University of Limerick Institutional Repository

Browsing by Author "Salehie, Mazeiar"

DSpace Repository

Browsing by Author "Salehie, Mazeiar"

Sort by: Order: Results:

  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Djahel, Soufiene; Salehie, Mazeiar; Tal, Irina; Jamshidi, Pooyan (IEEE Computer Society, 2013)
    Rapid increase in number of vehicles on the roads as well as growing size of cities have led to a plethora of challenges for road traffic management authorities such as traffic congestion, accidents and air pollution. ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Kaushik, Nilam; Salehie, Mazeiar; Tahvildari, Ladan; Moore, Mark (IEEE Computer Society, 2011)
    Although used extensively in industry, regression testing is challenging from both a process management as well as a resource management perspective. In literature, proposed test case prioritization techniques assume a ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Omoronyia, Inah; Salehie, Mazeiar; Ali, Raian; Kaiya, Haruhiko; Nuseibeh, Bashar (2011)
  • Salehie, Mazeiar; Li, Sen; Tahvildari, Ladan; Dara, Rozita; Moore, Mark (IEEE Computer Society, 2011)
    Any changes for maintenance or evolution purposes may break existing working features, or may violate the requirements established in the previous software releases. Regression testing is essential to avoid these problems, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adap- tive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze ...
  • Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar; Nuseibeh, Bashar (2012)
    Adaptive systems are characterized by the ability to monitor changes in their volatile world and react to monitored changes when needed. The ultimate goal of adaptation is that users’ requirements are always met correctly ...
  • Ali, Raian; Solis, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar; Maalej, Walid (Association for Computing Machinery, 2011)
    Adaptation requires a system to monitor its operational context to ensure that when changes occur, a suitable adaptation action is planned and taken at runtime. The ultimate goal of adaptation is that users get their dynamic ...
  • Salehie, Mazeiar; Tahvildari, Ladan (John Wiley & Sons, 2012)
    Self-adaptive software is a closed-loop system, since it continuously monitors its context (i.e. environment) and/or self (i.e. software entities) in order to adapt itself properly to changes. We believe that representi ...
  • Derakhshanmanesh, Mahdi; Salehie, Mazeiar; Jürgen, Ebert (Association for Computing Machinery, 2012)
    Access control systems are deployed in organizations to protect critical cyber-physical assets. These systems need to be adjustable to cope with di erent contextual factors like changes in resources or requirements. ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Smart grids are increasingly proliferating all over the world to leverage electricity infrastructures with information technology. Smart metering, particularly Advanced Metering Infrastructure (AMI), is an enabling ...

Search DSpace

Browse

My Account

Statistics