University of Limerick Institutional Repository

Browsing Faculty of Science and Engineering by Author "Yu, Yijun"

DSpace Repository

Browsing Faculty of Science and Engineering by Author "Yu, Yijun"

Sort by: Order: Results:

  • Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K.; Nuseibeh, Bashar (Elsevier, 2012)
    In the field of pervasive and ubiquitous computing, context-aware adaptive systems need to monitor changes in their environment in order to detect violations of requirements and switch their behaviour in order to continue ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Benats, Guillaume; Bandara, Arosha K.; Yu, Yijun; Colin, Jean-Noel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    The rapid growth of mobile applications has imposed new threats to privacy: users often nd it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...
  • Franqueira, Virginia N L; Tun, Thein Than; Yu, Yijun; Wieringa, Roel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Yu, Yijun; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    Software developers are often interested in particular changes in programs that are relevant to their current tasks: not all changes to evolving software are equally important. However, most existing differencing tools, ...
  • Tun, Thein Than; Laney, Robin; Yu, Yijun; Nuseibeh, Bashar (Elsevier, 2013)
    Development of several computing and communication technologies is enabling the widespread availability of pervasive systems. In smart home applications, household appliances|such as security alarms, heating systems, ...

Search DSpace


Browse

My Account

Statistics