Follow
Affan Yasin
Affan Yasin
Post Doctoral Researcher
Verified email at tsinghua.org.cn - Homepage
Title
Cited by
Cited by
Year
An online identity and smart contract management system
A Yasin, L Liu
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
1032016
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
942018
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
752019
On using grey literature and google scholar in systematic literature reviews in software engineering
A Yasin, R Fatima, L Wen, W Afzal, M Azhar, R Torkar
IEEE Access 8, 36226-36243, 2020
612020
How persuasive is a phishing email? A phishing game for phishing awareness
R Fatima, A Yasin, L Liu, J Wang
Journal of Computer Security 27 (6), 581-612, 2019
562019
Contemplating social engineering studies and attack scenarios: A review study
A Yasin, R Fatima, L Liu, A Yasin, J Wang
Security and Privacy 2 (4), e73, 2019
512019
Sharing information online rationally: An observation of user privacy concerns and awareness using serious game
R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin
Journal of Information Security and Applications 48, 102351, 2019
412019
Using simulation system for collaborative learning to enhance learner’s performance
S Zulfiqar, R Zhou, F Asmi, A Yasin
Cogent Education 5 (1), 1424678, 2018
352018
Understanding and deciphering of social engineering attack scenarios
A Yasin, R Fatima, L Liu, J Wang, R Ali, Z Wei
Security and Privacy 4 (4), e161, 2021
202021
On the quality of grey literature and its use in information synthesis during systematic literature reviews
A Yasin, MI Hasnain
192012
Valuating requirements arguments in the online user's forum for requirements decision‐making: The CrowdRE‐VArg framework
JA Khan, A Yasin, R Fatima, D Vasan, AA Khan, AW Khan
Software: Practice and Experience 52 (12), 2537-2573, 2022
152022
Stochastic recognition of human physical activities via augmented feature descriptors and random forest model
SB Tahir, AB Dogar, R Fatima, A Yasin, M Shafiq, JA Khan, M Assam, ...
Sensors 22 (17), 6632, 2022
142022
A natural language processing (NLP) evaluation on COVID-19 rumour dataset using deep learning techniques
R Fatima, N Samad Shaikh, A Riaz, S Ahmad, MA El-Affendi, ...
Computational Intelligence and Neuroscience 2022, 2022
132022
Impact of internet of things (IoT) as persuasive technology
S Faryad, H Batool, M Asif, A Yasin
IJ Information Technology and Computer Science 6 (2021), 16-28, 2021
92021
Machine learning-based multimodel computing for medical imaging for classification and detection of Alzheimer disease
FH Alghamedy, M Shafiq, L Liu, A Yasin, RA Khan, HS Mohammed
Computational Intelligence and Neuroscience 2022, 2022
82022
Counteracting social engineering attacks
A Yasin, R Fatima, L Liu, J Wanga, R Ali, Z Wei
Computer Fraud & Security 2021 (10), 15-19, 2021
82021
Big data services requirements analysis
A Yasin, L Liu, Z Cao, J Wang, Y Liu, TS Ling
Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium …, 2018
82018
Exploring and mining rationale information for low-rating software applications
T Ullah, JA Khan, ND Khan, A Yasin, H Arshad
Soft Computing, 1-26, 2023
52023
Improving software requirements reasoning by novices: a story‐based approach
R Fatima, A Yasin, L Liu, J Wang, W Afzal, A Yasin
IET Software 13 (6), 564-574, 2019
52019
Strategies for counteracting social engineering attacks
R Fatima, A Yasin, L Liu, W Jianmin
Computer Fraud & Security 2022 (7), 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20