Bashar Nuseibeh

Orcid: 0000-0002-3476-053X

Affiliations:
  • Open University, Department of Computing, Milton Keynes, UK


According to our database1, Bashar Nuseibeh authored at least 275 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Specifying for Trustworthiness.
Commun. ACM, January, 2024

2023
Security Responses in Software Development.
ACM Trans. Softw. Eng. Methodol., May, 2023

Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains.
IEEE Trans. Ind. Informatics, April, 2023

Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks.
IEEE Trans. Control. Syst. Technol., March, 2023

Adaptive Observability for Forensic-Ready Microservice Systems.
IEEE Trans. Serv. Comput., 2023

Security in Online Freelance Software Development: A case for Distributed Security Responsibility.
CoRR, 2023

Sustainable Adaptive Security.
CoRR, 2023

Forensic readiness of industrial control systems under stealthy attacks.
Comput. Secur., 2023

A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools.
Proceedings of the Seventeenth International Conference on Tangible, 2023

Meet your Maker: A Social Identity Analysis of Robotics Software Engineering.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

Socio-Technical Resilience for Community Healthcare.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2023

Requirements for Designing Kind Spaces.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

Towards a Socio-Technical Understanding of Police-Citizen Interactions.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023

Security Thinking in Online Freelance Software Development.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society, 2023

Values@Runtime: An Adaptive Framework for Operationalising Values.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society, 2023

Accounting for socio-technical resilience in software engineering.
Proceedings of the 16th IEEE/ACM International Conference on Cooperative and Human Aspects of Software Engineering, 2023

2022
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems.
IEEE Trans. Software Eng., 2022

The Case for Adaptive Security Interventions.
ACM Trans. Softw. Eng. Methodol., 2022

Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers.
Sensors, 2022

The case for Zero Trust Digital Forensics.
Digit. Investig., 2022

The case for Zero Trust Digital Forensics.
CoRR, 2022

What Do You Want From Me? Adapting Systems to the Uncertainty of Human Preferences.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results ICSE (NIER) 2022, 2022

Kind Computing.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results ICSE (NIER) 2022, 2022

Influences of developers' perspectives on their engagement with security in code.
Proceedings of the 15th IEEE/ACM International Workshop on Cooperative and Human Aspects of Software Engineering , 2022

Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Privacy Care: A Tangible Interaction Framework for Privacy Management.
ACM Trans. Internet Techn., 2021

Bumps in the Code: Error Handling During Software Development.
IEEE Softw., 2021

Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control.
Proceedings of the TEI '21: Fifteenth International Conference on Tangible, 2021

On Adaptive Fairness in Software Systems.
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021

Towards Adaptive Inspection for Fraud in I4.0 Supply Chains.
Proceedings of the 26th IEEE International Conference on Emerging Technologies and Factory Automation, 2021

Toward a Compare and Contrast Framework for COVID-19 Contact Tracing Mobile Applications: A Look at Usability.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

Six Software Engineering Principles for Smarter Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

Engineering Adaptive Authentication.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
Taking the Middle Path: Learning About Security Through Online Social Interaction.
IEEE Softw., 2020

Designing privacy-aware internet of things applications.
Inf. Sci., 2020

Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland.
CoRR, 2020

Building trust in digital policing: A scoping review of community policing apps.
CoRR, 2020

Optimal by Design: Model-Driven Synthesis of Adaptation Strategies for Autonomous Systems.
CoRR, 2020

How are you feeling?: Using Tangibles to Log the Emotions of Older Adults.
Proceedings of the TEI '20: Fourteenth International Conference on Tangible, 2020

OASIS: Weakening User Obligations for Security-critical Systems.
Proceedings of the 28th IEEE International Requirements Engineering Conference, 2020

Security but not for security's sake: The impact of social considerations on app developers' choices.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Schrödinger's security: opening the box on app developers' security rationale.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Designing Technologies for Community Policing.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Finding & Reviewing Community Policing Apps in Asia.
Proceedings of the AsianCHI '20: Proceedings of the 2020 Symposium on Emerging Research from Asia and on Asian Contexts and Cultures, 2020

Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

2019
Text Filtering and Ranking for Security Bug Report Prediction.
IEEE Trans. Software Eng., 2019

LiveBox: A Self-Adaptive Forensic-Ready Service for Drones.
IEEE Access, 2019

On the Automated Management of Security Incidents in Smart Spaces.
IEEE Access, 2019

Requirements We Live By.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Knowledge-Based Architecture for Recognising Activities of Older People.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Cautious Adaptation of Defiant Components.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Dragonfly: a tool for simulating self-adaptive drone behaviours.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

An anatomy of security conversations in stack overflow.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019

Talking about security with professional developers.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

"Hopefully we are mostly secure": views on secure code in professional practice.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

Won't take no for an answer: resource-driven requirements adaptation.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Modelling and analysing resilient cyber-physical systems.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action.
Proceedings of the Human-Computer Interaction. Design Practice in Contemporary Societies, 2019

Requirements Engineering.
Proceedings of the Handbook of Software Engineering., 2019

2018
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition.
ACM Trans. Internet Techn., 2018

On the Interplay Between Cyber and Physical Spaces for Adaptive Security.
IEEE Trans. Dependable Secur. Comput., 2018

Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things.
ACM Trans. Cyber Phys. Syst., 2018

Editorial: The First.
ACM Trans. Auton. Adapt. Syst., 2018

Generating Privacy Zones in Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Towards forensic-ready software systems.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

An investigation of security conversations in stack overflow: perceptions of security and community involvement.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Compositional verification of self-adaptive cyber-physical systems.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

I've seen this before: sharing cyber-physical incident knowledge.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Engineering Software for Life in Cyber-Physical-Social Spaces.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

2017
Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Front Matter - SEAMS 2017 Artifacts, Table of Contents, Preface, Artifact Evaluation Committee.
Dagstuhl Artifacts Ser., 2017

Designing Privacy-aware Internet of Things Applications.
CoRR, 2017

Topology-Aware Access Control of Smart Spaces.
Computer, 2017

Use of organisational topologies for forensic investigations.
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 2017

On evidence preservation requirements for forensic-ready systems.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Adaptive information security and privacy.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Are you ready? Towards the engineering of forensic-ready systems.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Learning to share: engineering adaptive decision-support for online social networks.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

O2O service composition with social collaboration.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017

Software Engineering Challenges for Investigating Cyber-Physical Incidents.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017

On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Automating trade-off analysis of security requirements.
Requir. Eng., 2016

Protecting Privacy in the Cloud: Current Practices, Future Directions.
Computer, 2016

Adaptive evidence collection in the cloud using attack scenarios.
Comput. Secur., 2016

Examining active error in software development.
Proceedings of the 2016 IEEE Symposium on Visual Languages and Human-Centric Computing, 2016

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

CrowdService: serving the individuals through mobile crowdsourcing and service composition.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Adding static and dynamic semantics to building information models.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

Towards adaptive compliance.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Privacy dynamics: learning privacy norms for social software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Feed me, feed me: an exemplar for engineering adaptive software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Wearables for physical privacy.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Privacy Itch and Scratch: On Body Privacy Warnings and Controls.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2015-11).
NII Shonan Meet. Rep., 2015

"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self Adapt. Syst., 2015

Automated analysis of security requirements through risk-based argumentation.
J. Syst. Softw., 2015

The Role of Environmental Assumptions in Failures of DNA Nanosystems.
Proceedings of the 1st IEEE/ACM International Workshop on Complex Faults and Failures in Large Software Systems, 2015

Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Signing Off: The State of the Journal.
IEEE Trans. Software Eng., 2014

Engineering Adaptive Digital Investigations using Forensics Requirements.
CoRR, 2014

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Engineering topology aware adaptive security: Preventing requirements violations at runtime.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Distilling privacy requirements for mobile applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Topology aware adaptive security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Self-adaptation through incremental generative model transformations at runtime.
Proceedings of the 36th International Conference on Software Engineering, 2014

Requirements-driven mediation for collaborative security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Personal informatics for non-geeks: lessons learned from ordinary people.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
In Memoriam: Mary Jean Harrold (1947-2013).
IEEE Trans. Software Eng., 2013

In Memoriam - David Notkin (1953-2013).
IEEE Trans. Software Eng., 2013

Editorial [new associate editors].
IEEE Trans. Software Eng., 2013

Characterizing Architecturally Significant Requirements.
IEEE Softw., 2013

Resolving vulnerability identification errors using security requirements on business process models.
Inf. Manag. Comput. Secur., 2013

Specifying software features for composition: A tool-supported approach.
Comput. Networks, 2013

Requirements-driven adaptive digital forensics.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

Engineering adaptive privacy: on the role of privacy awareness requirements.
Proceedings of the 35th International Conference on Software Engineering, 2013

Unpacking Tacit Knowledge for Requirements Engineering.
Proceedings of the Managing Requirements Knowledge., 2013

Aspect Interactions: A Requirements Engineering Perspective.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

2012
State of the Journal.
IEEE Trans. Software Eng., 2012

Analysing monitoring and switching problems for adaptive systems.
J. Syst. Softw., 2012

The thin line between products.
Proceedings of the 16th International Software Product Line Conference, 2012

SecuriTAS: a tool for engineering adaptive security.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Speculative requirements: Automatic detection of uncertainty in natural language requirements.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Privacy arguments: Analysing selective disclosure requirements for mobile applications.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Requirements-driven adaptive security: Protecting variable assets at runtime.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Thrashing, Tolerating and Compromising in Software Development.
Proceedings of the 24th Annual Workshop of the Psychology of Programming Interest Group, 2012

Caprice: a tool for engineering adaptive privacy.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Adaptive security and privacy in smart grids: a software engineering vision.
Proceedings of the First International Workshop on Software Engineering Challenges for the Smart Grid, 2012

On the role of primary and secondary assets in adaptive security: An application in smart grids.
Proceedings of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2012

Getting at ephemeral flaws.
Proceedings of the 5th International Workshop on Co-operative and Human Aspects of Software Engineering, 2012

Social Adaptation at Runtime.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2012

Social Adaptation - When Software Gives Users a Voice.
Proceedings of the ENASE 2012, 2012

An Aspect-Oriented Approach to Relating Security Requirements and Access Control.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
Editorial: What Makes a Publication Archival?
IEEE Trans. Software Eng., 2011

Editorial: State of the Journal.
IEEE Trans. Software Eng., 2011

Analysing anaphoric ambiguity in natural language requirements.
Requir. Eng., 2011

Social sensing: when users become monitors.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

OpenArgue: Supporting argumentation to evolve secure software systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Unknown knowns: Tacit knowledge in requirements engineering.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Risk and argument: A risk-based argumentation method for practical security.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Social Software Product Lines.
Proceedings of the First International Workshop on Requirements Engineering for Social Computing, 2011

PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
Proceedings of the POLICY 2011, 2011

Specifying and detecting meaningful changes in programs.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Learning to adapt requirements specifications of evolving systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

From Model-Driven Software Development Processes to Problem Diagnoses at Runtime.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

In the best families: tracking and relationships.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Using /* to Model Access Policies: Relating Actors to Their Organizational Context.
Proceedings of the Social Modeling for Requirements Engineering., 2011

A Reference Architecture for Consumer Electronics Products and its Application in Requirements Engineering.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
Editorial: How Special Should Issues Be?
IEEE Trans. Software Eng., 2010

In Memoriam: Robin Milner and Amir Pnueli.
IEEE Trans. Software Eng., 2010

Editorial: Readers, Writers, Reviewers, and Editors.
IEEE Trans. Software Eng., 2010

Editorial: A New Decade of TSE.
IEEE Trans. Software Eng., 2010

Requirements-Driven Design of Service-Oriented Interactions.
IEEE Softw., 2010

Security Requirements Engineering for Evolving Software Systems: A Survey.
Int. J. Secur. Softw. Eng., 2010

Guest Editors' Introduction: Evolving Critical Systems.
Computer, 2010

Model-Based Argument Analysis for Evolving Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Mobile Privacy Requirements on Demand.
Proceedings of the Product-Focused Software Process Improvement, 2010

"Privacy-shake", : a haptic interface for managing privacy settings in mobile location sharing applications.
Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, 2010

Automatic detection of nocuous coordination ambiguities in natural language requirements.
Proceedings of the ASE 2010, 2010

A Methodology for Automatic Identification of Nocuous Ambiguity.
Proceedings of the COLING 2010, 2010

ContraVision: presenting contrasting visions of future technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Contravision: exploring users' reactions to futuristic technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Specifying features of an evolving software system.
Softw. Pract. Exp., 2009

Securing the Skies: In Requirements We Trust.
Computer, 2009

Studying location privacy in mobile applications: 'predator vs. prey' probes.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

From Organizational Requirements to Service Choreography.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Early Identification of Problem Interactions: A Tool-Supported Approach.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Are Your Lights Off? Using Problem Frames to Diagnose System Failures.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

On Presuppositions in Requirements.
Proceedings of the Second International Workshop on Managing Requirements Knowledge, 2009

Making Tacit Requirements Explicit.
Proceedings of the Second International Workshop on Managing Requirements Knowledge, 2009

Requirements-Driven Collaborative Choreography Customization.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

Towards safer composition.
Proceedings of the 31st International Conference on Software Engineering, 2009

From spaces to places: emerging contexts in mobile privacy.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Feature Interaction as a Context Sharing Problem.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

A Framework for Developing Feature-Rich Software Systems.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008

Security Requirements Engineering: A Framework for Representation and Analysis.
IEEE Trans. Software Eng., 2008

A final editorial.
Autom. Softw. Eng., 2008

Building Contingencies into Specifications.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

First International Modeling Security Workshop.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

Evaluating the relation between changeability decay and the characteristics of clones and methods.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008

The five W's (and one "H") of Security: Software Engineering of Secure Systems.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Customizing Choreography: Deriving Conversations from Organizational Dependencies.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Using Problem Descriptions to Represent Variabilities For Context-Aware Applications.
Proceedings of the First International Workshop on Variability Modelling of Software-Intensive Systems, 2007

On the Structure of Problem Variability: From Feature Diagrams to Problem Frames.
Proceedings of the First International Workshop on Variability Modelling of Software-Intensive Systems, 2007

Specifying Monitoring and Switching Problems in Context.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Evaluating the Harmfulness of Cloning: A Change Based Experiment.
Proceedings of the Fourth International Workshop on Mining Software Repositories, 2007

Assessing the impact of bad smells using historical information.
Proceedings of the 9th International Workshop on Principles of Software Evolution (IWPSE 2007), 2007

Model-Based Security Engineering of Distributed Information Systems Using UMLsec.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Composing Features by Managing Inconsistent Requirements.
Proceedings of the Feature Interactions in Software and Communication Systems IX, 2007

2006
Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering.
IEEE Trans. Software Eng., 2006

Learning Software Engineering at a Distance.
IEEE Softw., 2006

Using trust assumptions with security requirements.
Requir. Eng., 2006

Towards Context-Aware Product-Family Architectures.
Proceedings of the International Workshop on Software Product Management, 2006

Identifying Nocuous Ambiguities in Natural Language Requirements.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

A framework for security requirements engineering.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Degradation archaeology: studying software flaws' evolution.
Proceedings of the 2nd ERCIM Workshop on Software Evolution, 2006

2005
Keeping ubiquitous computing to yourself: A practical model for user control of privacy.
Int. J. Hum. Comput. Stud., 2005

Relating software requirements and architectures.
IEE Proc. Softw., 2005

On Modelling Access Policies: Relating Roles to their Organisational Context.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

The Learning Grid and E-Assessment using Latent Semantic Analysis.
Proceedings of the Towards the Learning Grid - Advances in Human Learning Services, 2005

Introduction to Research Papers.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Gathering Requirements for a Grid-based Automatic Marking System.
Proceedings of the 1st International ELeGI Conference on Advanced Technology for Enhanced Learning, 2005

2004
Architecture-driven Problem Decomposition.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Using Abuse Frames to Bound the Scope of Security Problems.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Composing Requirements Using Problem Frames.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

The Effect of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the Trust Management, Second International Conference, 2004

Problem Frames: A Case for Coordination.
Proceedings of the Coordination Models and Languages, 6th International Conference, 2004

Crosscutting requirements.
Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2004

Deriving security requirements from crosscutting threat descriptions.
Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2004

2003
Guest editorial.
Requir. Eng., 2003

Modelling access policies using roles in requirements engineering.
Inf. Softw. Technol., 2003

Combining abductive reasoning and inductive learning to evolve requirements specifications.
IEE Proc. Softw., 2003

Introducing Abuse Frames for Analysing Security Requirements.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

E-Assessment using Latent Semantic Analysis.
Proceedings of the 3rd International LeGE-WG Workshop: GRID Infrastructure to Support Future Technology Enhanced Learning, 2003

ViewPoints: meaningful relationships are difficult!
Proceedings of the 25th International Conference on Software Engineering, 2003

2002
Lightweight validation of natural language requirements.
Softw. Pract. Exp., 2002

Relating Software Requirements and Architectures Using Problem Frames.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

Security Requirements Engineering: When Anti-Requirements Hit the Fan.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

An Abductive Approach for Analysing Event-Based Requirements Specifications.
Proceedings of the Logic Programming, 18th International Conference, 2002

2001
Workshop on multi-dimensional separation of concerns in software engineering.
ACM SIGSOFT Softw. Eng. Notes, 2001

Making inconsistency respectable in software development.
J. Syst. Softw., 2001

Weaving Together Requirements and Architectures.
Computer, 2001

An Analysis-Revision Cycle to Evolve Requirements Specifications.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Leveraging Inconsistency in Software Development.
Computer, 2000

Introduction to Special Issue.
Autom. Softw. Eng., 2000

Editorial.
Autom. Softw. Eng., 2000

Hybrid Model Visualization in Requirements and Design: A Preliminary Investigation.
Proceedings of the 10th International Workshop on Software Specification and Design, 2000

Requirements engineering: a roadmap.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Lightweight Validation of Natural Language Requirements: A Case Study.
Proceedings of the 4th International Conference on Requirements Engineering, 2000

1999
Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development.
IEEE Trans. Software Eng., 1999

Restructuring requirement specifications.
IEE Proc. Softw., 1999

Using Abduction to Evolve Inconsistent Requirements Specification.
Australas. J. Inf. Syst., 1999

An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering.
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

How Multi-Disciplinary Is RE (really)?
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

The Process of Inconsistency Management: A Framework for Understanding.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
Managing Inconsistent Specifications: Reasoning, Analysis, and Action.
ACM Trans. Softw. Eng. Methodol., 1998

On the Consequences of Acting in the Presence of Inconsistency.
Proceedings of the 9th International Workshop on Software Specification and Design, 1998

Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study.
Proceedings of the 3rd International Conference on Requirements Engineering (ICRE '98), 1998

1997
Soapbox: Ariane 5: Who Dunnit?
IEEE Softw., 1997

Making Requirements Measurable.
Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), 1997

Analyzing Inconsistent Specifications.
Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), 1997

Making Requirements Measurable (Tutorial).
Proceedings of the Pulling Together, 1997

1996
Conflicting Requirements: When the Customer is Not Always Right.
Requir. Eng., 1996

Method engineering for multi-perspective software development.
Inf. Softw. Technol., 1996

Using ViewPoints for inconsistency management.
Softw. Eng. J., 1996

Towards a framework for managing inconsistency between multiple views.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

To Be and Not to Be: On Managing Inconsistency in Software Development.
Proceedings of the 8th International Workshop on Software Specification and Design, 1996

When Agents Clash.
Proceedings of the Software Process Technology, 5th European Workshop, 1996

1995
Report on the Second IEEE International Symposium on Requirements Engineering (RE '95), York, UK, 27-29 March 1995.
Autom. Softw. Eng., 1995

Managing inconsistencies in an evolving specification.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

Decentralised Process Enactment in a Multi-Perspective Development Environment.
Proceedings of the 17th International Conference on Software Engineering, 1995

Decentralised Process Modelling.
Proceedings of the Software Process Technology, 4th European Workshop, 1995

1994
A Framework for Expressing the Relationships Between Multiple Views in Requirements Specification.
IEEE Trans. Software Eng., 1994

Inconsistency Handling in Multperspective Specifications.
IEEE Trans. Software Eng., 1994

1993
Fine-Grain Process Modelling.
Proceedings of the 7th International Workshop on Software Specification and Design, 1993

Expressing the Relationships Between Multiple Views in Requirements Specification.
Proceedings of the 15th International Conference on Software Engineering, 1993

Method Integration and Support for Distributed Software Development: An Overview.
Proceedings of the Studies of Software Design, 1993

Inconsistency Handling in Multi-Perspective Specifications.
Proceedings of the Software Engineering, 1993

1992
Viewpoints: A Framework for Integrating Multiple Perspectives in System Development.
Int. J. Softw. Eng. Knowl. Eng., 1992


  Loading...