关注
Muhammad U Khan
Muhammad U Khan
在 alfaisal.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Quantifying security in secure software development phases
MUA Khan, M Zulkernine
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
572008
On selecting appropriate development processes and requirements engineering methods for secure software
MUA Khan, M Zulkernine
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
442009
A survey on requirements and design methods for secure software development
MUA Khan, M Zulkernine
Recuperado de: http://citeseerx. ist. psu. edu/viewdoc/download, 2009
292009
An empirical study on off-the-shelf component usage in industrial projects
J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Torchiano, ...
Product Focused Software Process Improvement: 6th International Conference …, 2005
272005
Integrating software specifications into intrusion detection
M Zulkernine, M Graves, MUA Khan
International Journal of Information Security 6, 345-357, 2007
212007
Activity and artifact views of a secure software development process
MUA Khan, M Zulkernine
2009 International Conference on Computational Science and Engineering 3 …, 2009
182009
Validation of new theses on off-the-shelf component based development
J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Torchiano, ...
11th IEEE International Software Metrics Symposium (METRICS'05), 26-26, 2005
172005
Uml-sr: A novel security requirements specification language
M Mohsin, MU Khan
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
102019
Security and Reliability Requirements for a Virtual Classroom
S ur Rehman, MU Khan
Procedia Computer Science 94, 447-452, 2016
92016
Representing security specifications in UML state machine diagrams
MU Khan
Procedia Computer Science 56, 453-458, 2015
92015
A hybrid monitoring of software design-level security specifications
MU Khan, M Zulkernine
2014 14th International Conference on Quality Software, 111-116, 2014
82014
A reliable and secure virtualized clinical assistance tool for doctors and patients
S ur Rehman, MU Khan
Procedia Computer Science 94, 441-446, 2016
62016
Building components with embedded security monitors
MUA Khan, M Zulkernine
Proceedings of the joint ACM SIGSOFT conference--QoSA and ACM SIGSOFT …, 2011
62011
Barriers to disseminating off-the-shelf based development theories to IT industry
J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Morisio, ...
Proceedings of the second international workshop on Models and processes for …, 2005
22005
An empirical study on Off-the-Shelf component usage
J Li, R Conradi, O Petter, N Slyngstad, C Bunse, U Khan, M Torchiano, ...
Industrial Projects. Proc. 6th International Conference on Product Focused …, 2005
22005
Secure Communication Protocol Between Two Mobile Devices Over Short Distances
MU Khan, F Chowdhury, Z Jahangir, F Ofougwuka
Smart Societies, Infrastructure, Technologies and Applications: First …, 2018
2018
Embedding Security Monitors in Software Components
M Khan
2014
An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects
U Khan, M Torchiano, M Morisio
Product focused software process improvement: 6th international conference …, 2005
2005
系统目前无法执行此操作,请稍后再试。
文章 1–18