Maria Riaz

According to our database1, Maria Riaz authored at least 22 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
TAMEC: Trusted Augmented Mobile Execution on Cloud.
Sci. Program., 2021

2020
Quality-aware trajectory planning of cellular connected UAVs.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2017
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.
Empir. Softw. Eng., 2017

To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment.
Empir. Softw. Eng., 2017

2016
A grounded analysis of experts' decision-making during security assessments.
J. Cybersecur., 2016

Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

DIGS: A Framework for Discovering Goals for Security Requirements Engineering.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

2015
How have we evaluated software pattern application? A systematic mapping study of research design practices.
Inf. Softw. Technol., 2015

2014
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Towards a framework to measure security expertise in requirements analysis.
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014

Using templates to elicit implied security requirements from functional requirements - a controlled experiment.
Proceedings of the 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2014

2012
A legal cross-references taxonomy for reasoning about compliance requirements.
Requir. Eng., 2012

Security requirements patterns: understanding the science behind the art of pattern writing.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

2005
Service Delivery in Context Aware Environments: Lookup and Access Control Issues.
Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 2005

A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems.
Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 2005

Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach.
Proceedings of the Computational Science and Its Applications, 2005

Grid Access Middleware for Handheld Devices.
Proceedings of the Advances in Grid Computing, 2005

Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
DIAMOnDS - DIstributed Agents for MObile & Dynamic Services
CoRR, 2003


  Loading...