Armstrong Nhlabatsi
Cited by
Cited by
Feature interaction: The security threat from within software systems
A Nhlabatsi, R Laney, B Nuseibeh
Progress in Informatics 5 (75), 1, 2008
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
Security requirements engineering for evolving software systems: A survey
A Nhlabatsi, B Nuseibeh, Y Yu
Security-aware systems applications and software development methods, 108-128, 2012
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
Towards a unified framework for contextual variability in requirements
R Ali, Y Yu, R Chitchyan, A Nhlabatsi, P Giorgini
2009 Third International Workshop on Software Product Management, 31-34, 2009
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong, A Nhlabatsi, N Fetais, KM Khan, DS Kim
2019 18th IEEE International Conference on Trust, Security and Privacy in …, 2019
Requirements and specifications for adaptive security: concepts and analysis
TT Tun, M Yang, AK Bandara, Y Yu, A Nhlabatsi, N Khan, KM Khan, ...
Proceedings of the 13th International Conference on Software Engineering for …, 2018
A process model for customisation of software in multi-tenant SaaS model
KM Khan, A Nhlabatsi, N Khan
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
Managing security control assumptions using causal traceability
A Nhlabatsi, Y Yu, A Zisman, T Tun, N Khan, A Bandara, KM Khan, ...
2015 IEEE/ACM 8th International Symposium on Software and Systems …, 2015
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
Noora Fetais, and Khaled M Khan. Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi
Computers & Security 79, 33-52, 2018
“Why can’t I do that?”: tracing adaptive security decisions
A Nhlabatsi, T Tun, N Khan, Y Yu, A Bandara, KM Khan, B Nuseibeh
EAI Endorsed Transactions on Self-Adaptive Systems 1 (1), 2015
Feature interaction as a context sharing problem
Feature Interactions in Software and Communication Systems X, 133, 2009
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, N Fetais, KM Khan
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe
KM Khan, A Nhlabatsi
International Journal of Humanities and Social Sciences 11 (7), 1821-1824, 2017
Live migration of virtual machine memory content in networked systems: A review
RM Haris, KM Khan, A Nhlabatsi
Computer Networks, 108898, 2022
The system can't perform the operation now. Try again later.
Articles 1–20