University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "Yu, Yijun"

DSpace Repository

Browsing LERO - UL authors by Author "Yu, Yijun"

Sort by: Order: Results:

  • Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K.; Nuseibeh, Bashar (Elsevier, 2012)
    In the field of pervasive and ubiquitous computing, context-aware adaptive systems need to monitor changes in their environment in order to detect violations of requirements and switch their behaviour in order to continue ...
  • Yu, Yijun; Franqueira, Virginia N.L.; Tun, Thein Than; Wieringa, Roel J.; Nuseibeh, Bashar (Elsevier, 2015)
    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations ...
  • Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2018)
    Some user needs can only be met by leveraging the capabilities of others to undertake particular tasks that require intelligence and labor. Crowdsourcing such capabilities is one way to achieve this. But providing a service ...
  • Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    As the number, complexity, and heterogeneity of connected devices in the Internet of Things (IoT) increase, so does our need to secure these devices, the environment in which they operate, and the assets they manage or ...
  • Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar; Zhao, Wenyun (Association for Computing Machinery, 2017)
    In Online-to-Offline (O2O) commerce, customer services may need to be composed from online and offline services. Such composition is challenging, as it requires effective selection of appropriate services that, in turn, ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Benats, Guillaume; Bandara, Arosha K.; Yu, Yijun; Colin, Jean-Noel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    The rapid growth of mobile applications has imposed new threats to privacy: users often nd it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...
  • Barhamgi, Mahmoud; Bandara, Arosha K.; Yu, Yijun; Belhajjame, Khalid; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Cloud computing has now emerged as popular computing paradigm for data storage and computation for enterprises and individuals. Its major characteristics include the pay-per-use pricing model, where users pay only for the ...
  • Tun, Thein Than; Yang, Mu; Bandara, Arosha K.; Yu, Yijun; Nhlabatsi, A.; Khan, N.; Khan, K.M.; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is diicult because conditions of the environment are ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Taubenberger, Stefan; Jürgens, Jan; Yu, Yijun; Nuseibeh, Bashar (Emerald Group Publishing Ltd, 2013)
    Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified ...
  • Franqueira, Virginia N.L.; Tun, Thein Than; Yu, Yijun; Wieringa, Roel J.; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. ...
  • Yu, Yijun; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    Software developers are often interested in particular changes in programs that are relevant to their current tasks: not all changes to evolving software are equally important. However, most existing differencing tools, ...
  • Tun, Thein Than; Laney, Robin; Yu, Yijun; Nuseibeh, Bashar (Elsevier, 2013)
    Development of several computing and communication technologies is enabling the widespread availability of pervasive systems. In smart home applications, household appliances|such as security alarms, heating systems, ...
  • Tun, Thein Than; Price, Blaine A.; Bandara, Arosha K.; Yu, Yijun; Nuseibeh, Bashar (IEEE Computer Society, 2016)
    Abstract—Police investigations involving digital evidence tend to focus on forensic examination of storage units on personal electronic devices (laptops, smartphones, etc). However, a number of factors are making digital ...

Search ULIR


Browse

My Account

Statistics