University of Limerick Institutional Repository

Browsing LERO - UL authors by Subject "adaptation"

DSpace Repository

Browsing LERO - UL authors by Subject "adaptation"

Sort by: Order: Results:

  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Karlsson, Fredrik; Agerfalk, Par J. (2005)
    Method engineering approaches are often based on the assumption that method users are able to explicitly express their situational method requirements. However, similar to software requirements,situational method requirements ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Lane, Stephen (University of Limerick, 2012)
    Context: The loose coupling of services and Service-Based Applications (SBAs) have made them the ideal platform for context-based run-time adaptation. There has been a lot of research into implementation techniques for ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...

Search DSpace


Browse

My Account

Statistics