An NFR pattern approach to dealing with NFRs S Supakkul, T Hill, L Chung, TT Tun, JCS do Prado Leite 2010 18th IEEE International Requirements Engineering Conference, 179-188, 2010 | 85 | 2010 |
Relating requirements and feature configurations: A systematic approach T Than Tun, Q Boucher, A Classen, A Hubaux, P Heymans Proceedings of the 13th International Software Product Line Conference, 201-210, 2009 | 77 | 2009 |
Text filtering and ranking for security bug report prediction F Peters, TT Tun, Y Yu, B Nuseibeh IEEE Transactions on Software Engineering 45 (6), 615-631, 2017 | 68 | 2017 |
Risk and argument: A risk-based argumentation method for practical security VNL Franqueira, TT Tun, Y Yu, R Wieringa, B Nuseibeh 2011 IEEE 19th International Requirements Engineering Conference, 239-248, 2011 | 63 | 2011 |
An extended ontology for security requirements F Massacci, J Mylopoulos, F Paci, TT Tun, Y Yu Advanced Information Systems Engineering Workshops: CAiSE 2011 International …, 2011 | 49 | 2011 |
Automated analysis of security requirements through risk-based argumentation Y Yu, VNL Franqueira, TT Tun, RJ Wieringa, B Nuseibeh Journal of systems and software 106, 102-116, 2015 | 38 | 2015 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 38 | 2011 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 38 | 2011 |
Separation of concerns in feature diagram languages: A systematic survey A Hubaux, TT Tun, P Heymans ACM Computing Surveys (CSUR) 45 (4), 1-23, 2013 | 37 | 2013 |
International journal of advanced research in computer science and software engineering S Roy, S Nag, IK Maitra, SK Bandyopadhyay International Journal 3 (6), 2013 | 37 | 2013 |
An anatomy of security conversations in stack overflow T Lopez, T Tun, A Bandara, L Mark, B Nuseibeh, H Sharp 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 33 | 2019 |
Specifying features of an evolving software system TT Tun, T Trew, M Jackson, R Laney, B Nuseibeh Software: Practice and Experience 39 (11), 973-1002, 2009 | 32 | 2009 |
Composing features by managing inconsistent requirements RC Laney, TT Tun, M Jackson, B Nuseibeh ICFI, 129-144, 2007 | 32 | 2007 |
Towards forensic-ready software systems L Pasquale, D Alrajeh, C Peersman, T Tun, B Nuseibeh, A Rashid Proceedings of the 40th International Conference on Software Engineering …, 2018 | 31 | 2018 |
Privacy arguments: Analysing selective disclosure requirements for mobile applications TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh 2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012 | 26 | 2012 |
OpenArgue: Supporting argumentation to evolve secure software systems Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh 2011 IEEE 19th international requirements engineering conference, 351-352, 2011 | 25 | 2011 |
Using problem descriptions to represent variabilities for context-aware applications M Salifu, B Nuseibeh, L Rapanotti, TT Tun | 25 | 2007 |
Evolution of security engineering artifacts: a state of the art survey M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ... International Journal of Secure Software Engineering (IJSSE) 5 (4), 48-98, 2014 | 24 | 2014 |
Model-based argument analysis for evolving security requirements TT Tun, Y Yu, C Haley, B Nuseibeh 2010 Fourth International Conference on Secure Software Integration and …, 2010 | 24 | 2010 |
On the structure of problem variability: From feature diagrams to problem frames A Classen, P Heymans, R Laney, B Nuseibeh, TT Tun | 24 | 2007 |