Follow
Bashar Nuseibeh
Title
Cited by
Cited by
Year
An investigation of security conversations in stack overflow: Perceptions of security and community involvement
T Lopez, TT Tun, A Bandara, M Levine, B Nuseibeh, H Sharp
Proceedings of the 1st international workshop on security awareness from …, 2018
282018
Adding static and dynamic semantics to building information models
C Tsigkanos, T Kehrer, C Ghezzi, L Pasquale, B Nuseibeh
Proceedings of the 2nd International Workshop on Software Engineering for …, 2016
282016
Conflicting requirements: when the customer is not always right
B Nuseibeh
Requirements Engineering 1 (1), 70-71, 1996
281996
Dragonfly: a tool for simulating self-adaptive drone behaviours
PH Maia, L Vieira, M Chagas, Y Yu, A Zisman, B Nuseibeh
2019 IEEE/ACM 14th International Symposium on Software Engineering for …, 2019
272019
Are you ready? Towards the engineering of forensic-ready systems
G Grispos, J García-Galán, L Pasquale, B Nuseibeh
2017 11th International Conference on Research Challenges in Information …, 2017
272017
OpenArgue: Supporting argumentation to evolve secure software systems
Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh
2011 IEEE 19th international requirements engineering conference, 351-352, 2011
272011
Using problem descriptions to represent variabilities for context-aware applications
M Salifu, B Nuseibeh, L Rapanotti, TT Tun
272007
Towards a framework for managing inconsistency between multiple views
B Nuseibeh
Joint proceedings of the second international software architecture workshop …, 1996
271996
Privacy arguments: Analysing selective disclosure requirements for mobile applications
TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh
2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012
262012
Model-based argument analysis for evolving security requirements
TT Tun, Y Yu, C Haley, B Nuseibeh
2010 Fourth International Conference on Secure Software Integration and …, 2010
262010
Specifying and detecting meaningful changes in programs
Y Yu, TT Tun, B Nuseibeh
2011 26th IEEE/ACM International Conference on Automated Software …, 2011
252011
PrimAndroid: privacy policy modelling and analysis for android applications
G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh
2011 IEEE international symposium on policies for distributed systems and …, 2011
252011
An analysis-revision cycle to evolve requirements specifications
ASA Garcez, A Russo, B Nuseibeh, J Kramer
Proceedings 16th Annual International Conference on Automated Software …, 2001
252001
Protecting privacy in the cloud: Current practices, future directions
M Barhamgi, AK Bandara, Y Yu, K Belhajjame, B Nuseibeh
Computer 49 (2), 68-72, 2016
242016
Arguing satisfaction of security requirements
CB Haley, R Laney, JD Moffett, B Nuseibeh
Integrating security and software engineering: Advances and future visions …, 2007
242007
Resolving vulnerability identification errors using security requirements on business process models
S Taubenberger, J Jürjens, Y Yu, B Nuseibeh
Information Management & Computer Security 21 (3), 202-223, 2013
232013
Towards safer composition
A Classen, P Heymans, TT Tuny, B Nuseibeh
2009 31st International Conference on Software Engineering-Companion Volume …, 2009
232009
Evaluating the relation between changeability decay and the characteristics of clones and methods
A Lozano, M Wermelinger, B Nuseibeh
2008 23rd IEEE/ACM International Conference on Automated Software …, 2008
232008
On the structure of problem variability: From feature diagrams to problem frames
A Classen, P Heymans, R Laney, B Nuseibeh, TT Tun
232007
The case for zero trust digital forensics
C Neale, I Kennedy, B Price, Y Yu, B Nuseibeh
Forensic Science International: Digital Investigation 40, 301352, 2022
222022
The system can't perform the operation now. Try again later.
Articles 121–140