​
Login / Signup
Riham Hassan
Publication Activity (10 Years)
Years Active: 2008-2019
Publications (10 Years): 1
Top Topics
Optimal Design
Information Technology
South Africa
End User Computing
Top Venues
SAC
ISCRAM
Int. J. Inf. Syst. Crisis Response Manag.
</>
Publications
</>
Steven D. Sheetz
,
Andrea L. Kavanaugh
,
Edward A. Fox
,
Riham Hassan
,
Seungwon Yang
,
Mohamed Magdy
,
Donald J. Shoemaker
Information Uses and Gratifications Related to Crisis: Student Perceptions since the Egyptian Uprising.
ISCRAM
(2019)
Asmaa Abdallah
,
Riham Hassan
,
Mostafa Abdel Azim
Quantified extreme scenario based design approach.
SAC
(2013)
Andrea L. Kavanaugh
,
Steven D. Sheetz
,
Riham Hassan
,
Seungwon Yang
,
Hicham G. Elmongui
,
Edward A. Fox
,
Mohamed Magdy
,
Donald J. Shoemaker
Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt.
Int. J. Inf. Syst. Crisis Response Manag.
5 (1) (2013)
Andrea L. Kavanaugh
,
Steven D. Sheetz
,
Riham Hassan
,
Seungwon Yang
,
Hicham G. Elmongui
,
Edward A. Fox
,
Mohamed Magdy
,
Donald J. Shoemaker
Between a rock and a cell phone: Communication and information technology use during the 2011 Egyptian uprising.
ISCRAM
(2012)
Mohamed Azab
,
Riham Hassan
,
Mohamed Eltoweissy
ChameleonSoft: A moving target defense system.
CollaborateCom
(2011)
Riham Hassan
,
Shawn A. Bohner
,
Mohamed Eltoweissy
Towards safe and productive development of secure software: FADES and model-based software engineering.
CSIIRW
(2010)
Riham Hassan
,
Mohamed Eltoweissy
,
Shawn A. Bohner
,
Sherif El-Kassas
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements.
IET Softw.
4 (2) (2010)
Riham Hassan
,
Mohamed Eltoweissy
,
Shawn A. Bohner
,
Sherif El-Kassas
Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study.
CSE (3)
(2009)
Riham Hassan
,
Shawn A. Bohner
,
Sherif El-Kassas
,
Michael G. Hinchey
Integrating Formal Analysis and Design to Preserve Security Properties.
HICSS
(2009)
Riham Hassan
,
Shawn A. Bohner
,
Sherif El-Kassas
,
Mohamed Eltoweissy
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
ARES
(2008)
Riham Hassan
,
Shawn A. Bohner
,
Sherif El-Kassas
Formal derivation of security design specifications from security requirements.
CSIIRW
(2008)