Bashar Ahmad Nuseibeh
#94,807
Most Influential Person Now
British professor
Bashar Ahmad Nuseibeh's AcademicInfluence.com Rankings
Bashar Ahmad Nuseibehcomputer-science Degrees
Computer Science
#3836
World Rank
#4031
Historical Rank
Software Engineering
#121
World Rank
#121
Historical Rank
Database
#2692
World Rank
#2814
Historical Rank

Download Badge
Computer Science
Bashar Ahmad Nuseibeh's Degrees
- PhD Software Engineering University of Oxford
- Bachelors Computer Science University of Jordan
Similar Degrees You Can Earn
Why Is Bashar Ahmad Nuseibeh Influential?
(Suggest an Edit or Addition)According to Wikipedia, Bashar Ahmad Nuseibeh, is a professor of computing at The Open University in the United Kingdom, a professor of software engineering at the University of Limerick in Ireland, and chief scientist of Lero, the Irish Software Research Centre. He is also an honorary professor at University College London and the National Institute of Informatics , Japan.
Bashar Ahmad Nuseibeh's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Requirements engineering: a roadmap (2000) (2263)
- Expressing the relationships between multiple views in requirements specification (1993) (703)
- Viewpoints: A Framework for Integrating Multiple Perspectives in System Development (1992) (652)
- Weaving Together Requirements and Architectures (2001) (574)
- Security Requirements Engineering: A Framework for Representation and Analysis (2008) (480)
- Inconsistency Handling in Multperspective Specifications (1994) (381)
- Inconsistency Handling in Multi-Perspective Specifications (1993) (315)
- Using ViewPoints for inconsistency management (1996) (249)
- Inconsistency Handling in Multiperspective Specifications (1994) (232)
- Leveraging Inconsistency in Software Development (2000) (221)
- Managing inconsistent specifications: reasoning, analysis, and action (1998) (218)
- Software process modelling and technology (1994) (209)
- Making inconsistency respectable in software development (2001) (192)
- A framework for security requirements engineering (2006) (184)
- Relating software requirements and architectures using problem frames (2002) (183)
- Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC (2005) (140)
- Characterizing Architecturally Significant Requirements (2013) (133)
- Coordinating distributed ViewPoints: the Anatomy of a Consistency Check (1994) (132)
- Architecture-driven problem decomposition (2004) (123)
- Security requirements engineering: when anti-requirements hit the fan (2002) (121)
- Keeping ubiquitous computing to yourself: A practical model for user control of privacy (2005) (117)
- Analysing anaphoric ambiguity in natural language requirements (2011) (116)
- Specifying Monitoring and Switching Problems in Context (2007) (115)
- Managing inconsistencies in an evolving specification (1995) (111)
- Introducing abuse frames for analysing security requirements (2003) (110)
- From spaces to places: emerging contexts in mobile privacy (2009) (109)
- Deriving security requirements from crosscutting threat descriptions (2004) (108)
- Lightweight validation of natural language requirements (2002) (106)
- Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms (2016) (101)
- Evaluating the Harmfulness of Cloning: A Change Based Experiment (2007) (101)
- Ariane 5: Who Dunnit? (1997) (96)
- ViewPoints: meaningful relationships are difficult! (2003) (95)
- ViewPoints: a vehicle for method and tool integration (1992) (91)
- Contravision: exploring users' reactions to futuristic technology (2010) (90)
- Using abuse frames to bound the scope of security problems (2004) (90)
- Model-Based Security Engineering of Distributed Information Systems Using UMLsec (2007) (88)
- To be and not to be: on managing inconsistency in software development (1996) (86)
- An Abductive Approach for Analysing Event-Based Requirements Specifications (2002) (80)
- Hypermedia Support for Argumentation-Based Rationale (2006) (78)
- Requirements-driven adaptive security: Protecting variable assets at runtime (2012) (78)
- Composing requirements using problem frames (2004) (75)
- A national survey of attitudes to COVID-19 digital contact tracing in the Republic of Ireland (2020) (70)
- Method engineering for multi-perspective software development (1996) (69)
- Social Adaptation - When Software Gives Users a Voice (2012) (69)
- Assessing the impact of bad smells using historical information (2007) (68)
- Core Security Requirements Artefacts (2004) (67)
- A Hybrid Model for Automatic Emotion Recognition in Suicide Notes (2012) (67)
- Designing Privacy-aware Internet of Things Applications (2017) (65)
- Analysing inconsistent specifications (1997) (65)
- The effect of trust assumptions on the elaboration of security requirements (2004) (65)
- An empirical investigation of multiple viewpoint reasoning in requirements engineering (1999) (63)
- Arguing security: validating security requirements using structured argumentation (2005) (61)
- Engineering adaptive privacy: On the role of privacy awareness requirements (2013) (60)
- Modelling access policies using roles in requirements engineering (2003) (60)
- Social sensing: when users become monitors (2011) (60)
- Using trust assumptions with security requirements (2006) (59)
- Risk and argument: A risk-based argumentation method for practical security (2011) (58)
- Weaving the Software Development Process Between Requirements and Architectures (2001) (57)
- On the Interplay Between Cyber and Physical Spaces for Adaptive Security (2018) (57)
- Security Requirements Engineering for Evolving Software Systems: A Survey (2010) (56)
- Unpacking Tacit Knowledge for Requirements Engineering (2013) (56)
- On the impact of real-time feedback on users' behaviour in mobile location-sharing applications (2010) (55)
- Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach (2018) (54)
- Text Filtering and Ranking for Security Bug Report Prediction (2019) (52)
- Self-adaptation through incremental generative model transformations at runtime (2014) (52)
- Automatic detection of nocuous coordination ambiguities in natural language requirements (2010) (51)
- Feature interaction: the security threat from within software systems (2008) (51)
- Making Tacit Requirements Explicit (2009) (48)
- Distilling privacy requirements for mobile applications (2014) (47)
- Decentralised Process Enactment in a Multi-Perspective Development Environment (1995) (46)
- Communication patterns of agile requirements engineering (2011) (46)
- Crosscutting requirements (2004) (44)
- In the best families: tracking and relationships (2011) (44)
- Proceedings of the 27th international conference on Software engineering (2005) (44)
- Speculative requirements: Automatic detection of uncertainty in natural language requirements (2012) (43)
- Relating Software Requirements and Architectures (2005) (43)
- Towards an Analytical Role Modelling Framework for Security Requirements (2002) (41)
- A Multi-Perspective Framework for Method Integration (2001) (40)
- Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (2010) (39)
- Topology aware adaptive security (2014) (39)
- Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit (2014) (39)
- Feed Me, Feed Me: An Exemplar for Engineering Adaptive Software (2016) (39)
- Combining abductive reasoning and inductive learning to evolve requirements specifications (2003) (39)
- On modelling access policies: relating roles to their organisational context (2005) (38)
- Lightweight validation of natural language requirements: a case study (2000) (36)
- Automated analysis of security requirements through risk-based argumentation (2015) (36)
- Privacy Dynamics: Learning Privacy Norms for Social Software (2016) (36)
- Using Abduction to Evolve Inconsistent Requirements Specification (1999) (34)
- OpenArgue: Supporting argumentation to evolve secure software systems (2011) (33)
- Fine-grain process modelling (1993) (33)
- Security patterns: comparing modeling approaches (2010) (33)
- Analysing Security Threats and Vulnerabilities Using Abuse Frames (2003) (31)
- Arguing Satisfaction of Security Requirements (2008) (31)
- Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development (1996) (30)
- Linking the Selection of Requirements to Market Value : A Portfolio-Based Approach Siv (2001) (29)
- Specifying and detecting meaningful changes in programs (2011) (28)
- An Anatomy of Security Conversations in Stack Overflow (2019) (28)
- Problem Frames: A Case for Coordination (2004) (27)
- Requirements-Driven Collaborative Choreography Customization (2009) (27)
- Securing the Skies: In Requirements We Trust (2009) (27)
- Composing Features by Managing Inconsistent Requirements (2007) (27)
- Engineering topology aware adaptive security: Preventing requirements violations at runtime (2014) (26)
- Specifying features of an evolving software system (2009) (26)
- The process of inconsistency management: a framework for understanding (1999) (26)
- Privacy arguments: Analysing selective disclosure requirements for mobile applications (2012) (25)
- Workshop on multi-dimensional separation of concerns in software engineering (2000) (24)
- Adaptive evidence collection in the cloud using attack scenarios (2016) (24)
- Model-Based Argument Analysis for Evolving Security Requirements (2010) (24)
- Towards a framework for managing inconsistency between multiple views (1996) (23)
- Know What You Did Last Summer : risks of location data leakage in mobile and social computing (2009) (23)
- SecuriTAS: a tool for engineering adaptive security (2012) (22)
- Towards Forensic-Ready Software Systems (2018) (22)
- Requirements-driven adaptive digital forensics (2013) (22)
- An analysis-revision cycle to evolve requirements specifications (2001) (22)
- Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems (2015) (22)
- Restructuring requirements specifications for managing inconsistency and change: a case study (1998) (22)
- Schrödinger's Security: Opening the Box on App Developers' Security Rationale (2020) (21)
- Using Problem Descriptions to Represent Variabilities For Context-Aware Applications (2007) (21)
- Protecting Privacy in the Cloud: Current Practices, Future Directions (2016) (20)
- Analysing monitoring and switching problems for adaptive systems (2012) (20)
- PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications (2011) (19)
- Software Requirements and Design: The Work of Michael Jackson (2011) (19)
- Resolving vulnerability identification errors using security requirements on business process models (2013) (19)
- Adaptive security and privacy in smart grids: A software engineering vision (2012) (18)
- Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews (2017) (18)
- An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement (2018) (18)
- Learning Software Engineering at a Distance (2006) (18)
- Requirements-driven mediation for collaborative security (2014) (18)
- Modelling and Analysing Resilient Cyber-Physical Systems (2019) (18)
- On evidence preservation requirements for forensic-ready systems (2017) (17)
- Evaluating the relation between changeability decay and the characteristics of clones and methods (2008) (17)
- On the Structure of Problem Variability: From Feature Diagrams to Problem Frames (2007) (17)
- Automating trade-off analysis of security requirements (2016) (17)
- Restructuring Requirements Specifications (1999) (17)
- Using Problem Frames and projections to analyze requirements for distributed systems (2004) (17)
- Guest Editors' Introduction: Evolving Critical Systems (2010) (17)
- Sentiment analysis of user feedback on the HSE’s Covid-19 contact tracing app (2021) (17)
- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements (2004) (16)
- Adding Static and Dynamic Semantics to Building Information Models (2016) (16)
- A Methodology for Automatic Identification of Nocuous Ambiguity (2010) (16)
- CrowdService: Serving the individuals through mobile crowdsourcing and service composition (2016) (15)
- USING ABDUCTION TO EVOLVE INCONSISTENT REQUIREMENTS SPECIFICATIONS (1999) (15)
- "Privacy-shake",: a haptic interface for managing privacy settings in mobile location sharing applications (2010) (15)
- Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain (2011) (15)
- Privacy Itch and Scratch: On Body Privacy Warnings and Controls (2016) (14)
- Data privacy: Users' thoughts on quantified self personal data (2018) (14)
- Logging you, Logging me (2017) (14)
- On the Automated Management of Security Incidents in Smart Spaces (2019) (14)
- Using Trust Assumptions in Security Requirements Engineering (2003) (14)
- "Hopefully We Are Mostly Secure": Views on Secure Code in Professional Practice (2019) (14)
- Best Practice Guidance for Digital Contact Tracing Apps: A Cross-disciplinary Review of the Literature (2021) (13)
- Compositional Verification of Self-Adaptive Cyber-Physical Systems (2018) (13)
- Conflicting requirements: When the customer is not always right (1996) (13)
- Topology-Aware Access Control of Smart Spaces (2017) (13)
- On Presuppositions in Requirements (2009) (12)
- Bridging requirements and architecture for systems of systems (2008) (12)
- Caprice: a tool for engineering adaptive privacy (2012) (12)
- From Organizational Requirements to Service Choreography (2009) (12)
- On the role of primary and secondary assets in adaptive security: An application in smart grids (2012) (12)
- How are you feeling?: Using Tangibles to Log the Emotions of Older Adults (2020) (12)
- Early Identification of Problem Interactions: A Tool-Supported Approach (2009) (12)
- Dragonfly: a Tool for Simulating Self-Adaptive Drone Behaviours (2019) (12)
- Are you ready? Towards the engineering of forensic-ready systems (2017) (12)
- Towards safer composition (2009) (12)
- The conundrum of categorising requirements: managing requirements for learning on the move (2004) (12)
- The Role of Environmental Assumptions in Failures of DNA Nanosystems (2015) (11)
- E-Assessment using Latent Semantic Analysis (2003) (11)
- An Abductive Approach for Handling Inconsistencies in SCR Specifications (2000) (11)
- Decentralised Process Modelling (1995) (11)
- Requirements and Specifications for Adaptive Security: Concepts and Analysis (2018) (11)
- Customizing Choreography: Deriving Conversations from Organizational Dependencies (2008) (11)
- Computer-Aided Inconsistency Management in Software Development (1999) (11)
- Learning to adapt requirements specifications of evolving systems: (NIER track) (2011) (11)
- Feature Interaction as a Context Sharing Problem (2009) (10)
- Patterns for service-oriented information exchange requirements (2006) (10)
- Talking About Security with Professional Developers (2019) (10)
- Won't Take No for an Answer: Resource-Driven Requirements Adaptation (2019) (10)
- Towards Adaptive Compliance (2016) (10)
- Loneliness in older people and COVID-19: Applying the social identity approach to digital intervention design (2021) (10)
- Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations (2016) (9)
- Software Process Modelling Technology (1994) (9)
- I've Seen This Before: Sharing Cyber-Physical Incident Knowledge (2018) (9)
- Validating Security Requirements Using Structured Toulmin-Style Argumentation (2005) (9)
- Workshop on multi-dimensional separation of concerns in software engineering (2001) (9)
- Editorial: State of the Journal (2013) (9)
- On the consequences of acting in the presence of inconsistency (1998) (9)
- The Case for Adaptive Security Interventions (2021) (9)
- Towards Adaptive Systems through Requirements @ Runtime ? (2011) (9)
- Cautious Adaptation of Defiant Components (2019) (8)
- Feature-Driven Mediator Synthesis (2018) (8)
- Evolving Critical Systems (2011) (8)
- Are Your Lights Off? Using Problem Frames to Diagnose System Failures (2009) (8)
- Social Adaptation at Runtime (2012) (8)
- Towards Context-Aware Product-Family Architectures (2006) (7)
- Social Software Product Lines (2011) (7)
- Using Software Specification Methods for Measurement Instrument Systems (1992) (7)
- An Aspect-Oriented Approach to Relating Security Requirements and Access Control (2012) (7)
- The case for Zero Trust Digital Forensics (2022) (7)
- Software Engineering Challenges for Investigating Cyber-Physical Incidents (2017) (7)
- Enabling End-Users to Protect their Privacy (2017) (7)
- CrowdService: Optimizing Mobile Crowdsourcing and Service Composition (2018) (7)
- Specifying software features for composition: A tool-supported approach (2013) (7)
- Hybrid model visualization in requirements and design: a preliminary investigation (2000) (7)
- Unknown knowns: Tacit knowledge in requirements engineering (2011) (7)
- Privacy Care (2021) (6)
- Erratum: Using ViewPoints for inconsistency management (1996) (6)
- "Why can't I do that?": Tracing Adaptive Security Decisions (2015) (6)
- Nocuous Ambiguities in Requirements Specifications (2005) (6)
- State of the Journal (2012) (6)
- Misuse case techniques for mobile privacy (2011) (6)
- O2O service composition with social collaboration (2017) (6)
- Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps (2020) (6)
- The Case for Animal Privacy in the Design of Technologically Supported Environments (2022) (6)
- Six Software Engineering Principles for Smarter Cyber-Physical Systems (2021) (6)
- An Example Using Problem Frames: Analysis of a Lighting Control System (2003) (6)
- Signing Off: The State of the Journal (2014) (6)
- A FRAMEWORK FOR INTEGRATING MULTIPLE PERSPECTIVES IN SYSTEM-DEVELOPMENT - VIEWPOINTS (1992) (6)
- Learning to share: Engineering adaptive decision-support for online social networks (2017) (5)
- LiveBox: A Self-Adaptive Forensic-Ready Service for Drones (2019) (5)
- Using software specification methods for measurement instruments: Part II - formal methods (1992) (5)
- Coordinating Conflicting ViewPoints by Managing Inconsistency (1994) (5)
- Generating Privacy Zones in Smart Cities (2018) (5)
- Toward a Compare and Contrast Framework for COVID-19 Contact Tracing Mobile Applications: A Look at Usability (2021) (5)
- Requirements engineering through viewpoints (1993) (5)
- Towards learning to detect meaningful changes in software (2011) (5)
- Getting at ephemeral flaws (2012) (4)
- Public opinion of the Irish “COVID Tracker” digital contact tracing App: A national survey (2022) (4)
- An empirical investigation of reasoning reasoning with multiple viewpoints (1999) (4)
- The Learning Grid and E-Assessment using Latent Semantic Analysis (2005) (4)
- Engineering Adaptive Privacy: A requirements‐driven approach for mitigating mobile privacy threats (2012) (4)
- Soapbox: Ariane 5: Who Dunnit? (1997) (4)
- Editorial: What Makes a Publication Archival? (2011) (4)
- Managing Security Control Assumptions Using Causal Traceability (2015) (4)
- Personal informatics for non-geeks: lessons learned from ordinary people (2014) (4)
- Meta-CASE Support for Method-Based Software Development (1995) (4)
- Sentiment Analysis of User Feedback on the HSE Contact Tracing App (2020) (4)
- Technology transfer: software engineering and engineering design (1992) (4)
- Restructuring requirement specifications (1999) (4)
- ContraVision: presenting contrasting visions of future technology (2010) (4)
- Security but not for security's sake: The impact of social considerations on app developers' choices (2020) (4)
- Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems (2021) (3)
- Towards self-protecting smart metering: Investigating requirements for the MAPE loop (2012) (3)
- Aspect Interactions: A Requirements Engineering Perspective (2013) (3)
- Predators and Prey: Ubiquitous Tracking, Privacy and the Social Contract (2010) (3)
- Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control (2021) (3)
- A Reference Architecture for Consumer Electronics Products and its Application in Requirements Engineering (2011) (3)
- OASIS: Weakening User Obligations for Security-critical Systems (2020) (3)
- On Specifying for Trustworthiness (2022) (3)
- Examining active error in software development (2016) (3)
- Requirements-Driven Design of Service-Oriented Interactions (2010) (3)
- Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning (2006) (3)
- On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When? (2017) (3)
- Recovering Problem Structures to Support the Evolution of Software Systems (2008) (3)
- Weaving Together Requirements and Architecture Journal Article (3)
- Incidents are Meant for Learning, Not Repeating: Sharing Knowledge About Security Incidents in Cyber-Physical Systems (2019) (3)
- 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA (2005) (3)
- Method Integration and Support for Distributed Software Development: An Overview (1993) (3)
- Building bridges: on the development of complex software (1996) (3)
- Live Blackboxes: Requirements for tracking and verifying aircraft in motion (2017) (3)
- Chapter 12 – The Many Facets of Mediation: A Requirements-Driven Approach for Trading Off Mediation Solutions (2017) (3)
- From Model-Driven Software Development Processes to Problem Diagnoses at Runtime (2011) (2)
- Use of organisational topologies for forensic investigations (2017) (2)
- - 1-Making Inconsistency Respectable in Software Development (1999) (2)
- Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers (2022) (2)
- On Protecting Privacy in the Cloud (2015) (2)
- Extending Nocuous Ambiguity for Anaphora in Natural Language Requirements (2010) (2)
- Thrashing, Tolerating and Compromising in Software Development (2012) (2)
- Viewpoint Oriented Development: applications in composite systems (1993) (2)
- An empirical investigation of reasoning with multiple viewpoints (1999) (2)
- Taking the Middle Path: Learning About Security Through Online Social Interaction (2020) (2)
- Traceability for Adaptive Information Security in the Cloud (2014) (2)
- Knowledge-Based Architecture for Recognising Activities of Older People (2019) (2)
- Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks (2021) (2)
- On Adaptive Fairness in Software Systems (2021) (2)
- Requirements We Live By (2019) (2)
- Influences of developers' perspectives on their engagement with security in code (2022) (2)
- A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time (2019) (2)
- Directions in software process modelling and technology (1994) (2)
- A Multi-Pronged Empirical Approach to Mobile Privacy Investigation (2009) (2)
- Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems (2008) (2)
- Building trust in digital policing: a scoping review of community policing apps (2020) (2)
- Editorial: A New Decade of TSE (2010) (2)
- Degradation archaeology: studying software flaws' evolution (2006) (2)
- Editorial: How Special Should Issues Be? (2010) (2)
- Designing Technologies for Community Policing (2020) (2)
- Requirements Engineering (2019) (2)
- Requirements Engineering Annotated Bibliography (2000) (2)
- A viewpoint-based framework for software development environments (1991) (2)
- A Framework for Developing Feature-Rich Software Systems (2009) (2)
- Editorial: Readers, Writers, Reviewers, and Editors (2010) (1)
- Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland (2020) (1)
- Special issue: The future of software engineering for security and privacy (2008) (1)
- Developement, assessment, and reengineering of language descrition-- extended abstract (1998) (1)
- Multi-view Requirements Engineering (1993) (1)
- Mobile Privacy Requirements on Demand (2010) (1)
- Bumps in the Code: Error Handling During Software Development (2021) (1)
- Engineering Adaptive Software Systems (2019) (1)
- Security Responses in Software Development (2022) (1)
- ALGORITHMS FOR INCREMENTAL REQUIREMENTS MODELS EVALUATION AND TRANSFORMATION (2011) (1)
- Caprice - A requirements driven tool for engineering adaptive mobile privacy (2012) (1)
- Digital Detectives: Websleuthing Reduces Eyewitness Identification Accuracy in Police Lineups (2021) (1)
- Wearables for physical privacy (2016) (1)
- Editorial: And in Conclusion (2010) (1)
- Protecting Privacy in the Cloud : Current Practices (2016) (1)
- Towards explaining rebuttals in security arguments (2014) (1)
- Placing computer security at the heart of learning (2008) (1)
- Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action (2019) (1)
- Restructuring Requirements Speciications for Inconsistency Analysis: a Case Study (1998) (1)
- Validating Inconsistent Requirements Models using Graph-based Abduction (2001) (1)
- Finding & Reviewing Community Policing Apps in Asia (2020) (1)
- Finding & evaluating community policing apps in Asia (2020) (1)
- Making Requirements Measurable (1997) (1)
- An Empirical Study of Security Requirements in Planning Bug Fixes for an Open Source Software Project (2012) (1)
- Towards Adaptive Inspection for Fraud in I4.0 Supply Chains (2021) (1)
- Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture (2003) (1)
- Digital Intervention in Loneliness in Older Adults: Qualitative Analysis of User Studies (2022) (1)
- Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies (2013) (1)
- A National Survey on use and perceived usefulness of the Irish COVID Tracker contact tracing App (Preprint) (1)
- Concurrent software engineering: coordinating distributed viewpoints for managing inconsistency (1994) (1)
- ’ s repository of research publications and other research outputs Requirements and Specifications for Adaptive Security : Concepts and Analysis Conference or Workshop Item (2018) (0)
- Studying location privacy in mobile applications: 'predator vs. prey' probes (2009) (0)
- Specifying Secure Mobile Applications (2005) (0)
- Engineering Challenges for Investigating Cyber-Physical Incidents Conference or Workshop Item (2018) (0)
- Topology Aware Adaptive Security Conference Item Topology Aware Adaptive Security Conference Item (2015) (0)
- When Agents Clash (1996) (0)
- The Open University ’ s repository of research publications and other research outputs Customizing choreography : Deriving conversations from organizational dependencies (2010) (0)
- Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains (2023) (0)
- University ’ s repository of research publications and other research outputs Requirements-driven adaptive digital forensics Conference Item (2016) (0)
- University ’ s repository of research publications and other research outputs Topology aware adaptive security Conference or Workshop Item (2018) (0)
- SecuriTAS : a tool for engineering adaptive security Conference or Workshop Item (2018) (0)
- A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools (2023) (0)
- ’ s repository of research publications and other research outputs Distilling Privacy Requirements for Mobile Applications Conference Item (2015) (0)
- Automatic Detection of Nocuous Ambiguities in Natural Language Requirements (2010) (0)
- ’ s repository of research publications and other research outputs Hopefully We Are Mostly Secure : Views on Secure Code in Professional Practice Conference or Workshop Item (2019) (0)
- The Open University ’ s repository of research publications and other research outputs Specifying and detecting meaningful changes in programs (2016) (0)
- Open Research Online Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers (2022) (0)
- Structured Information Retrieval Strategies for Localising Software Changes (2018) (0)
- The Open University ’ s repository of research publications and other research outputs Towards explaining rebuttals in security arguments (2016) (0)
- In Memoriam: Mary Jean Harrold (1947-2013) (2013) (0)
- How Multi-Disciplinary Is RE (really)? (1999) (0)
- In Memoriam - David Notkin (1953-2013) (2013) (0)
- Open Research Online Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (2022) (0)
- Examining Active Error in Software Development Conference or Workshop Item (2019) (0)
- The Open University ’ s repository of research publications and other research outputs Live Blackboxes : Requirements for Tracking and Verifying Aircraft in Motion Conference Item (2016) (0)
- What Do You Want From Me? Adapting Systems to the Uncertainty of Human Preferences (2022) (0)
- Front Matter - SEAMS 2017 Artifacts, Table of Contents, Preface, Artifact Evaluation Committee (2017) (0)
- A TRANSLATION THEOREM (2018) (0)
- The Open University ’ s repository of research publications and other research outputs Composing features by managing inconsistent requirements Conference Item (2013) (0)
- A Siege on Positive Ageing: COVID-19 as Exacerbating Age-based Stereotype Threats among Older Adults (2021) (0)
- Report on the second IEEE international symposium on requirements engineering (RE '95), York, UK, 27–29 March 1995 (1995) (0)
- Making requirements measurable (tutorial) (1997) (0)
- Topology aware adaptive security Conference or Workshop Item (2020) (0)
- The Open University ’ s repository of research publications and other research outputs Towards safer composition (2016) (0)
- Building Contingencies into Specifications (2008) (0)
- Requirements-driven collaborative choreography customization Conference or Workshop Item (2019) (0)
- The Open University ’ s repository of research publications and other research outputs Examining Active Error in Software Development (2017) (0)
- Forensic readiness of industrial control systems under stealthy attacks (2022) (0)
- Engineering Adaptive Digital Investigations using Forensics Requirements (2014) (0)
- Engineering Software for Life in Cyber-Physical-Social Spaces (2018) (0)
- The Open University ’ s repository of research publications and other research outputs On presuppositions in requirements Conference Item (2014) (0)
- Studies of Software Design (1996) (0)
- Adaptive information security and privacy (2017) (0)
- S O F T W a R E M a N a G E M E N T the Twin Peaks Model Weaving Together Requirements and Architectures (0)
- The Open University ’ s repository of research publications and other research outputs Topology aware adaptive security (2016) (0)
- Values@Runtime: An Adaptive Framework for Operationalising Values (2023) (0)
- Survey on Security Measures of Software Requirement Engineering (2020) (0)
- Open Research Online Kind Computing or Workshop Item (2022) (0)
- The Open University ’ s repository of research publications and other research outputs Contravision : Exploring users ’ reactions to futuristic technology (2016) (0)
- Editorial [new associate editors] (2013) (0)
- Depiction of Additional Node-related Elements in Graph-based Software Visualisations (2008) (0)
- Open The case for Zero Trust Digital Forensics (2022) (0)
- The Open University ’ s repository of research publications and other research outputs Distilling Privacy Requirements for Mobile Applications (2016) (0)
- The Open University ’ s repository of research publications and other research outputs Topology aware adaptive security Conference Item (2014) (0)
- Requirenautics Quarterly Requirenautics Quarterly Re-locations Re-soundings (0)
- Modelling and Analysing Resilient Cyber-Physical Systems Conference or Workshop Item (2019) (0)
- Open Research Online Kind computing Conference or Workshop Item (2022) (0)
- STRETCH: a Sensor Platform for Non-Invasive Remote Monitoring of Older People in Real Time (2019) (0)
- CrowdService (2018) (0)
- Requirements-driven collaborative choreography customization Conference Item (2016) (0)
- ’ s repository of research publications and other research outputs Feed me , Feed me : An Exemplar for Engineering Adaptive Software Conference or Workshop Item (2018) (0)
- University ’ s repository of research publications and other research outputs Towards Adaptive Compliance Conference or Workshop Item (2018) (0)
- The Many Facets of Mediation (2016) (0)
- Introduction to Research Papers (2005) (0)
- ’ s repository of research publications and other research outputs Specifying and detecting meaningful changes inprograms Conference or Workshop Item (2018) (0)
- The Open University ’ s repository of research publications and other research outputs Caprice : a tool for engineering adaptive privacy (2013) (0)
- The Open University ’ s repository of research publications and other research outputs SecuriTAS : a tool for engineering adaptive security Conference Item (2014) (0)
- In Memoriam: Robin Milner and Amir Pnueli (2010) (0)
- Editorial: The First (2018) (0)
- The Open University ’ s repository of research publications and other research outputs Privacy arguments : analysing selective disclosure requirements for mobile applications Conference Item (2013) (0)
- Introduction to Special Issue (2004) (0)
- Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK (2022) (0)
- Optimal by Design: Model-Driven Synthesis of Adaptation Strategies for Autonomous Systems (2020) (0)
- Towards explaining rebuttals in security arguments Conference or Workshop Item (2014) (0)
- Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering (2006) (0)
- Towards Citizen Forensics: Improving Citizen-Police Collaboration (2020) (0)
- The Open University ’ s repository of research publications and other research outputs Customizing choreography : Deriving conversations from organizational dependencies Conference Item (2014) (0)
- The Open University ’ s repository of research publications and other research outputs Towards safer composition Conference Item (2012) (0)
- The Open University ’ s repository of research publications and other research outputs Social adaptation : when software gives users a voice Conference Item (2012) (0)
- ’ s repository of research publications and other research outputs Specifying and detecting meaningful changes in programs Conference Item (2011) (0)
- The Open University ’ s repository of research publications and other research outputs Caprice : a tool for engineering adaptive privacy Conference Item (2017) (0)
- Institutional Knowledge at Singapore Management University Institutional Knowledge at Singapore Management University O2O service composition with social collaboration O2O service composition with social collaboration (2020) (0)
- Computer Support for the Management of Mine Water: An Object-Oriented Approach (1994) (0)
- Response to Emergency Situations in a Traffic Management System (2014) (0)
- Open Research Online Requirements-driven collaborative choreography customization (2016) (0)
- Using /* to Model Access Policies: Relating Actors to Their Organizational Context (2011) (0)
- ’ s repository of research publications and other research outputs Learning to Share : Engineering Adaptive Decision-Support for Online Social Networks Conference or Workshop Item (2018) (0)
- Kind Computing (2022) (0)
- An Evaluation of the ReleasePlanner on the Treatment of Security and Evolving Requirements (2010) (0)
- Monitoring Analyzing Planning Executing Sensors Effectors Monitor Detect Diagnose Tolerate Prevent RecoverPrognose Repair Relax Evolve (2012) (0)
- Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews (2023) (0)
- D . 3 . 4 PROOF-OF-CONCEPT CASE TOOL (2011) (0)
- Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (2022) (0)
- Open Research Online Topology-Aware Access Control of Smart Spaces (2022) (0)
- University ’ s repository of research publications and other research outputs Requirements-driven collaborative choreography customization Conference or Workshop Item (2018) (0)
- ’ s repository of research publications and other research outputs CrowdService : Serving the Individuals through Mobile Crowdsourcing and Service Composition Conference or Workshop Item (2018) (0)
- The five W's (and one "H") of Security: Software Engineering of Secure Systems (2008) (0)
- The Open University ’ s repository of research publications and other research outputs Requirements-driven collaborative choreography customization Conference Item (2016) (0)
- Leveraging in Software (2000) (0)
- Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces (2017) (0)
- ’ s repository of research publications and other research outputs On the impact of real-time feedback on users ’ behaviour in mobile location-sharing applications Conference Item (2013) (0)
- The Open University ’ s repository of research publications and other research outputs Weaving together requirements and architecture (0)
- Distilling Privacy Requirements for Mobile Applications Conference or Workshop Item (2018) (0)
- Digital Contact Tracing Applications for COVID-19: A Citizen-Centred Evaluation Framework (Preprint) (2021) (0)
- Architectural Approaches To Software Engineering : Frameworks , Patterns , Components and Architectures (0)
- ’ s repository of research publications and other research outputs Are You Ready ? Towards the Engineering of Forensic-Ready Systems Conference or Workshop Item (2018) (0)
- Engineering Adaptive Software Systems: Communications of NII Shonan Meetings (2019) (0)
- Feel It, Code It: Emotional Goal Modelling for Gender-Inclusive Design (2023) (0)
- Dynamics : Learning Privacy Norms for Social Software Conference or Workshop Item (2019) (0)
- First International Modeling Security Workshop (2009) (0)
- Restructuring Requirements Speci cations for Analysis and Change Management (1998) (0)
- University ’ s repository of research publications and other research outputs Contravision : Exploring users ’ reactions to futuristic technology Conference or Workshop Item (2018) (0)
- Calibrating Value Estimates of Requirements Siv (2001) (0)
- ’ s repository of research publications and other research outputs Verifiable Limited Disclosure : Reporting and Handling Digital Evidence in Police Investigations Conference Item (2017) (0)
- On presuppositions in requirements Conference or Workshop Item (2018) (0)
- The thin line between products (2012) (0)
- Session details: Doctoral symposium: presentations (2006) (0)
- - 1-Inconsistency Handling in Multi-Perspective Specifications (1994) (0)
- Talking about Security with Professional Developers Conference or Workshop Item (2019) (0)
- Motivating Jenny Developer Security Toolkit (2020) (0)
- Gathering Requirements for a Grid-based Automatic Marking System (2005) (0)
- ’ s repository of research publications and other research outputs Privacy-byDesign Framework for Assessing Internet of Things Applications and Platforms Conference or Workshop Item (2019) (0)
- Deriving security requirements from crosscutting threat descriptions Conference or Workshop Item (2018) (0)
- Engineering Adaptive Authentication (2021) (0)
This paper list is powered by the following services:
Other Resources About Bashar Ahmad Nuseibeh
What Schools Are Affiliated With Bashar Ahmad Nuseibeh?
Bashar Ahmad Nuseibeh is affiliated with the following schools: