ERDF
CONTACT US TODAY: +353 61 213 028

Bashar Nuseibeh

Primary tabs

2016
Pasquale L, Hanvey S, Mcgloin M, Nuseibeh B. Adaptive evidence collection in the cloud using attack scenarios. Adaptive evidence collection in the cloud using attack scenarios [Internet]. 2016 . Available from: http://oro.open.ac.uk/id/eprint/45768
Bennaceur A, McCormick C, Galán JGarcía, Perera C, Smith A, Zisman A, Nuseibeh B. Feed me, Feed me: An Exemplar for Engineering Adaptive Software. In: 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2016). 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2016). USA; 2016.
Calikli G, Law M, Bandara AK, Russo A, Dickens L, Price BA, Stuart A, Levine M, Nuseibeh B. Privacy Dynamics: Learning Privacy Norms for Social Software. Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems [Internet]. 2016 . Available from: http://doi.acm.org/10.1145/2897053.2897063
García-Galán J, Pasquale L, Grispos G, Nuseibeh B. Towards Adaptive Compliance. Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems [Internet]. 2016 . Available from: http://doi.acm.org/10.1145/2897053.2897070
2015
Nhlabatsi A, Yu Y, Zisman A, Tun T, Khan N, Bandara A, Khan KM, Nuseibeh B. Managing Security Control Assumptions Using Causal Traceability. 2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability. 2015 .
Cerqueus T, Thiery A, Ventresque A, Pasquale L, Perry P, Nuseibeh B. Response to Emergency Situations in a Traffic Management System. In: . International Conference on Computer Information Systems. . International Conference on Computer Information Systems. ; 2015. Available from: https://www.informatik.tu-darmstadt.de/en/research/publications/details/?no_cache=1&tx_bibtex_pi1[pub_id]=TUD-CS-2015-0007
Tun T, Lutz R, Nakayama B, Yu Y, Mathur D, Nuseibeh B. The role of environmental assumptions in failures of DNA nano systems. Proceedings of Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS 2015) co-located with ICSE 2015. 2015 .
Nhlabatsi A, Tun T, Khan N, Yu Y, Bandara A, Khan KM, Nuseibeh B. ?Why can?t I do that??: tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems [Internet]. 2015 ;1. Available from: http://oro.open.ac.uk/41870/
2013
Chen L, Babar MA, Nuseibeh B. Characterising Architecturally Significant Requirements. IEEE Software [Internet]. 2013 . Available from: http://hdl.handle.net/10344/3061
Omoronyia I, Cavallaro L, Salehie M, Pasquale L, Nuseibeh B. Engineering Adaptive Privacy: on the role of privacy awareness requirements. In: ICSE 2013. ICSE 2013. San Francisco, USA; 2013. Available from: http://hdl.handle.net/10344/3145
Pasquale L, Yu Y, Salehie M, Cavallaro L, Tun TT, Nuseibeh B. Requirements-Driven Adaptive Digital Forensics. In: 21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track. 21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track. Rio de Janeiro, Brazil; 2013. Available from: http://hdl.handle.net/10344/3355
Taubenberger S, Jürjens J, Yu Y, Nuseibeh B. Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. Information Management and Computer Security [Internet]. 2013 ;21(3). Available from: http://hdl.handle.net/10344/3485
Tun TT, Laney R, Yu Y, Nuseibeh B. Specifying Software Features for Composition: A Tool-Supported Approach. Computer Networks [Internet]. 2013 ;57(12):pp 2454-2464. Available from: http://hdl.handle.net/10344/3084
2012
Salehie M, Pasquale L, Omoronyia I, Nuseibeh B. Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision. ICSE workshop on Software Engineering Challenges for the Smart Grid [Internet]. 2012 . Available from: https://sharepoint.lero.ie/Publications/2012/Workshop%20Papers/2012-Salehie-Adaptive%20Security%20and%20Privacy.pdf
Salifu M, Yu Y, Bandara AK, Nuseibeh B. Analysing Monitoring and Switching Problems for Adaptive Systems. Journal of Systems and Software [Internet]. 2012 ;85:pp 2829–2839. Available from: http://ulir.ul.ie/handle/10344/2699
Omoronyia I, Pasquale L, Salehie M, Cavallaro L, Doherty G, Nuseibeh B. Caprice: A tool for engineering adaptive privacy. In: 27th International Conference on Automated Software Engineering (ASE 2012). 27th International Conference on Automated Software Engineering (ASE 2012). Essen, Germany; 2012. Available from: http://ulir.ul.ie/handle/10344/2585
Lopez T, Petre M, Nuseibeh B. Getting at Ephemeral Flaws. Proceedings of 5th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE 2012) co-located with ICSE 2012 [Internet]. 2012 . Available from: http://ulir.ul.ie/handle/10344/2724
Yang H, Willis A, deRoeck A, Nuseibeh B. A hybrid model for automatic emotion recognition in suicide notes. Biomedical Informatics Insights [Internet]. 2012 ;5:pp 17-30. Available from: http://ulir.ul.ie/handle/10344/2327
Tun TT, Bandara AK, Price BA, Yu Y, Haley C, Omoronyia I, Nuseibeh B. Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. 20th IEEE International Requirements Engineering Conference (RE) [Internet]. 2012 . Available from: http://ulir.ul.ie/handle/10344/2729
Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B. Requirements-driven Adaptive Security:Protecting Variable Assets at Runtime. In: Proceedings of 20th International Requirements Engineering Conference (RE’12). Proceedings of 20th International Requirements Engineering Conference (RE’12). Chicago, USA; 2012. Available from: http://ulir.ul.ie/handle/10344/2598
Pasquale L, Salehie M, Ali R, Omoronyia I, Nuseibeh B. On the Role of Primary and Secondary Assets in Adaptive Security An Application in Smart Grids. In: 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Zurich, Switzerland; 2012. Available from: http://ulir.ul.ie/handle/10344/2352
Pasquale L, Menghi C, Salehie M, Cavallaro L, Omoronyia I, Nuseibeh B. SecurTAS A Tool for Engineering Adaptive Security. In: 20th International Symposium on Foundations of Software Engineering FSE 2012. 20th International Symposium on Foundations of Software Engineering FSE 2012. Cary, North Carolina; 2012. Available from: http://ulir.ul.ie/handle/10344/2727
Ali R, Solis C, Omoronyia I, Salehie M, Nuseibeh B. Social Adaptation: When Software Gives Users a Voice. In: The 7th International Evaluation of Novel Approaches to Software Engineering (ENASE’12). The 7th International Evaluation of Novel Approaches to Software Engineering (ENASE’12). Wroclaw, Poland; 2012. Available from: http://ulir.ul.ie/handle/10344/2313
Yang H, de Roeck A, Gervasi V, Willis A, Nuseibeh B. Speculative Requirements: Automatic Detection of Uncertainty in Natural Language Requirements. In: Proceedings of 20th International Requirements Engineering Conference (RE’12). Proceedings of 20th International Requirements Engineering Conference (RE’12). Chicago, USA; 2012. Available from: http://ulir.ul.ie/handle/10344/2686
Lopez T, Petre M, Nuseibeh B. Thrashing, Tolerating and Compromising in Software Development. Proceedings of 24th Annual Workshop of the Psychology of Programming Interest Group [Internet]. 2012 . Available from: http://ulir.ul.ie/handle/10344/2695

Pages