Shamal Faily
Bournemouth University
H-index: 21
Europe-United Kingdom
Top articles of Shamal Faily
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Human factors and cyber-security risks on the railway–the critical role played by signalling operations | Information & Computer Security | Eylem Thron Shamal Faily Huseyin Dogan Martin Freer | 2024/1/2 |
Emerging Technology Certification Risk Assessment with ETHICIST | Shamal Faily Rob Ashmore | 2023 | |
Implementation of NAO robot maze navigation based on computer vision and collaborative learning | Frontiers in Robotics and AI | Daniela Magallán-Ramírez Jorge David Martínez-Aguilar Areli Rodríguez-Tirado David Balderas Edgar Omar López-Caudana | 2022/4/4 |
Privacy Goals for the Data Lifecycle | Future Internet | Jane Henriksen-Bulmer Cagatay Yucel Shamal Faily Ioannis Chalkias | 2022/10/31 |
Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain | Rob Ashmore Andrew Howe Rhiannon Chilton Shamal Faily | 2022/10/31 | |
Welcome to the Ninth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'22) | Hanan Hibshi Duncan Ki-Aries Seok Won Lee Mattia Salnitri Raian Ali | 2022/10/22 | |
Assessing system of systems information security risk with OASoSIS | Computers & Security | Duncan Ki-Aries Shamal Faily Huseyin Dogan Christopher Williams | 2022/6/1 |
Automation and Cyber Security Risks on the Railways-the Human Factors implications | Contemporary Ergonomics & Human Factors 2022 | Eylem Thron Shamal Faily | 2022/4/11 |
Use-case informed task analysis for secure and usable design solutions in rail | Amna Altaf Shamal Faily Huseyin Dogan Alexios Mylonas Eylem Thron | 2021 | |
Visualising personas as goal models to find security tensions | Information & Computer Security | Shamal Faily Claudia Iacob Raian Ali Duncan Ki-Aries | 2021/11/12 |
Integrated design framework for facilitating systems-theoretic process analysis | Amna Altaf Shamal Faily Huseyin Dogan Eylem Thron Alexios Mylonas | 2021/10/4 | |
Cybersecurity User Requirements Analysis: The ECHO Approach | Vasilis Katos Duncan Ki-Aries Shamal Faily Angel Genchev Maya Bozhilova | 2021/6/28 | |
Evaluating privacy-determining user privacy expectations on the web | computers & security | Callum Pilton Shamal Faily Jane Henriksen-Bulmer | 2021/6/1 |
Identifying implicit vulnerabilities through personas as goal models | Shamal Faily Claudia Iacob Raian Ali Duncan Ki-Aries | 2020/9/14 | |
Dpia in context: applying dpia to assess privacy risks of cyber physical systems | Future internet | Jane Henriksen-Bulmer Shamal Faily Sheridan Jeary | 2020/5/24 |
The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project | Claudia Iacob Shamal Faily | 2020/2/26 | |
Identifying safety and human factors issues in rail using IRIS and CAIRIS | Amna Altaf Shamal Faily Huseyin Dogan Alexios Mylonas Eylem Thron | 2020 |