default search action
Bilal Naqvi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Maryam Gulzar, Asrahd Ali, Bilal Naqvi, Kari Smolander:
Revealing the State of the Art in Managing IT Infrastructure Within Enterprises: A Systematic Mapping Study. IEEE Access 12: 108533-108555 (2024) - [j5]Bilal Naqvi, Joakim Kävrestad, A. K. M. Najmul Islam:
Inclusive and Accessible Cybersecurity: Challenges and Future Directions. Computer 57(6): 73-81 (2024) - [c15]Shola Oyedeji, Mikhail O. Adisa, Ahmed Seffah, Felipe Leon Coello, Bilal Naqvi:
GaLaPaGoS: A Design Pattern for Sustainability of ICT Interactive Software and Services. HCSE 2024: 63-83 - [c14]Joakim Kävrestad, Bilal Naqvi:
Cognitively Available Cybersecurity: A Systematic Literature Review. HCSE 2024: 160-170 - [c13]Shola Oyedeji, Hatef Shamshiri, Mikhail O. Adisa, Jari Porras, Bilal Naqvi, Dominic Lammert:
Exploratory Study on Sustainability in Agile Software Development. HCSE 2024: 264-272 - [e1]Marta Kristín Lárusdóttir, Bilal Naqvi, Regina Bernhaupt, Carmelo Ardito, Stefan Sauer:
Human-Centered Software Engineering - 10th IFIP WG 13.2 International Working Conference, HCSE 2024, Reykjavik, Iceland, July 8-10, 2024, Proceedings. Lecture Notes in Computer Science 14793, Springer 2024, ISBN 978-3-031-64575-4 [contents] - 2023
- [j4]Bilal Naqvi, Kseniia Perova, Ali Farooq, Imran Makhdoom, Shola Oyedeji, Jari Porras:
Mitigation strategies against the phishing attacks: A systematic literature review. Comput. Secur. 132: 103387 (2023) - [j3]Ajesh Kumar, Bilal Naqvi, Annika Wolff:
Exploring the energy informatics and energy citizenship domains: a systematic literature review. Energy Inform. 6(1): 13 (2023) - [c12]Ajesh Kumar, Bilal Naqvi, S. M. Tahsinur Rahman:
Exploring energy citizenship at a community level. C&T 2023: 252-254 - [c11]Célia Martinie, Bilal Naqvi:
On using the Task Models for Validation and Evolution of Usable Security Design Patterns. HAISA 2023: 405-417 - [c10]Bilal Naqvi, Célia Martinie, Stepan Bakhaev, Kari Smolander:
On Using the Task Models for Refinement and Validation of Requirements Generated Through Co-creation. INTERACT Workshops (1) 2023: 47-58 - [c9]Ajesh Kumar, Annika Wolff, Bilal Naqvi:
Co-creating Community-level Indicators: Involving Communities in the Digitalization of Energy for Empowering Energy Citizenship. MIPRO 2023: 1392-1397 - 2022
- [c8]Bilal Naqvi:
Dissecting the Security and Usability Alignment in the Industry. HCSE 2022: 57-69 - [c7]Hasan Mahmud, A. K. M. Najmul Islam, Bilal Naqvi, Matti Mäntymäki:
Toward a GDPR Compliant Blockchain Governance Framework. I3E 2022: 471-484 - 2021
- [j2]A. K. M. Bahalul Haque, A. K. M. Najmul Islam, Sami Hyrynsalmi, Bilal Naqvi, Kari Smolander:
GDPR Compliant Blockchains-A Systematic Literature Review. IEEE Access 9: 50593-50606 (2021) - [j1]Bilal Naqvi, Nathan Luke Clarke, Jari Porras:
Incorporating the human facet of security in developing systems and services. Inf. Comput. Secur. 29(1): 49-72 (2021) - [c6]Bilal Naqvi, Carmelo Ardito:
Coping with Changing Contexts: A Healthcare Security Perspective. INTERACT (Workshops) 2021: 139-146 - [i2]A. K. M. Bahalul Haque, A. K. M. Najmul Islam, Sami Hyrynsalmi, Bilal Naqvi, Kari Smolander:
GDPR Compliant Blockchains-A Systematic Literature Review. CoRR abs/2104.00648 (2021) - [i1]A. K. M. Bahalul Haque, Bilal Naqvi, A. K. M. Najmul Islam, Sami Hyrynsalmi:
Towards a GDPR-Compliant Blockchain-Based COVID Vaccination Passport. CoRR abs/2109.10867 (2021) - 2020
- [c5]Bilal Naqvi, Jari Porras:
Usable Security by Design: A Pattern Approach. HCI (30) 2020: 609-618
2010 – 2019
- 2019
- [c4]Bilal Naqvi, Ahmed Seffah:
Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? HCI (29) 2019: 314-324 - [c3]Shola Oyedeji, Bilal Naqvi, Birgit Penzenstadler, Mikhail O. Adisa, Mariam Abdulkareem, Ahmed Seffah:
The Interplay between Usability, Sustainability and Green Aspects: A Design Case Study from a Developing Country. ICT4S 2019 - [c2]Bilal Naqvi, Jari Porras, Shola Oyedeji, Mehar Ullah:
Towards Identification of Patterns Aligning Security and Usability. INTERACT Workshops 2019: 121-132 - 2018
- [c1]Bilal Naqvi, Ahmed Seffah, Christina Braz:
Adding Measures to Task Models for Usability Inspection of the Cloud Access Control Services. HCSE 2018: 133-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint