default search action
Bashar Nuseibeh
Person information
- affiliation: Open University, Department of Computing, Milton Keynes, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j87]Dhaminda B. Abeywickrama, Amel Bennaceur, Greg Chance, Yiannis Demiris, Anastasia Kordoni, Mark Levine, Luke Moffat, Luc Moreau, Mohammad Reza Mousavi, Bashar Nuseibeh, Subramanian Ramamoorthy, Jan Oliver Ringert, James Wilson, Shane Windsor, Kerstin Eder:
On Specifying for Trustworthiness. Commun. ACM 67(1): 98-109 (2024) - [j86]Liliana Pasquale, Kushal Ramkumar, Wanling Cai, John McCarthy, Gavin Doherty, Bashar Nuseibeh:
The Rocky Road to Sustainable Security. IEEE Secur. Priv. 22(5): 82-86 (2024) - [j85]Daniel Gooch, Arosha K. Bandara, Amel Bennaceur, Emilie Giles, Lydia Harkin, Dmitri S. Katz, Mark Levine, Vikram Mehta, Bashar Nuseibeh, Clifford Stevenson, Avelie Stuart, Catherine V. Talbot, Blaine A. Price:
Reflections on using the story completion method in designing tangible user interfaces. Int. J. Hum. Comput. Stud. 192: 103360 (2024) - [j84]Carlos Gavidia-Calderon, Anastasia Kordoni, Amel Bennaceur, Mark Levine, Bashar Nuseibeh:
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems. ACM Trans. Softw. Eng. Methodol. 33(6): 164 (2024) - 2023
- [j83]Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Forensic readiness of industrial control systems under stealthy attacks. Comput. Secur. 125: 103010 (2023) - [j82]Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks. IEEE Trans. Control. Syst. Technol. 31(2): 735-747 (2023) - [j81]Thomas Welsh, Faeq Alrimawi, Ali Farahani, Diane Hassett, Andrea Zisman, Bashar Nuseibeh:
Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains. IEEE Trans. Ind. Informatics 19(4): 5656-5666 (2023) - [j80]Tamara Lopez, Helen Sharp, Arosha K. Bandara, Thein Tun, Mark Levine, Bashar Nuseibeh:
Security Responses in Software Development. ACM Trans. Softw. Eng. Methodol. 32(3): 64:1-64:29 (2023) - [j79]Davi Monteiro Barbosa, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Adaptive Observability for Forensic-Ready Microservice Systems. IEEE Trans. Serv. Comput. 16(5): 3196-3209 (2023) - 2022
- [j78]Christopher Neale, Ian Kennedy, Blaine A. Price, Yijun Yu, Bashar Nuseibeh:
The case for Zero Trust Digital Forensics. Digit. Investig. 40(Supplement): 301352 (2022) - [j77]Mohamed Bennasar, Blaine A. Price, Daniel Gooch, Arosha K. Bandara, Bashar Nuseibeh:
Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers. Sensors 22(19): 7482 (2022) - [j76]Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems. IEEE Trans. Dependable Secur. Comput. 19(6): 3955-3970 (2022) - [j75]Irum Rauf, Marian Petre, Thein Tun, Tamara Lopez, Paul Lunn, Dirk van der Linden, John N. Towse, Helen Sharp, Mark Levine, Awais Rashid, Bashar Nuseibeh:
The Case for Adaptive Security Interventions. ACM Trans. Softw. Eng. Methodol. 31(1): 9:1-9:52 (2022) - [j74]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. IEEE Trans. Software Eng. 48(2): 120-134 (2022) - 2021
- [j73]Tamara Lopez, Helen Sharp, Marian Petre, Bashar Nuseibeh:
Bumps in the Code: Error Handling During Software Development. IEEE Softw. 38(3): 26-34 (2021) - [j72]Vikram Mehta, Daniel Gooch, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Privacy Care: A Tangible Interaction Framework for Privacy Management. ACM Trans. Internet Techn. 21(1): 25:1-25:32 (2021) - 2020
- [j71]Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal Azad, Blaine A. Price, Bashar Nuseibeh:
Designing privacy-aware internet of things applications. Inf. Sci. 512: 238-257 (2020) - [j70]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
Taking the Middle Path: Learning About Security Through Online Social Interaction. IEEE Softw. 37(1): 25-30 (2020) - 2019
- [j69]Faeq Alrimawi, Liliana Pasquale, Bashar Nuseibeh:
On the Automated Management of Security Incidents in Smart Spaces. IEEE Access 7: 111513-111527 (2019) - [j68]Yijun Yu, Danny Barthaud, Blaine A. Price, Arosha K. Bandara, Andrea Zisman, Bashar Nuseibeh:
LiveBox: A Self-Adaptive Forensic-Ready Service for Drones. IEEE Access 7: 148401-148412 (2019) - [j67]Fayola Peters, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Text Filtering and Ranking for Security Bug Report Prediction. IEEE Trans. Software Eng. 45(6): 615-631 (2019) - 2018
- [j66]Bashar Nuseibeh:
Editorial: The First. ACM Trans. Auton. Adapt. Syst. 13(1) (2018) - [j65]Amel Bennaceur, Thein Than Tun, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Trans. Cyber Phys. Syst. 2(3): 21:1-21:25 (2018) - [j64]Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh:
On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Trans. Dependable Secur. Comput. 15(3): 466-480 (2018) - [j63]Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. ACM Trans. Internet Techn. 18(2): 19:1-19:25 (2018) - 2017
- [j62]Liliana Pasquale, Carlo Ghezzi, Edoardo Pasi, Christos Tsigkanos, Menouer Boubekeur, Blanca Florentino-Liaño, Tarik Hadzic, Bashar Nuseibeh:
Topology-Aware Access Control of Smart Spaces. Computer 50(7): 54-63 (2017) - [j61]Javier Cámara, Bashar Nuseibeh, David Garlan:
Front Matter - SEAMS 2017 Artifacts, Table of Contents, Preface, Artifact Evaluation Committee. Dagstuhl Artifacts Ser. 3(1): 00:-1-00:-12 (2017) - [j60]Blaine A. Price, Avelie Stuart, Gul Calikli, Ciaran McCormick, Vikram Mehta, Luke Hutton, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(2): 22:1-22:18 (2017) - 2016
- [j59]Liliana Pasquale, Sorren Hanvey, Mark Mcgloin, Bashar Nuseibeh:
Adaptive evidence collection in the cloud using attack scenarios. Comput. Secur. 59: 236-254 (2016) - [j58]Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh:
Protecting Privacy in the Cloud: Current Practices, Future Directions. Computer 49(2): 68-72 (2016) - [j57]Liliana Pasquale, Paola Spoletini, Mazeiar Salehie, Luca Cavallaro, Bashar Nuseibeh:
Automating trade-off analysis of security requirements. Requir. Eng. 21(4): 481-504 (2016) - 2015
- [j56]Yijun Yu, Virginia N. L. Franqueira, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh:
Automated analysis of security requirements through risk-based argumentation. J. Syst. Softw. 106: 102-116 (2015) - [j55]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - 2014
- [j54]Bashar Nuseibeh:
Signing Off: The State of the Journal. IEEE Trans. Software Eng. 40(1): 1-3 (2014) - 2013
- [j53]Thein Than Tun, Robin C. Laney, Yijun Yu, Bashar Nuseibeh:
Specifying software features for composition: A tool-supported approach. Comput. Networks 57(12): 2454-2464 (2013) - [j52]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [j51]Lianping Chen, Muhammad Ali Babar, Bashar Nuseibeh:
Characterizing Architecturally Significant Requirements. IEEE Softw. 30(2): 38-45 (2013) - [j50]Bashar Nuseibeh:
Editorial: State of the Journal. IEEE Trans. Software Eng. 39(2): 145-146 (2013) - [j49]Bashar Nuseibeh:
Editorial [new associate editors]. IEEE Trans. Software Eng. 39(5): 588-590 (2013) - [j48]Bashar Nuseibeh:
In Memoriam - David Notkin (1953-2013). IEEE Trans. Software Eng. 39(6): 742-743 (2013) - [j47]Bashar Nuseibeh:
Editorial. IEEE Trans. Software Eng. 39(9): 1187-1189 (2013) - [j46]Bashar Nuseibeh:
In Memoriam: Mary Jean Harrold (1947-2013). IEEE Trans. Software Eng. 39(11): 1466 (2013) - 2012
- [j45]Mohammed Salifu, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Analysing monitoring and switching problems for adaptive systems. J. Syst. Softw. 85(12): 2829-2839 (2012) - [j44]Bashar Nuseibeh:
State of the Journal. IEEE Trans. Software Eng. 38(1): 1-2 (2012) - 2011
- [j43]Hui Yang, Anne N. De Roeck, Vincenzo Gervasi, Alistair Willis, Bashar Nuseibeh:
Analysing anaphoric ambiguity in natural language requirements. Requir. Eng. 16(3): 163-189 (2011) - [j42]Bashar Nuseibeh:
Editorial: State of the Journal. IEEE Trans. Software Eng. 37(1): 1-3 (2011) - [j41]Bashar Nuseibeh:
Editorial: What Makes a Publication Archival? IEEE Trans. Software Eng. 37(2): 145 (2011) - 2010
- [j40]Lorcan Coyle, Mike Hinchey, Bashar Nuseibeh, José Luiz Fiadeiro:
Guest Editors' Introduction: Evolving Critical Systems. Computer 43(5): 28-33 (2010) - [j39]Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu:
Security Requirements Engineering for Evolving Software Systems: A Survey. Int. J. Secur. Softw. Eng. 1(1): 54-73 (2010) - [j38]Ayman Mahfouz, Leonor Barroca, Robin C. Laney, Bashar Nuseibeh:
Requirements-Driven Design of Service-Oriented Interactions. IEEE Softw. 27(6): 25-32 (2010) - [j37]Bashar Nuseibeh:
Editorial: A New Decade of TSE. IEEE Trans. Software Eng. 36(1): 3-6 (2010) - [j36]Bashar Nuseibeh:
Editorial: Readers, Writers, Reviewers, and Editors. IEEE Trans. Software Eng. 36(2): 145-156 (2010) - [j35]Bashar Nuseibeh:
In Memoriam: Robin Milner and Amir Pnueli. IEEE Trans. Software Eng. 36(3): 305 (2010) - [j34]Bashar Nuseibeh:
Editorial: How Special Should Issues Be? IEEE Trans. Software Eng. 36(4): 449-450 (2010) - [j33]Bashar Nuseibeh:
Editorial. IEEE Trans. Software Eng. 36(6): 735-736 (2010) - 2009
- [j32]Bashar Nuseibeh, Charles B. Haley, Craig J. Foster:
Securing the Skies: In Requirements We Trust. Computer 42(9): 64-72 (2009) - [j31]Thein Than Tun, Tim Trew, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Specifying features of an evolving software system. Softw. Pract. Exp. 39(11): 973-1002 (2009) - 2008
- [j30]Bashar Nuseibeh:
A final editorial. Autom. Softw. Eng. 15(3-4): 257-259 (2008) - [j29]Patrick D. McDaniel, Bashar Nuseibeh:
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems. IEEE Trans. Software Eng. 34(1): 3-4 (2008) - [j28]Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh:
Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Trans. Software Eng. 34(1): 133-153 (2008) - 2006
- [j27]Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh:
Using trust assumptions with security requirements. Requir. Eng. 11(2): 138-151 (2006) - [j26]Brendan Quinn, Leonor Barroca, Bashar Nuseibeh, Juan Fernández-Ramil, Lucia Rapanotti, Pete Thomas, Michel Wermelinger:
Learning Software Engineering at a Distance. IEEE Softw. 23(6): 36-43 (2006) - [j25]William G. Griswold, Bashar Nuseibeh:
Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering. IEEE Trans. Software Eng. 32(12): 929-930 (2006) - 2005
- [j24]Jon G. Hall, Ivan Mistrík, Bashar Nuseibeh, Andrés Silva:
Relating software requirements and architectures. IEE Proc. Softw. 152(4): 141-142 (2005) - [j23]Blaine A. Price, Karim Adam, Bashar Nuseibeh:
Keeping ubiquitous computing to yourself: A practical model for user control of privacy. Int. J. Hum. Comput. Stud. 63(1-2): 228-253 (2005) - 2003
- [j22]Artur S. d'Avila Garcez, Alessandra Russo, Bashar Nuseibeh, Jeff Kramer:
Combining abductive reasoning and inductive learning to evolve requirements specifications. IEE Proc. Softw. 150(1): 25-38 (2003) - [j21]Robert Crook, Darrel C. Ince, Bashar Nuseibeh:
Modelling access policies using roles in requirements engineering. Inf. Softw. Technol. 45(14): 979-991 (2003) - [j20]Bashar Nuseibeh:
Guest editorial. Requir. Eng. 8(1): 3 (2003) - 2002
- [j19]Vincenzo Gervasi, Bashar Nuseibeh:
Lightweight validation of natural language requirements. Softw. Pract. Exp. 32(2): 113-133 (2002) - 2001
- [j18]Bashar Nuseibeh:
Weaving Together Requirements and Architectures. Computer 34(3): 115-117 (2001) - [j17]Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo:
Making inconsistency respectable in software development. J. Syst. Softw. 58(2): 171-180 (2001) - [j16]Peri L. Tarr, William H. Harrison, Harold Ossher, Anthony Finkelstein, Bashar Nuseibeh, Dewayne E. Perry:
Workshop on multi-dimensional separation of concerns in software engineering. ACM SIGSOFT Softw. Eng. Notes 26(1): 78-81 (2001) - 2000
- [j15]Bashar Nuseibeh:
Editorial. Autom. Softw. Eng. 7(1): 5 (2000) - [j14]Bashar Nuseibeh, David F. Redmiles:
Introduction to Special Issue. Autom. Softw. Eng. 7(2): 99-100 (2000) - [j13]Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo:
Leveraging Inconsistency in Software Development. Computer 33(4): 24-29 (2000) - 1999
- [j12]Bashar Nuseibeh, Alessandra Russo:
Using Abduction to Evolve Inconsistent Requirements Specification. Australas. J. Inf. Syst. 6(2) (1999) - [j11]Alessandra Russo, Bashar Nuseibeh, Jeff Kramer:
Restructuring requirement specifications. IEE Proc. Softw. 146(1): 44-50 (1999) - [j10]Carlo Ghezzi, Bashar Nuseibeh:
Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development. IEEE Trans. Software Eng. 25(6): 782-783 (1999) - 1998
- [j9]Anthony Hunter, Bashar Nuseibeh:
Managing Inconsistent Specifications: Reasoning, Analysis, and Action. ACM Trans. Softw. Eng. Methodol. 7(4): 335-367 (1998) - 1997
- [j8]Bashar Nuseibeh:
Soapbox: Ariane 5: Who Dunnit? IEEE Softw. 14(3): 15-16 (1997) - 1996
- [j7]Steve M. Easterbrook, Bashar Nuseibeh:
Using ViewPoints for inconsistency management. Softw. Eng. J. 11(1): 31-43 (1996) - [j6]Bashar Nuseibeh, Anthony Finkelstein, Jeff Kramer:
Method engineering for multi-perspective software development. Inf. Softw. Technol. 38(4): 267-274 (1996) - [j5]Bashar Nuseibeh:
Conflicting Requirements: When the Customer is Not Always Right. Requir. Eng. 1(1): 70-71 (1996) - 1995
- [j4]Bashar Nuseibeh:
Report on the Second IEEE International Symposium on Requirements Engineering (RE '95), York, UK, 27-29 March 1995. Autom. Softw. Eng. 2(3): 249-253 (1995) - 1994
- [j3]Anthony Finkelstein, Dov M. Gabbay, Anthony Hunter, Jeff Kramer, Bashar Nuseibeh:
Inconsistency Handling in Multperspective Specifications. IEEE Trans. Software Eng. 20(8): 569-578 (1994) - [j2]Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein:
A Framework for Expressing the Relationships Between Multiple Views in Requirements Specification. IEEE Trans. Software Eng. 20(10): 760-773 (1994) - 1992
- [j1]Anthony Finkelstein, Jeff Kramer, Bashar Nuseibeh, L. Finkelstein, Michael Goedicke:
Viewpoints: A Framework for Integrating Multiple Perspectives in System Development. Int. J. Softw. Eng. Knowl. Eng. 2(1): 31-57 (1992)
Conference and Workshop Papers
- 2024
- [c181]Min Zhang, Carlos Arce-Plata, Blaine A. Price, Graham Pike, Zoe Walkington, Camilla Elphick, Lara Frumkin, Richard Philpot, Tina F. Keil, Mark Levine, Avelie Stuart, Bashar Nuseibeh, Arosha K. Bandara:
How Do People Use a Public Gratitude Platform in the Wild? CHI Extended Abstracts 2024: 187:1-187:7 - [c180]Faeq Alrimawi, Bashar Nuseibeh:
Meta-Modelling Kindness. MODELS 2024: 280-289 - 2023
- [c179]Irum Rauf, Marian Petre, Thein Than Tun, Tamara Lopez, Bashar Nuseibeh:
Security Thinking in Online Freelance Software Development. ICSE (SEIS) 2023: 13-24 - [c178]Amel Bennaceur, Diane Hassett, Bashar Nuseibeh, Andrea Zisman:
Values@Runtime: An Adaptive Framework for Operationalising Values. ICSE (SEIS) 2023: 175-179 - [c177]Tamara Lopez, Helen Sharp, Michel Wermelinger, Melanie Langer, Mark Levine, Caroline Jay, Yijun Yu, Bashar Nuseibeh:
Accounting for socio-technical resilience in software engineering. CHASE 2023: 31-36 - [c176]Min Zhang, Arosha K. Bandara, Richard Philpot, Avelie Stuart, Zoe Walkington, Camilla Elphick, Lara Frumkin, Graham Pike, Blaine A. Price, Mark Levine, Bashar Nuseibeh:
Towards a Socio-Technical Understanding of Police-Citizen Interactions. INTERACT (3) 2023: 324-345 - [c175]Faeq Alrimawi, Bashar Nuseibeh:
Requirements for Designing Kind Spaces. REW 2023: 36-41 - [c174]Diane Hassett, Amel Bennaceur, Bashar Nuseibeh:
Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design. REFSQ 2023: 324-336 - [c173]Amel Bennaceur, Avelie Stuart, Blaine A. Price, Arosha K. Bandara, Mark Levine, Linda Clare, Jessica Cohen, Ciaran McCormick, Vikram Mehta, Mohamed Bennasar, Daniel Gooch, Carlos Gavidia-Calderon, Anastasia Kordoni, Bashar Nuseibeh:
Socio-Technical Resilience for Community Healthcare. TAS 2023: 26:1-26:6 - [c172]Carlos Gavidia-Calderon, Amel Bennaceur, Tamara Lopez, Anastasia Kordoni, Mark Levine, Bashar Nuseibeh:
Meet your Maker: A Social Identity Analysis of Robotics Software Engineering. TAS 2023: 44:1-44:5 - [c171]Vikram Mehta, Daniel Gooch, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools. TEI 2023: 19:1-19:13 - 2022
- [c170]Min Zhang, Camilla Elphick, Richard Philpot, Zoe Walkington, Lara Frumkin, Blaine A. Price, Graham Pike, Mark Levine, Bashar Nuseibeh, Arosha K. Bandara:
Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK. CHI Extended Abstracts 2022: 281:1-281:7 - [c169]Faeq Alrimawi, Bashar Nuseibeh:
Kind Computing. ICSE (NIER) 2022: 61-65 - [c168]Carlos Gavidia-Calderon, Amel Bennaceur, Anastasia Kordoni, Mark Levine, Bashar Nuseibeh:
What Do You Want From Me? Adapting Systems to the Uncertainty of Human Preferences. ICSE (NIER) 2022: 126-130 - [c167]Irum Rauf, Tamara Lopez, Helen Sharp, Marian Petre, Thein Tun, Mark Levine, John N. Towse, Dirk van der Linden, Awais Rashid, Bashar Nuseibeh:
Influences of developers' perspectives on their engagement with security in code. CHASE@ICSE 2022: 86-95 - 2021
- [c166]Danny Weyns, Tomás Bures, Radu Calinescu, Barnaby Craggs, John S. Fitzgerald, David Garlan, Bashar Nuseibeh, Liliana Pasquale, Awais Rashid, Ivan Ruchkin, Bradley R. Schmerl:
Six Software Engineering Principles for Smarter Cyber-Physical Systems. ACSOS-C 2021: 198-203 - [c165]Alzubair Hassan, Bashar Nuseibeh, Liliana Pasquale:
Engineering Adaptive Authentication. ACSOS-C 2021: 275-280 - [c164]Cristiano Storni, Damyanka Tsvyatkova, Ita Richardson, Jim Buckley, Manzar Abbas, Sarah Beecham, Muslim Chochlov, Brian Fitzgerald, Liam Glynn, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, James O'Connell, Derek T. O'Keeffe, Ian R. O'Keeffe, Mike O'Callaghan, Abdul Razzaq, Kaavya Rekanar, Andrew J. Simpkin, Jane Walsh, Thomas Welsh:
Toward a Compare and Contrast Framework for COVID-19 Contact Tracing Mobile Applications: A Look at Usability. HEALTHINF 2021: 557-565 - [c163]Thomas Welsh, Faeq Alrimawi, Ali Farahani, Diane Hassett, Andrea Zisman, Bashar Nuseibeh:
Towards Adaptive Inspection for Fraud in I4.0 Supply Chains. ETFA 2021: 1-8 - [c162]Ali Farahani, Liliana Pasquale, Amel Bennaceur, Thomas Welsh, Bashar Nuseibeh:
On Adaptive Fairness in Software Systems. SEAMS@ICSE 2021: 97-103 - [c161]Vikram Mehta, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh, Daniel Gooch:
Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control. TEI 2021: 7:1-7:13 - 2020
- [c160]Thomas Welsh, Kaavya Rekanar, Manzar Abbas, Muslim Chochlov, Brian Fitzgerald, Liam Glynn, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, James O'Connell, Derek T. O'Keeffe, Ian R. O'Keeffe, Mike O'Callaghan, Abdul Razzaq, Ita Richardson, Andrew J. Simpkin, Cristiano Storni, Damyanka Tsvyatkova, Jane Walsh, Jim Buckley:
Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps. BESC 2020: 1-6 - [c159]Min Zhang, Arosha K. Bandara, Blaine A. Price, Graham Pike, Zoe Walkington, Camilla Elphick, Lara Frumkin, Richard Philpot, Mark Levine, Avelie Stuart, Bashar Nuseibeh:
Designing Technologies for Community Policing. CHI Extended Abstracts 2020: 1-9 - [c158]Min Zhang, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Finding & Reviewing Community Policing Apps in Asia. AsianCHI@CHI 2020: 45-48 - [c157]Irum Rauf, Dirk van der Linden, Mark Levine, John N. Towse, Bashar Nuseibeh, Awais Rashid:
Security but not for security's sake: The impact of social considerations on app developers' choices. ICSE (Workshops) 2020: 141-144 - [c156]Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. ICSE 2020: 149-160 - [c155]Thein Than Tun, Amel Bennaceur, Bashar Nuseibeh:
OASIS: Weakening User Obligations for Security-critical Systems. RE 2020: 113-124 - [c154]Daniel Gooch, Vikram Mehta, Blaine A. Price, Ciaran McCormick, Arosha K. Bandara, Amel Bennaceur, Mohamed Bennasar, Avelie Stuart, Linda Clare, Mark Levine, Jessica Cohen, Bashar Nuseibeh:
How are you feeling?: Using Tangibles to Log the Emotions of Older Adults. TEI 2020: 31-43 - 2019
- [c153]Denise J. Wilkins, Bashar Nuseibeh, Mark Levine:
Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action. HCI (3) 2019: 130-147 - [c152]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
An anatomy of security conversations in stack overflow. ICSE-SEIS 2019: 31-40 - [c151]Tamara Lopez, Helen Sharp, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
Talking about security with professional developers. CESSER-IP@ICSE 2019: 34-40 - [c150]Tamara Lopez, Helen Sharp, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
"Hopefully we are mostly secure": views on secure code in professional practice. CHASE@ICSE 2019: 61-68 - [c149]Amel Bennaceur, Carlo Ghezzi, Kenji Tei, Timo Kehrer, Danny Weyns, Radu Calinescu, Schahram Dustdar, Zhenjiang Hu, Shinichi Honiden, Fuyuki Ishikawa, Zhi Jin, Jeffrey Kramer, Marin Litoiu, Michele Loreti, Gabriel A. Moreno, Hausi A. Müller, Laura Nenzi, Bashar Nuseibeh, Liliana Pasquale, Wolfgang Reisig, Heinz Schmidt, Christos Tsigkanos, Haiyan Zhao:
Modelling and analysing resilient cyber-physical systems. SEAMS@ICSE 2019: 70-76 - [c148]Amel Bennaceur, Andrea Zisman, Ciaran McCormick, Danny Barthaud, Bashar Nuseibeh:
Won't take no for an answer: resource-driven requirements adaptation. SEAMS@ICSE 2019: 77-88 - [c147]Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Dragonfly: a tool for simulating self-adaptive drone behaviours. SEAMS@ICSE 2019: 107-113 - [c146]Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Cautious Adaptation of Defiant Components. ASE 2019: 974-985 - [c145]Mohamed Bennasar, Blaine A. Price, Avelie Stuart, Daniel Gooch, Ciaran McCormick, Vikram Mehta, Linda Clare, Amel Bennaceur, Jessica Cohen, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
Knowledge-Based Architecture for Recognising Activities of Older People. KES 2019: 590-599 - [c144]Bashar Nuseibeh:
Requirements We Live By. RE 2019: 1 - 2018
- [c143]Bashar Nuseibeh:
Engineering Software for Life in Cyber-Physical-Social Spaces. ENASE 2018: 5 - [c142]Aimee Borda, Liliana Pasquale, Vasileios Koutavas, Bashar Nuseibeh:
Compositional verification of self-adaptive cyber-physical systems. SEAMS@ICSE 2018: 1-11 - [c141]Liliana Pasquale, Dalal Alrajeh, Claudia Peersman, Thein Than Tun, Bashar Nuseibeh, Awais Rashid:
Towards forensic-ready software systems. ICSE (NIER) 2018: 9-12 - [c140]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
An investigation of security conversations in stack overflow: perceptions of security and community involvement. SEAD@ICSE 2018: 26-32 - [c139]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Bashar Nuseibeh:
I've seen this before: sharing cyber-physical incident knowledge. SEAD@ICSE 2018: 33-40 - [c138]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - [c137]Fayola Peters, Sorren Hanvey, Suresh Veluru, Alie El-Din Mady, Menouer Boubekeur, Bashar Nuseibeh:
Generating Privacy Zones in Smart Cities. ISC2 2018: 1-8 - 2017
- [c136]Bashar Nuseibeh:
On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When? CPSS@AsiaCCS 2017: 1 - [c135]Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. AsiaCCS 2017: 905-907 - [c134]Bashar Nuseibeh:
Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces. SEsCPS@ICSE 2017: 2 - [c133]Faeq Alrimawi, Liliana Pasquale, Bashar Nuseibeh:
Software Engineering Challenges for Investigating Cyber-Physical Incidents. SEsCPS@ICSE 2017: 34-40 - [c132]Yasmin Rafiq, Luke Dickens, Alessandra Russo, Arosha K. Bandara, Mu Yang, Avelie Stuart, Mark Levine, Gul Calikli, Blaine A. Price, Bashar Nuseibeh:
Learning to share: engineering adaptive decision-support for online social networks. ASE 2017: 280-285 - [c131]Wenyi Qian, Xin Peng, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
O2O service composition with social collaboration. ASE 2017: 451-461 - [c130]Bashar Nuseibeh:
Adaptive information security and privacy. RCIS 2017: 17 - [c129]George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are you ready? Towards the engineering of forensic-ready systems. RCIS 2017: 328-333 - [c128]Yehia Elrakaiby, Alessio Ferrari, Paola Spoletini, Stefania Gnesi, Bashar Nuseibeh:
Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews. RE 2017: 51-60 - [c127]George Grispos, Sorren Hanvey, Bashar Nuseibeh:
Use of organisational topologies for forensic investigations. SERF@ESEC/SIGSOFT FSE 2017: 2-5 - [c126]Dalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh:
On evidence preservation requirements for forensic-ready systems. ESEC/SIGSOFT FSE 2017: 559-569 - 2016
- [c125]Vikram Mehta, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Privacy Itch and Scratch: On Body Privacy Warnings and Controls. CHI Extended Abstracts 2016: 2417-2424 - [c124]Vikram Mehta, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Wearables for physical privacy. UbiComp Adjunct 2016: 942-945 - [c123]Christos Tsigkanos, Timo Kehrer, Carlo Ghezzi, Liliana Pasquale, Bashar Nuseibeh:
Adding static and dynamic semantics to building information models. SEsCPS@ICSE 2016: 1-7 - [c122]Gül Çalikli, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine, Bashar Nuseibeh:
Privacy dynamics: learning privacy norms for social software. SEAMS@ICSE 2016: 47-56 - [c121]Amel Bennaceur, Ciaran McCormick, Jesús García-Galán, Charith Perera, Andrew Smith, Andrea Zisman, Bashar Nuseibeh:
Feed me, feed me: an exemplar for engineering adaptive software. SEAMS@ICSE 2016: 89-95 - [c120]Jesús García-Galán, Liliana Pasquale, George Grispos, Bashar Nuseibeh:
Towards adaptive compliance. SEAMS@ICSE 2016: 108-114 - [c119]Charith Perera, Ciaran McCormick, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. IOT 2016: 83-92 - [c118]Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
CrowdService: serving the individuals through mobile crowdsourcing and service composition. ASE 2016: 214-219 - [c117]Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. RE Workshops 2016: 102-105 - [c116]Tamara Lopez, Marian Petre, Bashar Nuseibeh:
Examining active error in software development. VL/HCC 2016: 152-156 - 2015
- [c115]Thein Than Tun, Robyn R. Lutz, Brian Nakayama, Yijun Yu, Divita Mathur, Bashar Nuseibeh:
The Role of Environmental Assumptions in Failures of DNA Nanosystems. COUFLESS@ICSE 2015: 27-33 - [c114]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - [c113]Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, Bashar Nuseibeh:
Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems. ICSE (2) 2015: 729-732 - 2014
- [c112]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - [c111]Gul Calikli, Blaine A. Price, Mads Schaarup Andersen, Bashar Nuseibeh, Arosha K. Bandara:
Personal informatics for non-geeks: lessons learned from ordinary people. UbiComp Adjunct 2014: 683-686 - [c110]Amel Bennaceur, Arosha K. Bandara, Michael Jackson, Wei Liu, Lionel Montrieux, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements-driven mediation for collaborative security. SEAMS 2014: 37-42 - [c109]Liliana Pasquale, Carlo Ghezzi, Claudio Menghi, Christos Tsigkanos, Bashar Nuseibeh:
Topology aware adaptive security. SEAMS 2014: 43-48 - [c108]Bihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. ICSE 2014: 676-687 - [c107]Keerthi Thomas, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Distilling privacy requirements for mobile applications. ICSE 2014: 871-882 - [c106]Christos Tsigkanos, Liliana Pasquale, Claudio Menghi, Carlo Ghezzi, Bashar Nuseibeh:
Engineering topology aware adaptive security: Preventing requirements violations at runtime. RE 2014: 203-212 - [c105]Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. TrustCom 2014: 45-52 - 2013
- [c104]Inah Omoronyia, Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, Bashar Nuseibeh:
Engineering adaptive privacy: on the role of privacy awareness requirements. ICSE 2013: 632-641 - [c103]Liliana Pasquale, Yijun Yu, Mazeiar Salehie, Luca Cavallaro, Thein Than Tun, Bashar Nuseibeh:
Requirements-driven adaptive digital forensics. RE 2013: 340-341 - 2012
- [c102]Azadeh Alebrahim, Thein Than Tun, Yijun Yu, Maritta Heisel, Bashar Nuseibeh:
An Aspect-Oriented Approach to Relating Security Requirements and Access Control. CAiSE Forum 2012: 15-22 - [c101]Raian Ali, Carlos Solís, Inah Omoronyia, Mazeiar Salehie, Bashar Nuseibeh:
Social Adaptation - When Software Gives Users a Voice. ENASE 2012: 75-84 - [c100]Raian Ali, Carlos Solís, Inah Omoronyia, Mazeiar Salehie, Bashar Nuseibeh:
Social Adaptation at Runtime. ENASE (Selected Papers) 2012: 110-127 - [c99]Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Bashar Nuseibeh:
Adaptive security and privacy in smart grids: a software engineering vision. SE4SG@ICSE 2012: 46-49 - [c98]Tamara Lopez, Marian Petre, Bashar Nuseibeh:
Getting at ephemeral flaws. CHASE 2012: 90-92 - [c97]Liliana Pasquale, Mazeiar Salehie, Raian Ali, Inah Omoronyia, Bashar Nuseibeh:
On the role of primary and secondary assets in adaptive security: An application in smart grids. SEAMS 2012: 165-170 - [c96]Inah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin J. Doherty, Bashar Nuseibeh:
Caprice: a tool for engineering adaptive privacy. ASE 2012: 354-357 - [c95]Tamara Lopez, Marian Petre, Bashar Nuseibeh:
Thrashing, Tolerating and Compromising in Software Development. PPIG 2012: 1 - [c94]Hui Yang, Anne N. De Roeck, Vincenzo Gervasi, Alistair Willis, Bashar Nuseibeh:
Speculative requirements: Automatic detection of uncertainty in natural language requirements. RE 2012: 11-20 - [c93]Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Raian Ali, Bashar Nuseibeh:
Requirements-driven adaptive security: Protecting variable assets at runtime. RE 2012: 111-120 - [c92]Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles B. Haley, Inah Omoronyia, Bashar Nuseibeh:
Privacy arguments: Analysing selective disclosure requirements for mobile applications. RE 2012: 131-140 - [c91]Liliana Pasquale, Claudio Menghi, Mazeiar Salehie, Luca Cavallaro, Inah Omoronyia, Bashar Nuseibeh:
SecuriTAS: a tool for engineering adaptive security. SIGSOFT FSE 2012: 19 - [c90]Bashar Nuseibeh:
The thin line between products. SPLC (1) 2012: 2 - 2011
- [c89]Clara Mancini, Yvonne Rogers, Keerthi Thomas, Adam N. Joinson, Blaine A. Price, Arosha K. Bandara, Lukasz Jedrzejczyk, Bashar Nuseibeh:
In the best families: tracking and relationships. CHI 2011: 2419-2428 - [c88]Yijun Yu, Thein Than Tun, Arosha K. Bandara, Tian Zhang, Bashar Nuseibeh:
From Model-Driven Software Development Processes to Problem Diagnoses at Runtime. Models@run.time@Dagstuhl 2011: 188-207 - [c87]Rafael V. Borges, Artur S. d'Avila Garcez, Luís C. Lamb, Bashar Nuseibeh:
