<?xml version="1.0"?>
<dblpperson name="Maria Riaz" pid="61/1663" n="22">
<person key="homepages/61/1663" mdate="2009-06-09">
<author pid="61/1663">Maria Riaz</author>
</person>
<r><article key="journals/sp/ShahAMAARR21" mdate="2025-10-27">
<author orcid="0000-0001-9155-7549" pid="289/6581">Syed Luqman Shah</author>
<author orcid="0000-0003-1813-1415" pid="215/5617">Irshad Ahmed Abbasi</author>
<author pid="195/6963">Gasm Elseed Ibrahim Mohamed</author>
<author orcid="0000-0002-2753-8615" pid="151/8246-2">Sikandar Ali 0002</author>
<author pid="62/3931">Zahid Anwar</author>
<author pid="50/7805">Qasim Rajpoot</author>
<author pid="61/1663">Maria Riaz</author>
<title>TAMEC: Trusted Augmented Mobile Execution on Cloud.</title>
<pages>5542852:1-5542852:8</pages>
<year>2021</year>
<volume>2021</volume>
<journal>Sci. Program.</journal>
<ee type="oa">https://doi.org/10.1155/2021/5542852</ee>
<url>db/journals/sp/sp2021.html#ShahAMAARR21</url>
</article>
</r>
<r><inproceedings key="conf/icccn/RiazTK20" mdate="2021-04-09">
<author pid="61/1663">Maria Riaz</author>
<author orcid="0000-0001-6033-4377" pid="208/2150">Juha-Matti Tilli</author>
<author pid="87/6119">Raimo Kantola</author>
<title>Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks.</title>
<pages>1-11</pages>
<year>2020</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN49398.2020.9209718</ee>
<crossref>conf/icccn/2020</crossref>
<url>db/conf/icccn/icccn2020.html#RiazTK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/SheikhRJJS0A20" mdate="2024-07-08">
<author pid="32/10126">Muhammad Usman Sheikh</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="195/9170">Furqan Jameel</author>
<author pid="j/RikuJantti">Riku J&#228;ntti</author>
<author pid="192/3653">Navuday Sharma</author>
<author orcid="0000-0001-7470-6506" pid="20/6234-1">Vishal Sharma 0001</author>
<author orcid="0000-0002-1928-3704" pid="16/7566">Mamoun Alazab</author>
<title>Quality-aware trajectory planning of cellular connected UAVs.</title>
<pages>79-85</pages>
<year>2020</year>
<booktitle>DroneCom@MobiCom</booktitle>
<ee>https://doi.org/10.1145/3414045.3415943</ee>
<crossref>conf/mobicom/2020dronecom</crossref>
<url>db/conf/mobicom/dronecom2020.html#SheikhRJJS0A20</url>
</inproceedings>
</r>
<r><article key="journals/ese/RiazKSWMQJ17" mdate="2020-10-26">
<author pid="61/1663">Maria Riaz</author>
<author pid="34/11105">Jason Tyler King</author>
<author pid="119/9526">John Slankas</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<author orcid="0000-0002-1091-8486" pid="59/6145">Fabio Massacci</author>
<author pid="150/8937">Christian Quesada-L&#243;pez</author>
<author pid="15/2948">Marcelo Jenkins</author>
<title>Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.</title>
<pages>2127-2178</pages>
<year>2017</year>
<volume>22</volume>
<journal>Empir. Softw. Eng.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10664-016-9481-1</ee>
<ee>https://www.wikidata.org/entity/Q57425274</ee>
<url>db/journals/ese/ese22.html#RiazKSWMQJ17</url>
</article>
</r>
<r><article key="journals/ese/KingSRW17" mdate="2021-10-14">
<author pid="34/11105">Jason Tyler King</author>
<author orcid="0000-0002-0180-9309" pid="186/0403">Jonathan Stallings</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment.</title>
<pages>2684-2717</pages>
<year>2017</year>
<volume>22</volume>
<journal>Empir. Softw. Eng.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s10664-016-9449-1</ee>
