Follow
Armstrong Nhlabatsi
Title
Cited by
Cited by
Year
Feature interaction: The security threat from within software systems
A Nhlabatsi, R Laney, B Nuseibeh
Progress in Informatics 5 (75), 1, 2008
602008
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
552019
Security requirements engineering for evolving software systems: A survey
A Nhlabatsi, B Nuseibeh, Y Yu
Security-aware systems applications and software development methods, 108-128, 2012
492012
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
382011
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
242018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
242018
Towards a unified framework for contextual variability in requirements
R Ali, Y Yu, R Chitchyan, A Nhlabatsi, P Giorgini
2009 Third International Workshop on Software Product Management, 31-34, 2009
222009
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong, A Nhlabatsi, N Fetais, KM Khan, DS Kim
2019 18th IEEE International Conference on Trust, Security and Privacy in …, 2019
162019
Requirements and specifications for adaptive security: concepts and analysis
TT Tun, M Yang, AK Bandara, Y Yu, A Nhlabatsi, N Khan, KM Khan, ...
Proceedings of the 13th International Conference on Software Engineering for …, 2018
162018
A process model for customisation of software in multi-tenant SaaS model
KM Khan, A Nhlabatsi, N Khan
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
72015
Managing security control assumptions using causal traceability
A Nhlabatsi, Y Yu, A Zisman, T Tun, N Khan, A Bandara, KM Khan, ...
2015 IEEE/ACM 8th International Symposium on Software and Systems …, 2015
72015
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
52022
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
52021
Noora Fetais, and Khaled M Khan. Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi
Computers & Security 79, 33-52, 2018
52018
“Why can’t I do that?”: tracing adaptive security decisions
A Nhlabatsi, T Tun, N Khan, Y Yu, A Bandara, KM Khan, B Nuseibeh
EAI Endorsed Transactions on Self-Adaptive Systems 1 (1), 2015
52015
Feature interaction as a context sharing problem
ANRLB NUSEIBEH
Feature Interactions in Software and Communication Systems X, 133, 2009
52009
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
42021
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, N Fetais, KM Khan
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
42018
Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe
KM Khan, A Nhlabatsi
International Journal of Humanities and Social Sciences 11 (7), 1821-1824, 2017
42017
Live migration of virtual machine memory content in networked systems: A review
RM Haris, KM Khan, A Nhlabatsi
Computer Networks, 108898, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20