Learning to adapt requirements specifications of evolving systems. ICSE 2011: 856-859 - [c86]Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Specifying and detecting meaningful changes in programs. ASE 2011: 273-282 - [c85]Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. POLICY 2011: 129-132 - [c84]Raian Ali, Carlos Solís, Fabiano Dalpiaz, Walid Maalej, Paolo Giorgini, Bashar Nuseibeh:
Social Software Product Lines. RESC 2011: 14-17 - [c83]Virginia N. L. Franqueira, Thein Than Tun, Yijun Yu, Roel J. Wieringa, Bashar Nuseibeh:
Risk and argument: A risk-based argumentation method for practical security. RE 2011: 239-248 - [c82]Pete Sawyer, Vincenzo Gervasi, Bashar Nuseibeh:
Unknown knowns: Tacit knowledge in requirements engineering. RE 2011: 329 - [c81]Yijun Yu, Thein Than Tun, Alessandra Tedeschi, Virginia N. L. Franqueira, Bashar Nuseibeh:
OpenArgue: Supporting argumentation to evolve secure software systems. RE 2011: 351-352 - [c80]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. SEC 2011: 259-270 - [c79]Raian Ali, Carlos Solís, Mazeiar Salehie, Inah Omoronyia, Bashar Nuseibeh, Walid Maalej:
Social sensing: when users become monitors. SIGSOFT FSE 2011: 476-479 - 2010
- [c78]Clara Mancini, Yvonne Rogers, Arosha K. Bandara, Tony Coe, Lukasz Jedrzejczyk, Adam N. Joinson, Blaine A. Price, Keerthi Thomas, Bashar Nuseibeh:
Contravision: exploring users' reactions to futuristic technology. CHI 2010: 153-162 - [c77]Blaine A. Price, Clara Mancini, Yvonne Rogers, Arosha K. Bandara, Tony Coe, Adam N. Joinson, Jeffrey A. Lay, Bashar Nuseibeh:
ContraVision: presenting contrasting visions of future technology. CHI Extended Abstracts 2010: 4759-4764 - [c76]Hui Yang, Anne N. De Roeck, Alistair Willis, Bashar Nuseibeh:
A Methodology for Automatic Identification of Nocuous Ambiguity. COLING 2010: 1218-1226 - [c75]Hui Yang, Alistair Willis, Anne N. De Roeck, Bashar Nuseibeh:
Automatic detection of nocuous coordination ambiguities in natural language requirements. ASE 2010: 53-62 - [c74]Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh:
"Privacy-shake", : a haptic interface for managing privacy settings in mobile location sharing applications. Mobile HCI 2010: 411-412 - [c73]Bashar Nuseibeh:
Mobile Privacy Requirements on Demand. PROFES 2010: 1 - [c72]Hui Yang, Anne N. De Roeck, Vincenzo Gervasi, Alistair Willis, Bashar Nuseibeh:
Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. RE 2010: 25-34 - [c71]Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh:
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. SOUPS 2010 - [c70]Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh:
Model-Based Argument Analysis for Evolving Security Requirements. SSIRI 2010: 88-97 - 2009
- [c69]Thein Than Tun, Rod Chapman, Charles B. Haley, Robin C. Laney, Bashar Nuseibeh:
A Framework for Developing Feature-Rich Software Systems. ECBS 2009: 206-214 - [c68]Armstrong Nhlabatsi, Robin C. Laney, Bashar Nuseibeh:
Feature Interaction as a Context Sharing Problem. ICFI 2009: 133-148 - [c67]Clara Mancini, Keerthi Thomas, Yvonne Rogers, Blaine A. Price, Lukasz Jedrzejczyk, Arosha K. Bandara, Adam N. Joinson, Bashar Nuseibeh:
From spaces to places: emerging contexts in mobile privacy. UbiComp 2009: 1-10 - [c66]Andreas Classen, Patrick Heymans, Thein Than Tun, Bashar Nuseibeh:
Towards safer composition. ICSE Companion 2009: 227-230 - [c65]Ayman Mahfouz, Leonor Barroca, Robin C. Laney, Bashar Nuseibeh:
Requirements-Driven Collaborative Choreography Customization. ICSOC/ServiceWave 2009: 144-158 - [c64]Lin Ma, Bashar Nuseibeh, Paul Piwek, Anne N. De Roeck, Alistair Willis:
On Presuppositions in Requirements. MARK@RE 2009: 27-31 - [c63]Ricardo Gacitúa, Lin Ma, Bashar Nuseibeh, Paul Piwek, Anne N. De Roeck, Mark Rouncefield, Peter Sawyer, Alistair Willis, H. Yang:
Making Tacit Requirements Explicit. MARK@RE 2009: 40-44 - [c62]Thein Than Tun, Michael Jackson, Robin C. Laney, Bashar Nuseibeh, Yijun Yu:
Are Your Lights Off? Using Problem Frames to Diagnose System Failures. RE 2009: 343-348 - [c61]Thein Than Tun, Yijun Yu, Robin C. Laney, Bashar Nuseibeh:
Early Identification of Problem Interactions: A Tool-Supported Approach. REFSQ 2009: 74-88 - [c60]Ayman Mahfouz, Leonor Barroca, Robin C. Laney, Bashar Nuseibeh:
From Organizational Requirements to Service Choreography. SERVICES I 2009: 546-553 - [c59]Keerthi Thomas, Clara Mancini, Lukasz Jedrzejczyk, Arosha K. Bandara, Adam N. Joinson, Blaine A. Price, Yvonne Rogers, Bashar Nuseibeh:
Studying location privacy in mobile applications: 'predator vs. prey' probes. SOUPS 2009 - 2008
- [c58]Ayman Mahfouz, Leonor Barroca, Robin C. Laney, Bashar Nuseibeh:
Customizing Choreography: Deriving Conversations from Organizational Dependencies. EDOC 2008: 181-190 - [c57]Bashar Nuseibeh:
The five W's (and one "H") of Security: Software Engineering of Secure Systems. JISBD 2008: 1-2 - [c56]Angela Lozano, Michel Wermelinger, Bashar Nuseibeh:
Evaluating the relation between changeability decay and the characteristics of clones and methods. ASE Workshops 2008: 100-109 - [c55]Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson:
First International Modeling Security Workshop. MoDELS (Workshops) 2008: 181-184 - [c54]Armstrong Nhlabatsi, Robin C. Laney, Bashar Nuseibeh:
Building Contingencies into Specifications. RE 2008: 333-334 - 2007
- [c53]Robin C. Laney, Thein Than Tun, Michael Jackson, Bashar Nuseibeh:
Composing Features by Managing Inconsistent Requirements. ICFI 2007: 129-144 - [c52]Bastian Best, Jan Jürjens, Bashar Nuseibeh:
Model-Based Security Engineering of Distributed Information Systems Using UMLsec. ICSE 2007: 581-590 - [c51]Angela Lozano, Michel Wermelinger, Bashar Nuseibeh:
Assessing the impact of bad smells using historical information. IWPSE 2007: 31-34 - [c50]Angela Lozano, Michel Wermelinger, Bashar Nuseibeh:
Evaluating the Harmfulness of Cloning: A Change Based Experiment. MSR 2007: 18 - [c49]Mohammed Salifu, Yijun Yu, Bashar Nuseibeh:
Specifying Monitoring and Switching Problems in Context. RE 2007: 211-220 - [c48]Andreas Classen, Patrick Heymans, Robin C. Laney, Bashar Nuseibeh, Thein Than Tun:
On the Structure of Problem Variability: From Feature Diagrams to Problem Frames. VaMoS 2007: 109-117 - [c47]Mohammed Salifu, Bashar Nuseibeh, Lucia Rapanotti, Thein Than Tun:
