Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles by
Awais Rashid
Beyond Security-by-design: Securing a compromised system
13 January 2025 by
Awais Rashid
and
others
Cryptography and Security
,
Distributed, Parallel, and Cluster Computing
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
14 October 2024 by
Jan Klemmer
and
others
at
University of Bristol
Cryptography and Security
,
Software Engineering
Analytical sensitivity analysis and clinical impact modeling of Rapigen rapid diagnostics tests for malaria
3 September 2024 by
A. Golden
and
others
Public and Global Health
Saltzer & Schroeder for 2030: Security engineering principles in a world of AI
8 July 2024 by
Nikhil Patnaik
and
others
Software Engineering
Assessing Effectiveness of Cyber Essentials Technical Controls
21 June 2024 by
Priyanka Badva
and
others
Cryptography and Security
A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security
5 June 2024 by
Lata Nautiyal
and
Awais Rashid
Cryptography and Security
A Scoping Review of the Transcriptomic Perspective of Sepsis, a Move Towards Improved Precision Medicine?
5 December 2023 by
Ali Rashid
and
others
Intensive Care and Critical Care Medicine
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
28 August 2023 by
Kopo Ramokapane
and
others
Human-Computer Interaction
ExD: Explainable Deletion
25 August 2023 by
Kopo Ramokapane
and
Awais Rashid
Human-Computer Interaction
Towards Equitable Privacy
28 July 2023 by
Kopo Ramokapane
and
others
Cryptography and Security
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities
19 July 2023 by
Andrés Domínguez Hernández
and
others
Human-Computer Interaction
,
Computers and Society
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices
30 June 2023 by
Leonardo Horn Iwaya
and
others
Cryptography and Security
Decisions & Disruptions 2: Decide Harder
21 June 2023 by
Benjamin Shreeve
and
others
Cryptography and Security
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications
28 May 2023 by
Partha Das Chowdhury
and
others
Cryptography and Security
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
10 May 2023 by
Matthias Eckhart
and
others
at
University of Vienna
Cryptography and Security
,
Robotics
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications
31 January 2023 by
Mohammad Tahaei
and
others
Human-Computer Interaction
,
Cryptography and Security
A Survey of Relevant Text Mining Technology
28 November 2022 by
Claudia Peersman
and
others
Cryptography and Security
Better Call Saltzer \& Schroeder: A Retrospective Security Analysis of SolarWinds \& Log4j
4 November 2022 by
Partha Das Chowdhury
and
others
Software Engineering
A developmental pathway for epithelial-to-motoneuron transformation in C. elegans
27 September 2022 by
Ali Rashid
and
others
at
Rockefeller University
Neuroscience
Embedding Privacy Into Design Through Software Developers: Challenges & Solutions
8 September 2022 by
Mohammad Tahaei
and
others
Human-Computer Interaction
,
Cryptography and Security
"Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
4 August 2022 by
Karen Li
and
others
Cryptography and Security
,
Computation and Language
Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
3 August 2022 by
Colin Topping
and
others
Cryptography and Security
,
Computers and Society
Understanding motivations and characteristics of financially-motivated cybercriminals
28 March 2022 by
Claudia Peersman
and
others
Cryptography and Security
Automatic User Profiling in Darknet Markets: a Scalability Study
24 March 2022 by
Claudia Peersman
and
others
Cryptography and Security
,
Computers and Society
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
16 March 2022 by
Andrew Dwyer
and
others
Cryptography and Security
The Political Economy of Privacy Enhancing Technologies
24 February 2022 by
Partha Das Chowdhury
and
others
Computers and Society
,
NA
Characterising Cybercriminals: A Review
15 February 2022 by
Matthew Edwards
and
others
Computers and Society
,
Cryptography and Security
A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools
3 February 2022 by
Emmanouil Samanis
and
others
Cryptography and Security
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
22 January 2022 by
Leonardo Horn Iwaya
and
others
Cryptography and Security
,
Computers and Society
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
5 May 2021 by
Nikhil Patnaik
and
others
Cryptography and Security
,
Software Engineering
Load more