1 code implementation • 26 Feb 2023 • Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fehmideh, Mst Shamima Aktar, Tommi Mikkonen
Architecting software-intensive systems can be a complex process.
no code implementations • 12 Oct 2021 • Aakash Ahmad, Madhushi Bandara, Mahdi Fahmideh, Henderik A. Proper, Giancarlo Guizzardi, Jeffrey Soar
The outbreak of the SARS-CoV-2 pandemic of the new COVID-19 disease (COVID-19 for short) demands empowering existing medical, economic, and social emergency backend systems with data analytics capabilities.
no code implementations • 25 Jan 2021 • Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, M. Ali Babar
Findings indicate that majority of the end-users are aware of the existing security features provided by the apps (e. g., restricted app permissions); however, they desire usable security (e. g., biometric authentication) and are concerned about privacy of their health information (e. g., data anonymization).
Cryptography and Security Software Engineering