An online identity and smart contract management system A Yasin, L Liu 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 104 | 2016 |
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) A Yasin, L Liu, T Li, J Wang, D Zowghi Information and Software Technology 95, 179-200, 2018 | 99 | 2018 |
Improving software security awareness using a serious game A Yasin, L Liu, T Li, R Fatima, W Jianmin IET Software 13 (2), 159-169, 2019 | 85 | 2019 |
On using grey literature and google scholar in systematic literature reviews in software engineering A Yasin, R Fatima, L Wen, W Afzal, M Azhar, R Torkar IEEE Access 8, 36226-36243, 2020 | 65 | 2020 |
How persuasive is a phishing email? A phishing game for phishing awareness R Fatima, A Yasin, L Liu, J Wang Journal of Computer Security 27 (6), 581-612, 2019 | 62 | 2019 |
Contemplating social engineering studies and attack scenarios: A review study A Yasin, R Fatima, L Liu, A Yasin, J Wang Security and Privacy 2 (4), e73, 2019 | 52 | 2019 |
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin Journal of Information Security and Applications 48, 102351, 2019 | 43 | 2019 |
Using simulation system for collaborative learning to enhance learner’s performance S Zulfiqar, R Zhou, F Asmi, A Yasin Cogent Education 5 (1), 1424678, 2018 | 38 | 2018 |
Understanding and deciphering of social engineering attack scenarios A Yasin, R Fatima, L Liu, J Wang, R Ali, Z Wei Security and Privacy 4 (4), e161, 2021 | 20 | 2021 |
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework JA Khan, A Yasin, R Fatima, D Vasan, AA Khan, AW Khan Software: Practice and Experience 52 (12), 2537-2573, 2022 | 19 | 2022 |
On the quality of grey literature and its use in information synthesis during systematic literature reviews A Yasin, MI Hasnain | 19 | 2012 |
A natural language processing (NLP) evaluation on COVID‐19 rumour dataset using deep learning techniques R Fatima, N Samad Shaikh, A Riaz, S Ahmad, MA El-Affendi, ... Computational Intelligence and Neuroscience 2022 (1), 6561622, 2022 | 15 | 2022 |
Stochastic recognition of human physical activities via augmented feature descriptors and random forest model SB Tahir, AB Dogar, R Fatima, A Yasin, M Shafiq, JA Khan, M Assam, ... Sensors 22 (17), 6632, 2022 | 14 | 2022 |
Big data services requirements analysis A Yasin, L Liu, Z Cao, J Wang, Y Liu, TS Ling Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium …, 2018 | 10 | 2018 |
Machine Learning‐Based Multimodel Computing for Medical Imaging for Classification and Detection of Alzheimer Disease FH Alghamedy, M Shafiq, L Liu, A Yasin, RA Khan, HS Mohammed Computational Intelligence and Neuroscience 2022 (1), 9211477, 2022 | 9 | 2022 |
Impact of internet of things (IoT) as persuasive technology S Faryad, H Batool, M Asif, A Yasin IJ Information Technology and Computer Science 6 (2021), 16-28, 2021 | 9 | 2021 |
Counteracting social engineering attacks A Yasin, R Fatima, L Liu, J Wanga, R Ali, Z Wei Computer Fraud & Security 2021 (10), 15-19, 2021 | 9 | 2021 |
Exploring and mining rationale information for low-rating software applications T Ullah, JA Khan, ND Khan, A Yasin, H Arshad Soft Computing, 1-26, 2023 | 7 | 2023 |
On the utilization of non‐quality assessed literature in software engineering research A Yasin, R Fatima, L Liu, J Ali Khan, R Ali, J Wang Journal of Software: Evolution and Process 34 (7), e2464, 2022 | 6 | 2022 |
Improving software requirements reasoning by novices: a story‐based approach R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin IET Software 13 (6), 564-574, 2019 | 6 | 2019 |