default search action
Shareeful Islam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Shareeful Islam, Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, A. K. M. Najmul Islam:
Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS. Cogn. Comput. 16(5): 2611-2625 (2024) - [j37]Randhir Kumar, Ahamed Aljuhani, Danish Javeed, Prabhat Kumar, Shareeful Islam, A. K. M. Najmul Islam:
Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework. Future Gener. Comput. Syst. 156: 191-205 (2024) - [j36]Nihala Basheer, Shareeful Islam, Mohammed K. S. Alwaheidi, Spyridon Papastergiou:
Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience. Sensors 24(15): 4859 (2024) - [j35]Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, Shareeful Islam, A. K. M. Najmul Islam:
Federated Learning-Based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges. IEEE Trans. Consumer Electron. 70(1): 2618-2627 (2024) - [c40]Spyridon Papastergiou, Shareeful Islam, Eleni-Maria Kalogeraki, Argyro Chatzopoulou, Panagiotis Bountakas, Konstantinos Pournaras, Sreedevi Beena, Nineta Polemi:
Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes. CSR 2024: 833-838 - [c39]Nihala Basheer, Bernardi Pranggono, Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework. AIAI (1) 2024: 316-329 - [c38]Ahmed Abdullah Khaled, Md Mahmudul Hasan, Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection. AIAI (1) 2024: 362-374 - [e2]Shareeful Islam, Arnon Sturm:
Intelligent Information Systems - CAiSE Forum 2024, Limassol, Cyprus, June 3-7, 2024, Proceedings. Lecture Notes in Business Information Processing 520, Springer 2024, ISBN 978-3-031-60999-2 [contents] - [i1]Gauri Shankar, Md Raihan Uddin, Saddam Hossain Mukta, Prabhat Kumar, Shareeful Islam, A. K. M. Najmul Islam:
Blockchain Based Information Security and Privacy Protection: Challenges and Future Directions using Computational Literature Review. CoRR abs/2409.14472 (2024) - 2023
- [j34]Haralambos Mouratidis, Shareeful Islam, Antonio Santos-Olmo, Luis Enrique Sánchez, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. Comput. Secur. 128: 103139 (2023) - [j33]Stefano Silvestri, Shareeful Islam, Spyridon Papastergiou, Christos Tzagkarakis, Mario Ciampi:
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors 23(2): 651 (2023) - [c37]Shareeful Islam, Christos Grigoriadis, Spyridon Papastergiou:
Information Sharing for Creating Awareness for Securing Healthcare Ecosystem. DRCN 2023: 1-5 - 2022
- [j32]Shareeful Islam, Abdulrazaq Abba, Umar Mukhtar Ismail, Haralambos Mouratidis, Spyridon Papastergiou:
Vulnerability prediction for secure healthcare supply chain service delivery. Integr. Comput. Aided Eng. 29(4): 389-409 (2022) - [j31]Halima Ibrahim Kure, Shareeful Islam, Mustansar Ali Ghazanfar, Asad Raza, Maruf Pasha:
Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system. Neural Comput. Appl. 34(1): 493-514 (2022) - [j30]Halima Ibrahim Kure, Shareeful Islam, Haralambos Mouratidis:
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Comput. Appl. 34(18): 15241-15271 (2022) - [j29]Mohammed K. S. Alwaheidi, Shareeful Islam:
Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems. Sensors 22(15): 5726 (2022) - [c36]Patrizia Ribino, Mario Ciampi, Shareeful Islam, Spyridon Papastergiou:
Swarm Intelligence Model for Securing Healthcare Ecosystem. EUSPN/ICTH 2022: 149-156 - [c35]Mohammed K. S. Alwaheidi, Shareeful Islam, Spyridon Papastergiou:
A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security. ICR 2022: 365-374 - [c34]Shareeful Islam, Spyridon Papastergiou, Stefano Silvestri:
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System. ISCC 2022: 1-7 - [c33]Patrizia Ribino, Shareeful Islam, Mario Ciampi, Spyros Papastergiou:
Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem. UCAmI 2022: 50-61 - 2021
- [j28]Abel Yeboah-Ofori, Shareeful Islam, Sin Wee Lee, Zia Ush-Shamszaman, Khan Muhammad, Meteb Altaf, Mabrook S. Al-Rakhami:
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access 9: 94318-94337 (2021) - [c32]Shareeful Islam, Haralambos Mouratidis, Hasan Mahmud:
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning. AIAI 2021: 494-504 - [c31]Abel Yeboah-Ofori, Haralambos Mouratidis, Umar Mukhtar Ismail, Shareeful Islam, Spyridon Papastergiou:
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology. AIAI 2021: 518-530 - [c30]Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures. PCI 2021: 334-339 - 2020
- [j27]Umar Mukhtar Ismail, Shareeful Islam:
A unified framework for cloud security transparency and audit. J. Inf. Secur. Appl. 54: 102594 (2020) - [c29]Shareeful Islam, Hasan Mahmud:
An Intelligence Learner Management System using Learning Analytics and Machine learning. ICETC 2020: 120-125
2010 – 2019
- 2019
- [j26]Mumina Uddin, Shareeful Islam, Ameer Al-Nemrat:
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access 7: 166676-166689 (2019) - [j25]Abel Yeboah-Ofori, Shareeful Islam:
Cyber Security Threat Modeling for Supply Chain Organizational Environments. Future Internet 11(3): 63 (2019) - [j24]Halima Ibrahim Kure, Shareeful Islam:
Assets focus risk management framework for critical infrastructure cybersecurity risk management. IET Cyper-Phys. Syst.: Theory & Appl. 4(4): 332-340 (2019) - [j23]Halima Ibrahim Kure, Shareeful Islam:
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure. J. Univers. Comput. Sci. 25(11): 1478-1502 (2019) - 2018
- [j22]Shareeful Islam, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Trans. Cloud Comput. 6(2): 387-400 (2018) - 2017
- [j21]Pusp Raj Joshi, Shareeful Islam, Syed Islam:
A Framework for Cloud Based E-Government from the Perspective of Developing Countries. Future Internet 9(4): 80 (2017) - 2016
- [j20]Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo, Edgar R. Weippl:
A Framework for Security Transparency in Cloud Computing. Future Internet 8(1): 5 (2016) - [j19]Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack Simulation based Software Protection Assessment Method with Petri Net. Int. J. Cyber Situational Aware. 1(1): 152-181 (2016) - [j18]Shareeful Islam, Stefan Fenz, Edgar R. Weippl, Christos Kalloniatis:
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners. Int. J. Secur. Softw. Eng. 7(3): 44-73 (2016) - [j17]Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
An information security risk-driven investment model for analysing human factors. Inf. Comput. Secur. 24(2): 205-227 (2016) - [c28]Umar Mukhtar Ismail, Syed Islam, Shareeful Islam:
Towards Cloud Security Monitoring: A Case Study. CCC 2016: 8-14 - [c27]Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack simulation based software protection assessment method. Cyber Security And Protection Of Digital Services 2016: 1-8 - [c26]Reza Alavi, Shareeful Islam:
Agile Changes of Security Landscape: A Human Factors and Security Investment View. HAISA 2016: 112-124 - 2015
- [c25]Moussa Ouedraogo, Shareeful Islam:
Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems. CAiSE Workshops 2015: 495-506 - [c24]Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee:
Managing Social Engineering Attacks- Considering Human Factors and Security Investment. HAISA 2015: 161-171 - [c23]Reza Alavi, Shareeful Islam, Haris Mouratidis:
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. ICGS3 2015: 50-56 - [c22]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
A Framework for Cloud Security Audit. ICGS3 2015: 296-309 - [c21]Alifah Aida Lope Abdul Rahman, Shareeful Islam:
Sustainability forecast for cloud migration. MESOCA 2015: 31-35 - [c20]Alifah Aida Lope Abdul Rahman, Shareeful Islam, Ameer Al-Nemrat:
Measuring sustainability for an effective Information System audit from public organization perspective. RCIS 2015: 42-51 - [c19]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
Cloud Security Audit for Migration and Continuous Monitoring. TrustCom/BigDataSE/ISPA (1) 2015: 1081-1087 - 2014
- [j16]Christos Kalloniatis, Haralambos Mouratidis, Vassilis Manousakis, Shareeful Islam, Stefanos Gritzalis, Evangelia Kavakli:
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Comput. Stand. Interfaces 36(4): 759-775 (2014) - [j15]Michalis Pavlidis, Shareeful Islam, Haralambos Mouratidis, Paul Kearney:
Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5(1): 25-48 (2014) - [j14]Shareeful Islam, Haralambos Mouratidis, Edgar R. Weippl:
An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Inf. Softw. Technol. 56(2): 117-133 (2014) - [c18]Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations. HCI (24) 2014: 297-305 - [c17]Shareeful Islam, Edgar R. Weippl, Katharina Krombholz:
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. iiWAS 2014: 185-189 - 2013
- [j13]Anca-Juliana Stoica, Shareeful Islam:
Integrative Educational Approach Oriented Towards Software and System Development. Int. J. Eng. Pedagog. 3(1): 36-43 (2013) - [j12]Benjamin Aziz, Clive Blackwell, Shareeful Islam:
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach. Int. J. Digit. Crime Forensics 5(2): 1-22 (2013) - [j11]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar R. Weippl:
Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Comput. Commun. 9(1) (2013) - [j10]Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat:
Analyzing Human Factors for an Effective Information Security Management System. Int. J. Secur. Softw. Eng. 4(1): 50-74 (2013) - [j9]Haralambos Mouratidis, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis:
A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9): 2276-2293 (2013) - [j8]Christos Kalloniatis, Haralambos Mouratidis, Shareeful Islam:
Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng. 18(4): 299-319 (2013) - [c16]Anca-Juliana Stoica, Shareeful Islam:
Teaching information and software security courses in regular and distance learning programs. EDUCON 2013: 44-50 - [c15]Clive Blackwell, Shareeful Islam, Benjamin Aziz:
Using a Goal-Driven Approach in the Investigation of a Questioned Contract. IFIP Int. Conf. Digital Forensics 2013: 153-167 - [c14]Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis:
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. TrustBus 2013: 185-198 - 2012
- [j7]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam:
Modelling Security Using Trust Based Concepts. Int. J. Secur. Softw. Eng. 3(2): 36-53 (2012) - [j6]Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner:
Model Based Process to Support Security and Privacy Requirements Engineering. Int. J. Secur. Softw. Eng. 3(3): 1-22 (2012) - [j5]Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Marc-Philippe Huget, Stefanos Gritzalis:
Aligning Security and Privacy to Support the Development of Secure Information Systems. J. Univers. Comput. Sci. 18(12): 1608-1627 (2012) - [j4]Kurt Schneider, Eric Knauss, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - [c13]Fatemeh Zarrabi, Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, David Preston:
A Meta-model for Legal Compliance and Trustworthiness of Information Systems. CAiSE Workshops 2012: 46-60 - [c12]Fatemeh Zarrabi Jorshari, Haralambos Mouratidis, Shareeful Islam:
Extracting security requirements from relevant laws and regulations. RCIS 2012: 1-9 - [c11]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, Paul Kearney:
Dealing with trust and control: A meta-model for trustworthy information systems development. RCIS 2012: 1-9 - [c10]Aleksandar Hudic, Lorenz Zechner, Shareeful Islam, Christian Krieg, Edgar R. Weippl, Severin Winkler, Richard Hable:
Towards a Unified Penetration Testing Taxonomy. SocialCom/PASSAT 2012: 811-812 - 2011
- [b1]Shareeful Islam:
Software development risk management model: a goal-driven approach. Technical University Munich, 2011, pp. 1-185 - [j3]Shareeful Islam, Siv Hilde Houmb:
Towards a Framework for Offshore Outsource Software Development Risk Management Model. J. Softw. 6(1): 38-47 (2011) - [j2]Shareeful Islam, Haralambos Mouratidis, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c9]Michalis Pavlidis, Shareeful Islam:
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. CAiSE Forum 2011: 89-96 - [c8]Michalis Pavlidis, Shareeful Islam, Haralambos Mouratidis:
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos. CAiSE Forum (Selected Papers) 2011: 95-109 - [c7]Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens:
Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18 - [c6]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - [e1]Cornelia Boldyreff, Shareeful Islam, Michel Léonard, Bernhard Thalheim:
Proceedings of the CAiSE Doctoral Consortium 2011, London, United Kingdom, June 21, 2011. CEUR Workshop Proceedings 731, CEUR-WS.org 2011 [contents] - 2010
- [j1]Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider:
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requir. Eng. 15(1): 63-93 (2010) - [c5]Shareeful Islam, Siv Hilde Houmb:
Integrating Risk Management Activities into Requirements Engineering. RCIS 2010: 299-310 - [c4]Shareeful Islam, Haralambos Mouratidis, Stefan Wagner:
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. REFSQ 2010: 255-261
2000 – 2009
- 2009
- [c3]Shareeful Islam, Md. Mahbubul Alam Joarder, Siv Hilde Houmb:
Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint. ICGSE 2009: 347-352 - 2008
- [c2]Shareeful Islam, Wei Dong:
Human factors in software security risk management. LMSA@ICSE 2008: 13-16 - [c1]Shareeful Islam, Jan Jürjens:
Incorporating Security Requirements from Legal Regulations into UMLsec model. MODSEC@MoDELS 2008
Coauthor Index
aka: Haris Mouratidis
aka: Spyros Papastergiou
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint