Shareeful Islam
Orcid: 0000-0003-0885-1881
According to our database1,
Shareeful Islam
authored at least 80 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS.
Cogn. Comput., September, 2024
Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.
Sensors, August, 2024
Federated Learning-Based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges.
IEEE Trans. Consumer Electron., February, 2024
Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework.
Future Gener. Comput. Syst., 2024
Blockchain Based Information Security and Privacy Protection: Challenges and Future Directions using Computational Literature Review.
CoRR, 2024
Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Modelling language for cyber security incident handling for critical infrastructures.
Comput. Secur., May, 2023
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem.
Sensors, January, 2023
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023
2022
Sensors, 2022
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection.
Neural Comput. Appl., 2022
Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system.
Neural Comput. Appl., 2022
Integr. Comput. Aided Eng., 2022
Swarm Intelligence Based Multi-Agent Communication Model for Securing Healthcare Ecosystem.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
Cyber Threat Analysis Using Natural Language Processing for a Secure Healthcare System.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the ICR'22 International Conference on Innovations in Computing Research, 2022
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022
2021
IEEE Access, 2021
A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021
2020
J. Inf. Secur. Appl., 2020
An Intelligence Learner Management System using Learning Analytics and Machine learning.
Proceedings of the ICETC'20: 12th International Conference on Education Technology and Computers, 2020
2019
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure.
J. Univers. Comput. Sci., 2019
Assets focus risk management framework for critical infrastructure cybersecurity risk management.
IET Cyper-Phys. Syst.: Theory & Appl., 2019
Future Internet, 2019
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control.
IEEE Access, 2019
2018
IEEE Trans. Cloud Comput., 2018
2017
A Framework for Cloud Based E-Government from the Perspective of Developing Countries.
Future Internet, 2017
2016
Inf. Comput. Secur., 2016
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
Int. J. Secur. Softw. Eng., 2016
Int. J. Cyber Situational Aware., 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Measuring sustainability for an effective Information System audit from public organization perspective.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015
Proceedings of the 9th IEEE International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments, 2015
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014
Int. J. Inf. Syst. Model. Des., 2014
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Requir. Eng., 2013
A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013
Int. J. Secur. Softw. Eng., 2013
Int. J. Pervasive Comput. Commun., 2013
Int. J. Digit. Crime Forensics, 2013
Int. J. Eng. Pedagog., 2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Teaching information and software security courses in regular and distance learning programs.
Proceedings of the IEEE Global Engineering Education Conference, 2013
2012
Requir. Eng., 2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012
Int. J. Secur. Softw. Eng., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
2011
A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011
Towards a Framework for Offshore Outsource Software Development Risk Management Model.
J. Softw., 2011
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2011
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.
Requir. Eng., 2010
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010
2009
Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint.
Proceedings of the 4th IEEE International Conference on Global Software Engineering, 2009
2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the First International Workshop on Leadership and Management in Software Architecture, 2008