You are here

  1. Home
  2. Professor Bashar Nuseibeh

Professor Bashar Nuseibeh

FREng, MRIA, MAE, FIET, FBCS, FICS

Profile summary

Professional biography

 

I am a Professor of Computing at The Open University (Director of Research, 2002-2008). Previously, I was a Professor of Software Engineering and Chief Scientist of Lero – the Irish Software Research Centre, based at the University of LimerickI was also an academic member of staff (Reader) in the Department of Computing at Imperial College London and Head of its Software Engineering Laboratory (1990-2001). I continued my association with Imperial College as a Visiting Professor between 2005-2015. I am an Honorary Professor at University College London (affiliated with UCLIC and previously SSE) and a Visiting Professor at the National Institute of Informatics, Japan, and University College Dublin, Ireand.

I am the recipient of a Royal Society-Wolfson Merit Award (2013-2018) and a European Research Council (ERC) Advanced Grant on Adaptive Security and Privacy (2012-2018). I held a Senior Research Fellowship from The Royal Academy of Engineering and The Leverhulme Trust (2005-2007), and served as Editor-in-Chief of the Automated Software Engineering Journal (1995-2008),  IEEE Transactions on Software Engineering (2010- 2013), and ACM Transactions on Autonomous and Adaptive Systems (2017-2021). I am currently an Asociate Editor of IEEE Security & Privacy Magazine, ACM Transactions o Sowfatere Engineering and Methodology, and ACM Books.

I am a Fellow of the Royal Academy of Engineering, the British Computer Society (FBCS), the Irish Computer Society (FICS), the Institution of Engineering & Technology (FIET), and a Member of Academia Europaea (MAE) and the Royal Irish Academy (MRIA).

I used to maintan a personal website, but a more up to date publication list can be found at Google Scholar or DBLP.

 

Research interests

My research interests are broadly in software engineering, particularly in the areas of requirements engineering and design, with a special interest in applications in security, privacy and digital forensics.

My technical research is currently focused on engineering adaptive software that underpins many modern mobile and ubiquitous computing technologies, and my research methods are often empircal and multidisciplinary, a particular aim of which is to understand the interplay between the engineering of software-intensive systrems and human behavior. Broadly speaking my research aims to help engineer systems that promote pro-social behavior and mitigate agaist anti-social behaviour.

 

Teaching interests

I have a long standing interest in software engineering education, with experience of face to face teaching at undersgraduate and postgraduate levels at Imperial College London, of postgraduate distance education at The Open University, and professional training and tutorials at international conferences and workshops.

I also have a few publications on software engineering education, focusing on course and curriculum development.

I recently co-editred an open access textbook on an Introduction to Digitial Humanism.

Impact and engagement

A significant proportion of my work is done collaboratively with industry, which provides practical motivation for, evaluation of, and validation of my research and its context. Partnerships have included the UK's National Air Traffic Services (NATS), IBM, Microsoft and United Technologies. My work has been recognised for its impact through a variety awards such as:
 
Fellowships & Grants:
o   Microsoft Research Award (SEIF 2011)
 
Research and Service:
o   RE Lifetime Service Award (2021) 
o   ACM SigSoft Distinguished Service Award (2015) 
o   IFIP Outstanding Service Award (2009) 
 
Research Papers: 
o   Best Paper Award, SEAMS 2018, Sweden
o   Best Paper Award, TrustCom 2014, China
o   Best Poster Award, RE 2013, Brazil
o   Best Paper Award, ENASE-2012, France
o   Best Paper Award, MedNLP Challenge Workshop 2011, USA
o   Distinguished Paper Award, RE-2011, Italy
o   Best Research Paper, RE-2010, Australia
o   ICSE Most Influential Paper Award (2003), USA 
o   Best Application Paper Award, ICLP-02, Denmark
 
Tools and Videos:
o  Winner of Medical NLP Challenge 2011 (sentiment analysis tool), USA
o   CHI-2010 Golden Mouse Award (Best Research Video), USA
 

External collaborations

I have strong collaborative relationships with organisations (academic and industrial) in the UK and beyond. These include collaborative projects with Imperial Colllege London, University College London and Lancaster University in the UK, Qatar University in Qatar, National Institute of Informatics in Japan, and Lero in Ireland.

I have strong research links  with Lero - The Irish Software Research Centre and the National Institite of Informatics (NII).  These have led to joint projects/funding, joint publications, and researcher exchanges.

Research groups

NameTypeParent Unit
CRC: Software Engineering and DesignGroupFaculty of Mathematics, Computing and Technology

 

Externally funded projects

REsilient Autonomous SOcio-cyber-physical ageNts
RoleStart dateEnd dateFunding source
Lead01 Nov 202031 Oct 2024EPSRC Engineering and Physical Sciences Research Council

REASON will develop a comprehensive toolbox of general principles, mathematically based notations and models, reasoning methods, and systematic approaches enabling autonomous systems to operate with unprecedented levels of resilience. Analogous to the adaptive toolbox widely hypothesised to underpin human decision-making under uncertainty,17 our REASONing toolbox will allow autonomous systems to decide and perform resilience-enhancing actions safely, securely and observant of relevant social, legal, ethical, empathy and cultural rules and norms. Using the REASONinig toolbox, autonomous systems will proactively quantify and reduce uncertainty, predict and preempt disruptions, seek assistance from and co-operate with humans and peer autonomous systems, and provide assurances to instil stakeholder trust. The REASON vision will be delivered by a team of Computer Scientists ( CS ), Engineers ( Eng ), sychologists ( Psy ), Philosophers ( Phil ), Lawyers ( Law ), and Mathematicians (Math) with an extensive track record of leading large research programmes and of delivering research in all areas of the project.

Drone Identity
RoleStart dateEnd dateFunding source
Co-investigator01 Jul 201930 Jun 2020EC (European Commission): FP (inc. Horizon Europe, H2020, ERC)

This EngageKTN project is investigating forensic-readiness requirements of unmanned aerial systems, to help identify causes of safety and security related air traffic incidents. Unmanned aerial vehicles (or drones) are increasingly creating challenges for managing the safety of aircraft that share the airspace with them. The collection and use of forensic data associated with drones and surrounding physical contexts is key to effective incident investigations. The research is focusing on the architecture and concept of operations for European unmanned traffic management, and the ability to preserve such vital information as evidence for forensic investigations. The team of the project include Dr. Yijun Yu (PI), Mr. Danny Barthaud (Research Software Engineer), and Prof. Bashar Nuseibeh, Prof. Blaine Price, Prof. Andrea Zisman, Prof. Arosha Bandara at The Open University, and Dr. Anthony P. Rushton, Dr. David L. Bush, and Dr. George S. Koudis at NATS. The project URL is at https://droneidentity.eu.

Citizen Forensics
RoleStart dateEnd dateFunding source
Co-investigator01 Sep 201831 Aug 2022EPSRC Engineering and Physical Sciences Research Council

The Citizen Forensics project reframes key challenges that underlie modern policing in a socio-technical world; a world instrumented with mobile and ubiquitous computing technologies, in which many citizens and communities live, work and play, but which must also manage threats to their wellbeing and their rights. The project aims to support a new engagement between authorities (such as the police) and communities of citizens in order to better investigate (and in the long term reduce) potential or actual threats to citizen security, safety, and privacy. This includes both empowering the police by opening up new ways of citizens providing data in ways that protect privacy and anonymity, and empowering citizens by using these new technologies to also hold the police to account. We will be harnessing many of the so-called Internet of Things, Smart City and Smart Home technologies to encourage and allow citizens to help the police collect and analyse disparate data to improve public safety at both local and ultimately national levels. This multidisciplinary investigation draws upon expertise in computing, policing, psychology and organisational theory. For more information, see https://www.citizenforensics.org/

SAUSE: Secure, Adaptive, Usable Software Engineering
RoleStart dateEnd dateFunding source
Lead01 Apr 201831 Mar 2024EPSRC Engineering and Physical Sciences Research Council

In the last decade, the role of software engineering has changed rapidly and radically. Globalisation and mobility of people and services, pervasive computing, and ubiquitous connectivity through the Internet have disrupted traditional software engineering boundaries and practices. People and services are no longer bound by physical locations. Computational devices are no longer bound to the devices that host them. Communication, in its broadest sense, is no longer bounded in time or place. The Software Engineering & Design (SEAD) group at the Open University (OU) is leading software engineering research in this new reality that requires a paradigm shift in the way software is developed and used. This platform grant will grow and sustain strategic, multi-disciplinary, crosscutting research activities that underpin the advances in software engineering required to build the pervasive and ubiquitous computing systems that will be tightly woven into the fabric of a complex and changing socio-technical world. In addition to sustaining and growing the SEAD group at the OU and supporting its continued collaboration with the Social Psychology research group at the University of Exeter, the SAUSE platform will also enable the group to have lasting impact across several application domains such as healthcare, aviation, policing, and sustainability. The grant will allow the team to enhance the existing partner networks in these areas and to develop impact pathways for their research, going beyond the scope and lifetime of individual research projects.

Scenarios@runtime for Self-adaptive Systems
RoleStart dateEnd dateFunding source
Lead09 Feb 201809 May 2018The Royal Society

Software engineers increasingly treat software systems development as an evolutionary process, in which the software is continuously modified throughout its lifetime in response to changes in customer requirements and needs. Modifications are usually carried out by halting system execution, updating source code or structure, and then re-executing the software. However, a new paradigm of engineering adaptive software is emerging. In this paradigm, models are created during systems development, but these then continue to evolve at both production time and at execution time (becoming so-called "runtime models"). Runtime models differ from the models that are developed during software production, in that they need to accommodate events that occur while the system is running and interacting with its operating environment, potentially changing the decision-making behaviour of the systems that they underpin.

Why Johnny doesn’t write secure software? Secure Software Development by the Masses
RoleStart dateEnd dateFunding source
Lead01 Apr 201731 Dec 2021EPSRC Engineering and Physical Sciences Research Council

Developing software is no longer the domain of the select few with deep technical skills, training and knowledge. Mobile and web app development and easy to program hardware devices, such as Arduino and Raspberry Pi, have resulted in a wide range of people from diverse backgrounds developing software. Such software can be, and is, used by a potentially global user base. But what are the security implications of such software development by ‘the masses’. Are we moving toward a ‘wild west’ in which a diversity of skills and motives in those developing software will affect its security? This diversity of developers is here to stay and is at the heart of a range of innovations in the digital economy. However, little is currently understood about the security behaviours and decision-making processes of the masses – Johnny – engaging in software development. Without such foundational understanding, we cannot hope to leverage a hitherto untapped resource, Johnny, in developing resilient software that is used by millions around the world. From this foundation, we can consider the implications of their assumptions and design choices and provide new tools and techniques to support them. Such foundational research and advances are the focus of this proposal.

STRETCH: Socio-Technical Resilience for Enhancing Targeted Community Healthcare
RoleStart dateEnd dateFunding source
Co-investigator01 Apr 201728 Feb 2021EPSRC Engineering and Physical Sciences Research Council

The aim of this project will be to build a dynamic and resilient socio-technical system that sustains care for people with chronic illnesses in old age. Its principle novelty will be the integration of human and technical resources into a single system that will have resilient care at its heart. Resilience will mean both social resilience and technical resilience. To deliver social resilience we will explore how technology can help to harness existing social support as well as building wider social capital around older people. To deliver technical resilience we will design systems that integrate existing technological capacity in novel configurations as well as integrating new sensing / Internet of Things capability. However, the key innovation will be that the integrated socio-technical system will allow for the interchange between human assets and technological assets in the delivery of a resilient care architecture for older people. The system will not seek to replace human resource with a technology derived alternative, but to harness the capacities of all elements of the system in a way that serves the needs of the older person. Sometimes the system will respond to need through mobilising human resources, at other times the same need could be met through technological capability. In that sense, the system will have the needs of the older person at its core.

Publications

Reflections on using the story completion method in designing tangible user interfaces (2024-12)
Gooch, Daniel; Bandara, Arosha K.; Bennaceur, Amel; Giles, Emilie; Harkin, Lydia; Katz, Dmitri; Levine, Mark; Mehta, Vikram; Nuseibeh, Bashar; Stevenson, Clifford; Stuart, Avelie; Talbot, Catherine and Price, Blaine A.
International Journal of Human-Computer Studies, 192, Article 103360


Infrastructural Justice for Responsible Software Engineering (2024-09)
Robinson, Sarah; Buckley, Jim; Ciolfi, Luigina; Linehan, Conor; McInerney, Clare; Nuseibeh, Bashar; Twomey, John; Rauf, Irum and McCarthy, John
Journal of Responsible Technology, 19, Article 100087


The Rocky Road to Sustainable Security (2024-09)
Pasquale, Liliana; Ramkumar, Kushal; Cai, Wanling; McCarthy, John; Doherty, Gavin and Nuseibeh, Bashar
IEEE Security & Privacy, 22(5) (pp. 82-86)


On Specifying for Trustworthiness (2024-01)
Abeywickrama, Dhaminda B.; Bennaceur, Amel; Chance, Greg; Demiris, Yiannis; Kordoni, Anastasia; Levine, Mark; Moffat, Luke; Moreau, Luc; Mousavi, Mohammad Reza; Nuseibeh, Bashar; Ramamoorthy, Subramanian; Ringert, Jan Oliver; Wilson, James; Windsor, Shane and Eder, Kerstin
Communications of the ACM, 67(1) (pp. 98-109)


The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems (2024)
Gavidia-Calderon, Carlos; Kordoni, Anastasia; Bennaceur, Amel; Levine, Mark and Nuseibeh, Bashar
ACM Transactions on Software Engineering and Methodology, 33, Article 164(6)


“Are we in this together?” : embedding social identity detection in drones improves emergency coordination (2023-09-07)
Kordoni, Anastasia; Gavidia-Calderon, Carlos; Levine, Mark; Bennaceur, Amel and Nuseibeh, Bashar
Frontiers in Psychology, 14, Article 1146056


Security Responses in Software Development (2023-04-26)
Lopez, Tamara; Sharp, Helen; Bandara, Arosha; Thein, Tun; Levine, Mark and Nuseibeh, Bashar
ACM Transactions on Software Engineering and Methodology, 32, Article 64(3)


Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains (2023-04)
Welsh, Thomas; Alrimawi, Faeq; Farahani, Ali; Hassett, Diane; Zisman, Andrea and Nuseibeh, Bashar
IEEE Transactions on Industrial Informatics, 19(4) (pp. 5656-5666)


Forensic Readiness of Industrial Control Systems Under Stealthy Attacks (2023-02)
Azzam, Mazen; Pasquale, Liliana; Provan, Gregory and Nuseibeh, Bashar
Computers & Security, 125, Article 103010


Digital Intervention in Loneliness in Older Adults: Qualitative Analysis of User Studies (2023-01-27)
Stuart, Avelie; Yan, Ronnie Jieru; Harkin, Lydia Jo; Katz, Dmitri; Stevenson, Clifford; Mehta, Vikram; Giles, Emilie; Talbot, Catherine; Gooch, Daniel; Bennasar, Mohamed; Self, Tara; Nuseibeh, Bashar and Price, Blaine
JMIR Formative Research, 7, Article e42172


Adaptive Observability for Forensic-Ready Microservice Systems (2023)
Monteiro, Davi; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar
IEEE Transactions on Services Computing, 16(5) (pp. 3196-3209)


Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers (2022-10)
Bennasar, Mohamed; Price, Blaine; Gooch, Daniel; Bandara, Arosha and Nuseibeh, Bashar
Sensors, 22, Article 7482(19)


Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (2022-04-22)
Gooch, Daniel; Mehta, Vikram; Stuart, Avelie; Katz, Dmitri; Bennasar, Mohamed; Levine, Mark; Bandara, Arosha; Nuseibeh, Bashar; Bennaceur, Amel and Price, Blaine
JMIR Human Factors, 9, Article e34606(2)


The case for Zero Trust Digital Forensics (2022-03)
Neale, Chris; Kennedy, Ian; Price, Blaine; Yu, Yijun and Nuseibeh, Bashar
Forensic Science International: Digital Investigation, 40, Article 301352


Incidents Are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems (2022-01)
Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak; Yoshioka, Nobukazu and Nuseibeh, Bashar
IEEE Transactions on Software Engineering, 48(1) (pp. 120-134)


The Case for Adaptive Security Interventions (2022-01)
Rauf, Irum; Petre, Marian; Tun, Thein; Lopez, Tamara; Lunn, Paul; Van der Linden, Dirk; Towse, John; Sharp, Helen; Levine, Mark; Rashid, Awais and Nuseibeh, Bashar
ACM Transactions on Software Engineering and Methodology, 31, Article 9(1)


The Case for Animal Privacy in the Design of Technologically Supported Environments (2022-01)
Paci, Patrizia; Mancini, Clara and Nuseibeh, Bashar
Frontiers in Veterinary Science, 8, Article 784794


Best Practice Guidance for Digital Contact Tracing Apps: A Cross-disciplinary Review of the Literature (2021-06)
O'Connell, James; Abbas, Manzar; Beecham, Sarah; Buckley, Jim; Chochlov, Muslim; Fitzgerald, Brian; Glynn, Liam; Johnson, Kevin; Laffey, John; McNicholas, Bairbre; Nuseibeh, Bashar; O'Callaghan, Michael; O'Keeffe, Ian; Razzaq, Abdul; Rekanar, Kaavya; Richardson, Ita; Simpkin, Andrew; Storni, Cristiano; Tsvyatkova, Damyanka; Walsh, Jane; Welsh, Thomas and O'Keeffe, Derek
JMIR mHealth and uHealth, 9, Article e27753(6)


Bumps in the Code: Error Handling during Software Development (2021-05)
Lopez, Tamara; Sharp, Helen; Petre, Marian and Nuseibeh, Bashar
IEEE Software, 38(3) (pp. 26-34)


Digital detectives: websleuthing reduces eyewitness identification accuracy in police lineups (2021-04)
Elphick, Camilla; Philpot, Richard; Zhang, Min; Stuart, Avelie; Pike, Graham; Strathie, Ailsa; Havard, Catriona; Walkington, Zoe; Frumkin, Lara; Levine, Mark; Price, Blaine; Bandara, Arosha and Nuseibeh, Bashar
Frontiers in Psychology, 12, Article 640513


Privacy Care: A Tangible Interaction Framework for Privacy Management (2021-02)
Mehta, Vikram; Gooch, Daniel; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar
ACM Transactions on Internet Technology, Article 25


Building trust in digital policing: a scoping review of community policing apps (2021)
Elphick, Camilla; Philpot, Richard; Zhang, Min; Stuart, Avelie; Walkington, Zoe; Frumkin, Lara; Pike, Graham; Gardner, Kelly; Lacey, Mark; Levine, Mark; Price, Blaine; Bandara, Arosha and Nuseibeh, Bashar
Police Practice and Research, 22(5) (1469 -1491)


Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland (2020-12-06)
Elphick, Camilla; Stuart, Avelie; Philpot, Richard; Walkington, Zoe; Frumkin, Lara; Zhang, Min; Levine, Mark; Price, Blaine; Pike, Graham; Nuseibeh, Bashar and Bandara, Arosha
Arxiv


Designing Privacy-aware Internet of Things Applications (2020-02)
Perera, Charith; Barhamgi, Mahmoud; Bandara, Arosha; Ajmal, Muhammed; Price, Blaine and Nuseibeh, Bashar
Information Sciences, 512 (pp. 238-257)


Taking the Middle Path: Learning about Security Through Online Social Interaction (2020-01-01)
Lopez, Tamara; Tun, Thein; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen
IEEE Software, 37(1) (pp. 25-30)


On the Automated Management of Security Incidents in Smart Space (2019-08-23)
Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar
IEEE Access, 7 (pp. 111513-111527)


Text Filtering and Ranking for Security Bug Report Prediction (2019-06-01)
Peters, Fayola; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar
IEEE Transactions on Software Engineering, 45(6) (pp. 615-631)


LiveBox: A Self-Adaptive Forensic-Ready Service for Drones (2019)
Yu, Yijun; Barthaud, Danny; Price, Blaine; Bandara, Arosha; Zisman, Andrea and Nuseibeh, Bashar
IEEE Access, 7 (pp. 148401-148412)


Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach (2018-10-22)
Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen and Nuseibeh, Bashar
JMIR mHealth and uHealth, 6, Article e185(10)


Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things (2018-07-18)
Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun and Nuseibeh, Bashar
ACM Transactions on Cyber-Physical Systems, 2, Article 21(3)


On the Interplay Between Cyber and Physical Spaces for Adaptive Security (2018-05-11)
Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo and Nuseibeh, Bashar
IEEE Transactions on Dependable and Secure Computing, 15(3) (pp. 466-480)


CrowdService: Optimizing Mobile Crowdsourcing and Service Composition (2018-03-18)
Peng, Xin; Gu, Lingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun
ACM Transactions on Internet Technology (TOIT), 18, Article 19(2)


Topology-Aware Access Control of Smart Spaces (2017-07-07)
Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca and ,
IEEE Computer, 50(7) (pp. 54-63)


Adaptive evidence collection in the cloud using attack scenarios (2016-06)
Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark and Nuseibeh, Bashar
Computers & Security, 59 (pp. 236-254)


Protecting Privacy in the Cloud: Current Practices, Future Directions (2016-02-11)
Barhamgi, Mahmoud; Bandara, Arosha K.; Yu, Yijun; Belhajjame, Khalid and Nuseibeh, Bashar
Computer, 49(2) (pp. 68-72)


Automated analysis of security requirements through risk-based argumentation (2015-08)
Yu, Yijun; Franqueira, Virginia N. L.; Tun, Thein; Wieringa, Roel J. and Nuseibeh, Bashar
Journal of Systems and Software, 106 (pp. 102-116)


“Why can’t I do that?”: tracing adaptive security decisions (2015-01)
Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled M. and Nuseibeh, Bashar
EAI Endorsed Transactions on Self-Adaptive Systems, 1, Article e2(1)


Resolving vulnerability identification errors using security requirements on business process models (2013-07-12)
Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar
Information Management and Computer Security, 21(3) (pp. 202-223)


Specifying software features for composition: a tool-supported approach (2013)
Tun, Thein; Laney, Robin; Yu, Yijun and Nuseibeh, Bashar
Computer Networks, 57(12) (pp. 2454-2464)


Analysing monitoring and switching problems for adaptive systems (2012-07-31)
Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K. and Nuseibeh, Bashar
Journal of Systems and Software, 85(12) (pp. 2829-2839)


A hybrid model for automatic emotion recognition in suicide notes (2012-01-30)
Yang, Hui; Willis, Alistair; De Roeck, Anne and ,
Biomedical Informatics Insights, 5(Supp 1) (pp. 17-30)


Analysing anaphoric ambiguity in natural language requirements (2011-05)
Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar
Requirements Engineering, 16(3) (pp. 163-189)


Requirements-driven design of service-oriented interactions (2010-07-15)
Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar
IEEE Software, 27(6) (pp. 25-32)


Security requirements engineering for evolving software systems: a survey (2010)
Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun
International Journal of Secure Software Engineering (IJSSE), 1(1) (pp. 54-73)


Securing the skies: In requirements we trust (2009-09)
Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig
Computer, 42(9) (pp. 64-72)


Specifying features of an evolving software system (2009-08-10)
Tun, Thein Than; Trew, Tim; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar
Software: Practice and Experience, 39(11) (pp. 973-1002)


Security Requirements Engineering: A Framework for Representation and Analysis (2008-01)
Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar
IEEE Transactions on Software Engineering, 34(1) (pp. 133-153)


Placing computer security at the heart of learning (2008)
Richards, Mike; Price, Blaine A. and Nuseibeh, Bashar
Progress in Informatics, 5(2008) (pp. 91-98)


Using trust assumptions with security requirements (2006-04)
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
Requirements Engineering, 11(2) (pp. 138-151)


Learning software engineering at a distance (2006)
Quinn, Brendan; Barroca, Leonor; Nuseibeh, Bashar; Fernandez-Ramil, Juan; Rapanotti, Lucia; Thomas, Pete and Wermelinger, Michel
IEEE Software, 23(6) (pp. 36-43)


Editorial: Relating software requirements and architectures (2005-08)
Hall, J.G.; Mistrik, I.; Nuseibeh, B. and Silva, A.
IEE Proceedings: Software, 152(4) (pp. 141-142)


Keeping ubiquitous computing to yourself: a practical model for user control of privacy (2005-07)
Price, Blaine A.; Adam, Karim and Nuseibeh, Bashar
International Journal of Human-Computer Studies, 63(1-2) (pp. 228-253)


Modelling access policies using roles in requirements engineering (2003-07)
Crook, Robert; Ince, Darrel and Nuseibeh, Bashar
Information and Software Technology, 45(14) (pp. 979-991)


Lightweight Validation of Natural Language Requirements (2002-02)
Gervasi, Vincenzo and Nuseibeh, Bashar
Software: Practice and Experience, 32(2) (pp. 113-133)


Weaving together requirements and architecture (2001-03)
Nuseibeh, B.
Computer, 34(3) (pp. 115-119)


Responsible Software Engineering: Requirements and Goals (2024)
Bennaceur, Amel; Ghezzi, Carlo; Kramer, Jeff and Nuseibeh, Bashar
In: Werthner, Hannes; Ghezzi, Carlo; Kramer, Jeff; Nida-Rümelin, Julian; Nuseibeh, Bashar; Prem, Erich and Stanger, Allison eds. Introduction to Digital Humanism (pp. 299-315)
ISBN : 978-3-031-45304-5 | Publisher : Springer Nature Switzerland | Published : Cham


Requirements Engineering (2019-02-25)
Bennaceur, Amel; Tun, Thein Than; Yu, Yijun and Nuseibeh, Bashar
In: Cha, Sungdeok (Steve); Taylor, Richard N. and Kang, Kyo C. eds. Handbook of Software Engineering (pp. 51-92)
ISBN : 978-3-030-00261-9 | Publisher : Springer


Data Privacy: Users’ Thoughts on Quantified Self Personal Data (2018)
Spiller, Keith; Ball, Kirstie; Bandara, Arosha; Meadows, Maureen; Mccormick, Ciaran; Nuseibeh, Bashar and Price, Blaine A.
In: Ajana, Btihaj ed. Self-Tracking: Empirical and Philosophical Investigations (pp. 111-124)
ISBN : 978-3-319-65378-5 | Publisher : Palgrave Macmillan | Published : Cham


The Many Facets of Mediation: A Requirements-driven Approach for Trading-off Mediation Solutions (2016-08-11)
Bennaceur, A. and Nuseibeh, B.
In: Mistrík, Ivan; Ali, Nour; Kazman, Rick; Grundy, John and Schmerl, Bradley eds. Managing Trade-offs in Adaptable Software Architectures (pp. 299-322)
ISBN : 9780128028551 | Publisher : Elsevier


Aspect interactions: a requirements engineering perspective (2013-10-31)
Tun, Thein; Yu, Yijun; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar
In: Moreira, Ana; Chitchyan, Ruzanna; Araujo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering (pp. 271-286)
ISBN : 978-3-642-38639-8 | Publisher : Springer | Published : Heidelberg


Maintaining security requirements of software systems using evolving crosscutting dependencies (2013)
Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar
In: Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering
ISBN : 9783642386398 | Publisher : Springer


A reference architecture for consumer electronics products and its application in requirements engineering (2011)
Trew, Tim; Botterweck, Goetz and Nuseibeh, Bashar
In: Avgeriou, P.; Grundy, J.; Hall, J. G.; Lago, P. and Mistrik, I. eds. Relating Software Requirements and Architectures (pp. 203-231)
ISBN : 978-3-642-21000-6 | Publisher : Springer | Published : Heidelberg, Germany and London, UK and New York, USA


Security patterns: comparing modeling approaches (2010-10)
Bandara, Arosha; Hayashi, Shinpei; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin; Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun
In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives (pp. 75-111)
ISBN : 9781615208371 | Publisher : IGI Global | Published : Hershey, PA


Arguing satisfaction of security requirements (2008)
Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar
In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications
ISBN : 978-1-59904-937-3 | Publisher : Information Science Reference


Arguing satisfaction of security requirements (2006-08-31)
Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar
In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision (pp. 15-42)
ISBN : 1599041472 | Publisher : Idea Group Publishing | Published : Hershey, PA and London


Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC (2006)
Buckingham Shum, Simon; Selvin, A.M.; Sierhuis, Maarten; Conklin, Jeffrey; Haley, C.B. and Nuseibeh, Bashar
In: Dutoit, A.; McCall, R.; Mistrik, I. and Paech, B. eds. Rationale Management in Software Engineering (pp. 111-132)
ISBN : 3540309977 | Publisher : Springer-Verlag | Published : Berlin


The Learning Grid and E-Assessment using Latent Semantic Analysis (2005-11)
Haley, Debra; Nuseibeh, Bashar; Thomas, Pete; Taylor, Josie and Lefrere, Paul
In: Ritrovato, P.; Allison, C.; Cerri, S.; Dimitrakos, T.; Gaeta, M. and Salerno, S. eds. Towards the Learning Grid: Advances in Human Learning Services. Frontiers in Artificial Intelligence and Applications (pp. 197-202)
ISBN : 1 586035 34 7 | Publisher : IOS Press | Published : Amsterdam, The Netherlands


Problem frames: a case for coordination (2004-02-24)
Barroca, Leonor; Fiadeiro, J.L.; Jackson, M.; Laney, Robin and Nuseibeh, B.
In: De Nicola, Rocco; Ferrari, Gianluigi and Meredith, Greg eds. Coordination models and languages: 6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004: Proceedings. Lecture notes in computer science (2949/2004) (pp. 5-19)
ISBN : 354021044X | Publisher : Springer | Published : Heidleburg, Germany


Using abuse frames to bound the scope of security problems (2004)
Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel and Jackson, Michael
In: 12th IEEE International Requirements Engineering Conference (RE'04) (pp. 354-355)
Publisher : IEEE Computer Society


Engineering Adaptive Software Systems (2019)
Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds.
ISBN : 978-981-13-2184-9 | Publisher : Springer Singapore


Software Requirements and Design: The Work of Michael Jackson (2010-05)
Nuseibeh, Bashar and Zave, Pamela eds.
ISBN : 978-0-557-44467-0 | Publisher : Good Friends Publishing Company


How Do People Use a Public Gratitude Platform in the Wild? (2024)
Zhang, Min; Arce-Plata, Carlos; Price, Blaine; Pike, Graham; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Philpot, Richard; Keil, Tina; Levine, Mark; Stuart, Avelie; Nuseibeh, Bashar and Bandara, Arosha
In : Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA '24) (11-16 May 2024, Honolulu, Hawaii)


Exploring citizen forensics: witnesses, websleuths, vigilantes and the need for multi-directional channels of online collaboration (2024)
Pike, Graham; Zhang, Min; Elphick, Camilla; Bandara, Arosha; Philpot, Richard; Stuart, Avelie; Price, Blaine; Levine, Mark; Walkington, Zoe; Frumkin, Lara; Havard, Catriona; Strathie, Ailsa and Nuseibeh, Bashar
In : 2024 Conference of The Association of Psychology and Law (10-12 Jul 2024, Caparica, Portugal)


Meta-Modelling Kindness (2024)
Alrimawi, Faeq and Nuseibeh, Bashar
In : MODELS '24: ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems (22-27 Sep 2024, Linz, Austria) (pp. 280-289)


Requirements for Designing Kind Spaces (2023-09)
Alrimawi, Faeq and Nuseibeh, Bashar
In : 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW) (4-5 Sep 2023, Hannover, Germany) (pp. 36-41)


Towards a Socio-Technical Understanding of Police-Citizen Interactions (2023-08-25)
Zhang, Min; Bandara, Arosha K.; Philpot, Richard; Stuart, Avelie; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Pike, Graham; Price, Blaine; Levine, Mark and Nuseibeh, Bashar
In : 19th IFIP TC13 International Conference INTERACT 2023 (28 Aug - 1 Sep 2023, York, UK) (pp. 324-345)


Socio-Technical Resilience for Community Healthcare (2023-07-11)
Bennaceur, Amel; Stuart, Avelie; Price, Blaine; Bandara, Arosha; Levine, Mark; Clare, Linda; Cohen, Jessica; Mccormick, Ciaran; Mehta, Vikram; Bennasar, Mohamed; Gooch, Daniel; Gavidia-Calderon, Carlos; Kordoni, Anastasia and Nuseibeh, Bashar
In : TAS '23 First International Symposium on Trustworthy Autonomous Systems (11-12 Jul 2023, Edinburgh, United Kingdom)


Meet your Maker: A Social Identity Analysis of Robotics Software Engineering (2023-07-11)
Gavidia-Calderon, Carlos; Bennaceur, Amel; Lopez, Tamara; Kordoni, Anastasia; Levine, Mark and Nuseibeh, Bashar
In : TAS '23 First International Symposium on Trustworthy Autonomous Systems (11-12 Jul 2023, Edinburgh, United Kingdom)


Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design (2023-04-04)
Hassett, Diane; Bennaceur, Amel and Nuseibeh, Bashar
In : The 29th International Working Conference on Requirement Engineering: Foundation for Software Quality (17-20 Apr 2023, Barcelona, Spain)


A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools (2023-02-26)
Mehta, Vikram; Gooch, Daniel; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar
In : TEI '23: The Seventeenth International Conference on Tangible, Embedded, and Embodied Interaction (26 Feb - Mar 1 2023, Warsaw, Poland)


Security Thinking in Online Freelance Software Development (2023)
Rauf, Irum; Petre, Marian; Tun, Thein; Lopez, Tamara and Nuseibeh, Bashar
In : IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS) (14-20 May 2023, Melbourne, Australia) (pp. 13-24)


Values@Runtime: An Adaptive Framework for Operationalising Values (2023)
Bennaceur, Amel; Hassett, Diane; Nuseibeh, Bashar and Zisman, Andrea
In : IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS) (14-20 May 2023, Melbourne, Australia) (pp. 175-179)


Accounting for socio-technical resilience in software engineering (2023)
Lopez, Tamara; Sharp, Helen; Wermelinger, Michel; Langer, Melanie; Levine, Mark; Jay, Caroline; Yu, Yijun and Nuseibeh, Bashar
In : 2023 IEEE/ACM 16th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE) (14-15 May 2023, Melbourne)


Attitudes towards Online Community Support Initiatives during the COVID-19 Pandemic: A Survey in the UK (2022-05-10)
Zhang, Min; Elphick, Camilla; Philpot, Richard; Walkington, Zoe; Frumkin, Lara; Price, Blaine; Pike, Graham; Levine, Mark; Nuseibeh, Bashar and Bandara, Arosha
In : CHI Conference on Human Factors in Computing Systems Extended Abstracts (1-7 May 2022)


Influences of developers' perspectives on their engagement with security in code (2022-05)
Rauf, Irum; Lopez, Tamara; Sharp, Helen; Petre, Marian; Tun, Thein; Levine, Mark; Towse, John; Linden, Dirk van der; Rashid, Awais and Nuseibeh, Bashar
In : 15th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE) (CHASE 2022) (18-19 May 2022, USA) (pp. 86-95)


Kind Computing (2022-05)
Alrimawi, Faeq and Nuseibeh, Bashar
In : IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Technologies Results Track (ICSE-NIER) (22-24 May 2022)


What Do You Want From Me? Adapting Systems to the Uncertainty of Human Preferences (2022)
Gavidia-Calderon, Carlos; Bennaceur, Amel; Kordoni, Anastasia; Levine, Mark and Nuseibeh, Bashar
In : 2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER) (21-29 May 2022, Pittsburgh, PA, USA) (pp. 126-130)


Kind computing (2022)
Alrimawi, Faeq and Nuseibeh, Bashar
In : ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results (21-29 May 2022, Pittsburgh, Pennsylvania) (pp. 61-65)


Six Software Engineering Principles for Smarter Cyber-Physical Systems (2021-11-18)
Weyns, Danny; Bures, Tomas; Calinescu, Radu; Craggs, Barnaby; Fitzgerald, John; Garlan, David; Nuseibeh, Bashar; Pasquale, Liliana; Rashid, Awais; Ruchkin, Ivan and Schmerl, Bradley
In : 2nd IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2021 (27 Sep - 1 Oct 2021, Virtual) (pp. 198-203)


Engineering Adaptive Authentication (2021-11)
Hassan, Alzubair; Nuseibeh, Bashar and Pasquale, Liliana
In : 2nd IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2021 (27 Sep - 1 Oct 2021, Virtual) (pp. 275-280)


Towards Adaptive Inspection for Fraud in I4.0 Supply Chain (2021-09)
Welsh, Thomas; Alrimawi, Faeq; Farahani, Ali; Hasset, Diane; Zisman, Andrea and Nuseibeh, Bashar
In : 2021 ETFA - IEEE 26th International Conference on Emerging Technologies and Factory Automation (7-10 Sep 2021, Vasteras, Sweden)


On Adaptive Fairness in Software Systems (2021-05)
Farahani, Ali; Pasquale, Liliana; Bennaceur, Amel; Welsh, Tom and Nuseibeh, Bashar
In : 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2021, Virtual, Online (18-21 May 2021, Spain) (pp. 97-103)


Up Close and Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control (2021)
Mehta, Vikram; Bandara, Arosha; Price, Blaine; Nuseibeh, Bashar and Gooch, Daniel
In : TEI '21: Proceedings of the Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction (14-17 Feb 2021, Salzburg, Austria)


Schrödinger's security: opening the box on app developers' security rationale (2020-12-21)
van der Linden, Dirk; Anthonysamy, Pauline; Nuseibeh, Bashar; Tun, Thein Than; Petre, Marian; Levine, Mark; Towse, John and Rashid, Awais
In : 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (6-11 Jul 2020, Online) (pp. 149-160)


OASIS: Weakening User Obligations for Security-critical Systems (2020-10-09)
Tun, Thein Than; Bennaceur, Amel and Nuseibeh, Bashar
In : 28th IEEE International Requirements Engineering Conference (31 Aug - 4 Sep 2020) (pp. 113-124)


Security but not for security’s sake: The impact of social considerations on app developers’ choices (2020-09-25)
Rauf, Irum; van der Linden, Dirk; Levine, Mark; Towse, John; Nuseibeh, Bashar and Rashid, Awais
In : IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW'20) (5-11 Oct 2020, Seoul, Republic of Korea) (pp. 141-144)


Finding & Reviewing Community Policing Apps in Asia (2020-04)
Zhang, Min; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar
In : 2020 Symposium on Emerging Research from Asia and on Asian Contexts and Cultures (25-30 Apr 2020) (pp. 45-48)


How are you feeling? Using Tangibles to Log the Emotions of Older Adults (2020-02)
Gooch, Daniel; Mehta, Vikram; Price, Blaine; McCormick, Ciaran; Bandara, Arosha; Bennaceur, Amel; Bennasar, Mohamed; Stuart, Avelie; Clare, Linda; Levine, Mark; Cohen, Jessica and Nuseibeh, Bashar
In : Fourteenth International Conference on Tangible, Embedded, and Embodied Interaction (TEI ’20) (9-12 Feb 2020, Sydney, Australia) (pp. 31-43)


Towards Citizen Forensics: Improving Citizen-Police Collaboration (2020)
Bandara, Arosha; Zhang, Min; Price, Blaine; Pike, Graham; Elphick, Camilla; Walkington, Zoe; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar
In : Workshop on Crime and/or Punishment: Joining the Dots between Crime, Legality and HCI, Extended Abstracts of ACM Conference on Human Factors in Computing Systems (25-30 Apr 2020, Honolulu, HI, USA)


Designing Technologies for Community Policing (2020)
Zhang, Min; Bandara, Arosha; Price, Blaine; Pike, Graham; Walkington, Zoe; Elphick, Camilla; Frumkin, Lara; Philpot, Richard; Levine, Mark; Stuart, Avelie and Nuseibeh, Bashar
In : Extended Abstracts of ACM Conference on Human Factors in Computing Systems (Late Breaking Work) (25-30 Apr 2020, Honolulu, HI, USA) (pp. 1-9)


An Anatomy of Security Conversations in Stack Overflow (2019-08-15)
Lopez, Tamara; Tun, Thein; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen
In : 41st ACM/IEEE International Conference on Software Engineering (25 May - 1 Jun 2019, Montréal, Canada) (pp. 31-40)


Talking about Security with Professional Developers (2019-05-28)
Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar
In : 7th International Workshop Series on Conducting Empirical Studies in Industry (CESSER-IP) (28 May 2019, Montréal, Canada)


Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice (2019-05-27)
Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar
In : 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE) (27 May 2019, Montréal, Canada) (pp. 61-68)


Dragonfly: a Tool for Simulating Self-Adaptive Drone Behaviours (2019-05-25)
Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar
In : SEAMS 2019: 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (25-26 May 2019, Montreal, Canada) (pp. 107-113)


Modelling and Analysing Resilient Cyber-Physical Systems (2019)
Bennaceur, Amel; Ghezzi, Carlo; Tei, Kenji; Kehrer, Timo; Weyns, Danny; Calinescu, Radu; Dustdar, Schahram; Honiden, Shinichi; Ishikawa, Fuyuki; Jin, Zhi; Kramer, Jeffrey; Litoiu, Marin; Loreti, Michele; Moreno, Gabriel; Muller, Hausi; Nenzi, Laura; Nuseibeh, Bashar; Pasquale, Liliana; Reisig, Wolfgang; Schmidt, Heinz; Tsigkanos, Christos and Zhao, Haiyan Zhao
In : 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019 (25-26 May 2019, Montréal, Canada)


Won’t Take No for an Answer: Resource-driven Requirements Adaptation (2019)
Bennaceur, Amel; Zisman, Andrea; Mccormick, Ciaran; Barthaud, Danny and Nuseibeh, Bashar
In : 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019 (25-26 May 2019, Montréal, Canada)


Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action (2019)
Wilkins, Denise; Nuseibeh, Bashar and Levine, Mark
In : 2019 International Conference on Human-Computer Interaction (26-31 Jul 2019, Orlando, Florida, USA) (pp. 130-147)


Cautious Adaptation of Defiant Components (2019)
Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar
In : The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019) (11-15 Nov 2019, San Diego, California, USA) (pp. 974-985)


A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time (2019)
Bennasar, Mohamed; Mccormick, Ciaran; Price, Blaine; Gooch, Daniel; Stuart, Avelie; Mehta, Vikram; Clare, Linda; Bennaceur, Amel; Cohen, Jessica; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar
In : Innovation in Medicine and Healthcare Systems, and Multimedia (Jun 2019) (pp. 125-135)


Requirements and Specifications for Adaptive Security: Concepts and Analysis (2018-05-28)
Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B.
In : 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (28-29 May 2018, Gothenburg, Sweden) (pp. 161-171)


Compositional Verification of Self-Adaptive Cyber-Physical Systems (2018)
Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios and Nuseibeh, Bashar
In : 13th ACM/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (28-29 May 2018, Gothenburg, Sweden)


I’ve Seen This Before: Sharing Cyber-Physical Incident Knowledge (2018)
Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak and Nuseibeh, Bashar
In : 1st International Workshop on Security Awareness from Design to Deployment (SEAD’18) (27 May 2018, Gothenburg, Sweden.)


An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement (2018)
Lopez, Tamara; Tun, Thein T.; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen
In : First International Workshop on Security Awareness from Design to Deployment (SEAD'18) (27 May 2018, Gothenburg) (pp. 26-32)


Towards forensic-ready software systems (2018)
Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Tun, Thein; Nuseibeh, Bashar and Rashid, Awais
In : 40th International Conference on Software Engineering: New Ideas and Emerging Results (27 May 2018, Gothenburg, Sweden) (pp. 9-12)


Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews (2017-09)
Elrakaiby, Yehia; Ferrari, Alessio; Spolentini, Paola; Gnesi, Stefania and Nuseibeh, Bashar
In : 2017 IEEE 25th International Requirements Engineering Conference (4-8 Sep 2017, Lisbon, Portugal)


On Evidence Preservation Requirements for Forensic-Ready Systems (2017-08-21)
Alrajeh, Dalal; Pasquale, Liliana and ,
In : ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (4-8 Sep 2017, Paderborn, Germany) (pp. 559-569)


Software Engineering Challenges for Investigating Cyber-Physical Incidents (2017-07-07)
Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar
In : Proceedings of the 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS ’17) (20-28 May 2017, Buenos Aires, Argentina)


Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces (2017-07-07)
Nuseibeh, Bashar
In : 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) (21 May 2017, Buenos Aires, Argentina) (p 2)


Enabling End-Users to Protect Their Privacy (2017-04)
Barhamgi, Mahmoud; Yang, Mu; Yu, Chia-Mu; Yu, Yijun; Bandara, Arosha K.; Benslimane, Djamal and Nuseibeh, Bashar
In : ACM on Asia Conference on Computer and Communications Security (ASIACCS) 2017 (2-6 Apr 2017, Abu Dhabi, UAE) (pp. 905-907)


Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion (2017-01-09)
Yu, Yijun; Yang, Mu and Nuseibeh, Bashar
In : SCiA 2017 : 4th Software Challenges in Aerospace Symposium (9-13 Jan 2017, Grapevine, Texas)


O2O Service Composition with Social Collaboration (2017)
Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyu
In : 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (30 Oct - 3 Nov 2017, University of Illinois at Urbana-Champaign, Illinois, USA)


Are You Ready? Towards the Engineering of Forensic-Ready Systems (2017)
Grispos, George; Garcıa-Galan, Jesus; Pasquale, Liliana and Nuseibeh, Bashar
In : 11th International Conference on Research Challenges in Information Science (RCIS) (10-12 May 2017, Brighton)


Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks (2017)
Rafiq, Yasmin; Dickens, Luke; Russo, Alessandra; Bandara, Arosha; Yang, Mu; Stuart, Avelie; Levine, Mark; Calikli, Gul; Price, Blaine and Nuseibeh, Bashar
In : 32nd IEEE/ACM International Conference on Automated Software Engineering (30 Oct - 3 Nov 2017, Chicago, IL)


Use of organisational topologies for forensic investigations (2017)
Grispos, George; Hanvey, Sorren and Nuseibeh, Bashar
In : 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics (4 Sep 2017, Paderborn, Germany) (pp. 2-5)


Examining Active Error in Software Development (2016-11-10)
Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar
In : 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) (4-8 Sep 2016, Cambridge, UK) (pp. 152-156)


Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms (2016-11-07)
Perera, Charith; McCormick, Ciaran; Bandara, Arosha K.; Price, Blaine A. and Nuseibeh, Bashar
In : International Conference on the Internet of Things (IOT 2016) (7-9 Nov 2016, Stuttgart, Germany) (pp. 83-92)


CrowdService: Serving the Individuals through Mobile Crowdsourcing and Service Composition (2016-10-06)
Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun
In : 31st IEEE/ACM International Conference on Automated Software Engineering (ASE 2016) (3-7 Sep 2016, Singapore) (pp. 214-219)


Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations (2016-09-12)
Tun, Thein; Price, Blaine; Bandara, Arosha; Yu, Yijun and Nuseibeh, Bashar
In : iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime (12 Sep 2016, Beijing, China)


Wearables for Physical Privacy (2016-09-12)
Mehta, Vikram; Price, Blaine; Bandara, Arosha and Nuseibeh, Bashar
In : UbiComp 2016 (12-16 Sep 2016, Heidelberg, Germany)


Privacy Dynamics: Learning Privacy Norms for Social Software (2016-05-14)
Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alesandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark and Nuseibeh, Bashar
In : 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (16-17 May 2016, Austin, Texas, USA) (pp. 47-56)


Towards Adaptive Compliance (2016-05-14)
García-Galán, Jesús; Pasquale, Liliana; Grispos, George and Nuseibeh, Bashar
In : 38th International Conference on Software Engineering (ICSE) (14 May - 22 May 2016, Austin, TX, USA) (pp. 108-114)


Adding static and dynamic semantics to building information models (2016-05-14)
Tsigkanos, Christos; Kehrer, Timo; Ghezzi, Carlo; Pasquale, Liliana and Nuseibeh, Bashar
In : ICSE 16: 38th International Conference on Software Engineering (14-22 May 2016, Austin, TX, USA) (pp. 1-7)


Privacy Itch and Scratch: On Body Privacy Warnings and Controls (2016-05-07)
Mehta, Vikram; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar
In : ACM Conference on Human Factors in Computing Systems (7-12 May 2016, San Jose, CA)


Feed me, Feed me: An Exemplar for Engineering Adaptive Software (2016)
Bennaceur, Amel; Mccormick, Ciaran; García Galán, Jesús; Perera, Charith; Smith, Andrew; Zisman, Andrea and Nuseibeh, Bashar
In : 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (16-17 May 2016)


Managing security control assumptions using causal traceability (2015-07-17)
Nhlabatsi, Armstrong; Yu, Yijun; Zisman, Andrea; Tun, Thein; Khan, Niamul; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar
In : 8th International Symposium on Software and Systems Traceability (SST 2015) (17 Jul 2015, Florence, Italy)


The Role of Environmental Assumptions in Failures of DNA Nanosystems (2015-05)
Tun, Thein; Lutz, Robyn; Nakayama, Brian; Yu, Yijun; Mathur, Divita and Nuseibeh, Bashar
In : International Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS) (23 May 2015, Florence, Italy) (pp. 27-33)


Towards explaining rebuttals in security arguments (2014-12-10)
Yu, Yijun; Piwek, Paul; Tun, Thein Than and Nuseibeh, Bashar
In : 14th Workshop on Computational Models of Natural Argument (10 Dec 2014, Krakow, Poland)


Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit (2014-09-24)
Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar
In : 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14) (24-26 Sep 2014, Beijing, China) (pp. 45-52)


Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People (2014-09-13)
Calikli, Gul; Andersen, Mads Schaarup; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar
In : Ubicomp Adjunct 2014 (Sep 13-17 2014)., Seattle, WA, USA) (pp. 683-686)


Self-adaptation through incremental generative model transformations at runtime (2014-06-30)
Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun
In : 36th International Conference on Software Engineering (ICSE 2014) (31 May - 7 Jun 2014, Hyderabad, India) (pp. 676-687)


Traceability for adaptive information security in the cloud (2014-06-27)
Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar
In : 7th IEEE International Conference on Cloud Computing (27 Jun - 2 Jul 2014, Alaska, USA) (pp. 958-959)


Distilling Privacy Requirements for Mobile Applications (2014-05-31)
Thomas, Keerthi; Bandara, Arosha K.; Price, Blaine A. and Nuseibeh, Bashar
In : 36th International Conference on Software Engineering (ICSE 2014) (31 May - 7 Jun 2014, Hyderabad, India)


Requirements-driven mediation for collaborative security (2014)
Bennaceur, Amel; Bandara, Arosha; Jackson, Michael; Liu, Wei; Montrieux, Lionel; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar
In : SEAMS'14 - The 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (2-3 Jun 2014, Hyderabad)


Topology aware adaptive security (2014)
Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos and Nuseibeh, Bashar
In : 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'14) (2-3 Jun 2014, Hyderabad, India) (pp. 43-48)


Engineering topology aware adaptive security: preventing requirements violations at runtime (2014)
Tsigkanos, Christos; Pasquale, Liliana; Menghi, Claudio; Ghezzi, Carlo and Nuseibeh, Bashar
In : 22nd IEEE International Requirements Engineering Conference (RE' 2014) (25-29 Aug 2014, Karlskrona, Sweden) (pp. 203-212)


From model-driven software development processes to problem diagnoses at runtime (2014)
Yu, Yijun; Tun, Thein Than; Bandara, Arosha K.; Zhang, Tian and Nuseibeh, Bashar
In : Dagstuhl Seminar 11481 (2011) (pp. 188-207)


Requirements-driven adaptive digital forensics (2013-07-15)
Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar
In : 21st IEEE Requirements Engineering Conference (15-19 Jul 2013, Rio de Janeiro, Brazil)


Engineering adaptive privacy: on the role of privacy awareness requirements (2013-04)
Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana and Nuseibeh, Bashar
In : 35th International Conference on Software Engineering (ICSE 2013) (18-26 May 2013, San Francisco, CA, USA) (pp. 632-641)


SecuriTAS: a tool for engineering adaptive security (2012-11)
Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah and Nuseibeh, Bashar
In : ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012) (11-16 Nov 2012, North Carolina, USA)


