Publications
Filters: First Letter Of Last Name is N [Clear All Filters]
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.
"Specifying and detecting meaningful changes in programs",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), IEEE, Lawrence, KS, USA, pp. 273-282, November 6-10, 2011.
Abstract
"Towards learning to detect meaningful changes in software",
Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011.
Abstract
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"OpenArgue: supporting argumentation to evolve secure software systems",
2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011.
Abstract
ISBN: 978-1-4577-0924-1
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"Software Engineering for Secure Systems",
33rd International Conference on Software Engineering (ICSE 2011), 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Model-Based Argument Analysis for Evolving Security Requirements",
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
"Guest Editors' Introduction: Evolving Critical Systems",
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
IJSSE, vol. 1, no. 1, pp. 54-73, 2010.
"Securing the Skies: In Requirements We Trust.",
IEEE Computer, vol. 42, no. 9, pp. 64-72, 2009.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
"Specifying features of an evolving software system",
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
Abstract