University of Limerick Institutional Repository

Browsing LERO - The Irish Software Research Centre by Author "Nuseibeh, Bashar"

DSpace Repository

Browsing LERO - The Irish Software Research Centre by Author "Nuseibeh, Bashar"

Sort by: Order: Results:

  • Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark; Nuseibeh, Bashar (Elsevier, 2016)
    The increase in crimes targeting the cloud is increasing the amount of data that must be analysed during a digital forensic investigation, exacerbating the problem of processing such data in a timely manner. Since collecting ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Nuseibeh, Bashar (Association for Computing Machinery, 2011)
    Many requirements documents are written in natural language (NL). However, with the flexibility of NL comes the risk of introducing unwanted ambiguities in the requirements and misunderstandings between stakeholders. In ...
  • Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K.; Nuseibeh, Bashar (Elsevier, 2012)
    In the field of pervasive and ubiquitous computing, context-aware adaptive systems need to monitor changes in their environment in order to detect violations of requirements and switch their behaviour in order to continue ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2019)
    As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. This ...
  • Grispos, George; Garcia-Galan, Jesus; Pasquale, Liliana; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    As security incidents continue to impact organisations, there is a growing demand for systems to be 'forensic-ready’ – to maximise the potential use of evidence whilst minimising the costs of an investigation. Researchers ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen; Nuseibeh, Bashar (JMIR Publications, 2018)
    Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities of data about their lifestyle. These data can be used to support health interventions and monitor ...
  • Yu, Yijun; Franqueira, Virginia N.L.; Tun, Thein Than; Wieringa, Roel J.; Nuseibeh, Bashar (Elsevier, 2015)
    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations ...
  • Yang, Hui; Willis, Alistair; De Roeck, Anne; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    Natural language is prevalent in requirements documents. However, ambiguity is an intrinsic phenomenon of natural language, and is therefore present in all such documents. Ambiguity occurs when a sentence can be interpreted ...
  • O'Connell, James; Abbas, Manzar; Beecham, Sarah; Buckley, Jim; Chochlov, Muslim; Fitzgerald, Brian; Glynn, Liam G.; Johnson, Kevin; Laffey, John; McNicholas, Bairbre; Nuseibeh, Bashar; O'Callaghan, Michael; O'Keeffe, Ian R.; Razzaq, Abdul; Rekanar, Kaavya; Richardson, Ita; Simpkin, Andrew; Storni, Cristiano; Tsvyatkova, Damyanka; Walsh, Jane C.; Welsh, Thomas; O'Keeffe, Derek (JMIR Publications, 2021)
    Background: Digital contact tracing apps have the potential to augment contact tracing systems and disrupt COVID-19 transmission by rapidly identifying secondary cases prior to the onset of infectiousness and linking them ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Chen, Lianping; Babar, Muhmmad Ali; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    At the heart of any engineering discipline is the interplay between problem and solution development. In software engineering, the effectiveness of a software solution is determined with respect to a problem, yet the nature ...
  • Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios; Nuseibeh, Bashar (Assocation for Computing Machinery, 2018)
    Cyber-Physical Systems (CPSs) must often self-adapt to respond to changes in their operating environment. However, using formal verification techniques to provide assurances that critical requirements are satisfied can ...
  • Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffrey; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    How can we best explore the range of users’ reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach in ContraVision uses futuristic videos, or other narrative ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Ju, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (IEEE Computer Society, 2016)
    Some user needs in real life can only be accomplished by lever-aging the intelligence and labor of other people via crowdsourcing tasks. For example, one may want to confirm the validity of the description of a secondhand ...
  • Maia, Paulo Henrique; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea; Nuseibeh, Bashar (Association for Computing Machinery, 2019)
    Drone simulators can provide an abstraction of different applications of drones and facilitate reasoning about distinct situations, in order to evaluate the effectiveness of these applications. In this paper we describe ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Lopez, Tamara; Petre, Marian; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Software rarely works as intended while it is being written. Things go wrong in the midst of everyday practice, and developers are commonly understood to form theories and strategies for dealing with them. Errors in ...

Search ULIR


Browse

My Account

Statistics