Follow
Bashar Nuseibeh
Title
Cited by
Cited by
Year
Ariane 5: who dunnit?
B Nuseibeh
IEEE Software 14 (3), 15, 1997
1531997
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
BA Price, K Adam, B Nuseibeh
International Journal of Human-Computer Studies 63 (1-2), 228-253, 2005
1432005
Security requirements engineering: When anti-requirements hit the fan
R Crook, D Ince, L Lin, B Nuseibeh
Proceedings IEEE Joint International Conference on Requirements Engineering …, 2002
1432002
Privacy-by-design framework for assessing internet of things applications and platforms
C Perera, C McCormick, AK Bandara, BA Price, B Nuseibeh
Proceedings of the 6th International Conference on the Internet of Things, 83-92, 2016
1392016
Architecture-driven problem decomposition
L Rapanotti, JG Hall, M Jackson, B Nuseibeh
Proceedings. 12th IEEE International Requirements Engineering Conference …, 2004
1392004
Deriving security requirements from crosscutting threat descriptions
CB Haley, RC Laney, B Nuseibeh
Proceedings of the 3rd international conference on Aspect-oriented software …, 2004
1392004
Evaluating the harmfulness of cloning: A change based experiment
A Lozano, M Wermelinger, B Nuseibeh
Fourth International Workshop on Mining Software Repositories (MSR'07: ICSE …, 2007
1372007
Introducing abuse frames for analysing security requirements
L Lin, B Nuseibeh, D Ince, M Jackson, J Moffett
Proceedings. 11th IEEE International Requirements Engineering Conference …, 2003
1372003
Managing inconsistencies in an evolving specification
S Easterbrook, B Nuseibeh
Proceedings of 1995 IEEE International Symposium on Requirements Engineering …, 1995
1361995
ViewPoints: meaningful relationships are difficult!
B Nuseibeh, J Kramer, A Finkelstein
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
1332003
Specifying monitoring and switching problems in context
M Salifu, Y Yu, B Nuseibeh
15th IEEE International Requirements Engineering Conference (RE 2007), 211-220, 2007
1252007
Inconsistency handling in multi-perspective specifications
A Finkelstein, D Gabbay, A Hunter, J Kramer, B Nuseibeh
Software Engineering—ESEC'93: 4th European Software Engineering Conference …, 1993
1231993
A national survey of attitudes to COVID-19 digital contact tracing in the Republic of Ireland
ME O’Callaghan, J Buckley, B Fitzgerald, K Johnson, J Laffey, ...
Irish Journal of Medical Science (1971-) 190, 863-887, 2021
1182021
Model-based security engineering of distributed information systems using UMLsec
B Best, J Jurjens, B Nuseibeh
29th International Conference on Software Engineering (ICSE'07), 581-590, 2007
1112007
From spaces to places: emerging contexts in mobile privacy
C Mancini, K Thomas, Y Rogers, BA Price, L Jedrzejczyk, AK Bandara, ...
Proceedings of the 11th international conference on Ubiquitous computing, 1-10, 2009
1102009
Using abuse frames to bound the scope of security problems
L Lin, B Nuseibeh, D Ince, M Jackson
Proceedings. 12th IEEE International Requirements Engineering Conference …, 2004
1082004
To be and not to be: On managing inconsistency in software development
B Nuseibeh
Proceedings of the 8th International Workshop on Software Specification and …, 1996
1081996
Viewpoints-a vehicle for method and tool integration
B Nuseibeh, A Finkelstein
IEEE Computer Society Press, 1992
1081992
Contravision: exploring users' reactions to futuristic technology
C Mancini, Y Rogers, AK Bandara, T Coe, L Jedrzejczyk, AN Joinson, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
1062010
An abductive approach for analysing event-based requirements specifications
A Russo, R Miller, B Nuseibeh, J Kramer
Logic Programming: 18th International Conference, ICLP 2002 Copenhagen …, 2002
1012002
The system can't perform the operation now. Try again later.
Articles 21–40