Export 2 results:
Search results for biblio_type:Proceedings, refereed
Filters: Author is Ali, Awais [Reset Search]
Filters: Author is Ali, Awais [Reset Search]
"Modelling Security Requirements for Software Development with Common Criteria." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, edited by G. Wang, J. Feng, M. Z. A. Bhuiyan and R. Lu, XVI, 506. Vol. 11611. Springer, 2019.
amaranaseer_2019.pdf (1.5 MB)
Cloud Computing Security Threats and Attacks with Their Mitigation Techniques In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Edited by J. E. Guerrero. Nanjing, China: IEEE, 2017.
amaranaseer_paper2017.pdf (430.62 KB)