Quantifying security in secure software development phases MUA Khan, M Zulkernine 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 57 | 2008 |
On selecting appropriate development processes and requirements engineering methods for secure software MUA Khan, M Zulkernine 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 44 | 2009 |
A survey on requirements and design methods for secure software development MUA Khan, M Zulkernine Recuperado de: http://citeseerx. ist. psu. edu/viewdoc/download, 2009 | 29 | 2009 |
An empirical study on off-the-shelf component usage in industrial projects J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Torchiano, ... Product Focused Software Process Improvement: 6th International Conference …, 2005 | 27 | 2005 |
Integrating software specifications into intrusion detection M Zulkernine, M Graves, MUA Khan International Journal of Information Security 6, 345-357, 2007 | 21 | 2007 |
Activity and artifact views of a secure software development process MUA Khan, M Zulkernine 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 18 | 2009 |
Validation of new theses on off-the-shelf component based development J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Torchiano, ... 11th IEEE International Software Metrics Symposium (METRICS'05), 26-26, 2005 | 17 | 2005 |
Uml-sr: A novel security requirements specification language M Mohsin, MU Khan 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 10 | 2019 |
Security and Reliability Requirements for a Virtual Classroom S ur Rehman, MU Khan Procedia Computer Science 94, 447-452, 2016 | 9 | 2016 |
Representing security specifications in UML state machine diagrams MU Khan Procedia Computer Science 56, 453-458, 2015 | 9 | 2015 |
A hybrid monitoring of software design-level security specifications MU Khan, M Zulkernine 2014 14th International Conference on Quality Software, 111-116, 2014 | 8 | 2014 |
A reliable and secure virtualized clinical assistance tool for doctors and patients S ur Rehman, MU Khan Procedia Computer Science 94, 441-446, 2016 | 6 | 2016 |
Building components with embedded security monitors MUA Khan, M Zulkernine Proceedings of the joint ACM SIGSOFT conference--QoSA and ACM SIGSOFT …, 2011 | 6 | 2011 |
Barriers to disseminating off-the-shelf based development theories to IT industry J Li, R Conradi, OPN Slyngstad, C Bunse, U Khan, M Morisio, ... Proceedings of the second international workshop on Models and processes for …, 2005 | 2 | 2005 |
An empirical study on Off-the-Shelf component usage J Li, R Conradi, O Petter, N Slyngstad, C Bunse, U Khan, M Torchiano, ... Industrial Projects. Proc. 6th International Conference on Product Focused …, 2005 | 2 | 2005 |
Secure Communication Protocol Between Two Mobile Devices Over Short Distances MU Khan, F Chowdhury, Z Jahangir, F Ofougwuka Smart Societies, Infrastructure, Technologies and Applications: First …, 2018 | | 2018 |
Embedding Security Monitors in Software Components M Khan | | 2014 |
An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects U Khan, M Torchiano, M Morisio Product focused software process improvement: 6th international conference …, 2005 | | 2005 |