Publications
Filters: First Letter Of Last Name is N [Clear All Filters]
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.
"Guest Editors' Introduction: Evolving Critical Systems",
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
"Securing the Skies: In Requirements We Trust.",
IEEE Computer, vol. 42, no. 9, pp. 64-72, 2009.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
IJSSE, vol. 1, no. 1, pp. 54-73, 2010.
"Software Engineering for Secure Systems",
33rd International Conference on Software Engineering (ICSE 2011), 2011.
"Specifying features of an evolving software system",
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
Abstract
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Model-Based Argument Analysis for Evolving Security Requirements",
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
"OpenArgue: supporting argumentation to evolve secure software systems",
2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011.
Abstract
ISBN: 978-1-4577-0924-1
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"Specifying and detecting meaningful changes in programs",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), IEEE, Lawrence, KS, USA, pp. 273-282, November 6-10, 2011.
Abstract
"Towards learning to detect meaningful changes in software",
Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011.
Abstract
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.