University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "Tun, Thein Than"

DSpace Repository

Browsing LERO - UL authors by Author "Tun, Thein Than"

Sort by: Order: Results:

  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2019)
    As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. This ...
  • Yu, Yijun; Franqueira, Virginia N.L.; Tun, Thein Than; Wieringa, Roel J.; Nuseibeh, Bashar (Elsevier, 2015)
    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations ...
  • Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Lopez, Tamara; Tun, Thein Than; Bandara, Arosha K.; Levine, Mark; Nuseibeh, Bashar; Sharp, Helen (Association for Computing Machinery, 2018)
    Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Bashara, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Franqueira, Virginia N.L.; Tun, Thein Than; Yu, Yijun; Wieringa, Roel J.; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Yu, Yijun; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    Software developers are often interested in particular changes in programs that are relevant to their current tasks: not all changes to evolving software are equally important. However, most existing differencing tools, ...
  • Tun, Thein Than; Laney, Robin; Yu, Yijun; Nuseibeh, Bashar (Elsevier, 2013)
    Development of several computing and communication technologies is enabling the widespread availability of pervasive systems. In smart home applications, household appliances|such as security alarms, heating systems, ...
  • Peters, Fayola; Tun, Thein Than; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2019)
    Security bug reports can describe security critical vulnerabilities in software products. Bug tracking systems may contain thousands of bug reports, where relatively few of them are security related. Therefore finding ...
  • Tun, Thein Than; Price, Blaine A.; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Abstract—Police investigations involving digital evidence tend to focus on forensic examination of storage units on personal electronic devices (laptops, smartphones, etc). However, a number of factors are making digital ...

Search ULIR


Browse

My Account

Statistics