Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Between a rock and a cell phone: Communication and information technology use during the 2011 Egyptian uprising., , , , , , , and . ISCRAM, Simon Fraser University, Vancouver, Canada, (2012)Quantified extreme scenario based design approach., , and . SAC, page 1117-1122. ACM, (2013)Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study., , , and . CSE (3), page 213-218. IEEE Computer Society, (2009)Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements., , , and . ARES, page 1443-1450. IEEE Computer Society, (2008)Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt., , , , , , , and . Int. J. Inf. Syst. Crisis Response Manag., 5 (1): 1-21 (2013)Integrating Formal Analysis and Design to Preserve Security Properties., , , and . HICSS, page 1-10. IEEE Computer Society, (2009)Towards safe and productive development of secure software: FADES and model-based software engineering., , and . CSIIRW, page 20. ACM, (2010)Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements., , , and . IET Software, 4 (2): 149-160 (2010)ChameleonSoft: A moving target defense system., , and . CollaborateCom, page 241-250. ICST / IEEE, (2011)Spectral Domain Features for Ovarian cancer Data Analysis., , and . JCS, 9 (8): 1061-1068 (2013)