Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider Requirements Engineering 15, 63-93, 2010 | 178 | 2010 |
E-government maturity model for sustainable E-government services from the perspective of developing countries PR Joshi, S Islam Sustainability 10 (6), 1882, 2018 | 176 | 2018 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 170 | 2013 |
An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System MAR H I Kure, S Islam Applied Science 8 (6), 2018 | 168 | 2018 |
Cyber security threat modeling for supply chain organizational environments A Yeboah-Ofori, S Islam Future internet 11 (3), 63, 2019 | 102 | 2019 |
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli Computer Standards & Interfaces 36 (4), 759-775, 2014 | 92 | 2014 |
Evaluating cloud deployment scenarios based on security and privacy requirements C Kalloniatis, H Mouratidis, S Islam Requirements Engineering 18, 299-319, 2013 | 84 | 2013 |
An empirical study on the implementation and evaluation of a goal-driven software development risk management model S Islam, H Mouratidis, ER Weippl Information and Software Technology 56 (2), 117-133, 2014 | 79 | 2014 |
A dynamic access control model using authorising workflow and task-role-based access control M Uddin, S Islam, A Al-Nemrat Ieee Access 7, 166676-166689, 2019 | 74 | 2019 |
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security A Yeboah-Ofori, I Shareeful, S Wee Lee, Z Ush Shamszaman, M K., ... IEEE Access, 2021 | 67 | 2021 |
Kyung-Sup Kwak The Internet of Things for Health Care: A Comprehensive Survey SMR Islam IEEE access 3, 678-708, 2015 | 67* | 2015 |
Data confidentiality using fragmentation in cloud computing A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl International Journal of Pervasive Computing and Communications 9 (1), 37-51, 2013 | 66 | 2013 |
Software development risk management model: a goal driven approach S Islam Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009 | 66 | 2009 |
A framework to support alignment of secure software engineering with legal regulations S Islam, H Mouratidis, J Jürjens Software & Systems Modeling 10 (3), 369-394, 2011 | 65 | 2011 |
Enhancing security requirements engineering by organizational learning K Schneider, E Knauss, S Houmb, S Islam, J Jürjens Requirements Engineering 17, 35-56, 2012 | 64 | 2012 |
Supporting requirements engineers in recognising security issues E Knauss, S Houmb, K Schneider, S Islam, J Jürjens Requirements Engineering: Foundation for Software Quality: 17th …, 2011 | 64 | 2011 |
Assurance of security and privacy requirements for cloud deployment models S Islam, M Ouedraogo, C Kalloniatis, H Mouratidis, S Gritzalis IEEE Transactions on Cloud Computing 6 (2), 387-400, 2015 | 63 | 2015 |
Riazul, et al." SM Islam The internet of things for health care: a comprehensive survey." IEEE Access …, 2015 | 61 | 2015 |
A risk management framework for cloud migration decision support S Islam, S Fenz, E Weippl, H Mouratidis Journal of Risk and Financial Management 10 (2), 10, 2017 | 58 | 2017 |
An information security risk-driven investment model for analysing human factors R Alavi, S Islam, H Mouratidis Information & Computer Security 24 (2), 205-227, 2016 | 58 | 2016 |