Follow
Rubia Fatima
Rubia Fatima
Tsinghua University
Verified email at tsinghua.org.cn
Title
Cited by
Cited by
Year
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
762019
On using grey literature and google scholar in systematic literature reviews in software engineering
A Yasin, R Fatima, L Wen, W Afzal, M Azhar, R Torkar
IEEE Access 8, 36226-36243, 2020
612020
How persuasive is a phishing email? A phishing game for phishing awareness
R Fatima, A Yasin, L Liu, J Wang
Journal of Computer Security 27 (6), 581-612, 2019
552019
Contemplating social engineering studies and attack scenarios: A review study
A Yasin, R Fatima, L Liu, A Yasin, J Wang
Security and Privacy 2 (4), e73, 2019
502019
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game
R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin
Journal of Information Security and Applications 48, 102351, 2019
422019
Understanding and deciphering of social engineering attack scenarios
A Yasin, R Fatima, L Liu, J Wang, R Ali, Z Wei
Security and Privacy 4 (4), e161, 2021
202021
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework
JA Khan, A Yasin, R Fatima, D Vasan, AA Khan, AW Khan
Software: Practice and Experience 52 (12), 2537-2573, 2022
162022
Stochastic recognition of human physical activities via augmented feature descriptors and random forest model
SB Tahir, AB Dogar, R Fatima, A Yasin, M Shafiq, JA Khan, M Assam, ...
Sensors 22 (17), 6632, 2022
142022
A natural language processing (NLP) evaluation on COVID-19 rumour dataset using deep learning techniques
R Fatima, N Samad Shaikh, A Riaz, S Ahmad, MA El-Affendi, ...
Computational Intelligence and Neuroscience 2022, 2022
132022
Counteracting social engineering attacks
A Yasin, R Fatima, L Liu, J Wanga, R Ali, Z Wei
Computer Fraud & Security 2021 (10), 15-19, 2021
82021
Improving software requirements reasoning by novices: a story‐based approach
R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin
IET Software 13 (6), 564-574, 2019
52019
On the utilization of non‐quality assessed literature in software engineering research
A Yasin, R Fatima, L Liu, J Ali Khan, R Ali, J Wang
Journal of Software: Evolution and Process 34 (7), e2464, 2022
42022
Strategies for counteracting social engineering attacks
R Fatima, A Yasin, L Liu, W Jianmin
Computer Fraud & Security 2022 (7), 2022
42022
Ontologies as building blocks of cloud security
NS Shaikh, A Yasin, R Fatima
International Journal of Information Technology and Computer Science (IJITCS …, 2022
42022
Understanding social engineers strategies from the perspective of Sun-Tzu philosophy
A Yasin, R Fatima, L Liu, J Wang, R Ali
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
32020
Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security
A Yasin, R Fatima, Z JiangBin, W Afzal, S Raza
Information and Software Technology, 107426, 2024
22024
Retrieving arXiv, SocArXiv, and SSRN metadata for initial review screening
R Fatima, A Yasin, L Liu, J Wang, W Afzal
Information and Software Technology 161, 107251, 2023
22023
Anomaly Prediction over Human Crowded Scenes via Associate-Based Data Mining and K-Ary Tree Hashing
A Yasin, J Frnda, R Fatima, J Ali Khan, MS Anwar
International Journal of Intelligent Systems 2023, 2023
22023
What should abeeha do? an activity for phishing awareness
R Fatima, A Yasin, L Liu, J Wang
2022 IEEE 22nd International Conference on Software Quality, Reliability …, 2022
22022
Google Scholar vs. DBLP vs. Microsoft academic search: An indexing comparison for software engineering literature
R Fatima, A Yasin, L Liu, J Wang
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20