Home > Research > Researchers > Professor Awais Rashid > Publications

Professor Awais Rashid

Formerly at Lancaster University

  1. Chapter (peer-reviewed)
  2. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  3. Published

    Aspect-oriented software development: an introduction

    Brichau, J., Chitchyan, R., Rashid, A. & D'Hondt, T., 2008, Wiley Encyclopedia of Computer Science and Engineering 2008. John Wiley and Sons

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  4. Chapter
  5. Published

    Engineering Aspect-Oriented Systems

    Blair, G. S., Blair, L., Rashid, A., Chitchyan, R., Moreira, A. & Araujo, J., 01/2005, Aspect-oriented software development. Filman, R. E., Elrad, T., Clarke, S. & Aksit, M. (eds.). Harlow: Addison Wesley Longman, p. 379-406 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Software Evolution with XVCL

    Loughran, N., Rashid, A., Zhang, W., Jarzabek, S. & Zhang, H., 04/2004, EPRINTS-BOOK-TITLE.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Conference contribution/Paper
  8. Published

    Schrödinger’s Security: Opening the Box on App Developers’ Security Rationale

    van der Linden, D., Anthonysamy, P., Nuseibeh, B., Tun, T. T., Petre, M., Levine, M., Towse, J. & Rashid, A., 23/05/2020, ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York: Association for Computing Machinery (ACM), p. 149-160 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    "I feel stupid I can't delete...": a study of users' cloud deletion practices and coping strategies

    Ramokapane, K. M., Rashid, A. & Such, J., 12/07/2017, Proceedings of SOUPS 2017 Thirteenth Symposium on Usable Privacy and Security. USENIX Association, p. 241-256 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Privacy requirements: present and future

    Anthonysamy, P., Rashid, A. & Chitchyan, R., 29/06/2017, Software Engineering: Software Engineering in Society Track (ICSE-SEIS), 2017 IEEE/ACM 39th International Conference on. IEEE, p. 13-22 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Smart cyber-physical systems: beyond usable security to security ergonomics by design

    Craggs, B. & Rashid, A., 21/05/2017, 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS'17): held in conjunction with International Conference on Software Engineering (ICSE), Buenos Aires, Argentina, 21 May 2017. IEEE, p. 22-25 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)

    Whitty, M., Edwards, M. J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T. & Stringhini, G., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York: ACM, p. 1311-1314 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Sampling labelled profile data for identity resolution

    Edwards, M., Wattam, S. M., Rayson, P. E. & Rashid, A., 5/12/2016, Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE, p. 540-547 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    SimaticScan: towards a specialised vulnerability scanner for industrial control systems

    Antrobus, R., Frey, S., Green, B. & Rashid, A., 23/08/2016, Proceedings 4th International Symposium for ICS & SCADA Cyber Security Research. BCS

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Mimicry in online conversations: an exploratory study of linguistic analysis techniques

    Carrick, T., Rashid, A. & Taylor, P. J., 18/08/2016, Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Inferring semantic mapping between policies and code: the clue is in the language

    Anthonysamy, P., Edwards, M., Weichel, C. & Rashid, A., 29/03/2016, Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, United Kingdom, April 6-8, 2016. Proceedings.. Caballero, J., Bodden, E. & Athanasopoulos, E. (eds.). Springer, p. 233-250 18 p. (Lecture Notes in Computer Science; vol. 9639).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Dynamic constructs competition miner - occurrence- vs. time-based ageing

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 19/11/2015, Data-Driven Process Discovery and Analysis: 4th International Symposium, SIMPDA 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers. Ceravolo, P., Russo, B. & Accorsi, R. (eds.). Springer, p. 79-106 28 p. (Lecture Notes in Business Information Processing; vol. 237).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Detecting broken pointcuts using structural commonality and degree of interest

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 9/11/2015, 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) November 9–13, 2015 Lincoln, Nebraska, USA. IEEE, p. 641-646 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Managing emergent ethical concerns for software engineering in society

    Rashid, A., Moore, K., May-Chahal, C. & Chitchyan, R., 16/06/2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ) . IEEE, p. 523-526 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Engineering sustainability through language

    Chitchyan, R., Cazzola, W. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on. IEEE, Vol. 2. p. 501-504 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Software engineering for privacy in-the-large

    Anthonysamy, P. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ). IEEE Press, p. 947-948 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Evaluation of the dynamic construct competition miner for an eHealth system

    Redlich, D., Galushka, M., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2015, Business Information Systems : 18th International Conference, BIS 2015, Poznań, Poland, June 24-26, 2015, Proceedings. Abramowicz, W. (ed.). Cham: Springer, p. 115-126 12 p. (Lecture Notes in Business Information Processing; vol. 208).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 2015, SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity . New York: ACM, p. 17-18 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Tackling the requirements jigsaw puzzle

    Albuquerque, M. P. & Rashid, A., 08/2014, Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE Computer Society, p. 233-242 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    iCOP: automatically identifying new child abuse media in P2P networks

    Peersman, C., Schulze, C., Rashid, A., Brennan, M. & Fischer, C., 2014, 2014 IEEE Symposium on Security and Privacy Workshops. IEEE Publishing, p. 124-131 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    DFC2M2: a capability maturity model for digital forensics organisations

    Al Hanaei, E. H. S. S. & Rashid, A., 2014, Security and Privacy Workshops (SPW), 2014 IEEE. Piscataway, N.J.: IEEE Publishing, p. 57-60 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Introducing a framework for scalable dynamic process discovery

    Redlich, D., Gilani, W., Molka, T., Drobek, M., Rashid, A. & Blair, G. S., 2014, Advances in Enterprise Engineering VIII : 4th Enterprise Engineering Working Conference, EEWC 2014, Funchal, Madeira Island, Portugal, May 5-8, 2014. Proceedings. Aveiro, D., Tribolet, J. & Gouveia, D. (eds.). Springer, p. 151-166 16 p. (Lecture Notes in Business Information Processing; vol. 174).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    EA-tracer: identifying traceability links between code aspects and early aspects

    Sardinha, A., Yu, Y., Niu, N. & Rashid, A., 2012, SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing. New York, NY, USA: ACM, p. 1035-1042 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A., 2012, International Conference on Cyber Security.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Aspect assumptions: a retrospective study of AspectJ developers' assumptions about aspect usage

    Zschaler, S. & Rashid, A., 2011, AOSD '11 Proceedings of the tenth international conference on Aspect-oriented software development. New York: ACM Press, p. 93-104 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Inferring test results for dynamic software product lines

    Cafeo, B., Noppen, J., Ferrari, F., Chitchyan, R. & Rashid, A., 2011, ESEC/FSE '11 Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering. New York: ACM Press, p. 500-503 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Do the Privacy Policies Reflect the Privacy Controls on Social Networks?

    Anthonysamy, P., Rashid, A. & Greenwood, P., 2011, Privacy, Security, Risk and Trust (PASSAT). IEEE Xplore, p. 1155-1158 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Taming Unbounded Variability in Service Engineering

    Anthonysamy, P., Rashid, A. & Rummler, A., 2011, Business Process Management Workshops BPM 2010 International Workshops and Education Track, Hoboken, NJ, USA, September 13-15, 2010, Revised Selected Papers. zur Muehlen, M. & Su, J. (eds.). Berlin: Springer, p. 615-619 4 p. (Lecture Notes in Business Information Processing; vol. 66, no. 7).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 Next

Back to top