Home > Research > Researchers > Professor Awais Rashid > Publications

Professor Awais Rashid

Formerly at Lancaster University

  1. Conference contribution/Paper
  2. Published

    Software engineering for privacy in-the-large

    Anthonysamy, P. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ). IEEE Press, p. 947-948 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Evaluation of the dynamic construct competition miner for an eHealth system

    Redlich, D., Galushka, M., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2015, Business Information Systems : 18th International Conference, BIS 2015, Poznań, Poland, June 24-26, 2015, Proceedings. Abramowicz, W. (ed.). Cham: Springer, p. 115-126 12 p. (Lecture Notes in Business Information Processing; vol. 208).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 2015, SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity . New York: ACM, p. 17-18 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Tackling the requirements jigsaw puzzle

    Albuquerque, M. P. & Rashid, A., 08/2014, Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE Computer Society, p. 233-242 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    iCOP: automatically identifying new child abuse media in P2P networks

    Peersman, C., Schulze, C., Rashid, A., Brennan, M. & Fischer, C., 2014, 2014 IEEE Symposium on Security and Privacy Workshops. IEEE Publishing, p. 124-131 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    DFC2M2: a capability maturity model for digital forensics organisations

    Al Hanaei, E. H. S. S. & Rashid, A., 2014, Security and Privacy Workshops (SPW), 2014 IEEE. Piscataway, N.J.: IEEE Publishing, p. 57-60 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...23 Next

Back to top