Shamal Faily
Orcid: 0000-0002-2859-1143Affiliations:
- Bournemouth University, UK
According to our database1,
Shamal Faily
authored at least 80 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Human factors and cyber-security risks on the railway - the critical role played by signalling operations.
Inf. Comput. Secur., 2024
2022
Comput. Secur., 2022
Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
2021
Inf. Comput. Secur., 2021
Comput. Secur., 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Critical Information Infrastructures Security, 2021
2020
Future Internet, 2020
The Impact of Undergraduate Mentorship on Student Satisfaction and Engagement, Teamwork Performance, and Team Dysfunction in a Software Engineering Group Project.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects.
J. Syst. Softw., 2019
Comput. Secur., 2019
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
Proceedings of the 13th Annual Conference on System of Systems Engineering, 2018
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Springer, ISBN: 978-3-319-75492-5, 2018
2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017
Design as Code: Facilitating Collaboration Between Usability and Security Engineers Using CAIRIS.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 30th IEEE Conference on Software Engineering Education and Training, 2017
Proceedings of the HCI 2017, 2017
2016
Requir. Eng., 2016
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
Proceedings of the HCI 2016, 2016
Improving Human-Reviews Interaction: A Study of the Role, Use, and Place of Online Reviews.
Proceedings of the HCI 2016, 2016
Proceedings of the HCI 2016, 2016
Proceedings of the HCI 2016, 2016
2015
Inf. Comput. Secur., 2015
Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Eliciting and visualising trust expectations using persona trust characteristics and goal models.
Proceedings of the 6th International Workshop on Social Software Engineering, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014
Proceedings of the Cyberpatterns, 2014
2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Mobile Computing, Applications, and Services, 2013
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project.
Proceedings of the Hardware and Software: Verification and Testing, 2013
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
Model-driven architectural risk analysis using architectural and contextualised attack patterns.
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the Human-Centered Software Engineering - 4th International Conference, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012
2011
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework.
Int. J. Secur. Softw. Eng., 2011
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011
Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Inf. Manag. Comput. Secur., 2010
Int. J. Secur. Softw. Eng., 2010
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
2008
Towards Requirements Engineering Practice for Professional End User Developers: A Case Study.
Proceedings of the Third International Workshop on Requirements Engineering Education and Training, 2008