Home > Research > Researchers > Professor Awais Rashid > Publications

Professor Awais Rashid

Formerly at Lancaster University

  1. 2014
  2. Published

    Tackling the requirements jigsaw puzzle

    Albuquerque, M. P. & Rashid, A., 08/2014, Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE Computer Society, p. 233-242 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  4. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    DFC2M2: a capability maturity model for digital forensics organisations

    Al Hanaei, E. H. S. S. & Rashid, A., 2014, Security and Privacy Workshops (SPW), 2014 IEEE. Piscataway, N.J.: IEEE Publishing, p. 57-60 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    iCOP: automatically identifying new child abuse media in P2P networks

    Peersman, C., Schulze, C., Rashid, A., Brennan, M. & Fischer, C., 2014, 2014 IEEE Symposium on Security and Privacy Workshops. IEEE Publishing, p. 124-131 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Introducing a framework for scalable dynamic process discovery

    Redlich, D., Gilani, W., Molka, T., Drobek, M., Rashid, A. & Blair, G. S., 2014, Advances in Enterprise Engineering VIII : 4th Enterprise Engineering Working Conference, EEWC 2014, Funchal, Madeira Island, Portugal, May 5-8, 2014. Proceedings. Aveiro, D., Tribolet, J. & Gouveia, D. (eds.). Springer, p. 151-166 16 p. (Lecture Notes in Business Information Processing; vol. 174).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Safeguarding cyborg childhoods: incorporating the on/offline behaviour of children into everyday social work practices

    May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P. & Greenwood, P., 2014, In: British Journal of Social Work. 44, 3, p. 596-614 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. 2013
  14. Published

    Towards the practical mutation testing of AspectJ programs

    Ferrari, F., Rashid, A. & Maldonado, J. C., 1/09/2013, In: Science of Computer Programming. 78, 9, p. 1639-1662 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Social networking privacy: understanding the disconnect from policy to controls

    Anthonysamy, P., Greenwood, P. & Rashid, A., 06/2013, In: Computer. 46, 6, p. 60-67 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Who am I? Analysing Digital Personas in Cybercrime Investigations

    Rashid, A., Baron, A., Rayson, P., May-Chahal, C., Greenwood, P. & Walkerdine, J., 04/2013, In: Computer. 46, 4, p. 54-61 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    EA-analyzer: automating conflict detection in a large set of textual aspect-oriented requirements

    Sardinha, J., Chitchyan, R., Weston, N., Greenwood, P. & Rashid, A., 03/2013, In: Automated Software Engineering. 20, 1, p. 111-135 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Mastering crosscutting architectural decisions with aspects

    Sant'Anna, C., Garcia, A., Batista, T. V. & Rashid, A., 03/2013, In: Software: Practice and Experience. 43, 3, p. 305-332 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Aspect identification in textual requirements with EA-Miner

    Weston, N., Chitchyan, R., Sampaio, A., Rashid, A. & Greenwood, P., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 3-21 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  20. Published

    Aspect-oriented requirements engineering

    Moreira, A. (ed.), Chitchyan, R. (ed.), Araújo, J. (ed.) & Rashid, A. (ed.), 2013, Berlin: Springer. 383 p.

    Research output: Book/Report/ProceedingsBook

  21. Published

    Conflict identification with EA-Analyzer

    Sardinha, A., Chitchyan, R., Araújo, J., Moreira, A. & Rashid, A., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 209-224 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  22. 2012
  23. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  24. Published

    Children Online: A survey of child language and CMC corpora

    Baron, A., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 2012, In: International Journal of Corpus Linguistics. 17, 4, p. 443-481 39 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A., 2012, International Conference on Cyber Security.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Collaborative Privacy Management for Third-Party Applications in Online Social Networks

    Anthonysamy, P., Rashid, A., Walkerdine, J., Greenwood, P. & Larkou, G., 2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  27. Published

    EA-tracer: identifying traceability links between code aspects and early aspects

    Sardinha, A., Yu, Y., Niu, N. & Rashid, A., 2012, SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing. New York, NY, USA: ACM, p. 1035-1042 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Pointcut rejuvenation: recovering pointcut expressions in evolving aspect-oriented software

    Khatchadourian, R., Greenwood, P., Rashid, A. & Xu, G., 2012, In: IEEE Transactions on Software Engineering. 38, 3, p. 642-657 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...10 Next

Back to top