עקוב אחר
Affan Yasin
Affan Yasin
Post Doctoral Researcher
כתובת אימייל מאומתת בדומיין tsinghua.org.cn - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
An online identity and smart contract management system
A Yasin, L Liu
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
1032016
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
982018
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
792019
On using grey literature and google scholar in systematic literature reviews in software engineering
A Yasin, R Fatima, L Wen, W Afzal, M Azhar, R Torkar
IEEE Access 8, 36226-36243, 2020
632020
How persuasive is a phishing email? A phishing game for phishing awareness
R Fatima, A Yasin, L Liu, J Wang
Journal of Computer Security 27 (6), 581-612, 2019
572019
Contemplating social engineering studies and attack scenarios: A review study
A Yasin, R Fatima, L Liu, A Yasin, J Wang
Security and Privacy 2 (4), e73, 2019
512019
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game
R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin
Journal of Information Security and Applications 48, 102351, 2019
432019
Using simulation system for collaborative learning to enhance learner’s performance
S Zulfiqar, R Zhou, F Asmi, A Yasin
Cogent Education 5 (1), 1424678, 2018
352018
Understanding and deciphering of social engineering attack scenarios
A Yasin, R Fatima, L Liu, J Wang, R Ali, Z Wei
Security and Privacy 4 (4), e161, 2021
202021
On the quality of grey literature and its use in information synthesis during systematic literature reviews
A Yasin, MI Hasnain
192012
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework
JA Khan, A Yasin, R Fatima, D Vasan, AA Khan, AW Khan
Software: Practice and Experience 52 (12), 2537-2573, 2022
172022
A natural language processing (NLP) evaluation on COVID-19 rumour dataset using deep learning techniques
R Fatima, N Samad Shaikh, A Riaz, S Ahmad, MA El-Affendi, ...
Computational Intelligence and Neuroscience 2022, 2022
142022
Stochastic recognition of human physical activities via augmented feature descriptors and random forest model
SB Tahir, AB Dogar, R Fatima, A Yasin, M Shafiq, JA Khan, M Assam, ...
Sensors 22 (17), 6632, 2022
142022
Big data services requirements analysis
A Yasin, L Liu, Z Cao, J Wang, Y Liu, TS Ling
Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium …, 2018
102018
Impact of internet of things (IoT) as persuasive technology
S Faryad, H Batool, M Asif, A Yasin
IJ Information Technology and Computer Science 6 (2021), 16-28, 2021
92021
Counteracting social engineering attacks
A Yasin, R Fatima, L Liu, J Wanga, R Ali, Z Wei
Computer Fraud & Security 2021 (10), 15-19, 2021
92021
Machine learning-based multimodel computing for medical imaging for classification and detection of Alzheimer disease
FH Alghamedy, M Shafiq, L Liu, A Yasin, RA Khan, HS Mohammed
Computational Intelligence and Neuroscience 2022, 2022
82022
Exploring and mining rationale information for low-rating software applications
T Ullah, JA Khan, ND Khan, A Yasin, H Arshad
Soft Computing, 1-26, 2023
72023
On the utilization of non‐quality assessed literature in software engineering research
A Yasin, R Fatima, L Liu, J Ali Khan, R Ali, J Wang
Journal of Software: Evolution and Process 34 (7), e2464, 2022
52022
Ontologies as building blocks of cloud security
NS Shaikh, A Yasin, R Fatima
International Journal of Information Technology and Computer Science (IJITCS …, 2022
52022
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20