Home > Research > Researchers > Professor Awais Rashid > Publications

Professor Awais Rashid

Formerly at Lancaster University

  1. 2012
  2. Published

    Children Online: A survey of child language and CMC corpora

    Baron, A., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 2012, In: International Journal of Corpus Linguistics. 17, 4, p. 443-481 39 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A., 2012, International Conference on Cyber Security.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Collaborative Privacy Management for Third-Party Applications in Online Social Networks

    Anthonysamy, P., Rashid, A., Walkerdine, J., Greenwood, P. & Larkou, G., 2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    EA-tracer: identifying traceability links between code aspects and early aspects

    Sardinha, A., Yu, Y., Niu, N. & Rashid, A., 2012, SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing. New York, NY, USA: ACM, p. 1035-1042 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Pointcut rejuvenation: recovering pointcut expressions in evolving aspect-oriented software

    Khatchadourian, R., Greenwood, P., Rashid, A. & Xu, G., 2012, In: IEEE Transactions on Software Engineering. 38, 3, p. 642-657 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    UDesignIt: Towards Social Media for Community- Driven Design

    Greenwood, P., Rashid, A. & Walkerdine, J., 2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  9. 2013
  10. Published

    Aspect identification in textual requirements with EA-Miner

    Weston, N., Chitchyan, R., Sampaio, A., Rashid, A. & Greenwood, P., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 3-21 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  11. Published

    Aspect-oriented requirements engineering

    Moreira, A. (ed.), Chitchyan, R. (ed.), Araújo, J. (ed.) & Rashid, A. (ed.), 2013, Berlin: Springer. 383 p.

    Research output: Book/Report/ProceedingsBook

  12. Published

    Conflict identification with EA-Analyzer

    Sardinha, A., Chitchyan, R., Araújo, J., Moreira, A. & Rashid, A., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 209-224 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  13. Published

    EA-analyzer: automating conflict detection in a large set of textual aspect-oriented requirements

    Sardinha, J., Chitchyan, R., Weston, N., Greenwood, P. & Rashid, A., 03/2013, In: Automated Software Engineering. 20, 1, p. 111-135 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Mastering crosscutting architectural decisions with aspects

    Sant'Anna, C., Garcia, A., Batista, T. V. & Rashid, A., 03/2013, In: Software: Practice and Experience. 43, 3, p. 305-332 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Who am I? Analysing Digital Personas in Cybercrime Investigations

    Rashid, A., Baron, A., Rayson, P., May-Chahal, C., Greenwood, P. & Walkerdine, J., 04/2013, In: Computer. 46, 4, p. 54-61 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Social networking privacy: understanding the disconnect from policy to controls

    Anthonysamy, P., Greenwood, P. & Rashid, A., 06/2013, In: Computer. 46, 6, p. 60-67 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Towards the practical mutation testing of AspectJ programs

    Ferrari, F., Rashid, A. & Maldonado, J. C., 1/09/2013, In: Science of Computer Programming. 78, 9, p. 1639-1662 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. 2014
  19. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    DFC2M2: a capability maturity model for digital forensics organisations

    Al Hanaei, E. H. S. S. & Rashid, A., 2014, Security and Privacy Workshops (SPW), 2014 IEEE. Piscataway, N.J.: IEEE Publishing, p. 57-60 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    iCOP: automatically identifying new child abuse media in P2P networks

    Peersman, C., Schulze, C., Rashid, A., Brennan, M. & Fischer, C., 2014, 2014 IEEE Symposium on Security and Privacy Workshops. IEEE Publishing, p. 124-131 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Introducing a framework for scalable dynamic process discovery

    Redlich, D., Gilani, W., Molka, T., Drobek, M., Rashid, A. & Blair, G. S., 2014, Advances in Enterprise Engineering VIII : 4th Enterprise Engineering Working Conference, EEWC 2014, Funchal, Madeira Island, Portugal, May 5-8, 2014. Proceedings. Aveiro, D., Tribolet, J. & Gouveia, D. (eds.). Springer, p. 151-166 16 p. (Lecture Notes in Business Information Processing; vol. 174).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Safeguarding cyborg childhoods: incorporating the on/offline behaviour of children into everyday social work practices

    May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P. & Greenwood, P., 2014, In: British Journal of Social Work. 44, 3, p. 596-614 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  29. Published

    Tackling the requirements jigsaw puzzle

    Albuquerque, M. P. & Rashid, A., 08/2014, Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE Computer Society, p. 233-242 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. 2015
  31. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  32. Published

    Engineering sustainability through language

    Chitchyan, R., Cazzola, W. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on. IEEE, Vol. 2. p. 501-504 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Evaluation of the dynamic construct competition miner for an eHealth system

    Redlich, D., Galushka, M., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2015, Business Information Systems : 18th International Conference, BIS 2015, Poznań, Poland, June 24-26, 2015, Proceedings. Abramowicz, W. (ed.). Cham: Springer, p. 115-126 12 p. (Lecture Notes in Business Information Processing; vol. 208).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 2015, SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity . New York: ACM, p. 17-18 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Software engineering for privacy in-the-large

    Anthonysamy, P. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ). IEEE Press, p. 947-948 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  38. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Managing emergent ethical concerns for software engineering in society

    Rashid, A., Moore, K., May-Chahal, C. & Chitchyan, R., 16/06/2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ) . IEEE, p. 523-526 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In: ACM Computing Surveys. 48, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Detecting broken pointcuts using structural commonality and degree of interest

    Khatchadourian, R., Rashid, A., Masuhara, H. & Watanabe, T., 9/11/2015, 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) November 9–13, 2015 Lincoln, Nebraska, USA. IEEE, p. 641-646 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Dynamic constructs competition miner - occurrence- vs. time-based ageing

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 19/11/2015, Data-Driven Process Discovery and Analysis: 4th International Symposium, SIMPDA 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers. Ceravolo, P., Russo, B. & Accorsi, R. (eds.). Springer, p. 79-106 28 p. (Lecture Notes in Business Information Processing; vol. 237).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. 2016
  45. Published
  46. Published

    Poster: The Role of Confirmation Bias in Potentially Undermining Speculative Cryptocurrency Decisions

    Craggs, B. & Rashid, A., 03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  47. Published

    Study on the gender dimension of trafficking in human beings

    Walby, S., Apitzsch, B., Armstrong, J. E., Balderston, S., Szmagalska-Follis, K., Francis, B. J., Kelly, L., May-Chahal, C. A., Rashid, A., Shire, K., Towers, J. & Tunte, M., 16/03/2016, 240 p. Luxembourg : European Commission.

    Research output: Other contribution

  48. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Inferring semantic mapping between policies and code: the clue is in the language

    Anthonysamy, P., Edwards, M., Weichel, C. & Rashid, A., 29/03/2016, Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, United Kingdom, April 6-8, 2016. Proceedings.. Caballero, J., Bodden, E. & Athanasopoulos, E. (eds.). Springer, p. 233-250 18 p. (Lecture Notes in Computer Science; vol. 9639).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  51. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top