Home > Research > Researchers > Professor Awais Rashid > Publications

Professor Awais Rashid

Formerly at Lancaster University

  1. 2020
  2. Published

    Schrödinger’s Security: Opening the Box on App Developers’ Security Rationale

    van der Linden, D., Anthonysamy, P., Nuseibeh, B., Tun, T. T., Petre, M., Levine, M., Towse, J. & Rashid, A., 23/05/2020, ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York: Association for Computing Machinery (ACM), p. 149-160 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2018
  4. Published

    Data Exfiltration: A Review of External Attack Vectors and Countermeasures

    Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A. & Rashid, A., 1/01/2018, In: Journal of Network and Computer Applications. 101, p. 18-54 37 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating

    Cazzola, W., Chitchyan, R., Rashid, A. & Shaqiri, A., 01/2018, In: Computer Languages, Systems and Structures. 51, p. 71-89 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. 2017
  7. Published

    Detecting broken pointcuts using structural commonality and degree of interest

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 15/12/2017, In: Science of Computer Programming. 150, p. 56-74 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. E-pub ahead of print

    The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game

    Frey, S. A. F., Rashid, A., Anthonysamy, P., Pinto-Albuquerque, M. & Naqvi, S. A. A., 13/12/2017, (E-pub ahead of print) In: IEEE Transactions on Software Engineering. 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  11. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In: Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Privacy requirements: present and future

    Anthonysamy, P., Rashid, A. & Chitchyan, R., 29/06/2017, Software Engineering: Software Engineering in Society Track (ICSE-SEIS), 2017 IEEE/ACM 39th International Conference on. IEEE, p. 13-22 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Smart cyber-physical systems: beyond usable security to security ergonomics by design

    Craggs, B. & Rashid, A., 21/05/2017, 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS'17): held in conjunction with International Conference on Software Engineering (ICSE), Buenos Aires, Argentina, 21 May 2017. IEEE, p. 22-25 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)

    Whitty, M., Edwards, M. J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T. & Stringhini, G., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York: ACM, p. 1311-1314 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  21. 2016
  22. Published

    Sampling labelled profile data for identity resolution

    Edwards, M., Wattam, S. M., Rayson, P. E. & Rashid, A., 5/12/2016, Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE, p. 540-547 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Flash mobs, Arab Spring and protest movements: can we analyse group identities in online conversations?

    Criado Pacheco, N., Rashid, A. & Leite, L., 15/11/2016, In: Expert Systems with Applications. 62, p. 212-224 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    iCOP: live forensics to reveal previously unknown criminal media on P2P networks

    Peersman, C., Schulze, C., Rashid, A., Brennan, M. & Fischer, C., 1/09/2016, In: Digital Investigation. 18, p. 50-64 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    SimaticScan: towards a specialised vulnerability scanner for industrial control systems

    Antrobus, R., Frey, S., Green, B. & Rashid, A., 23/08/2016, Proceedings 4th International Symposium for ICS & SCADA Cyber Security Research. BCS

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Mimicry in online conversations: an exploratory study of linguistic analysis techniques

    Carrick, T., Rashid, A. & Taylor, P. J., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...10 Next

Back to top