Empirical research in requirements engineering: trends and opportunities T Ambreen, N Ikram, M Usman, M Niazi Requirements Engineering 23, 63-95, 2018 | 132 | 2018 |
Establishing trust in offshore software outsourcing relationships: an exploratory study using a systematic literature review M Niazi, N Ikram, M Bano, S Imtiaz, SU Khan IET software 7 (5), 283-293, 2013 | 86 | 2013 |
A tertiary study: experiences of conducting systematic literature reviews in software engineering S Imtiaz, M Bano, N Ikram, M Niazi Proceedings of the 17th international conference on evaluation and …, 2013 | 79 | 2013 |
Goal oriented requirement engineering: A critical study of techniques S Anwer, N Ikram 2006 13th Asia Pacific Software Engineering Conference (APSEC'06), 121-130, 2006 | 67 | 2006 |
Causes of requirement change-a systematic literature review M Bano, S Imtiaz, N Ikram, M Niazi, M Usman IET Digital Library, 2012 | 63 | 2012 |
Requirement change management process models: activities, artifacts and roles S Ramzan, N Ikram 2006 IEEE International Multitopic Conference, 219-223, 2006 | 57 | 2006 |
Making decision in requirement change management S Ramzan, N Ikram 2005 International Conference on Information and Communication Technologies …, 2005 | 52 | 2005 |
Issues and challenges of requirement engineering in service oriented software development M Bano, N Ikram 2010 Fifth International Conference on Software Engineering Advances, 64-69, 2010 | 49 | 2010 |
Systematic reviews in requirements engineering: A tertiary study M Bano, D Zowghi, N Ikram 2014 IEEE 4th International Workshop on Empirical Requirements Engineering …, 2014 | 43 | 2014 |
What makes service oriented requirements engineering challenging? A qualitative study M Bano, D Zowghi, N Ikram, M Niazi IET software 8 (4), 154-160, 2014 | 37 | 2014 |
GlobReq: A framework for improving requirements engineering in global software development projects: Preliminary results M Niazi, M El-Attar, M Usman, N Ikram 16th International Conference on Evaluation & Assessment in Software …, 2012 | 35 | 2012 |
Dynamics of task allocation in global software development S Imtiaz, N Ikram Software: Process and Evolution, 2016 | 33 | 2016 |
Cyber-security and risky behaviors in a developing country context: A Pakistani perspective NF Khan, N Ikram, S Saleem, S Zafar Security Journal 36 (2), 373-405, 2023 | 28 | 2023 |
Build software or buy: A study on developing large scale software B Shahzad, AM Abdullatif, N Ikram, A Mashkoor IEEE Access 5, 24262-24274, 2017 | 28 | 2017 |
Requirements validation techniques in GSD: A survey F Yousuf, Z Zaman, N Ikram 2008 IEEE International Multitopic Conference, 553-557, 2008 | 28 | 2008 |
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model NF Khan, N Ikram, H Murtaza, M Javed Computers & Security 125, 103049, 2023 | 27 | 2023 |
Evidence in software architecture, a systematic literature review N Qureshi, M Usman, N Ikram Proceedings of the 17th International Conference on Evaluation and …, 2013 | 25 | 2013 |
Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach NF Khan, N Ikram, H Murtaza, MA Asadi Kybernetes 52 (1), 401-421, 2023 | 24 | 2023 |
Impact analysis from multiple perspectives: Evaluation of traceability techniques S Imtiaz, N Ikram, S Imtiaz 2008 The Third International Conference on Software Engineering Advances …, 2008 | 18 | 2008 |
Empirical investigation of critical requirements engineering practices for global software development HU Khan, M Niazi, M El-Attar, N Ikram, SU Khan, AQ Gill IEEE Access 9, 93593-93613, 2021 | 17 | 2021 |