Shareeful Islam

Orcid: 0000-0003-0885-1881

According to our database1, Shareeful Islam authored at least 71 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Modelling language for cyber security incident handling for critical infrastructures.
Comput. Secur., May, 2023

A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem.
Sensors, January, 2023

Information Sharing for Creating Awareness for Securing Healthcare Ecosystem.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

2022
Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems.
Sensors, 2022

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection.
Neural Comput. Appl., 2022

Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system.
Neural Comput. Appl., 2022

Vulnerability prediction for secure healthcare supply chain service delivery.
Integr. Comput. Aided Eng., 2022

Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security.
Proceedings of the ICR'22 International Conference on Innovations in Computing Research, 2022

2021
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security.
IEEE Access, 2021

A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

2020
A unified framework for cloud security transparency and audit.
J. Inf. Secur. Appl., 2020

An Intelligence Learner Management System using Learning Analytics and Machine learning.
Proceedings of the ICETC'20: 12th International Conference on Education Technology and Computers, 2020

2019
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure.
J. Univers. Comput. Sci., 2019

Assets focus risk management framework for critical infrastructure cybersecurity risk management.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Cyber Security Threat Modeling for Supply Chain Organizational Environments.
Future Internet, 2019

A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control.
IEEE Access, 2019

2018
Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Comput., 2018

2017
A Framework for Cloud Based E-Government from the Perspective of Developing Countries.
Future Internet, 2017

2016
An information security risk-driven investment model for analysing human factors.
Inf. Comput. Secur., 2016

Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
Int. J. Secur. Softw. Eng., 2016

Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware., 2016

A Framework for Security Transparency in Cloud Computing.
Future Internet, 2016

Agile Changes of Security Landscape: A Human Factors and Security Investment View.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Attack simulation based software protection assessment method.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Towards Cloud Security Monitoring: A Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Cloud Security Audit for Migration and Continuous Monitoring.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Measuring sustainability for an effective Information System audit from public organization perspective.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015

Sustainability forecast for cloud migration.
Proceedings of the 9th IEEE International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments, 2015

A Framework for Cloud Security Audit.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014

Modeling Trust Relationships for Developing Trustworthy Information Systems.
Int. J. Inf. Syst. Model. Des., 2014

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Evaluating cloud deployment scenarios based on security and privacy requirements.
Requir. Eng., 2013

A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013

Analyzing Human Factors for an Effective Information Security Management System.
Int. J. Secur. Softw. Eng., 2013

Data Confidentiality using Fragmentation in Cloud Computing.
Int. J. Pervasive Comput. Commun., 2013

A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.
Int. J. Digit. Crime Forensics, 2013

Integrative Educational Approach Oriented Towards Software and System Development.
Int. J. Eng. Pedagog., 2013

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Proceedings of the Advances in Digital Forensics IX, 2013

Teaching information and software security courses in regular and distance learning programs.
Proceedings of the IEEE Global Engineering Education Conference, 2013

2012
Enhancing security requirements engineering by organizational learning.
Requir. Eng., 2012

Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012

Modelling Security Using Trust Based Concepts.
Int. J. Secur. Softw. Eng., 2012

Model Based Process to Support Security and Privacy Requirements Engineering.
Int. J. Secur. Softw. Eng., 2012

Towards a Unified Penetration Testing Taxonomy.
Proceedings of the 2012 International Conference on Privacy, 2012

Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

Extracting security requirements from relevant laws and regulations.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

A Meta-model for Legal Compliance and Trustworthiness of Information Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

2011
Software development risk management model: a goal-driven approach.
PhD thesis, 2011

A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011

Towards a Framework for Offshore Outsource Software Development Risk Management Model.
J. Softw., 2011

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Supporting Requirements Engineers in Recognising Security Issues.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2011

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Requir. Eng., 2010

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

Integrating Risk Management Activities into Requirements Engineering.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

2009
Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint.
Proceedings of the 4th IEEE International Conference on Global Software Engineering, 2009

2008
Incorporating Security Requirements from Legal Regulations into UMLsec model.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Human factors in software security risk management.
Proceedings of the First International Workshop on Leadership and Management in Software Architecture, 2008


  Loading...