<ee>https://www.wikidata.org/entity/Q57424504</ee>
<url>db/journals/ese/ese22.html#KingSRW17</url>
</article>
</r>
<r><article key="journals/cybersecurity/HibshiBRW16" mdate="2020-09-07">
<author pid="118/1575">Hanan Hibshi</author>
<author pid="62/962">Travis D. Breaux</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>A grounded analysis of experts' decision-making during security assessments.</title>
<pages>147-163</pages>
<year>2016</year>
<volume>2</volume>
<journal>J. Cybersecur.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1093/cybsec/tyw010</ee>
<url>db/journals/cybersecurity/cybersecurity2.html#HibshiBRW16</url>
</article>
</r>
<r><inproceedings key="conf/esem/RiazSSSW16" mdate="2025-05-01">
<author pid="61/1663">Maria Riaz</author>
<author orcid="0000-0002-0180-9309" pid="186/0403">Jonathan Stallings</author>
<author orcid="0000-0003-3599-3893" pid="s/MunindarPSingh">Munindar P. Singh</author>
<author pid="119/9526">John Slankas</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>DIGS: A Framework for Discovering Goals for Security Requirements Engineering.</title>
<pages>35:1-35:10</pages>
<year>2016</year>
<booktitle>ESEM</booktitle>
<ee>https://doi.org/10.1145/2961111.2962599</ee>
<crossref>conf/esem/2016</crossref>
<url>db/conf/esem/esem2016.html#RiazSSSW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/RiazEW16" mdate="2023-03-24">
<author pid="61/1663">Maria Riaz</author>
<author pid="190/1215">Sarah Elder</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements.</title>
<pages>62-67</pages>
<year>2016</year>
<booktitle>RE Workshops</booktitle>
<ee>https://doi.org/10.1109/REW.2016.025</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/REW.2016.025</ee>
<crossref>conf/re/2016</crossref>
<url>db/conf/re/re2016w.html#RiazEW16</url>
</inproceedings>
</r>
<r><article key="journals/infsof/RiazBW15" mdate="2020-02-20">
<author pid="61/1663">Maria Riaz</author>
<author orcid="0000-0001-7127-8155" pid="62/962">Travis D. Breaux</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>How have we evaluated software pattern application? A systematic mapping study of research design practices.</title>
<pages>14-38</pages>
<year>2015</year>
<volume>65</volume>
<journal>Inf. Softw. Technol.</journal>
<ee>https://doi.org/10.1016/j.infsof.2015.04.002</ee>
<ee>https://www.wikidata.org/entity/Q57436465</ee>
<url>db/journals/infsof/infsof65.html#RiazBW15</url>
</article>
</r>
<r><inproceedings key="conf/esem/RiazSKW14" mdate="2018-11-06">
<author pid="61/1663">Maria Riaz</author>
<author pid="119/9526">John Slankas</author>
<author pid="34/11105">Jason Tyler King</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>Using templates to elicit implied security requirements from functional requirements - a controlled experiment.</title>
<pages>22:1-22:10</pages>
<year>2014</year>
<booktitle>ESEM</booktitle>
<ee>https://doi.org/10.1145/2652524.2652532</ee>
<crossref>conf/esem/2014</crossref>
<url>db/conf/esem/esem2014.html#RiazSKW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/HibshiBRW14" mdate="2023-03-24">
<author orcid="0000-0003-0250-3616" pid="118/1575">Hanan Hibshi</author>
<author orcid="0000-0001-7127-8155" pid="62/962">Travis D. Breaux</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>Towards a framework to measure security expertise in requirements analysis.</title>
<pages>13-18</pages>
<year>2014</year>
<booktitle>ESPRE</booktitle>
<ee>https://doi.org/10.1109/ESPRE.2014.6890522</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ESPRE.2014.6890522</ee>
<crossref>conf/re/2014espre</crossref>
<url>db/conf/re/espre2014.html#HibshiBRW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/RiazKSW14" mdate="2024-04-25">
<author pid="61/1663">Maria Riaz</author>
<author pid="34/11105">Jason Tyler King</author>
<author pid="119/9526">John Slankas</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>Hidden in plain sight: Automatically identifying security requirements from natural language artifacts.</title>
<pages>183-192</pages>
<year>2014</year>
<booktitle>RE</booktitle>
<ee>https://doi.org/10.1109/RE.2014.6912260</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RE.2014.6912260</ee>
<ee>https://orkg.org/orkg/resource/R211380</ee>
<crossref>conf/re/2014</crossref>
<url>db/conf/re/re2014.html#RiazKSW14</url>
</inproceedings>
</r>
<r><article key="journals/re/MaxwellASRM12" mdate="2018-11-14">
<author pid="76/7861">Jeremy C. Maxwell</author>
<author pid="a/AnnieIAnton">Annie I. Ant&#243;n</author>
<author pid="25/1945">Peter P. Swire</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="46/11449">Christopher M. McCraw</author>
<title>A legal cross-references taxonomy for reasoning about compliance requirements.</title>
<pages>99-115</pages>
<year>2012</year>
<volume>17</volume>
<journal>Requir. Eng.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s00766-012-0152-5</ee>
<ee>https://www.wikidata.org/entity/Q56502461</ee>
<url>db/journals/re/re17.html#MaxwellASRM12</url>
</article>
</r>
<r><inproceedings key="conf/re/RiazW12" mdate="2023-03-24">
<author pid="61/1663">Maria Riaz</author>
<author pid="w/LaurieAWilliams">Laurie A. Williams</author>
<title>Security requirements patterns: understanding the science behind the art of pattern writing.</title>
<pages>29-34</pages>
<year>2012</year>
<booktitle>RePa</booktitle>
<ee>https://doi.org/10.1109/RePa.2012.6359977</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RePa.2012.6359977</ee>
<crossref>conf/re/2012repa</crossref>
<url>db/conf/re/repa2012.html#RiazW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ACISicis/RiazKLL05" mdate="2024-07-03">
<author pid="61/1663">Maria Riaz</author>
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<author pid="53/1318">Young-Koo Lee</author>
<title>Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery.</title>
<pages>175-180</pages>
<year>2005</year>
<crossref>conf/ACISicis/2005</crossref>
<booktitle>ACIS-ICIS</booktitle>
<ee>https://doi.org/10.1109/ICIS.2005.74</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICIS.2005.74</ee>
<url>db/conf/ACISicis/ACISicis2005.html#RiazKLL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ACISicis/KianiRLL05" mdate="2024-07-03">
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<author pid="53/1318">Young-Koo Lee</author>
<title>Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach.</title>
<pages>513-518</pages>
<year>2005</year>
<crossref>conf/ACISicis/2005</crossref>
<booktitle>ACIS-ICIS</booktitle>
<ee>https://doi.org/10.1109/ICIS.2005.40</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICIS.2005.40</ee>
<url>db/conf/ACISicis/ACISicis2005.html#KianiRLL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/egc/KianiRLJK05" mdate="2024-07-05">
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<author pid="43/6574">Taewoong Jeon</author>
<author pid="54/5443">Hagbae Kim</author>
<title>Grid Access Middleware for Handheld Devices.</title>
<pages>1002-1011</pages>
<year>2005</year>
<crossref>conf/egc/2005</crossref>
<booktitle>EGC</booktitle>
<ee>https://doi.org/10.1007/11508380_102</ee>
<url>db/conf/egc/egc2005.html#KianiRLJK05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/RiazKSL05" mdate="2024-07-04">
<author pid="61/1663">Maria Riaz</author>
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="77/1638">Anjum Shehzad</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<title>Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach.</title>
<pages>1096-1105</pages>
<year>2005</year>
<crossref>conf/iccsa/2005-2</crossref>
<booktitle>ICCSA (2)</booktitle>
<ee>https://doi.org/10.1007/11424826_117</ee>
<url>db/conf/iccsa/iccsa2005-2.html#RiazKSL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rtcsa/KianiRZLL05" mdate="2024-07-01">
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="45/3650">Yonil Zhung</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<author pid="53/1318">Young-Koo Lee</author>
<title>A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems.</title>
<pages>451-454</pages>
<year>2005</year>
<crossref>conf/rtcsa/2005</crossref>
<booktitle>RTCSA</booktitle>
<ee>https://doi.org/10.1109/RTCSA.2005.9</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RTCSA.2005.9</ee>
<url>db/conf/rtcsa/rtcsa2005.html#KianiRZLL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rtcsa/RiazKLHL05" mdate="2024-07-03">
<author pid="61/1663">Maria Riaz</author>
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<author pid="98/4870">Sangman Han</author>
<author pid="53/1318">Young-Koo Lee</author>
<title>Service Delivery in Context Aware Environments: Lookup and Access Control Issues.</title>
<pages>455-458</pages>
<year>2005</year>
<crossref>conf/rtcsa/2005</crossref>
<booktitle>RTCSA</booktitle>
<ee>https://doi.org/10.1109/RTCSA.2005.94</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RTCSA.2005.94</ee>
<url>db/conf/rtcsa/rtcsa2005.html#RiazKLHL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/euc/NgoSLRL04" mdate="2024-06-28">
<author pid="05/5897">Hung Quoc Ngo 0001</author>
<author pid="77/1638">Anjum Shehzad</author>
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="08/5736-1">Sungyoung Lee 0001</author>
<title>Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework.</title>
<pages>672-681</pages>
<ee>https://doi.org/10.1007/978-3-540-30121-9_64</ee>
<year>2004</year>
<crossref>conf/euc/2004</crossref>
<booktitle>EUC</booktitle>
<url>db/conf/euc/euc2004.html#NgoSLRL04</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/cs-DC-0305062" mdate="2024-08-23">
<author pid="34/3740">Aamir Shafi</author>
<author pid="67/3254">Umer Farooq</author>
<author pid="35/3218">Saad Liaquat Kiani</author>
<author pid="61/1663">Maria Riaz</author>
<author pid="77/1638">Anjum Shehzad</author>
<author pid="56/6-1">Arshad Ali 0001</author>
<author pid="83/301">Iosif Legrand</author>
<author pid="34/700">Harvey B. Newman</author>
<title>DIAMOnDS - DIstributed Agents for MObile &#38; Dynamic Services</title>
<ee type="oa">http://arxiv.org/abs/cs/0305062</ee>
<year>2003</year>
<journal>CoRR</journal>
<volume>cs.DC/0305062</volume>
<url>db/journals/corr/corr0305.html#cs-DC-0305062</url>
</article>
</r>
<coauthors n="43" nc="5">