Social adaptation: when software gives users a voice (2012-06)
Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar
In : ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering (28-30 Jun 2012, Wroclaw, Poland)


Getting at ephemeral flaws (2012-06)
Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar
In : Cooperative and Human Aspects of Software Engineering (CHASE), 2012 5th International Workshop on (2 Jun 2012, Zurich)


An aspect-oriented approach to relating security requirements and access control (2012-06)
Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta and Nuseibeh, Bashar
In : CAiSE'12 Forum (28 Jun 2012, Gdansk, Poland)


Privacy arguments: analysing selective disclosure requirements for mobile applications (2012)
Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar
In : 20th IEEE International Requirements Engineering Conference (24-28 Sep 2012, Chicago, Illinois) (pp. 131-140)


Speculative requirements: automatic detection of uncertainty in natural language requirements (2012)
Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar
In : The 20th IEEE International Requirements Engineering Conference (24-28 Sep 2012, Chicago, ILL, USA) (pp. 11-20)


Adaptive security and privacy in smart grids: A software engineering vision (2012)
Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar
In : Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop (3 Jun 2012, University of Zurich)


On the role of primary and secondary assets in adaptive security: An application in smart grids (2012)
Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar
In : Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop (4-5 Jun 2012, Switzerland)


Caprice: a tool for engineering adaptive privacy (2012)
Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar
In : 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012) (3-7 Sep 2012, Essen, Germany)


Requirements-driven adaptive security: protecting variable assets at runtime (2012)
Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar
In : 20th International Requirements Engineering Conference (RE'12) (24-28 Sep 2012, Chicago, USA) (pp. 111-120)


Towards learning to detect meaningful changes in software (2011-11)
Yu, Yijun; Bandara, Arosha; Tun, Thein Than and Nuseibeh, Bashar
In : Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering (12 Nov 2011, Lawrence, Kansas) (pp. 51-54)


Social sensing: when users become monitors (2011-09)
Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid
In : 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011) (5-9 Sep 2011, Szeged, Hungary)


Risk and argument: a risk-based argumentation method for practical security (2011-08-29)
Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar
In : 19th IEEE International Conference on Requirements Engineering (29 Aug - 2 Sep 2011, Trento, Italy) (pp. 239-248)


OpenArgue: supporting argumentation to evolve secure software systems (2011-08-29)
Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar
In : 19th IEEE International Requirements Engineering Conference (29 Aug - 02 Sep 2011) (pp. 351-352)


PrimAndroid: privacy policy modelling and analysis for Android applications (2011-06-07)
Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar
In : IEEE International Symposium on Policies for Distributed Systems and Networks (6-8 Jun 2011, Pisa, Italy)


Learning to adapt requirements specifications of evolving systems (NIER Track) (2011-05)
Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar
In : 33rd International Conference on Software Engineering (ICSE 2011) (21-28 May 2011, Honolulu, Hawaii, USA)


In the best families: tracking and relationships (2011)
Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam; Price, Blaine; Bandara, Arosha; Jedrzejczyk, Lukasz and Nuseibeh, Bashar
In : 29th International ACM Conference on Human Factors in Computing Systems, ACM CHI 2011 (07-12 May 2011, Vancouver, Canada) (pp. 2419-2428)


“Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications (2010-09)
Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar
In : MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services (7-10 Sep 2010, Libon, Portugal) (pp. 411-412)


On the impact of real-time feedback on users' behaviour in mobile location-sharing applications (2010-07-14)
Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K. and Nuseibeh, Bashar
In : SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security (14-16 Jul 2010) (pp. 1-12)


Model-Based argument analysis for evolving security requirements (2010-06-09)
Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B.
In : Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010 (9-11 Sep 2010, Singapore) (pp. 88-97)


Contravision: Exploring users' reactions to futuristic technology (2010-04-10)
Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam; Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar
In : Proceedings of the 28th International Conference on Human factors in computing systems (10-15 Apr 2010, Atlanta Georgia, USA) (pp. 153-162)


ContraVision: presenting contrasting visions of future technology (2010-04)
Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar
In : 28th International Conference on Human Factors in Computing Systems (10-15 Apr 2010, Atlanta, GA, USA) (pp. 4759-4764)


A methodology for automatic identification of nocuous ambiguity (2010)
Yang, Hui; De Roeck, Anne; Willis, Alistair and Nuseibeh, Bashar
In : The 23rd International Conference on Computational Linguistics (Coling 2010) (23-27 Aug 2010, Beijing, China) (pp. 1218-1226)


Automatic detection of nocuous coordination ambiguities in natural language requirements (2010)
Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar
In : The IEEE/ACM international conference on Automated software engineering (ASE'10) (20-24 Sep 2010, Antwerp, Belgium) (pp. 53-62)


Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (2010)
Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar
In : 18th International IEEE Requirements Engineering Conference (RE'10) (27 Sep - 1 Oct 2010, Sydney, Australia) (pp. 25-34)


Making tacit requirements explicit (2009-09-01)
Gacitua, R.; Ma, L.; Nuseibeh, B.; Piwek, P.; De Roeck, A.; Rouncefield, M.; Sawyer, P.; Willis, A. and Yang, H.
In : Second International Workshop on Managing Requirements Knowledge (MaRK’09) (1 Sep 2009, Altanta, USA)


On presuppositions in requirements (2009-09)
Ma, Lin; Nuseibeh, Bashar; Piwek, Paul; De Roeck, Anne and Willis, Alistair
In : 2009 Second International Workshop on Managing Requirements Knowledge (MaRK'09) (1 Sep 2009, Atlanta, Georgia, USA)


Are your lights off? Using problem frames to diagnose system failures (2009-08)
Tun, Thein; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun
In : 17th IEEE International Requirements Engineering Conference (31 Aug - 4 Sep 2009, Atlanta, Georgia, USA)


Studying location privacy in mobile applications: 'predator vs. prey' probes (2009-07)
Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar
In : Proceedings of the 5th Symposium on Usable Privacy and Security (15-17 Jul 2009, California) (pp. 1-1)


Feature interaction as a context sharing problem (2009-06)
Nhlabatsi, Armstrong; Laney, Robin and Nuseibeh, Bashar
In : International Conference on Feature Interactions (11-12 Jun, University of Lisbon, Portugal)


A framework for developing feature-rich software systems (2009)
Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar
In : 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009) (14-16 Apr 2009, San Francisco, California, USA)


From spaces to places: Emerging contexts in mobile privacy (2009)
Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar
In : Proceedings of the 11th International conference on Ubiquitous computing (30 Sep - 3 Oct 2009, Orlando, Florida, USA) (pp. 1-10)


A multi-pronged empirical approach to mobile privacy investigation (2009)
Mancini, Clara; Rogers, Yvonne; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Joinson, Adam; Bandara, Arosha and Nuseibeh, Bashar
In : Workshop on Mobile User Experience Research: Challenges, Methods & Tools. 27th ACM International Conference on Human Factors in Computing Systems, ACM CHI 2009 (4-9 Apr 2009, Boston, USA)


Towards safer composition (2009)
Classen, Andreas; Heymans, Patrick; Tun, Thein and Nuseibeh, Bashar
In : 31st International Conference on Software Engineering (16-24 May 2009, Vancouver, BC) (pp. 227-230)


Early identification of problem interactions: A tool-supported approach (2009)
Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar
(pp. 74-88)


From organizational requirements to service choreography (2009)
Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar
In : 2009 IEEE Congress on Services (SERVICES 2009) (6-10 Jul 2009, Los Angeles, CA, USA)


Evaluating the relation between changeability decay and the characteristics of clones and methods (2008-09)
Lozano Rodriguez, Angela; Wermelinger, Michel and Nuseibeh, Bashar
In : 4th International ERCIM Workshop on Software Evolution and Evolvability (15-16 Sep 2008, L'Aquila, Italy) (pp. 100-109)


Customizing choreography: Deriving conversations from organizational dependencies (2008-09)
Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar
In : 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008) (15-19 Sep 2008, München, Germany)


Bridging requirements and architecture for systems of systems (2008-08-28)
Haley, Charles B. and Nuseibeh, Bashar
In : 3rd International Symposium on Information Technology (ITSIM'08) (26-28 Aug 2008, Kuala Lumpur, Malaysia)


Specifying Monitoring and Switching Problems in Context (2007-10-16)
Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar
In : 15th IEEE International Requirements Engineering Conference (RE 2007) (15 Oct - 19 Oct 2007, Delhi, India)


On the structure of problem variability: From feature diagrams to problem frames (2007-01)
Classen, Andreas; Heymans, Patrick; Laney, Robin; Nuseibeh, Bashar and Tun, Thein Than
In : Proceedings of International workshop on Variability Modeling of Software-intensive Systems (16-18 Jan 2007, Limerick, Ireland) (pp. 109-118)


