default search action
Armstrong Nhlabatsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi:
A machine learning-based optimization approach for pre-copy live virtual machine migration. Clust. Comput. 27(2): 1293-1312 (2024) - [j11]Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan:
Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model. Computing 106(9): 3031-3062 (2024) - [j10]Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan:
Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model. Computing 106(12): 4249 (2024) - [j9]Christos Chronis, Iraklis Varlamis, Yassine Himeur, Aya Nabil Sayed, Tamim M. Al-Hasan, Armstrong Nhlabatsi, Faycal Bensaali, George Dimitrakopoulos:
A Survey on the use of Federated Learning in Privacy-Preserving Recommender Systems. IEEE Open J. Comput. Soc. 5: 227-247 (2024) - 2023
- [j8]Rachael Fernandez, Peter C.-H. Cheng, Armstrong Nhlabatsi, Khaled Md. Khan, Noora Fetais:
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools. IEEE Access 11: 13929-13947 (2023) - [j7]Armstrong Nhlabatsi, Khaled Md. Khan, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais:
Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Trans. Cloud Comput. 11(1): 426-444 (2023) - [c12]Thowayba M. Elkaffash, Armstrong Nhlabatsi:
Data-Leashing: Towards a Characterization of The Problem and Its Solution. DSA 2023: 288-295 - [c11]Rachael Fernandez, Peter C.-H. Cheng, Ben Smith, Tania Fenton, Yehia Boraey, Armstrong Nhlabatsi, Khaled M. Khan, Noora Fetais:
Interactive Graphical Access Control Tools. VL/HCC 2023: 255-259 - 2022
- [j6]Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi:
Live migration of virtual machine memory content in networked systems. Comput. Networks 209: 108898 (2022) - 2021
- [j5]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Threat-Specific Security Risk Evaluation in the Cloud. IEEE Trans. Cloud Comput. 9(2): 793-806 (2021) - 2020
- [c10]Armstrong Nhlabatsi, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Design and Implementation of a Threat-Specific Security Risk Assessment Tool. ICIoT 2020: 511-518
2010 – 2019
- 2019
- [j4]Jin B. Hong, Armstrong Nhlabatsi, Dong Seong Kim, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Systematic identification of threats in the cloud: A survey. Comput. Networks 150: 46-69 (2019) - [c9]SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. TrustCom/BigDataSE 2019: 602-609 - [i1]SeoungMo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. CoRR abs/1903.04271 (2019) - 2018
- [j3]Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan:
Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 79: 33-52 (2018) - [c8]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - [c7]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan:
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. QRS 2018: 367-374 - 2015
- [j2]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - [c6]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - [c5]Khaled M. Khan, Armstrong Nhlabatsi, Niamul Khan:
A Process Model for Customisation of Software in Multi-tenant SaaS Model. UCC 2015: 418-419 - 2014
- [c4]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - 2010
- [j1]Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu:
Security Requirements Engineering for Evolving Software Systems: A Survey. Int. J. Secur. Softw. Eng. 1(1): 54-73 (2010)
2000 – 2009
- 2009
- [b1]Armstrong Nhlabatsi:
Initialisation Problems in Feature Composition. Open University, Milton Keynes, UK, 2009 - [c3]Armstrong Nhlabatsi, Robin C. Laney, Bashar Nuseibeh:
Feature Interaction as a Context Sharing Problem. ICFI 2009: 133-148 - [c2]Raian Ali, Yijun Yu, Ruzanna Chitchyan, Armstrong Nhlabatsi, Paolo Giorgini:
Towards a Unified Framework for Contextual Variability in Requirements. IWSPM 2009: 31-34 - 2008
- [c1]Armstrong Nhlabatsi, Robin C. Laney, Bashar Nuseibeh:
Building Contingencies into Specifications. RE 2008: 333-334
Coauthor Index
aka: Khaled Md. Khan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint