Currently browsing: Items authored or edited by Bashar Nuseibeh https://orcid.org/0000-0002-3476-053X

165 items in this list.
Generated on Mon Sep 28 10:37:17 2020 BST.

Jump to:

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001

2020To Top

Gooch, Daniel; Mehta, Vikram; Price, Blaine; Mccormick, Ciaran; Bandara, Arosha; Bennaceur, Amel; Bennasar, Mohamed; Stuart, Avelie; Clare, Linda; Levine, Mark; Cohen, Jessica and Nuseibeh, Bashar (2020). How are you feeling? Using Tangibles to Log the Emotions of Older Adults. In: Fourteenth International Conference on Tangible, Embedded, and Embodied Interaction (TEI ’20), ACM pp. 31–43.

Zhang, Min; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar (2020). Finding & Evaluating Community Policing apps in Asia. In: 3rd Asian CHI Symposium (CHI 2020 Extended Abstracts), 25-30 Apr 2020, ACM.

Bandara, Arosha; Zhang, Min; Price, Blaine; Pike, Graham; Elphick, Camilla; Walkington, Zoe; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar (2020). Towards Citizen Forensics: Improving Citizen-Police Collaboration. In: Workshop on Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI, Extended Abstracts of ACM Conference on Human Factors in Computing Systems, 25-30 Apr 2020, Honolulu, HI, USA.

Zhang, Min; Bandara, Arosha; Price, Blaine; Pike, Graham; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar (2020). Designing Technologies for Community Policing. In: Extended Abstracts of ACM Conference on Human Factors in Computing Systems (Late Breaking Work), 25-30 Apr 2020, Honolulu, HI, USA.

2019To Top

Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar (2019). On the Automated Management of Security Incidents in Smart Space. IEEE Access, 7 pp. 111513–111527.

Lopez, Tamara; Tun, Thein; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2019). An Anatomy of Security Conversations in Stack Overflow. In: 41st ACM/IEEE International Conference on Software Engineering, 25 May - 1 Jun 2019, Montréal, Canada, pp. 31–40.

Peters, Fayola; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2019). Text Filtering and Ranking for Security Bug Report Prediction. IEEE Transactions on Software Engineering, 45(6) pp. 615–631.

Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Talking about Security with Professional Developers. In: 7th International Workshop Series on Conducting Empirical Studies in Industry (CESSER-IP), 28 May 2019, Montréal, Canada.

Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice. In: Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering pp. 61–68.

Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2019). Dragonfly: a Tool for Simulating Self-Adaptive Drone Behaviours. In: SEAMS '19 Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, IEEE pp. 107–113.

Bennaceur, Amel; Tun, Thein Than; Yu, Yijun and Nuseibeh, Bashar (2019). Requirements Engineering. In: Cha, Sungdeok (Steve); Taylor, Richard N. and Kang, Kyo C. eds. Handbook of Software Engineering. Springer, pp. 51–92.

Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds. (2019). Engineering Adaptive Software Systems. Springer Singapore.

Bennaceur, Amel; Ghezzi, Carlo; Tei, Kenji; Kehrer, Timo; Weyns, Danny; Calinescu, Radu; Dustdar, Schahram; Honiden, Shinichi; Ishikawa, Fuyuki; Jin, Zhi; Kramer, Jeffrey; Litoiu, Marin; Loreti, Michele; Moreno, Gabriel; Muller, Hausi; Nenzi, Laura; Nuseibeh, Bashar; Pasquale, Liliana; Reisig, Wolfgang; Schmidt, Heinz; Tsigkanos, Christos and Zhao, Haiyan Zhao (2019). Modelling and Analysing Resilient Cyber-Physical Systems. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.

Bennaceur, Amel; Zisman, Andrea; Mccormick, Ciaran; Barthaud, Danny and Nuseibeh, Bashar (2019). Won’t Take No for an Answer: Resource-driven Requirements Adaptation. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.

Wilkins, Denise; Nuseibeh, Bashar and Levine, Mark (2019). Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action. In: HCII 2019, Proceedings Part III: Human-Computer Interaction. Design Practice in Contemporary Societies, Lecture Notes in Computer Science, Springer, pp. 130–147.

Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2019). Cautious Adaptation of Defiant Components. In: The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019) (Lawall, Julia and Marinov, Darko eds.), 11-15 Nov 2019, San Diego, California, USA.

Bennasar, Mohamed; Mccormick, Ciaran; Price, Blaine; Gooch, Daniel; Stuart, Avelie; Mehta, Vikram; Clare, Linda; Bennaceur, Amel; Cohen, Jessica; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time. In: Innovation in Medicine and Healthcare Systems, and Multimedia, Springer Singapore, Singapore pp. 125–135.

2018To Top

Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B. (2018). Requirements and Specifications for Adaptive Security: Concepts and Analysis. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 161–171.

Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo and Nuseibeh, Bashar (2018). On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing, 15(3) pp. 466–480.

Peng, Xin; Gu, Lingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2018). CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. ACM Transactions on Internet Technology (TOIT), 18(2), article no. 19.

Spiller, Keith; Ball, Kirstie; Bandara, Arosha; Meadows, Maureen; Mccormick, Ciaran; Nuseibeh, Bashar and Price, Blaine A. (2018). Data Privacy: Users’ Thoughts on Quantified Self Personal Data. In: Ajana, Btihaj ed. Self-Tracking: Empirical and Philosophical Investigations. Cham: Palgrave Macmillan, pp. 111–124.

Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Tun, Thein; Nuseibeh, Bashar and Rashid, Awais (2018). Towards forensic-ready software systems. In: Proceedings of the 40th International Conference on Software Engineering New Ideas and Emerging Results - ICSE-NIER '18, ACM Press pp. 9–12.

Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios and Nuseibeh, Bashar (2018). Compositional Verification of Self-Adaptive Cyber-Physical Systems. In: 13th ACM/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 28-29 May 2018, Gothenburg, Sweden.

Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak and Nuseibeh, Bashar (2018). I’ve Seen This Before: Sharing Cyber-Physical Incident Knowledge. In: 1st International Workshop on Security Awareness from Design to Deployment (SEAD’18), 27 May 2018, Gothenburg, Sweden..

Lopez, Tamara; Tun, Thein T.; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2018). An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement. In: SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, ACM, New York pp. 26–32.

2017To Top

Grispos, George; Hanvey, Sorren and Nuseibeh, Bashar (2017). Use of Organisational Topologies for Forensic Investigations. In: Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 4 Sep 2017, Paderborn, Germany.

Elrakaiby, Yehia; Ferrari, Alessio; Spolentini, Paola; Gnesi, Stefania and Nuseibeh, Bashar (2017). Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews. In: 2017 IEEE 25th International Requirements Engineering Conference, 4-8 Sep 2017, Lisbon, Portugal.

Alrajeh, Dalal; Pasquale, Liliana and Nuseibeh, Bashar (2017). On Evidence Preservation Requirements for Forensic-Ready Systems. In: ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 4-8 Sep 2017, Paderborn, Germany, pp. 559–569.

Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik and Nuseibeh, Bashar (2017). Topology-Aware Access Control of Smart Spaces. IEEE Computer, 50(7) pp. 54–63.

Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar (2017). Software Engineering Challenges for Investigating Cyber-Physical Incidents. In: Proceedings of the 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS ’17), 20-28 May 2017, Buenos Aires, Argentina.

Nuseibeh, Bashar (2017). Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces. In: Proceedings of 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), IEEE, p. 2.

Barhamgi, Mahmoud; Yang, Mu; Yu, Chia-Mu; Yu, Yijun; Bandara, Arosha K.; Benslimane, Djamal and Nuseibeh, Bashar (2017). Enabling End-Users to Protect Their Privacy. In: ASIA CCS '17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, New York, NY, pp. 905–907.

Yu, Yijun; Yang, Mu and Nuseibeh, Bashar (2017). Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion. In: SCiA 2017 : 4th Software Challenges in Aerospace Symposium, 9-13 Jan 2017, Grapevine, Texas.

Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyu (2017). O2O Service Composition with Social Collaboration. In: 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (Di Penta, Massimiliano and Nyguen, Tien N. eds.), 30 Oct - 3 Nov 2017, University of Illinois at Urbana-Champaign, Illinois, USA.

Grispos, George; Garcıa-Galan, Jesus; Pasquale, Liliana and Nuseibeh, Bashar (2017). Are You Ready? Towards the Engineering of Forensic-Ready Systems. In: 11th International Conference on Research Challenges in Information Science (RCIS), 10-12 May 2017, Brighton.

Rafiq, Yasmin; Dickens, Luke; Russo, Alessandra; Bandara, Arosha; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine and Nuseibeh, Bashar (2017). Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks. In: 32nd IEEE/ACM International Conference on Automated Software Engineering, 30 Oct - 3 Nov 2017, Chicago, IL.

Grispos, George; Hanvey, Sorren and Nuseibeh, Bashar (2017). Use of organisational topologies for forensic investigations. In: Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics - SERF 2017, ACM Press pp. 2–5.

2016To Top

Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2016). Examining Active Error in Software Development. In: 2016 IEEE Symposium on Visual Languages and Human-Centric Computing pp. 152–156.

Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2016). CrowdService: Serving the Individuals through Mobile Crowdsourcing and Service Composition. In: ASE 2016 Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ACM, New York, USA, pp. 214–219.

Tun, Thein; Price, Blaine; Bandara, Arosha; Yu, Yijun and Nuseibeh, Bashar (2016). Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. In: iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 12 Sep 2016, Beijing, China.

Bennaceur, A. and Nuseibeh, B. (2016). The Many Facets of Mediation: A Requirements-driven Approach for Trading-off Mediation Solutions. In: Mistrík, Ivan; Ali, Nour; Kazman, Rick; Grundy, John and Schmerl, Bradley eds. Managing Trade-offs in Adaptable Software Architectures. Elsevier, pp. 299–322.

Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark and Nuseibeh, Bashar (2016). Adaptive evidence collection in the cloud using attack scenarios. Computers & Security, 59 pp. 236–254.

Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alesandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark and Nuseibeh, Bashar (2016). Privacy Dynamics: Learning Privacy Norms for Social Software. In: 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Association of Computing Machinery pp. 47–56.

García-Galán, Jesús; Pasquale, Liliana; Grispos, George and Nuseibeh, Bashar (2016). Towards Adaptive Compliance. In: SEAMS '16: Proceedings of the 11th International Workshop on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 108–114.

Tsigkanos, Christos; Kehrer, Timo; Ghezzi, Carlo; Pasquale, Liliana and Nuseibeh, Bashar (2016). Adding static and dynamic semantics to building information models. In: SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, ACM, New York, USA, pp. 1–7.

Bennaceur, Amel; Mccormick, Ciaran; García Galán, Jesús; Perera, Charith; Smith, Andrew; Zisman, Andrea and Nuseibeh, Bashar (2016). Feed me, Feed me: An Exemplar for Engineering Adaptive Software. In: 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 16-17 May 2016.

2015To Top

Yu, Yijun; Franqueira, Virginia N. L.; Tun, Thein; Wieringa, Roel J. and Nuseibeh, Bashar (2015). Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software, 106 pp. 102–116.

Nhlabatsi, Armstrong; Yu, Yijun; Zisman, Andrea; Tun, Thein; Khan, Niamul; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2015). Managing security control assumptions using causal traceability. In: 8th International Symposium on Software and Systems Traceability (SST 2015), 17 Jul 2015, Florence, Italy.

Tun, Thein; Lutz, Robyn; Nakayama, Brian; Yu, Yijun; Mathur, Divita and Nuseibeh, Bashar (2015). The Role of Environmental Assumptions in Failures of DNA Nanosystems. In: 2015 IEEE/ACM 1st International Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS), pp. 27–33.

Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled M. and Nuseibeh, Bashar (2015). “Why can’t I do that?”: tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2.

2014To Top

Yu, Yijun; Piwek, Paul; Tun, Thein Than and Nuseibeh, Bashar (2014). Towards explaining rebuttals in security arguments. In: 14th Workshop on Computational Models of Natural Argument, 10 Dec 2014, Krakow, Poland.

Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 Sep 2014, Beijing, China, IEEE, pp. 45–52.

Calikli, Gul; Andersen, Mads Schaarup; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar (2014). Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People. In: Proceedings of 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp 2014 Adjunct), pp. 683–686.

Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2014). Self-adaptation through incremental generative model transformations at runtime. In: 36th International Conference on Software Engineering, Hyderabad, ACM/IEEE.

Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2014). Traceability for adaptive information security in the cloud. In: Proceedings of the 2014 IEEE Seventh International Conference on Cloud Computing, IEEE, pp. 958–959.

Thomas, Keerthi; Bandara, Arosha K.; Price, Blaine A. and Nuseibeh, Bashar (2014). Distilling Privacy Requirements for Mobile Applications. In: 36th International Conference on Software Engineering (ICSE 2014), 31 May - 7 Jun 2014, Hyderabad, India.

Bennaceur, Amel; Bandara, Arosha; Jackson, Michael; Liu, Wei; Montrieux, Lionel; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2014). Requirements-driven mediation for collaborative security. In: SEAMS'14 - The 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2-3 Jun 2014, Hyderabad.

Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos and Nuseibeh, Bashar (2014). Topology aware adaptive security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, pp. 43–48.

Tsigkanos, Christos; Pasquale, Liliana; Menghi, Claudio; Ghezzi, Carlo and Nuseibeh, Bashar (2014). Engineering topology aware adaptive security: preventing requirements violations at runtime. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE): Proceedings, Institute of Electrical and Electronics Engineers, pp. 203–212.

Yu, Yijun; Tun, Thein Than; Bandara, Arosha K.; Zhang, Tian and Nuseibeh, Bashar (2014). From model-driven software development processes to problem diagnoses at runtime. In: Bencome, Nelly; France, Robert; Cheng, Betty H.C. and Aßmann, Uwe eds. Models@run.time -- Foundations, Applications, and Roadmaps. Lecture Notes in Computer Science (8378). Cham: Springer International Publishing, pp. 188–207.

2013To Top

Tun, Thein; Yu, Yijun; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2013). Aspect interactions: a requirements engineering perspective. In: Moreira, Ana; Chitchyan, Ruzanna; Araujo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering. Heidelberg: Springer, pp. 271–286.

Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar (2013). Requirements-driven adaptive digital forensics. In: 21st IEEE Requirements Engineering Conference, 15-19 Jul 2013, Rio de Janeiro, Brazil.

Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar (2013). Resolving vulnerability identification errors using security requirements on business process models. Information Management and Computer Security, 21(3) pp. 202–223.

Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana and Nuseibeh, Bashar (2013). Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013), 18-26 May 2013, San Francisco, CA, USA (forthcoming), pp. 632–641.

Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2013). Maintaining security requirements of software systems using evolving crosscutting dependencies. In: Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering. Springer.

2012To Top

Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah and Nuseibeh, Bashar (2012). SecuriTAS: a tool for engineering adaptive security. In: ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012), 11-16 Nov 2012, North Carolina, USA.

Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012). Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering, 28-30 Jun 2012, Wroclaw, Poland.

Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2012). Getting at ephemeral flaws. In: Cooperative and Human Aspects of Software Engineering (CHASE), 2012 5th International Workshop on, 2 Jun 2012, Zurich.

Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar (2012). Privacy arguments: analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, 24-28 Sep 2012, Chicago, Illinois, pp. 131–140.

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2012). Speculative requirements: automatic detection of uncertainty in natural language requirements. In: The 20th IEEE International Requirements Engineering Conference, 24-28 Sep 2012, Chicago, ILL, USA, IEEE, pp. 11–20.

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar (2012). Adaptive security and privacy in smart grids: A software engineering vision. In: Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop, 3 Jun 2012, University of Zurich.

Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar (2012). On the role of primary and secondary assets in adaptive security: An application in smart grids. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop, 4-5 Jun 2012, Switzerland.

Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar (2012). Caprice: a tool for engineering adaptive privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), 3-7 Sep 2012, Essen, Germany.

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar (2012). Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th International Requirements Engineering Conference (RE'12), 24-28 Sep 2012, Chicago, USA, pp. 111–120.

2011To Top

Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2011). Specifying and detecting meaningful changes in programs. In: 26th IEEE/ACM International Conference On Automated Software Engineering, 6-10 Nov 2011, Lawrence, Kansas, USA, pp. 273–282.

Yu, Yijun; Bandara, Arosha; Tun, Thein Than and Nuseibeh, Bashar (2011). Towards learning to detect meaningful changes in software. In: Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, 12 Nov 2011, Lawrence, Kansas, ACM, pp. 51–54.

Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid (2011). Social sensing: when users become monitors. In: 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011), 5-9 Sep 2011, Szeged, Hungary.

Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar (2011). Risk and argument: a risk-based argumentation method for practical security. In: 19th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2011, Trento, Italy, pp. 239–248.

Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar (2011). OpenArgue: supporting argumentation to evolve secure software systems. In: 2011 IEEE 19th International Requirements Engineering Conference, pp. 351–352.

Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar (2011). PrimAndroid: privacy policy modelling and analysis for Android applications. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 6-8 Jun 2011, Pisa, Italy.

Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar (2011). Learning to adapt requirements specifications of evolving systems (NIER Track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA.

Trew, Tim; Botterweck, Goetz and Nuseibeh, Bashar (2011). A reference architecture for consumer electronics products and its application in requirements engineering. In: Avgeriou, P.; Grundy, J.; Hall, J. G.; Lago, P. and Mistrik, I. eds. Relating Software Requirements and Architectures. Heidelberg, Germany and London, UK and New York, USA: Springer, pp. 203–231.

2010To Top

Bandara, Arosha; Shinpei, Hayashi; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin; Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun (2010). Security patterns: comparing modeling approaches. In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, pp. 75–111.

Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar (2010). “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications. In: MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, 7-10 Sep 2010, Libon, Portugal, ACM, pp. 411–412.

Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement (SSIRI), 2010, IEEE, pp. 88–97.

Nuseibeh, Bashar and Zave, Pamela eds. (2010). Software Requirements and Design: The Work of Michael Jackson. Good Friends Publishing Company.

Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam; Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar (2010). Contravision: Exploring users' reactions to futuristic technology. In: Proceedings of the 28th International Conference on Human factors in computing systems, 10-15 Apr 2010, Atlanta Georgia, USA, pp. 153–162.

Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar (2010). ContraVision: presenting contrasting visions of future technology. In: 28th International Conference on Human Factors in Computing Systems, 10-15 Apr 2010, Atlanta, GA, USA, pp. 4759–4764.

Yang, Hui; De Roeck, Anne; Willis, Alistair and Nuseibeh, Bashar (2010). A methodology for automatic identification of nocuous ambiguity. In: The 23rd International Conference on Computational Linguistics (Coling 2010), 23-27 Aug 2010, Beijing, China, pp. 1218–1226.

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2010). Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: 18th International IEEE Requirements Engineering Conference (RE'10), 27 Sep - 1 Oct 2010, Sydney, Australia, pp. 25–34.

2009To Top

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). Requirements-driven collaborative choreography customization. In: 7th International Joint Conference on Service Oriented Computing, 23-27 Nov 2009, Stockholm, Sweden.

Gacitua, R.; Ma, L.; Nuseibeh, B.; Piwek, P.; De Roeck, A.; Rouncefield, M.; Sawyer, P.; Willis, A. and Yang, H. (2009). Making tacit requirements explicit. In: Second International Workshop on Managing Requirements Knowledge (MaRK’09), 1 Sep 2009, Altanta, USA.

Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9) pp. 64–72.

Ma, Lin; Nuseibeh, Bashar; Piwek, Paul; De Roeck, Anne and Willis, Alistair (2009). On presuppositions in requirements. In: 2009 Second International Workshop on Managing Requirements Knowledge (MaRK'09), 1 Sep 2009, Atlanta, Georgia, USA.

Tun, Thein; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun (2009). Are your lights off? Using problem frames to diagnose system failures. In: 17th IEEE International Requirements Engineering Conference, 31 Aug - 4 Sep 2009, Atlanta, Georgia, USA.

Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar (2009). Studying location privacy in mobile applications: 'predator vs. prey' probes. In: Proceedings of the 5th Symposium on Usable Privacy and Security, 15-17 Jul 2009, California, ACM, p. 1.

Nhlabatsi, Armstrong; Laney, Robin and Nuseibeh, Bashar (2009). Feature interaction as a context sharing problem. In: International Conference on Feature Interactions, 11-12 Jun, University of Lisbon, Portugal.

Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2009). A framework for developing feature-rich software systems. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), 14-16 Apr 2009, San Francisco, California, USA.

Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar (2009). From spaces to places: Emerging contexts in mobile privacy. In: Proceedings of the 11th International conference on Ubiquitous computing, 30 Sep - 3 Oct 2009, Orlando, Florida, USA, ACM, pp. 1–10.

Mancini, Clara; Rogers, Yvonne; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Joinson, Adam; Bandara, Arosha and Nuseibeh, Bashar (2009). A multi-pronged empirical approach to mobile privacy investigation. In: Workshop on Mobile User Experience Research: Challenges, Methods & Tools. 27th ACM International Conference on Human Factors in Computing Systems, ACM CHI 2009, 4-9 Apr 2009, Boston, USA.

Classen, Andreas; Heymans, Patrick; Tun, Thein and Nuseibeh, Bashar (2009). Towards safer composition. In: 2009 31st International Conference on Software Engineering - Companion Volume, pp. 227–230.

Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar (2009). Early identification of problem interactions: A tool-supported approach. In: Glinz, Martin and Heymans, Patrick eds. Requirements Engineering: Foundation for Software Quality, 15th International Working Conference. Lecture Notes in Computer Science (5512). Germany: Springer Verlag, pp. 74–88.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). From organizational requirements to service choreography. In: 2009 IEEE Congress on Services (SERVICES 2009), 6-10 Jul 2009, Los Angeles, CA, USA.

2008To Top

Lozano Rodriguez, Angela; Wermelinger, Michel and Nuseibeh, Bashar (2008). Evaluating the relation between changeability decay and the characteristics of clones and methods. In: 4th International ERCIM Workshop on Software Evolution and Evolvability, 15-16 Sep 2008, L'Aquila, Italy, IEEE, pp. 100–109.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2008). Customizing choreography: Deriving conversations from organizational dependencies. In: 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008), 15-19 Sep 2008, München, Germany.

Haley, Charles B. and Nuseibeh, Bashar (2008). Bridging requirements and architecture for systems of systems. In: 3rd International Symposium on Information Technology (ITSIM'08), 26-28 Aug 2008, Kuala Lumpur, Malaysia.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1) pp. 133–153.

Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar (2008). Arguing satisfaction of security requirements. In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Volume 4. Information Science Reference.

2007To Top

Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar (2007). Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference (RE 2007), 15 Oct - 19 Oct 2007, Delhi, India.

Classen, Andreas; Heymans, Patrick; Laney, Robin; Nuseibeh, Bashar and Tun, Thein Than (2007). On the structure of problem variability: From feature diagrams to problem frames. In: Proceedings of International workshop on Variability Modeling of Software-intensive Systems, 16-18 Jan 2007, Limerick, Ireland, pp. 109–118.

Salifu, Mohammed; Nuseibeh, Bashar; Rapanotti, Lucia and Tun, Thein Than (2007). Using problem descriptions to represent variabilities for context-aware applications. In: Proceedings of 1st International workshop on Variability Modeling of Software-intensive Systems (VaMoS 2007), 16-18 Jan 2007, Limerick, Ireland, pp. 149–156.

Laney, Robin; Tun, Thein Than; Jackson, Michael and Nuseibeh, Bashar (2007). Composing features by managing inconsistent requirements. In: Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007), 3-5 Sep 2007, Grenoble, France, pp. 141–156.

2006To Top

Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair (2006). Identifying nocuous ambiguities in natural language requirements. In: 14th IEEE International Requirements Engineering Conference (RE'06), IEEE, pp. 56–65.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Arguing satisfaction of security requirements. In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision. Hershey, PA and London: Idea Group Publishing, pp. 15–42.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2006). A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06), 20-21 May 2006, Shanghai, China.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Using trust assumptions with security requirements. Requirements Engineering, 11(2) pp. 138–151.

Buckingham Shum, Simon; Selvin, A.M.; Sierhuis, Maarten; Conklin, Jeffrey; Haley, C.B. and Nuseibeh, Bashar (2006). Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC. In: Dutoit, A.; McCall, R.; Mistrik, I. and Paech, B. eds. Rationale Management in Software Engineering. Berlin: Springer-Verlag, pp. 111–132.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2006). Patterns for service-oriented information exchange requirements. In: PLoP Pattern Languages of Programs 2006, 21-23 Oct 2006, Portland, Oregon.

2005To Top

Haley, Debra; Nuseibeh, Bashar; Thomas, Pete; Taylor, Josie and Lefrere, Paul (2005). The Learning Grid and E-Assessment using Latent Semantic Analysis. In: Ritrovato, P.; Allison, C.; Cerri, S.; Dimitrakos, T.; Gaeta, M. and Salerno, S. eds. Towards the Learning Grid. Advances in Human Learning Services. Frontiers in Artificial Intelligence and Applications, Volume. Amsterdam, Holland: IOS Press.

Crook, R.; Ince, D. and Nuseibeh, Bashar (2005). On Modelling access policies: relating roles to their organisational Context. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2005, Paris, France.

Hall, J.G.; Mistrik, I.; Nuseibeh, B. and Silva, A. (2005). Editorial: Relating software requirements and architectures. IEE Proceedings: Software, 152(4) pp. 141–142.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2005). Arguing security: validating security requirements using structured argumentation. In: Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), 29 Aug 2005, Paris, France.

2004To Top

Rapanotti, L.; Hall, J.G.; Jackson, M. and Nuseibeh, B. (2004). Architecture-driven problem decomposition. In: 12th IEEE International Conference on Requirements Engineering (RE 2004), 6-11 Sep 2004, Kyoto, Japan.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). The Effect of trust assumptions on the elaboration of security requirements. In: 12th IEEE International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.

Laney, Robin; Barroca, Leonor; Jackson, Michael and Nuseibeh, Bashar (2004). Composing requirements using problem frames. In: Proceedings of the 12th IEEE International Requirements Engineering Conference (RE 2004), IEEE, pp. 122–131.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Using Problem Frames and projections to analyze requirements for distributed systems. In: Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04), 7-8 Jun 2004, Riga, Latvia.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Proceedings of the Second International Conference on Trust Management (iTrust'04), 29 Mar - 1 Apr 2004, Oxford, UK.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the 3rd international conference on aspect-oriented software development, ACM Press, New York, USA, pp. 112–121.

Barroca, Leonor; Fiadeiro, J.L.; Jackson, M.; Laney, Robin and Nuseibeh, B. (2004). Problem frames: a case for coordination. In: De Nicola, Rocco; Ferrari, Gianluigi and Meredith, Greg eds. Coordination models and languages: 6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004: Proceedings. Lecture notes in computer science, 2949 (2949/2004). Heidleburg, Germany: Springer, pp. 5–19.

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel and Jackson, Michael (2004). Using abuse frames to bound the scope of security problems. In: ed. 12th IEEE International Requirements Engineering Conference (RE'04). IEEE Computer Society, pp. 354–355.

Haley, Debra; Nuseibeh, Bashar; Sharp, Helen and Taylor, Josie (2004). The conundrum of categorising requirements: managing requirements for learning on the move. In: 12th International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.

2003To Top

Crook, Robert; Ince, Darrel and Nuseibeh, Bashar (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14) pp. 979–991.

Haley, Charles and Nuseibeh, Bashar (2003). Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 6-12 Jan 2003, L'Aquila Italy.

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan (2003). Introducing abuse frames to analyse security requirements. In: Proceedings of the 11th International Conference on Requirements Engineering, 8-12 Sep 2003, Monterey, USA.

2002To Top

Hall, J.G.; Jackson, M.; Laney, R. C.; Nuseibeh, B. and Rapanotti, L. (2002). Relating software requirements and architectures using problem frames. In: Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002, 09-13 Sep 2002, Essen, Germany.

Russo, Alessandra; Miller, Rob; Nuseibeh, Bashar and Kramer, Jeff (2002). An abductive approach for analysing event-based requirements specifications. In: 18th International Conference on Logic Programming, 29 Jul - 01 Aug 2002, Copenhagen, Denmark.

Gervasi, Vincenzo and Nuseibeh, Bashar (2002). Lightweight Validation of Natural Language Requirements. Software: Practice and Experience, 32(2) pp. 113–133.

Crook, Robert; Ince, Darrel; Lin, Luncheng and Nuseibeh, Bashar (2002). Security Requirements Engineering: when anti-requirements hit the fan. In: Proc IEEE International Conference on Requirements Engineering, 8-13 Sep 2002, Germany.

2001To Top

Export

Subscribe to these results

get details to embed this page in another page Embed as feed [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0