Armstrong Nhlabatsi
Armstrong Nhlabatsi
Потвърден имейл адрес: qu.edu.qa
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
Feature interaction: The security threat from within software systems
A Nhlabatsi, R Laney, B Nuseibeh
Progress in Informatics 5 (75), 1, 2008
Security requirements engineering for evolving software systems: A survey
A Nhlabatsi, B Nuseibeh, Y Yu
Security-aware systems applications and software development methods, 108-128, 2012
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
Towards a unified framework for contextual variability in requirements
R Ali, Y Yu, R Chitchyan, A Nhlabatsi, P Giorgini
2009 Third International Workshop on Software Product Management, 31-34, 2009
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong, A Nhlabatsi, N Fetais, KM Khan, DS Kim
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
Requirements and specifications for adaptive security: concepts and analysis
TT Tun, M Yang, AK Bandara, Y Yu, A Nhlabatsi, N Khan, KM Khan, ...
Proceedings of the 13th International Conference on Software Engineering for …, 2018
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
Live migration of virtual machine memory content in networked systems
RM Haris, KM Khan, A Nhlabatsi
Computer Networks 209, 108898, 2022
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
Managing security control assumptions using causal traceability
A Nhlabatsi, Y Yu, A Zisman, T Tun, N Khan, A Bandara, KM Khan, ...
2015 IEEE/ACM 8th International Symposium on Software and Systems …, 2015
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
N Hussein, A Nhlabatsi
IoT 3 (4), 450-472, 2022
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
Noora Fetais, and Khaled M Khan. Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi
Computers & Security 79, 33-52, 2018
A process model for customisation of software in multi-tenant SaaS model
KM Khan, A Nhlabatsi, N Khan
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
“Why can’t I do that?”: tracing adaptive security decisions
A Nhlabatsi, T Tun, N Khan, Y Yu, A Bandara, KM Khan, B Nuseibeh
EAI Endorsed Transactions on Self-Adaptive Systems 1 (1), 2015
Feature interaction as a context sharing problem
Feature Interactions in Software and Communication Systems X, 133, 2009
Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe
KM Khan, A Nhlabatsi
International Journal of Humanities and Social Sciences 11 (7), 1821-1824, 2017
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20