Moving beyond cyber security awareness and training to engendering security knowledge sharing S Alahmari, K Renaud, I Omoronyia Information Systems and e-Business Management 21 (1), 123-158, 2023 | 12 | 2023 |
DCMS consultation: Security and Privacy settings in Apps and App Stores M CARR, I Castro, A Rashid, J Llanos, O Michalec, M Ramopakane, ... REPHRAIN: National Research Centre on Privacy, Harm Reduction and …, 2022 | | 2022 |
Analysing Privacy Conflicts in Web-Based Systems P Inglis, I Omoronyia 2021 IEEE 29th International Requirements Engineering Conference (RE), 430-431, 2021 | | 2021 |
Implement a model for describing and maximising security knowledge sharing S Alahmari, K Renaud, I Omoronyia 2020 15th International Conference for Internet Technology and Secured …, 2020 | 3 | 2020 |
Towards using unstructured user input request for malware detection O Olukoya, L Mackenzie, I Omoronyia Computers & Security 93, 101783, 2020 | 12 | 2020 |
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests O Olukoya, L Mackenzie, I Omoronyia Computers & Security 89, 101685, 2020 | 25 | 2020 |
A model for describing and maximising security knowledge sharing to enhance security awareness S Alahmari, K Renaud, I Omoronyia Information Systems: 16th European, Mediterranean, and Middle Eastern …, 2020 | 5 | 2020 |
A privacy awareness system for software design I Omoronyia, U Etuk, P Inglis International Journal of Software Engineering and Knowledge Engineering 29 …, 2019 | 9 | 2019 |
Why is Baking Privacy into Software Design Hard? I Omoronyia ITNOW 61 (3), 44-45, 2019 | 4 | 2019 |
The case for privacy awareness requirements I Omoronyia Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and …, 2019 | 6 | 2019 |
A Systematic Review of Information Security Knowledge-Sharing Research. S Al-Ahmari, K Renaud, I Omoronyia HAISA, 101-110, 2018 | 7 | 2018 |
Permission-based risk signals for app behaviour characterization in Android apps O Olukoya, L Mackenzie, I Omoronyia | 4 | 2018 |
Privacy engineering in dynamic settings I Omoronyia 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 3 | 2017 |
Reasoning with imprecise privacy preferences I Omoronyia Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 9 | 2016 |
Systems and methods for runtime adaptive security to protect variable assets M Salehie, L Pasquale, C Menghi, I Omoronyia, B Nuseibeh US Patent 9,330,262, 2016 | 18 | 2016 |
Engineering adaptive privacy: on the role of privacy awareness requirements I Omoronyia, L Cavallaro, M Salehie, L Pasquale, B Nuseibeh 2013 35th International Conference on Software Engineering (ICSE), 632-641, 2013 | 85 | 2013 |
Using ontologies and machine learning for hazard identification and safety analysis O Daramola, T Stålhane, I Omoronyia, G Sindre Managing requirements knowledge, 117-141, 2013 | 32 | 2013 |
Social adaptation at runtime R Ali, C Solis, I Omoronyia, M Salehie, B Nuseibeh Evaluation of Novel Approaches to Software Engineering: 7th International …, 2013 | 6 | 2013 |
SecuriTAS: a tool for engineering adaptive security L Pasquale, C Menghi, M Salehie, L Cavallaro, I Omoronyia, B Nuseibeh Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012 | 33 | 2012 |
Privacy arguments: Analysing selective disclosure requirements for mobile applications TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh 2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012 | 26 | 2012 |