Currently browsing: Items authored or edited by Bashar Nuseibeh https://orcid.org/0000-0002-3476-053X

234 items in this list.
Generated on Sun Dec 1 15:59:21 2024 GMT.

2024To Top

Gooch, Daniel; Bandara, Arosha K.; Bennaceur, Amel; Giles, Emilie; Harkin, Lydia; Katz, Dmitri; Levine, Mark; Mehta, Vikram; Nuseibeh, Bashar; Stevenson, Clifford; Stuart, Avelie; Talbot, Catherine and Price, Blaine A. (2024). Reflections on using the story completion method in designing tangible user interfaces. International Journal of Human-Computer Studies, 192, article no. 103360.

Robinson, Sarah; Buckley, Jim; Ciolfi, Luigina; Linehan, Conor; McInerney, Clare; Nuseibeh, Bashar; Twomey, John; Rauf, Irum and McCarthy, John (2024). Infrastructural Justice for Responsible Software Engineering. Journal of Responsible Technology, 19, article no. 100087.

Pasquale, Liliana; Ramkumar, Kushal; Cai, Wanling; McCarthy, John; Doherty, Gavin and Nuseibeh, Bashar (2024). The Rocky Road to Sustainable Security. IEEE Security & Privacy, 22(5) pp. 82–86.

Abeywickrama, Dhaminda B.; Bennaceur, Amel; Chance, Greg; Demiris, Yiannis; Kordoni, Anastasia; Levine, Mark; Moffat, Luke; Moreau, Luc; Mousavi, Mohammad Reza; Nuseibeh, Bashar; Ramamoorthy, Subramanian; Ringert, Jan Oliver; Wilson, James; Windsor, Shane and Eder, Kerstin (2024). On Specifying for Trustworthiness. Communications of the ACM, 67(1) pp. 98–109.

Zhang, Min; Arce-Plata, Carlos; Price, Blaine; Pike, Graham; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Philpot, Richard; Keil, Tina; Levine, Mark; Stuart, Avelie; Nuseibeh, Bashar and Bandara, Arosha (2024). How Do People Use a Public Gratitude Platform in the Wild? In: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA '24), 11-16 May 2024, Honolulu, Hawaii.

Gavidia-Calderon, Carlos; Kordoni, Anastasia; Bennaceur, Amel; Levine, Mark and Nuseibeh, Bashar (2024). The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems. ACM Transactions on Software Engineering and Methodology, 33(6), article no. 164.

Bennaceur, Amel; Ghezzi, Carlo; Kramer, Jeff and Nuseibeh, Bashar (2024). Responsible Software Engineering: Requirements and Goals. In: Werthner, Hannes; Ghezzi, Carlo; Kramer, Jeff; Nida-Rümelin, Julian; Nuseibeh, Bashar; Prem, Erich and Stanger, Allison eds. Introduction to Digital Humanism. Cham: Springer Nature Switzerland, pp. 299–315.

Alrimawi, Faeq and Nuseibeh, Bashar (2024). Meta-Modelling Kindness. In: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, ACM, 12 pp. 280–289.

2023To Top

Alrimawi, Faeq and Nuseibeh, Bashar (2023). Requirements for Designing Kind Spaces. In: 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), 4-5 Sep 2023, Hannover, Germany, IEEE, pp. 36–41.

Zhang, Min; Bandara, Arosha K.; Philpot, Richard; Stuart, Avelie; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Pike, Graham; Price, Blaine; Levine, Mark and Nuseibeh, Bashar (2023). Towards a Socio-Technical Understanding of Police-Citizen Interactions. In: Human-Computer Interaction – INTERACT 2023 (Abdelnour Nocera, J; Kristín Lárusdóttir, M; Petrie, H; Piccinno, A and Winckler, M eds.), Lecture Notes in Computer Science, Springer, Cham, pp. 324–345.

Bennaceur, Amel; Stuart, Avelie; Price, Blaine; Bandara, Arosha; Levine, Mark; Clare, Linda; Cohen, Jessica; Mccormick, Ciaran; Mehta, Vikram; Bennasar, Mohamed; Gooch, Daniel; Gavidia-Calderon, Carlos; Kordoni, Anastasia and Nuseibeh, Bashar (2023). Socio-Technical Resilience for Community Healthcare. In: Proceedings of the First International Symposium on Trustworthy Autonomous Systems, ACM.

Gavidia-Calderon, Carlos; Bennaceur, Amel; Lopez, Tamara; Kordoni, Anastasia; Levine, Mark and Nuseibeh, Bashar (2023). Meet your Maker: A Social Identity Analysis of Robotics Software Engineering. In: Proceedings of the First International Symposium on Trustworthy Autonomous Systems, ACM.

Lopez, Tamara; Sharp, Helen; Bandara, Arosha; Thein, Tun; Levine, Mark and Nuseibeh, Bashar (2023). Security Responses in Software Development. ACM Transactions on Software Engineering and Methodology, 32(3), article no. 64.

Hassett, Diane; Bennaceur, Amel and Nuseibeh, Bashar (2023). Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design. In: Requirements Engineering: Foundation for Software Quality. REFSQ 2023 (Ferrari, Alessio and Penzenstadler, Birgit eds.), Lecture Notes in Computer Science (LNTCS), Springer, Cham.