Using problem descriptions to represent variabilities for context-aware applications (2007-01)
Salifu, Mohammed; Nuseibeh, Bashar; Rapanotti, Lucia and Tun, Thein Than
In : Proceedings of 1st International workshop on Variability Modeling of Software-intensive Systems (VaMoS 2007) (16-18 Jan 2007, Limerick, Ireland) (pp. 149-156)


Composing features by managing inconsistent requirements (2007)
Laney, Robin; Tun, Thein Than; Jackson, Michael and Nuseibeh, Bashar
In : Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007) (3-5 Sep 2007, Grenoble, France) (pp. 141-156)


Identifying nocuous ambiguities in natural language requirements (2006-09-01)
Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair
In : Proceedings of 14th IEEE International Requirements Engineering conference (RE'06) (11-15 Sep 2006, Minneapolis/St Paul, Minnesota, USA) (pp. 56-65)


A framework for security requirements engineering (2006-05-20)
Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar
In : Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06) (20-21 May 2006, Shanghai, China)


Patterns for service-oriented information exchange requirements (2006)
Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar
In : PLoP Pattern Languages of Programs 2006 (21-23 Oct 2006, Portland, Oregon)


On Modelling access policies: relating roles to their organisational Context (2005-08-29)
Crook, R.; Ince, D. and Nuseibeh, Bashar
In : Proceedings of 13th IEEE International Conference on Requirements Engineering (29 Aug - 2 Sep 2005, Paris, France)


Arguing security: validating security requirements using structured argumentation (2005)
Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar
In : Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05) (29 Aug 2005, Paris, France)


Architecture-driven problem decomposition (2004-09-20)
Rapanotti, L.; Hall, J.G.; Jackson, M. and Nuseibeh, B.
In : 12th IEEE International Conference on Requirements Engineering (RE 2004) (6-11 Sep 2004, Kyoto, Japan)


The Effect of trust assumptions on the elaboration of security requirements (2004-09-06)
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
In : 12th IEEE International Requirements Engineering Conference (RE'04) (6-10 Sep 2004, Kyoto, Japan)


The conundrum of categorising requirements: managing requirements for learning on the move (2004-09-06)
Taylor, J.; Sharp, H.C.; Haley, D.T. and Nuseibeh, B.
In : 21st IEEE International Requirements Engineering Conference (RE) (6-10 Sep 2004, Kyoto, Japan) (pp. 309-314)


Composing requirements using problem frames (2004-09)
Laney, Robin; Barroca, Leonor; Jackson, Michael and Nuseibeh, Bashar
In : 12th International Requirements Engineering Conference (6-10 Sep 2004, Kyoto, Japan) (pp. 122-131)


Using Problem Frames and projections to analyze requirements for distributed systems (2004-06-07)
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar
In : Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04) (7-8 Jun 2004, Riga, Latvia)


Picking battles: The impact of trust assumptions on the elaboration of security requirements (2004-03-29)
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar
In : Proceedings of the Second International Conference on Trust Management (iTrust'04) (29 Mar - 1 Apr 2004, Oxford, UK)


Deriving security requirements from crosscutting threat descriptions (2004-03)
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar
In : Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04) (22-26 Mar 2004, Lancaster, UK) (pp. 112-121)


Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture (2003-01-06)
Haley, Charles and Nuseibeh, Bashar
In : International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet (6-12 Jan 2003, L'Aquila Italy)


Introducing abuse frames to analyse security requirements (2003)
Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan
In : Proceedings of the 11th International Conference on Requirements Engineering (8-12 Sep 2003, Monterey, USA)


Relating software requirements and architectures using problem frames (2002-09-09)
Hall, J.G.; Jackson, M.; Laney, R. C.; Nuseibeh, B. and Rapanotti, L.
In : Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002 (09-13 Sep 2002, Essen, Germany)


An abductive approach for analysing event-based requirements specifications (2002-07-29)
Russo, Alessandra; Miller, Rob; Nuseibeh, Bashar and Kramer, Jeff
In : 18th International Conference on Logic Programming (29 Jul - 01 Aug 2002, Copenhagen, Denmark)


Security Requirements Engineering: when anti-requirements hit the fan (2002)
Crook, Robert; Ince, Darrel; Lin, Luncheng and Nuseibeh, Bashar
In : Proc IEEE International Conference on Requirements Engineering (8-13 Sep 2002, Germany)


Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things (2016)
Bennaceur, Amel; Tun, Thein; Bandara, Arosha; Yu, Yijun and Nuseibeh, Bashar
Department of Computing, The Open University


Enriching Traceability with Context for Adaptive Information Security in the Cloud (2014-04-29)
Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar
Department of Computing, The Open University


An Empirical Study of Security Requirements in Planning Bug Fixes for an Open Source Software Project (2012-01-10)
Saleem, Saad bin; Yu, Yijun and Nuseibeh, Bashar
Department of Computing, The Open University


Learning from Context: A Field Study of Privacy Awareness System for Mobile Devices (2011-06-09)
Jedrzejczyk, L.; Mancini, C.; Corapi, D.; Price, B. A.; Bandara, A. K. and Nuseibeh, B.
Department of Computing, The Open University


An Evaluation of the ReleasePlanner on the Treatment of Security and Evolving Requirements (2010-12-08)
Bin Saleem, Saad; Yu, Yijun; Nuseibeh, Bashar and De Roeck, Anne
Department of Computing, The Open University


Predators and Prey: Ubiquitous Tracking, Privacy and the Social Contract (2010-06-15)
Mancini, Clara; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Bandara, Arosha; Rogers, Yvonne; Joinson, Adam and Nuseibeh, Bashar
Department of Computing, The Open University


I Know What You Did Last Summer: risks of location data leakage in mobile and social computing (2009-11-13)
Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K. and Nuseibeh, Bashar
Department of Computing, The Open University


Are Your Lights Off? Using Problem Frames to Diagnose System Failures (2009-06-05)
Tun, Thein Tun; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun
Department of Computing, The Open University


Depiction of Additional Node-related Elements in Graph-based Software Visualisations (2008-12-19)
Yu, Yijun; Wermelinger, Michel; Kaiya, Haruhiko and Nuseibeh, Bashar
Department of Computing, The Open University


Tool support to derive specifications for conflict-free composition (2008-07-31)
Tun, Thein Than; Laney, Robin; Jackson, Michael and Nuseibeh, Bashar
Department of Computing, The Open University


Introducing new features to a critical software system (2008-07-03)
Tun, Thein Than; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar
Department of Computing, The Open University


Recovering Problem Structures from Execution Traces (2008-06-30)
Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar
Department of Computing, The Open University


Recovering Problem Structures to Support the Evolution of Software Systems (2008-04-05)
Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar
Department of Computing, The Open University


Analysing Monitoring and Switching Requirements using Constraint Satisfiability (2008-03-20)
Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar
Department of Computing, The Open University


Towards Context-Aware Product-Family Architectures Pilot Study Device Mobility Management Problems (2006-12-30)
Salifu, Mohammed; Nuseibeh, Bashar and Rapanotti, Lucia
Department of Computing, The Open University


Composing Problems: Deriving specifications from inconsistent requirements (2005-05-06)
Laney, Robin; Jackson, Michael and Nuseibeh, Bashar
Department of Computing, The Open University


Validating Security Requirements Using Structured Toulmin-Style Argumentation (2005-03-21)
Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar
Department of Computing, The Open University


Nocuous Ambiguities in Requirements Specifications (2005-03-03)
Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair
Department of Computing, The Open University


Core Security Requirements Artefacts (2004-06-21)
Moffett, Jonathan D.; Haley, Charles B. and Nuseibeh, Bashar
Department of Computing, The Open University


Managing Requirements for Mobile Learning (2004-05-26)
Haley, Debra T.; Nuseibeh, Bashar; Sharp, Helen C. and Taylor, Josie T.
Department of Computing, The Open University


Picking Battles: the Impact of Trust Assumptions on the Elaboration of Security Requirements (2003-12-05)
Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D and Nuseibeh, Bashar
Department of Computing, The Open University


An Example Using Problem Frames: Analysis of a Lighting Control System (2003-12-05)
Haley, Charles B.; Jackson, Michael A.; Laney, Robin C. and Nuseibeh, Bashar
Department of Computing, The Open University


Deriving Security Requirements from Crosscutting Threat Descriptions (2003-10)
Haley, C. B.; Laney, R. C. and Nuseibeh, B. A,
Department of Computing, The Open University


Analysing Security Threats and Vulnerabilities Using Abuse Frames (2003)
Lin, Lun-Cheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan
Department of Computing, The Open University


Architecture-driven Problem Decomposition (2003)
Rapanotti, Lucia; Hall, Jon G.; Jackson, Michael and Nuseibeh, Bashar
Department of Computing, The Open University


Relating Software Requirements and Architectures Using Problem Frames (2002)
Hall, Jon G.; Jackson, Michael; Laney, Robin C.; Nuseibeh, Bashar and Rapanotti, Lucia
Department of Computing, The Open University