<co c="2"><na f="a/Abbasi:Irshad_Ahmed" pid="215/5617">Irshad Ahmed Abbasi</na></co>
<co c="3"><na f="a/Alazab:Mamoun" pid="16/7566">Mamoun Alazab</na></co>
<co c="1"><na f="a/Ali_0001:Arshad" pid="56/6-1">Arshad Ali 0001</na></co>
<co c="2"><na f="a/Ali_0002:Sikandar" pid="151/8246-2">Sikandar Ali 0002</na></co>
<co c="0"><na f="a/Ant=oacute=n:Annie_I=" pid="a/AnnieIAnton">Annie I. Ant&#243;n</na></co>
<co c="2"><na f="a/Anwar:Zahid" pid="62/3931">Zahid Anwar</na></co>
<co c="0"><na f="b/Breaux:Travis_D=" pid="62/962">Travis D. Breaux</na></co>
<co c="0"><na f="e/Elder:Sarah" pid="190/1215">Sarah Elder</na></co>
<co c="1"><na f="f/Farooq:Umer" pid="67/3254">Umer Farooq</na></co>
<co c="1"><na f="h/Han:Sangman" pid="98/4870">Sangman Han</na></co>
<co c="0"><na f="h/Hibshi:Hanan" pid="118/1575">Hanan Hibshi</na></co>
<co c="3"><na f="j/Jameel:Furqan" pid="195/9170">Furqan Jameel</na></co>
<co c="3"><na f="j/J=auml=ntti:Riku" pid="j/RikuJantti">Riku J&#228;ntti</na></co>
<co c="0"><na f="j/Jenkins:Marcelo" pid="15/2948">Marcelo Jenkins</na></co>
<co c="1"><na f="j/Jeon:Taewoong" pid="43/6574">Taewoong Jeon</na></co>
<co c="4"><na f="k/Kantola:Raimo" pid="87/6119">Raimo Kantola</na></co>
<co c="1"><na f="k/Kim:Hagbae" pid="54/5443">Hagbae Kim</na></co>
<co c="0"><na f="k/King:Jason_Tyler" pid="34/11105">Jason Tyler King</na></co>
<co c="1"><na f="l/Lee_0001:Sungyoung" pid="08/5736-1">Sungyoung Lee 0001</na></co>
<co c="1"><na f="l/Lee:Young=Koo" pid="53/1318">Young-Koo Lee</na></co>
<co c="1"><na f="l/Legrand:Iosif" pid="83/301">Iosif Legrand</na></co>
<co c="1" n="2"><na f="l/Liaquat:Saad" pid="35/3218">Saad Liaquat</na><na>Saad Liaquat Kiani</na></co>
<co c="0"><na f="m/Massacci:Fabio" pid="59/6145">Fabio Massacci</na></co>
<co c="0"><na f="m/Maxwell:Jeremy_C=" pid="76/7861">Jeremy C. Maxwell</na></co>
<co c="0"><na f="m/McCraw:Christopher_M=" pid="46/11449">Christopher M. McCraw</na></co>
<co c="2"><na f="m/Mohamed:Gasm_Elseed_Ibrahim" pid="195/6963">Gasm Elseed Ibrahim Mohamed</na></co>
<co c="1"><na f="n/Newman:Harvey_B=" pid="34/700">Harvey B. Newman</na></co>
<co c="1"><na f="n/Ngo_0001:Hung_Quoc" pid="05/5897">Hung Quoc Ngo 0001</na></co>
<co c="0"><na f="q/Quesada=L=oacute=pez:Christian" pid="150/8937">Christian Quesada-L&#243;pez</na></co>
<co c="2"><na f="r/Rajpoot:Qasim" pid="50/7805">Qasim Rajpoot</na></co>
<co c="1"><na f="s/Shafi:Aamir" pid="34/3740">Aamir Shafi</na></co>
<co c="2"><na f="s/Shah:Syed_Luqman" pid="289/6581">Syed Luqman Shah</na></co>
<co c="3"><na f="s/Sharma:Navuday" pid="192/3653">Navuday Sharma</na></co>
<co c="3"><na f="s/Sharma_0001:Vishal" pid="20/6234-1">Vishal Sharma 0001</na></co>
<co c="1"><na f="s/Shehzad:Anjum" pid="77/1638">Anjum Shehzad</na></co>
<co c="3"><na f="s/Sheikh:Muhammad_Usman" pid="32/10126">Muhammad Usman Sheikh</na></co>
<co c="0"><na f="s/Singh:Munindar_P=" pid="s/MunindarPSingh">Munindar P. Singh</na></co>
<co c="0"><na f="s/Slankas:John" pid="119/9526">John Slankas</na></co>
<co c="0"><na f="s/Stallings:Jonathan" pid="186/0403">Jonathan Stallings</na></co>
<co c="0"><na f="s/Swire:Peter_P=" pid="25/1945">Peter P. Swire</na></co>
<co c="4"><na f="t/Tilli:Juha=Matti" pid="208/2150">Juha-Matti Tilli</na></co>
<co c="0"><na f="w/Williams:Laurie_A=" pid="w/LaurieAWilliams">Laurie A. Williams</na></co>
<co c="1"><na f="z/Zhung:Yonil" pid="45/3650">Yonil Zhung</na></co>
</coauthors>
</dblpperson>

