Follow
Armstrong Nhlabatsi
Title
Cited by
Cited by
Year
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
762019
Feature interaction: The security threat from within software systems
A Nhlabatsi, R Laney, B Nuseibeh
Progress in Informatics 5 (75), 1, 2008
642008
Security requirements engineering for evolving software systems: A survey
A Nhlabatsi, B Nuseibeh, Y Yu
Security-aware systems applications and software development methods, 108-128, 2012
472012
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
402018
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
392011
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
382018
Towards a unified framework for contextual variability in requirements
R Ali, Y Yu, R Chitchyan, A Nhlabatsi, P Giorgini
2009 Third International Workshop on Software Product Management, 31-34, 2009
242009
Requirements and specifications for adaptive security: concepts and analysis
TT Tun, M Yang, AK Bandara, Y Yu, A Nhlabatsi, N Khan, KM Khan, ...
Proceedings of the 13th International Conference on Software Engineering for …, 2018
212018
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
202021
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong, A Nhlabatsi, N Fetais, KM Khan, DS Kim
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
202019
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
N Hussein, A Nhlabatsi
IoT 3 (4), 450-472, 2022
162022
Live migration of virtual machine memory content in networked systems
RM Haris, KM Khan, A Nhlabatsi
Computer Networks 209, 108898, 2022
152022
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
142022
Managing security control assumptions using causal traceability
A Nhlabatsi, Y Yu, A Zisman, T Tun, N Khan, A Bandara, KM Khan, ...
2015 IEEE/ACM 8th International Symposium on Software and Systems …, 2015
102015
A machine learning-based optimization approach for pre-copy live virtual machine migration
RM Haris, KM Khan, A Nhlabatsi, M Barhamgi
Cluster Computing 27 (2), 1293-1312, 2024
82024
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
82021
Spiral^ SRA: a threat-specific security risk assessment framework for the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, N Fetais, KM Khan
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
62018
A process model for customisation of software in multi-tenant SaaS model
KM Khan, A Nhlabatsi, N Khan
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
62015
“Why can’t I do that?”: tracing adaptive security decisions
A Nhlabatsi, T Tun, N Khan, Y Yu, A Bandara, KM Khan, B Nuseibeh
EAI Endorsed Transactions on Self-Adaptive Systems 1 (1), 2015
62015
Feature interaction as a context sharing problem
A Nhlabatsi, R Laney, B Nuseibeh
Feature Interactions in Software and Communication Systems X, 133-148, 2009
62009
The system can't perform the operation now. Try again later.
Articles 1–20