Rubia Fatima

Orcid: 0000-0002-7144-1925

According to our database1, Rubia Fatima authored at least 23 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
What goes wrong during phishing education? A probe into a game-based assessment with unfavorable results.
Entertain. Comput., 2025

2024
Gamifying requirements: An empirical analysis of game-based technique for novices.
J. Softw. Evol. Process., June, 2024

Counteracting sociocultural barriers in global software engineering using group activities.
J. Softw. Evol. Process., May, 2024

Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security.
Inf. Softw. Technol., 2024

Re-evaluation of PhishI game and its utilisation in eliciting security requirements.
Int. J. Inf. Comput. Secur., 2024

2023
Retrieving arXiv, SocArXiv, and SSRN metadata for initial review screening.
Inf. Softw. Technol., 2023

Anomaly Prediction over Human Crowded Scenes via Associate-Based Data Mining and K-Ary Tree Hashing.
Int. J. Intell. Syst., 2023

On the Image-Based Detection of Tomato and Corn leaves Diseases : An in-depth comparative experiments.
CoRR, 2023

2022
Valuating requirements arguments in the online user's forum for requirements decision-making: The CrowdRE-VArg framework.
Softw. Pract. Exp., 2022

On the utilization of non-quality assessed literature in software engineering research.
J. Softw. Evol. Process., 2022

Stochastic Recognition of Human Physical Activities via Augmented Feature Descriptors and Random Forest Model.
Sensors, 2022

What Should Abeeha do? an Activity for Phishing Awareness.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
Understanding and deciphering of social engineering attack scenarios.
Secur. Priv., 2021

2020
On Using Grey Literature and Google Scholar in Systematic Literature Reviews in Software Engineering.
IEEE Access, 2020

Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

The Use of Grey Literature and Google Scholar in Software Engineering Systematic Literature Reviews.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Google Scholar vs. Dblp vs. Microsoft Academic Search: An Indexing Comparison for Software Engineering Literature.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Contemplating social engineering studies and attack scenarios: A review study.
Secur. Priv., 2019

How persuasive is a phishing email? A phishing game for phishing awareness.
J. Comput. Secur., 2019

Sharing information online rationally: An observation of user privacy concerns and awareness using serious game.
J. Inf. Secur. Appl., 2019

Improving software security awareness using a serious game.
IET Softw., 2019

Improving software requirements reasoning by novices: a story-based approach.
IET Softw., 2019

2017
Designing the Next Mobile App Recommender System for the Globe.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017


  Loading...