Hanan Hibshi

Orcid: 0000-0003-0250-3616

According to our database1, Hanan Hibshi authored at least 17 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements.
IEEE Trans. Dependable Secur. Comput., 2022

Observations From an Online Security Competition and Its Implications on Crowdsourced Security.
CoRR, 2022

2021
Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Ask the Experts: What Should Be on an IoT Privacy and Security Label?
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2018
Composite Security Requirements in the Presence of Uncertainty.
PhD thesis, 2018

2017
Reinforcing Security Requirements with Multifactor Quality Measurement.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

2016
A grounded analysis of experts' decision-making during security assessments.
J. Cybersecur., 2016

Improving security requirements adequacy.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Systematic analysis of qualitative data in security.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Privacy Risk in Cybersecurity Data Sharing.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Assessment of risk perception in security requirements composition.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

Detecting repurposing and over-collection in multi-party privacy requirements specifications.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

2014
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements.
Requir. Eng., 2014

Towards a framework to measure security expertise in requirements analysis.
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014

Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2012
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

2011
Usability of Forensics Tools: A User Study.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011


  Loading...