Welsh, Thomas; Alrimawi, Faeq; Farahani, Ali; Hassett, Diane; Zisman, Andrea and Nuseibeh, Bashar (2023). Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains. IEEE Transactions on Industrial Informatics, 19(4) pp. 5656–5666.

Mehta, Vikram; Gooch, Daniel; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar (2023). A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools. In: TEI ’23: Proceedings of the Seventeenth International Conference on Tangible, Embedded, and Embodied Interaction, ACM, article no. 19.

Azzam, Mazen; Pasquale, Liliana; Provan, Gregory and Nuseibeh, Bashar (2023). Forensic Readiness of Industrial Control Systems Under Stealthy Attacks. Computers & Security, 125, article no. 103010.

Stuart, Avelie; Yan, Ronnie Jieru; Harkin, Lydia Jo; Katz, Dmitri; Stevenson, Clifford; Mehta, Vikram; Giles, Emilie; Talbot, Catherine; Gooch, Daniel; Bennasar, Mohamed; Self, Tara; Nuseibeh, Bashar and Price, Blaine (2023). Digital Intervention in Loneliness in Older Adults: Qualitative Analysis of User Studies. JMIR Formative Research, 7, article no. e42172.

Rauf, Irum; Petre, Marian; Tun, Thein; Lopez, Tamara and Nuseibeh, Bashar (2023). Security Thinking in Online Freelance Software Development. In: IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS), 14-20 May 2023, Melbourne, Australia, pp. 13–24.

Bennaceur, Amel; Hassett, Diane; Nuseibeh, Bashar and Zisman, Andrea (2023). Values@Runtime: An Adaptive Framework for Operationalising Values. In: IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS), 14-20 May 2023, Melbourne, Australia, pp. 175–179.

Lopez, Tamara; Sharp, Helen; Wermelinger, Michel; Langer, Melanie; Levine, Mark; Jay, Caroline; Yu, Yijun and Nuseibeh, Bashar (2023). Accounting for socio-technical resilience in software engineering. In: 2023 IEEE/ACM 16th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE), 14-15 May 2023, Melbourne.

Monteiro, Davi; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2023). Adaptive Observability for Forensic-Ready Microservice Systems. IEEE Transactions on Services Computing, 16(5) pp. 3196–3209.

2022To Top

Zhang, Min; Elphick, Camilla; Philpot, Richard; Walkington, Zoe; Frumkin, Lara; Price, Blaine; Pike, Graham; Levine, Mark; Nuseibeh, Bashar and Bandara, Arosha (2022). Attitudes towards Online Community Support Initiatives during the COVID-19 Pandemic: A Survey in the UK. In: CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1-7 May 2022, Association for Computing Machinery.

Rauf, Irum; Lopez, Tamara; Sharp, Helen; Petre, Marian; Tun, Thein; Levine, Mark; Towse, John; Linden, Dirk van der; Rashid, Awais and Nuseibeh, Bashar (2022). Influences of developers' perspectives on their engagement with security in code. In: Proceedings of CHASE ’22: Proceedings of the 15th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE) (CHASE 2022), ACM, New York, NY, USA, pp. 86–95.

Alrimawi, Faeq and Nuseibeh, Bashar (2022). Kind Computing. In: 2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), IEEE.

Neale, Chris; Kennedy, Ian; Price, Blaine; Yu, Yijun and Nuseibeh, Bashar (2022). The case for Zero Trust Digital Forensics. Forensic Science International: Digital Investigation, 40, article no. 301352.

Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak; Yoshioka, Nobukazu and Nuseibeh, Bashar (2022). Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. IEEE Transactions on Software Engineering, 48(1) pp. 120–134.

Rauf, Irum; Petre, Marian; Tun, Thein; Lopez, Tamara; Lunn, Paul; Van der Linden, Dirk; Towse, John; Sharp, Helen; Levine, Mark; Rashid, Awais and Nuseibeh, Bashar (2022). The Case for Adaptive Security Interventions. ACM Transactions on Software Engineering and Methodology, 31(1), article no. 9.

Gavidia-Calderon, Carlos; Bennaceur, Amel; Kordoni, Anastasia; Levine, Mark and Nuseibeh, Bashar (2022). What Do You Want From Me? Adapting Systems to the Uncertainty of Human Preferences. In: 2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), 21-29 May 2022, Pittsburgh, PA, USA, pp. 126–130.

Alrimawi, Faeq and Nuseibeh, Bashar (2022). Kind computing. In: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, ACM pp. 61–65.

2021To Top

Weyns, Danny; Bures, Tomas; Calinescu, Radu; Craggs, Barnaby; Fitzgerald, John; Garlan, David; Nuseibeh, Bashar; Pasquale, Liliana; Rashid, Awais; Ruchkin, Ivan and Schmerl, Bradley (2021). Six Software Engineering Principles for Smarter Cyber-Physical Systems. In: 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), pp. 198–203.

Hassan, Alzubair; Nuseibeh, Bashar and Pasquale, Liliana (2021). Engineering Adaptive Authentication. In: 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), pp. 275–280.

Welsh, Thomas; Alrimawi, Faeq; Farahani, Ali; Hasset, Diane; Zisman, Andrea and Nuseibeh, Bashar (2021). Towards Adaptive Inspection for Fraud in I4.0 Supply Chain. In: 2021 ETFA - IEEE 26th International Conference on Emerging Technologies and Factory Automation, 7-10 Sep 2021, Vasteras, Sweden, IEEE.

O'Connell, James; Abbas, Manzar; Beecham, Sarah; Buckley, Jim; Chochlov, Muslim; Fitzgerald, Brian; Glynn, Liam; Johnson, Kevin; Laffey, John; McNicholas, Bairbre; Nuseibeh, Bashar; O'Callaghan, Michael; O'Keeffe, Ian; Razzaq, Abdul; Rekanar, Kaavya; Richardson, Ita; Simpkin, Andrew; Storni, Cristiano; Tsvyatkova, Damyanka; Walsh, Jane; Welsh, Thomas and O'Keeffe, Derek (2021). Best Practice Guidance for Digital Contact Tracing Apps: A Cross-disciplinary Review of the Literature. JMIR mHealth and uHealth, 9(6), article no. e27753.

Farahani, Ali; Pasquale, Liliana; Bennaceur, Amel; Welsh, Tom and Nuseibeh, Bashar (2021). On Adaptive Fairness in Software Systems. In: Proceedings - 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2021 pp. 97–103.

Mehta, Vikram; Bandara, Arosha; Price, Blaine; Nuseibeh, Bashar and Gooch, Daniel (2021). Up Close and Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control. In: TEI '21: Proceedings of the Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction, 14-17 Feb 2021, Salzburg, Austria.

2020To Top

van der Linden, Dirk; Anthonysamy, Pauline; Nuseibeh, Bashar; Tun, Thein Than; Petre, Marian; Levine, Mark; Towse, John and Rashid, Awais (2020). Schrödinger's security: opening the box on app developers' security rationale. In: ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, Association for Computing Machinery, New York, USA pp. 149–160.

Tun, Thein Than; Bennaceur, Amel and Nuseibeh, Bashar (2020). OASIS: Weakening User Obligations for Security-critical Systems. In: IEEE International Conference on Requirements Engineering, IEEE pp. 113–124.

Rauf, Irum; van der Linden, Dirk; Levine, Mark; Towse, John; Nuseibeh, Bashar and Rashid, Awais (2020). Security but not for security’s sake: The impact of social considerations on app developers’ choices. In: IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW'20), May 23--29, 2020, Seoul, Republic of Korea, IEEE/ACM, New York, NY, United States, pp. 141–144.

Zhang, Min; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar (2020). Finding & Reviewing Community Policing Apps in Asia. In: AsianCHI '20: Proceedings of the 2020 Symposium on Emerging Research from Asia and on Asian Contexts and Cultures, ACM pp. 45–48.

Gooch, Daniel; Mehta, Vikram; Price, Blaine; McCormick, Ciaran; Bandara, Arosha; Bennaceur, Amel; Bennasar, Mohamed; Stuart, Avelie; Clare, Linda; Levine, Mark; Cohen, Jessica and Nuseibeh, Bashar (2020). How are you feeling? Using Tangibles to Log the Emotions of Older Adults. In: Fourteenth International Conference on Tangible, Embedded, and Embodied Interaction (TEI ’20), ACM pp. 31–43.

Bandara, Arosha; Zhang, Min; Price, Blaine; Pike, Graham; Elphick, Camilla; Walkington, Zoe; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar (2020). Towards Citizen Forensics: Improving Citizen-Police Collaboration. In: Workshop on Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI, Extended Abstracts of ACM Conference on Human Factors in Computing Systems, 25-30 Apr 2020, Honolulu, HI, USA.

Zhang, Min; Bandara, Arosha; Price, Blaine; Pike, Graham; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar (2020). Designing Technologies for Community Policing. In: CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems pp. 1–9.

2019To Top

Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar (2019). On the Automated Management of Security Incidents in Smart Space. IEEE Access, 7 pp. 111513–111527.

Lopez, Tamara; Tun, Thein; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2019). An Anatomy of Security Conversations in Stack Overflow. In: 41st ACM/IEEE International Conference on Software Engineering, 25 May - 1 Jun 2019, Montréal, Canada, pp. 31–40.

Peters, Fayola; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2019). Text Filtering and Ranking for Security Bug Report Prediction. IEEE Transactions on Software Engineering, 45(6) pp. 615–631.

Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Talking about Security with Professional Developers. In: 7th International Workshop Series on Conducting Empirical Studies in Industry (CESSER-IP), 28 May 2019, Montréal, Canada.

Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice. In: Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering pp. 61–68.

Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2019). Dragonfly: a Tool for Simulating Self-Adaptive Drone Behaviours. In: SEAMS '19 Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, IEEE pp. 107–113.

Bennaceur, Amel; Tun, Thein Than; Yu, Yijun and Nuseibeh, Bashar (2019). Requirements Engineering. In: Cha, Sungdeok (Steve); Taylor, Richard N. and Kang, Kyo C. eds. Handbook of Software Engineering. Springer, pp. 51–92.

Bennaceur, Amel; Ghezzi, Carlo; Tei, Kenji; Kehrer, Timo; Weyns, Danny; Calinescu, Radu; Dustdar, Schahram; Honiden, Shinichi; Ishikawa, Fuyuki; Jin, Zhi; Kramer, Jeffrey; Litoiu, Marin; Loreti, Michele; Moreno, Gabriel; Muller, Hausi; Nenzi, Laura; Nuseibeh, Bashar; Pasquale, Liliana; Reisig, Wolfgang; Schmidt, Heinz; Tsigkanos, Christos and Zhao, Haiyan Zhao (2019). Modelling and Analysing Resilient Cyber-Physical Systems. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.

Bennaceur, Amel; Zisman, Andrea; Mccormick, Ciaran; Barthaud, Danny and Nuseibeh, Bashar (2019). Won’t Take No for an Answer: Resource-driven Requirements Adaptation. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.

Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds. (2019). Engineering Adaptive Software Systems. Springer Singapore.

Wilkins, Denise; Nuseibeh, Bashar and Levine, Mark (2019). Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action. In: HCII 2019, Proceedings Part III: Human-Computer Interaction. Design Practice in Contemporary Societies, Lecture Notes in Computer Science, Springer, pp. 130–147.

Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2019). Cautious Adaptation of Defiant Components. In: The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019) (Lawall, Julia and Marinov, Darko eds.), 11-15 Nov 2019, San Diego, California, USA, pp. 974–985.

Bennasar, Mohamed; Mccormick, Ciaran; Price, Blaine; Gooch, Daniel; Stuart, Avelie; Mehta, Vikram; Clare, Linda; Bennaceur, Amel; Cohen, Jessica; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time. In: Innovation in Medicine and Healthcare Systems, and Multimedia, Springer Singapore, Singapore pp. 125–135.

2018To Top

Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B. (2018). Requirements and Specifications for Adaptive Security: Concepts and Analysis. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 161–171.

Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo and Nuseibeh, Bashar (2018). On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing, 15(3) pp. 466–480.

Peng, Xin; Gu, Lingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2018). CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. ACM Transactions on Internet Technology (TOIT), 18(2), article no. 19.

Spiller, Keith; Ball, Kirstie; Bandara, Arosha; Meadows, Maureen; Mccormick, Ciaran; Nuseibeh, Bashar and Price, Blaine A. (2018). Data Privacy: Users’ Thoughts on Quantified Self Personal Data. In: Ajana, Btihaj ed. Self-Tracking: Empirical and Philosophical Investigations. Cham: Palgrave Macmillan, pp. 111–124.

Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios and Nuseibeh, Bashar (2018). Compositional Verification of Self-Adaptive Cyber-Physical Systems. In: 13th ACM/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 28-29 May 2018, Gothenburg, Sweden.

Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak and Nuseibeh, Bashar (2018). I’ve Seen This Before: Sharing Cyber-Physical Incident Knowledge. In: 1st International Workshop on Security Awareness from Design to Deployment (SEAD’18), 27 May 2018, Gothenburg, Sweden..

Lopez, Tamara; Tun, Thein T.; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2018). An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement. In: SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, ACM, New York pp. 26–32.

Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Tun, Thein; Nuseibeh, Bashar and Rashid, Awais (2018). Towards forensic-ready software systems. In: Proceedings of the 40th International Conference on Software Engineering New Ideas and Emerging Results - ICSE-NIER '18, ACM Press pp. 9–12.

2017To Top

Elrakaiby, Yehia; Ferrari, Alessio; Spolentini, Paola; Gnesi, Stefania and Nuseibeh, Bashar (2017). Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews. In: 2017 IEEE 25th International Requirements Engineering Conference, 4-8 Sep 2017, Lisbon, Portugal.

Alrajeh, Dalal; Pasquale, Liliana and (2017). On Evidence Preservation Requirements for Forensic-Ready Systems. In: ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 4-8 Sep 2017, Paderborn, Germany, pp. 559–569.

Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca and (2017). Topology-Aware Access Control of Smart Spaces. IEEE Computer, 50(7) pp. 54–63.

Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar (2017). Software Engineering Challenges for Investigating Cyber-Physical Incidents. In: Proceedings of the 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS ’17), 20-28 May 2017, Buenos Aires, Argentina.

Nuseibeh, Bashar (2017). Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces. In: Proceedings of 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), IEEE, p. 2.

Barhamgi, Mahmoud; Yang, Mu; Yu, Chia-Mu; Yu, Yijun; Bandara, Arosha K.; Benslimane, Djamal and Nuseibeh, Bashar (2017). Enabling End-Users to Protect Their Privacy. In: ASIA CCS '17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, New York, NY, pp. 905–907.

Yu, Yijun; Yang, Mu and Nuseibeh, Bashar (2017). Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion. In: SCiA 2017 : 4th Software Challenges in Aerospace Symposium, 9-13 Jan 2017, Grapevine, Texas.

Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyu (2017). O2O Service Composition with Social Collaboration. In: 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (Di Penta, Massimiliano and Nyguen, Tien N. eds.), 30 Oct - 3 Nov 2017, University of Illinois at Urbana-Champaign, Illinois, USA.

Grispos, George; Garcıa-Galan, Jesus; Pasquale, Liliana and Nuseibeh, Bashar (2017). Are You Ready? Towards the Engineering of Forensic-Ready Systems. In: 11th International Conference on Research Challenges in Information Science (RCIS), 10-12 May 2017, Brighton.

Rafiq, Yasmin; Dickens, Luke; Russo, Alessandra; Bandara, Arosha; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine and Nuseibeh, Bashar (2017). Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks. In: 32nd IEEE/ACM International Conference on Automated Software Engineering, 30 Oct - 3 Nov 2017, Chicago, IL.

Grispos, George; Hanvey, Sorren and Nuseibeh, Bashar (2017). Use of organisational topologies for forensic investigations. In: Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics - SERF 2017, ACM Press pp. 2–5.

2016To Top

Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2016). Examining Active Error in Software Development. In: 2016 IEEE Symposium on Visual Languages and Human-Centric Computing pp. 152–156.

Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2016). CrowdService: Serving the Individuals through Mobile Crowdsourcing and Service Composition. In: ASE 2016 Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ACM, New York, USA, pp. 214–219.

Tun, Thein; Price, Blaine; Bandara, Arosha; Yu, Yijun and Nuseibeh, Bashar (2016). Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. In: iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 12 Sep 2016, Beijing, China.

Bennaceur, A. and Nuseibeh, B. (2016). The Many Facets of Mediation: A Requirements-driven Approach for Trading-off Mediation Solutions. In: Mistrík, Ivan; Ali, Nour; Kazman, Rick; Grundy, John and Schmerl, Bradley eds. Managing Trade-offs in Adaptable Software Architectures. Elsevier, pp. 299–322.

Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark and Nuseibeh, Bashar (2016). Adaptive evidence collection in the cloud using attack scenarios. Computers & Security, 59 pp. 236–254.

Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alesandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark and Nuseibeh, Bashar (2016). Privacy Dynamics: Learning Privacy Norms for Social Software. In: 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Association of Computing Machinery pp. 47–56.

García-Galán, Jesús; Pasquale, Liliana; Grispos, George and Nuseibeh, Bashar (2016). Towards Adaptive Compliance. In: SEAMS '16: Proceedings of the 11th International Workshop on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 108–114.

Tsigkanos, Christos; Kehrer, Timo; Ghezzi, Carlo; Pasquale, Liliana and Nuseibeh, Bashar (2016). Adding static and dynamic semantics to building information models. In: SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, ACM, New York, USA, pp. 1–7.

Bennaceur, Amel; Mccormick, Ciaran; García Galán, Jesús; Perera, Charith; Smith, Andrew; Zisman, Andrea and Nuseibeh, Bashar (2016). Feed me, Feed me: An Exemplar for Engineering Adaptive Software. In: 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 16-17 May 2016.

2015To Top

Yu, Yijun; Franqueira, Virginia N. L.; Tun, Thein; Wieringa, Roel J. and Nuseibeh, Bashar (2015). Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software, 106 pp. 102–116.

Nhlabatsi, Armstrong; Yu, Yijun; Zisman, Andrea; Tun, Thein; Khan, Niamul; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2015). Managing security control assumptions using causal traceability. In: 8th International Symposium on Software and Systems Traceability (SST 2015), 17 Jul 2015, Florence, Italy.

Tun, Thein; Lutz, Robyn; Nakayama, Brian; Yu, Yijun; Mathur, Divita and Nuseibeh, Bashar (2015). The Role of Environmental Assumptions in Failures of DNA Nanosystems. In: 2015 IEEE/ACM 1st International Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS), pp. 27–33.

Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled M. and Nuseibeh, Bashar (2015). “Why can’t I do that?”: tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2.

2014To Top

Yu, Yijun; Piwek, Paul; Tun, Thein Than and Nuseibeh, Bashar (2014). Towards explaining rebuttals in security arguments. In: 14th Workshop on Computational Models of Natural Argument, 10 Dec 2014, Krakow, Poland.

Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 Sep 2014, Beijing, China, IEEE, pp. 45–52.

Calikli, Gul; Andersen, Mads Schaarup; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar (2014). Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People. In: Proceedings of 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp 2014 Adjunct), pp. 683–686.

Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2014). Self-adaptation through incremental generative model transformations at runtime. In: 36th International Conference on Software Engineering, Hyderabad, ACM/IEEE pp. 676–687.

Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2014). Traceability for adaptive information security in the cloud. In: Proceedings of the 2014 IEEE Seventh International Conference on Cloud Computing, IEEE, pp. 958–959.

Thomas, Keerthi; Bandara, Arosha K.; Price, Blaine A. and Nuseibeh, Bashar (2014). Distilling Privacy Requirements for Mobile Applications. In: 36th International Conference on Software Engineering (ICSE 2014), 31 May - 7 Jun 2014, Hyderabad, India.

Bennaceur, Amel; Bandara, Arosha; Jackson, Michael; Liu, Wei; Montrieux, Lionel; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2014). Requirements-driven mediation for collaborative security. In: SEAMS'14 - The 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2-3 Jun 2014, Hyderabad.

Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos and Nuseibeh, Bashar (2014). Topology aware adaptive security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, pp. 43–48.

Tsigkanos, Christos; Pasquale, Liliana; Menghi, Claudio; Ghezzi, Carlo and Nuseibeh, Bashar (2014). Engineering topology aware adaptive security: preventing requirements violations at runtime. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE): Proceedings, Institute of Electrical and Electronics Engineers, pp. 203–212.

Yu, Yijun; Tun, Thein Than; Bandara, Arosha K.; Zhang, Tian and Nuseibeh, Bashar (2014). From model-driven software development processes to problem diagnoses at runtime. In: Models@run.time -- Foundations, Applications, and Roadmaps (Bencome, Nelly; France, Robert; Cheng, Betty H.C. and Aßmann, Uwe eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, pp. 188–207.

2013To Top

Tun, Thein; Yu, Yijun; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2013). Aspect interactions: a requirements engineering perspective. In: Moreira, Ana; Chitchyan, Ruzanna; Araujo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering. Heidelberg: Springer, pp. 271–286.

Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar (2013). Requirements-driven adaptive digital forensics. In: 21st IEEE Requirements Engineering Conference, 15-19 Jul 2013, Rio de Janeiro, Brazil.

Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar (2013). Resolving vulnerability identification errors using security requirements on business process models. Information Management and Computer Security, 21(3) pp. 202–223.

Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana and Nuseibeh, Bashar (2013). Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013), 18-26 May 2013, San Francisco, CA, USA, pp. 632–641.

Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2013). Maintaining security requirements of software systems using evolving crosscutting dependencies. In: Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering. Springer.

2012To Top

Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah and Nuseibeh, Bashar (2012). SecuriTAS: a tool for engineering adaptive security. In: ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012), 11-16 Nov 2012, North Carolina, USA.

Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012). Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering, 28-30 Jun 2012, Wroclaw, Poland.

Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2012). Getting at ephemeral flaws. In: Cooperative and Human Aspects of Software Engineering (CHASE), 2012 5th International Workshop on, 2 Jun 2012, Zurich.

Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar (2012). Privacy arguments: analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, 24-28 Sep 2012, Chicago, Illinois, pp. 131–140.

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2012). Speculative requirements: automatic detection of uncertainty in natural language requirements. In: The 20th IEEE International Requirements Engineering Conference, 24-28 Sep 2012, Chicago, ILL, USA, IEEE, pp. 11–20.

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar (2012). Adaptive security and privacy in smart grids: A software engineering vision. In: Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop, 3 Jun 2012, University of Zurich.

Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar (2012). On the role of primary and secondary assets in adaptive security: An application in smart grids. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop, 4-5 Jun 2012, Switzerland.

Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar (2012). Caprice: a tool for engineering adaptive privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), 3-7 Sep 2012, Essen, Germany.

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar (2012). Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th International Requirements Engineering Conference (RE'12), 24-28 Sep 2012, Chicago, USA, pp. 111–120.

2011To Top

Yu, Yijun; Bandara, Arosha; Tun, Thein Than and Nuseibeh, Bashar (2011). Towards learning to detect meaningful changes in software. In: Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, 12 Nov 2011, Lawrence, Kansas, ACM, pp. 51–54.

Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid (2011). Social sensing: when users become monitors. In: 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011), 5-9 Sep 2011, Szeged, Hungary.

Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar (2011). Risk and argument: a risk-based argumentation method for practical security. In: 19th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2011, Trento, Italy, pp. 239–248.

Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar (2011). OpenArgue: supporting argumentation to evolve secure software systems. In: 2011 IEEE 19th International Requirements Engineering Conference, pp. 351–352.

Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar (2011). PrimAndroid: privacy policy modelling and analysis for Android applications. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 6-8 Jun 2011, Pisa, Italy.

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2011). Analysing anaphoric ambiguity in natural language requirements. Requirements Engineering, 16(3) pp. 163–189.

Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar (2011). Learning to adapt requirements specifications of evolving systems (NIER Track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA.

Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam; Price, Blaine; Bandara, Arosha; Jedrzejczyk, Lukasz and Nuseibeh, Bashar (2011). In the best families: tracking and relationships. In: 29th International ACM Conference on Human Factors in Computing Systems, ACM CHI 2011, 07-12 May 2011, Vancouver, Canada, pp. 2419–2428.

Trew, Tim; Botterweck, Goetz and Nuseibeh, Bashar (2011). A reference architecture for consumer electronics products and its application in requirements engineering. In: Avgeriou, P.; Grundy, J.; Hall, J. G.; Lago, P. and Mistrik, I. eds. Relating Software Requirements and Architectures. Heidelberg, Germany and London, UK and New York, USA: Springer, pp. 203–231.

2010To Top

Bandara, Arosha; Hayashi, Shinpei; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin; Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun (2010). Security patterns: comparing modeling approaches. In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, pp. 75–111.

Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar (2010). “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications. In: MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, 7-10 Sep 2010, Libon, Portugal, ACM, pp. 411–412.

Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement (SSIRI), 2010, IEEE, pp. 88–97.

Nuseibeh, Bashar and Zave, Pamela eds. (2010). Software Requirements and Design: The Work of Michael Jackson. Good Friends Publishing Company.

Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam; Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar (2010). Contravision: Exploring users' reactions to futuristic technology. In: Proceedings of the 28th International Conference on Human factors in computing systems, 10-15 Apr 2010, Atlanta Georgia, USA, pp. 153–162.

Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar (2010). ContraVision: presenting contrasting visions of future technology. In: 28th International Conference on Human Factors in Computing Systems, 10-15 Apr 2010, Atlanta, GA, USA, pp. 4759–4764.

Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun (2010). Security requirements engineering for evolving software systems: a survey. International Journal of Secure Software Engineering (IJSSE), 1(1) pp. 54–73.

Yang, Hui; De Roeck, Anne; Willis, Alistair and Nuseibeh, Bashar (2010). A methodology for automatic identification of nocuous ambiguity. In: The 23rd International Conference on Computational Linguistics (Coling 2010), 23-27 Aug 2010, Beijing, China, pp. 1218–1226.

Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar (2010). Automatic detection of nocuous coordination ambiguities in natural language requirements. In: Proceedings of the IEEE/ACM international conference on Automated software engineering, ACM, pp. 53–62.

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2010). Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: 18th International IEEE Requirements Engineering Conference (RE'10), 27 Sep - 1 Oct 2010, Sydney, Australia, pp. 25–34.

2009To Top

Gacitua, R.; Ma, L.; Nuseibeh, B.; Piwek, P.; De Roeck, A.; Rouncefield, M.; Sawyer, P.; Willis, A. and Yang, H. (2009). Making tacit requirements explicit. In: Second International Workshop on Managing Requirements Knowledge (MaRK’09), 1 Sep 2009, Altanta, USA.

Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9) pp. 64–72.

Ma, Lin; Nuseibeh, Bashar; Piwek, Paul; De Roeck, Anne and Willis, Alistair (2009). On presuppositions in requirements. In: 2009 Second International Workshop on Managing Requirements Knowledge (MaRK'09), 1 Sep 2009, Atlanta, Georgia, USA.

Tun, Thein Than; Trew, Tim; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2009). Specifying features of an evolving software system. Software: Practice and Experience, 39(11) pp. 973–1002.

Tun, Thein; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun (2009). Are your lights off? Using problem frames to diagnose system failures. In: 17th IEEE International Requirements Engineering Conference, 31 Aug - 4 Sep 2009, Atlanta, Georgia, USA.

Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar (2009). Studying location privacy in mobile applications: 'predator vs. prey' probes. In: Proceedings of the 5th Symposium on Usable Privacy and Security, 15-17 Jul 2009, California, ACM, p. 1.

Nhlabatsi, Armstrong; Laney, Robin and Nuseibeh, Bashar (2009). Feature interaction as a context sharing problem. In: International Conference on Feature Interactions, 11-12 Jun, University of Lisbon, Portugal.

Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2009). A framework for developing feature-rich software systems. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), 14-16 Apr 2009, San Francisco, California, USA.

Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar (2009). From spaces to places: Emerging contexts in mobile privacy. In: Proceedings of the 11th International conference on Ubiquitous computing, 30 Sep - 3 Oct 2009, Orlando, Florida, USA, ACM, pp. 1–10.

Mancini, Clara; Rogers, Yvonne; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Joinson, Adam; Bandara, Arosha and Nuseibeh, Bashar (2009). A multi-pronged empirical approach to mobile privacy investigation. In: Workshop on Mobile User Experience Research: Challenges, Methods & Tools. 27th ACM International Conference on Human Factors in Computing Systems, ACM CHI 2009, 4-9 Apr 2009, Boston, USA.

Classen, Andreas; Heymans, Patrick; Tun, Thein and Nuseibeh, Bashar (2009). Towards safer composition. In: 2009 31st International Conference on Software Engineering - Companion Volume, pp. 227–230.

Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar (2009). Early identification of problem interactions: A tool-supported approach. In: Requirements Engineering: Foundation for Software Quality, 15th International Working Conference (Glinz, Martin and Heymans, Patrick eds.), Lecture Notes in Computer Science, Springer Verlag, Germany, pp. 74–88.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). From organizational requirements to service choreography. In: 2009 IEEE Congress on Services (SERVICES 2009), 6-10 Jul 2009, Los Angeles, CA, USA.

2008To Top

Lozano Rodriguez, Angela; Wermelinger, Michel and Nuseibeh, Bashar (2008). Evaluating the relation between changeability decay and the characteristics of clones and methods. In: 4th International ERCIM Workshop on Software Evolution and Evolvability, 15-16 Sep 2008, L'Aquila, Italy, IEEE, pp. 100–109.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2008). Customizing choreography: Deriving conversations from organizational dependencies. In: 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008), 15-19 Sep 2008, München, Germany.

Haley, Charles B. and Nuseibeh, Bashar (2008). Bridging requirements and architecture for systems of systems. In: 3rd International Symposium on Information Technology (ITSIM'08), 26-28 Aug 2008, Kuala Lumpur, Malaysia.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1) pp. 133–153.

Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar (2008). Arguing satisfaction of security requirements. In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Volume 4. Information Science Reference.

2007To Top

Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar (2007). Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference (RE 2007), 15 Oct - 19 Oct 2007, Delhi, India.

Classen, Andreas; Heymans, Patrick; Laney, Robin; Nuseibeh, Bashar and Tun, Thein Than (2007). On the structure of problem variability: From feature diagrams to problem frames. In: Proceedings of International workshop on Variability Modeling of Software-intensive Systems, 16-18 Jan 2007, Limerick, Ireland, pp. 109–118.

Salifu, Mohammed; Nuseibeh, Bashar; Rapanotti, Lucia and Tun, Thein Than (2007). Using problem descriptions to represent variabilities for context-aware applications. In: Proceedings of 1st International workshop on Variability Modeling of Software-intensive Systems (VaMoS 2007), 16-18 Jan 2007, Limerick, Ireland, pp. 149–156.

Laney, Robin; Tun, Thein Than; Jackson, Michael and Nuseibeh, Bashar (2007). Composing features by managing inconsistent requirements. In: Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007), 3-5 Sep 2007, Grenoble, France, pp. 141–156.

2006To Top

Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair (2006). Identifying nocuous ambiguities in natural language requirements. In: 14th IEEE International Requirements Engineering Conference (RE'06), IEEE, pp. 56–65.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Arguing satisfaction of security requirements. In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision. Hershey, PA and London: Idea Group Publishing, pp. 15–42.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2006). A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06), 20-21 May 2006, Shanghai, China.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Using trust assumptions with security requirements. Requirements Engineering, 11(2) pp. 138–151.

Buckingham Shum, Simon; Selvin, A.M.; Sierhuis, Maarten; Conklin, Jeffrey; Haley, C.B. and Nuseibeh, Bashar (2006). Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC. In: Dutoit, A.; McCall, R.; Mistrik, I. and Paech, B. eds. Rationale Management in Software Engineering. Berlin: Springer-Verlag, pp. 111–132.

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2006). Patterns for service-oriented information exchange requirements. In: PLoP Pattern Languages of Programs 2006, 21-23 Oct 2006, Portland, Oregon.

2005To Top

Haley, Debra; Nuseibeh, Bashar; Thomas, Pete; Taylor, Josie and Lefrere, Paul (2005). The Learning Grid and E-Assessment using Latent Semantic Analysis. In: Ritrovato, P.; Allison, C.; Cerri, S.; Dimitrakos, T.; Gaeta, M. and Salerno, S. eds. Towards the Learning Grid: Advances in Human Learning Services. Frontiers in Artificial Intelligence and Applications, 127. Amsterdam, The Netherlands: IOS Press, pp. 197–202.

Crook, R.; Ince, D. and Nuseibeh, Bashar (2005). On Modelling access policies: relating roles to their organisational Context. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2005, Paris, France.

Hall, J.G.; Mistrik, I.; Nuseibeh, B. and Silva, A. (2005). Editorial: Relating software requirements and architectures. IEE Proceedings: Software, 152(4) pp. 141–142.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2005). Arguing security: validating security requirements using structured argumentation. In: Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), 29 Aug 2005, Paris, France.

2004To Top

Rapanotti, L.; Hall, J.G.; Jackson, M. and Nuseibeh, B. (2004). Architecture-driven problem decomposition. In: 12th IEEE International Conference on Requirements Engineering (RE 2004), 6-11 Sep 2004, Kyoto, Japan.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). The Effect of trust assumptions on the elaboration of security requirements. In: 12th IEEE International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.

Taylor, J.; Sharp, H.C.; Haley, D.T. and Nuseibeh, B. (2004). The conundrum of categorising requirements: managing requirements for learning on the move. In: 21st IEEE International Requirements Engineering Conference (RE), 6-10 Sep 2004, Kyoto, Japan, pp. 309–314.

Laney, Robin; Barroca, Leonor; Jackson, Michael and Nuseibeh, Bashar (2004). Composing requirements using problem frames. In: Proceedings of the 12th IEEE International Requirements Engineering Conference (RE 2004), IEEE, pp. 122–131.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Using Problem Frames and projections to analyze requirements for distributed systems. In: Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04), 7-8 Jun 2004, Riga, Latvia.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Proceedings of the Second International Conference on Trust Management (iTrust'04), 29 Mar - 1 Apr 2004, Oxford, UK.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the 3rd international conference on aspect-oriented software development, ACM Press, New York, USA, pp. 112–121.

Barroca, Leonor; Fiadeiro, J.L.; Jackson, M.; Laney, Robin and Nuseibeh, B. (2004). Problem frames: a case for coordination. In: De Nicola, Rocco; Ferrari, Gianluigi and Meredith, Greg eds. Coordination models and languages: 6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004: Proceedings. Lecture notes in computer science, 2949 (2949/2004). Heidleburg, Germany: Springer, pp. 5–19.

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel and Jackson, Michael (2004). Using abuse frames to bound the scope of security problems. In: ed. 12th IEEE International Requirements Engineering Conference (RE'04). IEEE Computer Society, pp. 354–355.

2003To Top

Crook, Robert; Ince, Darrel and Nuseibeh, Bashar (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14) pp. 979–991.

Haley, Charles and Nuseibeh, Bashar (2003). Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 6-12 Jan 2003, L'Aquila Italy.

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan (2003). Introducing abuse frames to analyse security requirements. In: Proceedings of the 11th International Conference on Requirements Engineering, 8-12 Sep 2003, Monterey, USA.

2002To Top

Hall, J.G.; Jackson, M.; Laney, R. C.; Nuseibeh, B. and Rapanotti, L. (2002). Relating software requirements and architectures using problem frames. In: Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002, 09-13 Sep 2002, Essen, Germany.

Russo, Alessandra; Miller, Rob; Nuseibeh, Bashar and Kramer, Jeff (2002). An abductive approach for analysing event-based requirements specifications. In: 18th International Conference on Logic Programming, 29 Jul - 01 Aug 2002, Copenhagen, Denmark.

Gervasi, Vincenzo and Nuseibeh, Bashar (2002). Lightweight Validation of Natural Language Requirements. Software: Practice and Experience, 32(2) pp. 113–133.

Crook, Robert; Ince, Darrel; Lin, Luncheng and Nuseibeh, Bashar (2002). Security Requirements Engineering: when anti-requirements hit the fan. In: Proc IEEE International Conference on Requirements Engineering, 8-13 Sep 2002, Germany.

2001To Top

Export

Subscribe to these results

get details to embed this page in another page Embed as feed [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0