Export 2 results:
Filters: Author is Ali, Awais [Clear All Filters]
"Modelling Security Requirements for Software Development with Common Criteria." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, edited by G. Wang, J. Feng, M. Z. A. Bhuiyan and R. Lu, XVI, 506. Vol. 11611. Springer, 2019.
amaranaseer_2019.pdf (1.5 MB)
Cloud Computing Security Threats and Attacks with Their Mitigation Techniques In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Edited by J. E. Guerrero. Nanjing, China: IEEE, 2017.
amaranaseer_paper2017.pdf (430.62 KB)