default search action
Maria Riaz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Syed Luqman Shah, Irshad Ahmed Abbasi, Gasm Elseed Ibrahim Mohamed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, Maria Riaz:
TAMEC: Trusted Augmented Mobile Execution on Cloud. Sci. Program. 2021: 5542852:1-5542852:8 (2021) - 2020
- [c15]Maria Riaz, Juha-Matti Tilli, Raimo Kantola:
Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks. ICCCN 2020: 1-11 - [c14]Muhammad Usman Sheikh, Maria Riaz, Furqan Jameel, Riku Jäntti, Navuday Sharma, Vishal Sharma, Mamoun Alazab:
Quality-aware trajectory planning of cellular connected UAVs. DroneCom@MobiCom 2020: 79-85
2010 – 2019
- 2017
- [j5]Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams, Fabio Massacci, Christian Quesada-López, Marcelo Jenkins:
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. Empir. Softw. Eng. 22(4): 2127-2178 (2017) - [j4]Jason Tyler King, Jonathan Stallings, Maria Riaz, Laurie A. Williams:
To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment. Empir. Softw. Eng. 22(5): 2684-2717 (2017) - 2016
- [j3]Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
A grounded analysis of experts' decision-making during security assessments. J. Cybersecur. 2(2): 147-163 (2016) - [c13]Maria Riaz, Jonathan Stallings, Munindar P. Singh, John Slankas, Laurie A. Williams:
DIGS: A Framework for Discovering Goals for Security Requirements Engineering. ESEM 2016: 35:1-35:10 - [c12]Maria Riaz, Sarah Elder, Laurie A. Williams:
Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements. RE Workshops 2016: 62-67 - 2015
- [j2]Maria Riaz, Travis D. Breaux, Laurie A. Williams:
How have we evaluated software pattern application? A systematic mapping study of research design practices. Inf. Softw. Technol. 65: 14-38 (2015) - 2014
- [c11]Maria Riaz, John Slankas, Jason Tyler King, Laurie A. Williams:
Using templates to elicit implied security requirements from functional requirements - a controlled experiment. ESEM 2014: 22:1-22:10 - [c10]Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
Towards a framework to measure security expertise in requirements analysis. ESPRE 2014: 13-18 - [c9]Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams:
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. RE 2014: 183-192 - 2012
- [j1]Jeremy C. Maxwell, Annie I. Antón, Peter P. Swire, Maria Riaz, Christopher M. McCraw:
A legal cross-references taxonomy for reasoning about compliance requirements. Requir. Eng. 17(2): 99-115 (2012) - [c8]Maria Riaz, Laurie A. Williams:
Security requirements patterns: understanding the science behind the art of pattern writing. RePa 2012: 29-34
2000 – 2009
- 2005
- [c7]Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Young-Koo Lee:
Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery. ACIS-ICIS 2005: 175-180 - [c6]Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Young-Koo Lee:
Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach. ACIS-ICIS 2005: 513-518 - [c5]Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Taewoong Jeon, Hagbae Kim:
Grid Access Middleware for Handheld Devices. EGC 2005: 1002-1011 - [c4]Maria Riaz, Saad Liaquat Kiani, Anjum Shehzad, Sungyoung Lee:
Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach. ICCSA (2) 2005: 1096-1105 - [c3]Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems. RTCSA 2005: 451-454 - [c2]Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Sangman Han, Young-Koo Lee:
Service Delivery in Context Aware Environments: Lookup and Access Control Issues. RTCSA 2005: 455-458 - 2004
- [c1]Hung Quoc Ngo, Anjum Shehzad, Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee:
Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework. EUC 2004: 672-681 - 2003
- [i1]Aamir Shafi, Umer Farooq, Saad Liaquat Kiani, Maria Riaz, Anjum Shehzad, Arshad Ali, Iosif Legrand, Harvey B. Newman:
DIAMOnDS - DIstributed Agents for MObile & Dynamic Services. CoRR cs.DC/0305062 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 19:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint