What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Awais Rashid
Google Scholar
ORCID:
0000-0002-0109-1341
38
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities.
Rui Huan
Kopo M. Ramokapane
Awais Rashid
2024
journals/compsec
A framework for mapping organisational workforce knowledge profile in cyber security.
Lata Nautiyal
Awais Rashid
2024
conf/ccs
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Jan H. Klemmer
Stefan Albert Horstmann
Nikhil Patnaik
Cordelia Ludden
Cordell Burton Jr.
Carson Powers
Fabio Massacci
Akond Rahman
Daniel Votipka
Heather Richter Lipford
Awais Rashid
Alena Naiakshina
Sascha Fahl
2024
conf/uss
Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense.
Priyanka Badva
Kopo M. Ramokapane
Eleonora Pantano
Awais Rashid
2024
conf/nspw
"When Data Breaches Happen, Where Does the Buck Stop?... and where should it stop?".
Partha Das Chowdhury
Karen Renaud
Awais Rashid
2024
conf/eurosp
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications.
Sami Ullah
Awais Rashid
2023
conf/nspw
ExD: Explainable Deletion.
Kopo Marvin Ramokapane
Awais Rashid
2023
conf/eurosp
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.
Feras Shahbi
Joseph Gardiner
Sridhar Adepu
Awais Rashid
2022
journals/popets
Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks.
Mohammad Tahaei
Kopo M. Ramokapane
Tianshi Li
Jason I. Hong
Awais Rashid
2022
conf/uss
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming.
Sharad Agarwal
Awais Rashid
Joseph Gardiner
2022
conf/nspw
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs.
Partha Das Chowdhury
Andrés Domínguez Hernández
Kopo Marvin Ramokapane
Awais Rashid
2021
journals/compsec
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks.
Colin Topping
Andrew Carl Dwyer
Ola Aleksandra Michalec
Barnaby Craggs
Awais Rashid
2021
conf/ccs
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Joseph Gardiner
Adam Eiffert
Peter Garraghan
Nicholas J. P. Race
Shishir Nagaraja
Awais Rashid
2021
conf/eurosp
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach.
Ziauddin Ursani
Claudia Peersman
Matthew Edwards
Chao Chen
Awais Rashid
2021
conf/esorics
Building a Privacy Testbed: Use Cases and Design Considerations.
Joseph Gardiner
Partha Das Chowdhury
Jacob Halsey
Mohammad Tahaei
Tariq Elahi
Awais Rashid
2020
journals/compsec
Contextualising and aligning security metrics and business objectives: A GQM-based methodology.
Eleni Philippou
Sylvain Frey
Awais Rashid
2020
journals/tifs
Automatically Dismantling Online Dating Fraud.
Guillermo Suarez-Tangil
Matthew Edwards
Claudia Peersman
Gianluca Stringhini
Awais Rashid
Monica T. Whitty
2020
conf/ccs
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Richard James Thomas
Joseph Gardiner
Tom Chothia
Emmanouil Samanis
Joshua Perrett
Awais Rashid
2020
conf/ccs
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
Joseph Gardiner
Awais Rashid
2020
conf/soups
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures.
Ola Aleksandra Michalec
Dirk van der Linden
Sveta Milyaeva
Awais Rashid
2019
journals/popets
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy.
Kopo M. Ramokapane
Anthony C. Mazeli
Awais Rashid
2019
conf/ccs
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds.
Joseph Gardiner
Barnaby Craggs
Benjamin Green
Awais Rashid
2019
conf/soups
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries.
Nikhil Patnaik
Joseph Hallett
Awais Rashid
2018
conf/ccs
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Awais Rashid
Nils Ole Tippenhauer
2018
conf/uss
Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks.
Joseph Hallett
Robert Larson
Awais Rashid
2017
journals/compsec
Panning for gold: Automatically analysing online social engineering attack surfaces.
Matthew Edwards
Robert Larson
Benjamin Green
Awais Rashid
Alistair Baron
2017
conf/ccs
CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy.
Rakesh B. Bobba
Awais Rashid
2017
conf/uss
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research.
Benjamin Green
Anhtuan Le
Rob Antrobus
Utz Roedig
David Hutchison
Awais Rashid
2017
conf/soups
"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies.
Kopo M. Ramokapane
Awais Rashid
Jose M. Such
2017
conf/soups
The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems.
Alberto Zanutto
Ben Shreeve
Karolina Follis
Jerry S. Busby
Awais Rashid
2016
journals/compsec
Information assurance techniques: Perceived cost effectiveness.
Jose M. Such
Antonios Gouglidis
William Knowles
Gaurav Misra
Awais Rashid
2016
conf/ccs
SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection.
William Jardine
Sylvain Frey
Benjamin Green
Awais Rashid
2016
conf/ccs
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions.
Kopo M. Ramokapane
Awais Rashid
Jose M. Such
2016
conf/soups
How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views.
Charles Weir
Awais Rashid
James Noble
2016
conf/eurosp
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe.
Sylvain Frey
Yehia Elkhatib
Awais Rashid
Karolina Follis
John Edward Vidler
Nicholas J. P. Race
Christopher Edwards
2015
conf/ccs
Assurance Techniques for Industrial Control Systems (ICS).
William Knowles
Jose M. Such
Antonios Gouglidis
Gaurav Misra
Awais Rashid
2014
conf/sp
iCOP: Automatically Identifying New Child Abuse Media in P2P Networks.
Claudia Peersman
Christian Schulze
Awais Rashid
Margaret Brennan
Carl Fischer
2014
conf/sp
DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations.
Ebrahim Hamad Al Hanaei
Awais Rashid
Coauthors
Adam Eiffert
(1)
Akond Rahman
(1)
Alberto Zanutto
(1)
Alena Naiakshina
(1)
Alistair Baron
(1)
Andrés Domínguez Hernández
(1)
Andrew Carl Dwyer
(1)
Anhtuan Le
(1)
Anthony C. Mazeli
(1)
Antonios Gouglidis
(2)
Awais Rashid
(38)
Barnaby Craggs
(2)
Ben Shreeve
(1)
Benjamin Green
(4)
Carl Fischer
(1)
Carson Powers
(1)
Chao Chen
(1)
Charles Weir
(1)
Christian Schulze
(1)
Christopher Edwards
(1)
Claudia Peersman
(3)
Colin Topping
(1)
Cordelia Ludden
(1)
Cordell Burton Jr.
(1)
Daniel Votipka
(1)
David Hutchison
(1)
Dirk van der Linden
(1)
Ebrahim Hamad Al Hanaei
(1)
Eleni Philippou
(1)
Eleonora Pantano
(1)
Emmanouil Samanis
(1)
Fabio Massacci
(1)
Feras Shahbi
(1)
Gaurav Misra
(2)
Gianluca Stringhini
(1)
Guillermo Suarez-Tangil
(1)
Heather Richter Lipford
(1)
Jacob Halsey
(1)
James Noble
(1)
Jan H. Klemmer
(1)
Jason I. Hong
(1)
Jerry S. Busby
(1)
John Edward Vidler
(1)
Jose M. Such
(4)
Joseph Gardiner
(7)
Joseph Hallett
(2)
Joshua Perrett
(1)
Karen Renaud
(1)
Karolina Follis
(2)
Kopo M. Ramokapane
(6)
Kopo Marvin Ramokapane
(2)
Lata Nautiyal
(1)
Margaret Brennan
(1)
Matthew Edwards
(3)
Mohammad Tahaei
(2)
Monica T. Whitty
(1)
Nicholas J. P. Race
(2)
Nikhil Patnaik
(2)
Nils Ole Tippenhauer
(1)
Ola Aleksandra Michalec
(2)
Partha Das Chowdhury
(3)
Peter Garraghan
(1)
Priyanka Badva
(1)
Rakesh B. Bobba
(1)
Richard James Thomas
(1)
Rob Antrobus
(1)
Robert Larson
(2)
Rui Huan
(1)
Sami Ullah
(1)
Sascha Fahl
(1)
Sharad Agarwal
(1)
Shishir Nagaraja
(1)
Sridhar Adepu
(1)
Stefan Albert Horstmann
(1)
Sveta Milyaeva
(1)
Sylvain Frey
(3)
Tariq Elahi
(1)
Tianshi Li
(1)
Tom Chothia
(1)
Utz Roedig
(1)
William Jardine
(1)
William Knowles
(2)
Yehia Elkhatib
(1)
Ziauddin Ursani
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to