Using Problem Descriptions to Represent Variabilities For Context-Aware Applications. VaMoS 2007: 149-156 - 2006
- [c46]Angela Lozano, Michel Wermelinger, Bashar Nuseibeh:
Degradation archaeology: studying software flaws' evolution. EVOL 2006: 119-125 - [c45]Charles B. Haley, Jonathan D. Moffett, Robin C. Laney, Bashar Nuseibeh:
A framework for security requirements engineering. SESS@ICSE 2006: 35-42 - [c44]Mohammed Salifu, Bashar Nuseibeh, Lucia Rapanotti:
Towards Context-Aware Product-Family Architectures. IWSPM 2006: 38-43 - [c43]Francis Chantree, Bashar Nuseibeh, Anne N. De Roeck, Alistair Willis:
Identifying Nocuous Ambiguities in Natural Language Requirements. RE 2006: 56-65 - [c42]David Bush, Bashar Nuseibeh:
Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning. RE 2006: 324 - 2005
- [c41]Debra T. Hayley, Anne N. De Roeck, Bashar Nuseibeh, Marian Petre, Pete Thomas:
Gathering Requirements for a Grid-based Automatic Marking System. ELeGI Conference 2005 - [c40]William G. Griswold, Bashar Nuseibeh:
Introduction to Research Papers. ICSE 2005: 48 - [c39]Robert Crook, Darrel C. Ince, Bashar Nuseibeh:
On Modelling Access Policies: Relating Roles to their Organisational Context. RE 2005: 157-166 - 2004
- [c38]Bashar Nuseibeh:
Crosscutting requirements. AOSD 2004: 3-4 - [c37]Charles B. Haley, Robin C. Laney, Bashar Nuseibeh:
Deriving security requirements from crosscutting threat descriptions. AOSD 2004: 112-121 - [c36]Leonor Barroca, José Luiz Fiadeiro, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Problem Frames: A Case for Coordination. COORDINATION 2004: 5-19 - [c35]Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh:
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. iTrust 2004: 347-354 - [c34]Lucia Rapanotti, Jon G. Hall, Michael Jackson, Bashar Nuseibeh:
Architecture-driven Problem Decomposition. RE 2004: 80-89 - [c33]Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh:
The Effect of Trust Assumptions on the Elaboration of Security Requirements. RE 2004: 102-111 - [c32]Robin C. Laney, Leonor Barroca, Michael Jackson, Bashar Nuseibeh:
Composing Requirements Using Problem Frames. RE 2004: 122-131 - [c31]Debra Trusso Haley, Bashar Nuseibeh, Helen C. Sharp, Josie Taylor:
The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move. RE 2004: 309-314 - [c30]Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson:
Using Abuse Frames to Bound the Scope of Security Problems. RE 2004: 354-355 - 2003
- [c29]Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein:
ViewPoints: meaningful relationships are difficult! ICSE 2003: 676-683 - [c28]Debra Trusso Haley, Pete Thomas, Bashar Nuseibeh, Josie Taylor, Paul Lefrere:
E-Assessment using Latent Semantic Analysis. LeGE-WG 3 2003 - [c27]Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson, Jonathan D. Moffett:
Introducing Abuse Frames for Analysing Security Requirements. RE 2003: 371-372 - 2002
- [c26]Alessandra Russo, Rob Miller, Bashar Nuseibeh, Jeff Kramer:
An Abductive Approach for Analysing Event-Based Requirements Specifications. ICLP 2002: 22-37 - [c25]Jon G. Hall, Michael Jackson, Robin C. Laney, Bashar Nuseibeh, Lucia Rapanotti:
Relating Software Requirements and Architectures Using Problem Frames. RE 2002: 137-144 - [c24]Robert Crook, Darrel C. Ince, Luncheng Lin, Bashar Nuseibeh:
Security Requirements Engineering: When Anti-Requirements Hit the Fan. RE 2002: 203-205 - 2001
- [c23]Artur S. d'Avila Garcez, Alessandra Russo, Bashar Nuseibeh, Jeff Kramer:
An Analysis-Revision Cycle to Evolve Requirements Specifications. ASE 2001: 354-358 - 2000
- [c22]Vincenzo Gervasi, Bashar Nuseibeh:
Lightweight Validation of Natural Language Requirements: A Case Study. ICRE 2000: 140-149 - [c21]Bashar Nuseibeh, Steve M. Easterbrook:
Requirements engineering: a roadmap. ICSE - Future of SE Track 2000: 35-46 - [c20]Peri L. Tarr, William H. Harrison, Harold Ossher, Anthony Finkelstein, Bashar Nuseibeh, Dewayne E. Perry:
Workshop on multi-dimensional separation of concerns in software engineering. ICSE 2000: 809-810 - [c19]Jeff Magee, Jeff Kramer, Bashar Nuseibeh, David Bush, Julia Sonander:
Hybrid Model Visualization in Requirements and Design: A Preliminary Investigation. IWSSD 2000: 3-10 - 1999
- [c18]Bashar Nuseibeh, Steve M. Easterbrook:
The Process of Inconsistency Management: A Framework for Understanding. DEXA Workshop 1999: 364-368 - [c17]Steve M. Easterbrook, Bashar Nuseibeh:
How Multi-Disciplinary Is RE (really)? RE 1999: 33- - [c16]Tim Menzies, Steve M. Easterbrook, Bashar Nuseibeh, Sam Waugh:
An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering. RE 1999: 100- - 1998
- [c15]Alessandra Russo, Bashar Nuseibeh, Jeff Kramer:
Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study. ICRE 1998: 51- - [c14]Bashar Nuseibeh, Alessandra Russo:
On the Consequences of Acting in the Presence of Inconsistency. IWSSD 1998: 156-158 - 1997
- [c13]Bashar Nuseibeh, Suzanne Robertson:
Making Requirements Measurable (Tutorial). ICSE 1997: 647-648 - [c12]Anthony Hunter, Bashar Nuseibeh:
Analyzing Inconsistent Specifications. RE 1997: 78-86 - [c11]Bashar Nuseibeh, Suzanne Robertson:
Making Requirements Measurable. RE 1997: 262 - 1996
- [c10]Bashar Nuseibeh:
When Agents Clash. EWSPT 1996: 237-240 - [c9]Bashar Nuseibeh:
To Be and Not to Be: On Managing Inconsistency in Software Development. IWSSD 1996: 164-169 - [c8]Bashar Nuseibeh:
Towards a framework for managing inconsistency between multiple views. ISAW/Viewpoints@FSE 1996: 184-186 - 1995
- [c7]Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein, Ulf Leonhardt:
Decentralised Process Modelling. EWSPT 1995: 185-188 - [c6]Ulf Leonhardt, Jeff Kramer, Bashar Nuseibeh:
Decentralised Process Enactment in a Multi-Perspective Development Environment. ICSE 1995: 255-264 - [c5]Steve M. Easterbrook, Bashar Nuseibeh:
Managing inconsistencies in an evolving specification. RE 1995: 48-55 - 1993
- [c4]Anthony Finkelstein, Dov M. Gabbay, Anthony Hunter, Jeff Kramer, Bashar Nuseibeh:
Inconsistency Handling in Multi-Perspective Specifications. ESEC 1993: 84-99 - [c3]Jeff Kramer, Anthony Finkelstein, Bashar Nuseibeh:
