Shareeful Islam
Shareeful Islam
Associate Professor in Cyber Security, Anglia Ruskin University
Email confirmado em - Página inicial
Citado por
Citado por
E-government maturity model for sustainable E-government services from the perspective of developing countries
PR Joshi, S Islam
Sustainability 10 (6), 1882, 2018
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider
Requirements Engineering 15, 63-93, 2010
An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
MAR H I Kure, S Islam
Applied Science 8 (6), 2018
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
Cyber security threat modeling for supply chain organizational environments
A Yeboah-Ofori, S Islam
Future internet 11 (3), 63, 2019
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18, 299-319, 2013
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
S Islam, H Mouratidis, ER Weippl
Information and Software Technology 56 (2), 117-133, 2014
A dynamic access control model using authorising workflow and task-role-based access control
M Uddin, S Islam, A Al-Nemrat
Ieee Access 7, 166676-166689, 2019
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
A Yeboah-Ofori, I Shareeful, S Wee Lee, Z Ush Shamszaman, M K., ...
IEEE Access, 2021
Kyung-Sup Kwak The Internet of Things for Health Care: A Comprehensive Survey
SMR Islam
IEEE access 3, 678-708, 2015
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications 9 (1), 37-51, 2013
Software development risk management model: a goal driven approach
S Islam
Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009
A framework to support alignment of secure software engineering with legal regulations
S Islam, H Mouratidis, J Jürjens
Software & Systems Modeling 10 (3), 369-394, 2011
Assurance of security and privacy requirements for cloud deployment models
S Islam, M Ouedraogo, C Kalloniatis, H Mouratidis, S Gritzalis
IEEE Transactions on Cloud Computing 6 (2), 387-400, 2015
Enhancing security requirements engineering by organizational learning
K Schneider, E Knauss, S Houmb, S Islam, J Jürjens
Requirements Engineering 17, 35-56, 2012
Supporting requirements engineers in recognising security issues
E Knauss, S Houmb, K Schneider, S Islam, J Jürjens
Requirements Engineering: Foundation for Software Quality: 17th …, 2011
Riazul, et al."
SM Islam
The internet of things for health care: a comprehensive survey." IEEE Access …, 2015
A risk management framework for cloud migration decision support
S Islam, S Fenz, E Weippl, H Mouratidis
Journal of Risk and Financial Management 10 (2), 10, 2017
An information security risk-driven investment model for analysing human factors
R Alavi, S Islam, H Mouratidis
Information & Computer Security 24 (2), 205-227, 2016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20