Method Integration and Support for Distributed Software Development: An Overview. ICSE Workshop on Studies of Software Design 1993: 115-126 - [c2]Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein:
Expressing the Relationships Between Multiple Views in Requirements Specification. ICSE 1993: 187-196 - [c1]Bashar Nuseibeh, Anthony Finkelstein, Jeff Kramer:
Fine-Grain Process Modelling. IWSSD 1993: 42-46
Parts in Books or Collections
- 2019
- [p7]Amel Bennaceur, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements Engineering. Handbook of Software Engineering 2019: 51-92 - 2013
- [p6]Saad Bin Saleem, Lionel Montrieux, Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies. Aspect-Oriented Requirements Engineering 2013: 167-181 - [p5]Thein Than Tun, Yijun Yu, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Aspect Interactions: A Requirements Engineering Perspective. Aspect-Oriented Requirements Engineering 2013: 271-286 - [p4]Vincenzo Gervasi, Ricardo Gacitúa, Mark Rouncefield, Peter Sawyer, Leonid Kof, Lin Ma, Paul Piwek, Anne N. De Roeck, Alistair Willis, H. Yang, Bashar Nuseibeh:
Unpacking Tacit Knowledge for Requirements Engineering. Managing Requirements Knowledge 2013: 23-47 - 2011
- [p3]Tim Trew, Goetz Botterweck, Bashar Nuseibeh:
A Reference Architecture for Consumer Electronics Products and its Application in Requirements Engineering. Relating Software Requirements and Architectures 2011: 203-231 - [p2]Robert Crook, Darrel C. Ince, Bashar Nuseibeh:
Using /* to Model Access Policies: Relating Actors to Their Organizational Context. Social Modeling for Requirements Engineering 2011: 313-336 - 2005
- [p1]Debra Trusso Haley, Pete Thomas, Bashar Nuseibeh, Josie Taylor, Paul Lefrere:
The Learning Grid and E-Assessment using Latent Semantic Analysis. Towards the Learning Grid 2005: 197-202
Editorship
- 2019
- [e4]Yijun Yu, Arosha K. Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi A. Müller, John Mylopoulos, Bashar Nuseibeh:
Engineering Adaptive Software Systems - Communications of NII Shonan Meetings. Springer 2019, ISBN 978-981-13-2184-9 [contents] - 2010
- [e3]Alexander Egyed, Roberto E. Lopez-Herrejon, Bashar Nuseibeh, Goetz Botterweck, Marsha Chechik, Zhenjiang Hu:
Proceedings of the 3rd Workshop on Living with Inconsistencies in Software Development, LWI@ASE 2010, Antwerp, Belgium, September 21st, 2010. CEUR Workshop Proceedings 661, CEUR-WS.org 2010 [contents] - 2008
- [e2]Jon Whittle, Jan Jürjens, Bashar Nuseibeh, Glen Dobson:
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, France, September 28, 2008. CEUR Workshop Proceedings 413, CEUR-WS.org 2008 [contents] - 2005
- [e1]Gruia-Catalin Roman, William G. Griswold, Bashar Nuseibeh:
27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA. ACM 2005 [contents]
Informal and Other Publications
- 2023
- [i17]Liliana Pasquale, Kushal Ramkumar, Wanling Cai, John McCarthy, Gavin Doherty, Bashar Nuseibeh:
Sustainable Adaptive Security. CoRR abs/2306.04481 (2023) - [i16]Irum Rauf, Tamara Lopez, Thein Tun, Marian Petre, Bashar Nuseibeh:
Security in Online Freelance Software Development: A case for Distributed Security Responsibility. CoRR abs/2307.06066 (2023) - 2022
- [i15]Christopher Neale, Ian Kennedy, Blaine A. Price, Bashar Nuseibeh:
The case for Zero Trust Digital Forensics. CoRR abs/2202.02623 (2022) - [i14]Dhaminda B. Abeywickrama, Amel Bennaceur, Greg Chance, Yiannis Demiris, Anastasia Kordoni, Mark Levine, Luke Moffat, Luc Moreau, Mohammad Reza Mousavi, Bashar Nuseibeh, Subramanian Ramamoorthy, Jan Oliver Ringert, James Wilson, Shane Windsor, Kerstin Eder:
On Specifying for Trustworthiness. CoRR abs/2206.11421 (2022) - 2021
- [i13]Ali Farahani, Liliana Pasquale, Amel Bennaceur, Thomas Welsh, Bashar Nuseibeh:
On Adaptive Fairness in Software Systems. CoRR abs/2104.02414 (2021) - [i12]Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks. CoRR abs/2106.02378 (2021) - [i11]Mazen Azzam, Liliana Pasquale, Gregory M. Provan, Bashar Nuseibeh:
Grounds for Suspicion: Physics-based Early Warnings for Stealthy Attacks on Industrial Control Systems. CoRR abs/2106.07980 (2021) - 2020
- [i10]Yehia Elrakaiby, Paola Spoletini, Bashar Nuseibeh:
Optimal by Design: Model-Driven Synthesis of Adaptation Strategies for Autonomous Systems. CoRR abs/2001.08525 (2020) - [i9]Camilla Elphick, Richard Philpot, Min Zhang, Avelie Stuart, Zoe Walkington, Lara Frumkin, Graham Pike, Kelly Gardner, Mark Lacey, Mark Levine, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh:
Building trust in digital policing: A scoping review of community policing apps. CoRR abs/2006.07140 (2020) - [i8]Camilla Elphick, Avelie Stuart, Richard Philpot, Zoe Walkington, Lara Frumkin, Min Zhang, Mark Levine, Blaine A. Price, Graham Pike, Bashar Nuseibeh, Arosha K. Bandara:
Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland. CoRR abs/2006.07153 (2020) - 2019
- [i7]Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh:
Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems. CoRR abs/1907.00199 (2019) - 2017
- [i6]Charith Perera, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Designing Privacy-aware Internet of Things Applications. CoRR abs/1703.03892 (2017) - [i5]George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are You Ready? Towards the Engineering of Forensic-Ready Systems. CoRR abs/1705.03250 (2017) - 2016
- [i4]Charith Perera, Ciaran McCormick, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. CoRR abs/1609.04060 (2016) - [i3]Jesús García-Galán, Liliana Pasquale, George Grispos, Bashar Nuseibeh:
Towards Adaptive Compliance. CoRR abs/1611.05626 (2016) - 2015
- [i2]Tetsuo Tamai, Hausi A. Müller, Bashar Nuseibeh:
Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2015-11). NII Shonan Meet. Rep. 2015 (2015) - 2014
- [i1]Liliana Pasquale, Yijun Yu, Luca Cavallaro, Mazeiar Salehie, Thein Than Tun, Bashar Nuseibeh:
Engineering Adaptive Digital Investigations using Forensics Requirements. CoRR abs/1402.0997 (2014)
Coauthor Index
aka: Jeffrey Kramer
aka: Helen C. Sharp
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint