An NFR pattern approach to dealing with NFRs S Supakkul, T Hill, L Chung, TT Tun, JCS do Prado Leite 2010 18th IEEE International Requirements Engineering Conference, 179-188, 2010 | 85 | 2010 |
Relating requirements and feature configurations: A systematic approach T Than Tun, Q Boucher, A Classen, A Hubaux, P Heymans Proceedings of the 13th International Software Product Line Conference, 201-210, 2009 | 77 | 2009 |
Risk and argument: A risk-based argumentation method for practical security VNL Franqueira, TT Tun, Y Yu, R Wieringa, B Nuseibeh 2011 IEEE 19th International Requirements Engineering Conference, 239-248, 2011 | 61 | 2011 |
Text filtering and ranking for security bug report prediction F Peters, TT Tun, Y Yu, B Nuseibeh IEEE Transactions on Software Engineering 45 (6), 615-631, 2017 | 54 | 2017 |
An extended ontology for security requirements F Massacci, J Mylopoulos, F Paci, TT Tun, Y Yu International Conference on Advanced Information Systems Engineering, 622-636, 2011 | 50 | 2011 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 38 | 2011 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 38 | 2011 |
Automated analysis of security requirements through risk-based argumentation Y Yu, VNL Franqueira, TT Tun, RJ Wieringa, B Nuseibeh Journal of systems and software 106, 102-116, 2015 | 37 | 2015 |
Separation of concerns in feature diagram languages: A systematic survey A Hubaux, TT Tun, P Heymans ACM Computing Surveys (CSUR) 45 (4), 1-23, 2013 | 35 | 2013 |
Specifying features of an evolving software system TT Tun, T Trew, M Jackson, R Laney, B Nuseibeh Software: Practice and Experience 39 (11), 973-1002, 2009 | 31 | 2009 |
Composing features by managing inconsistent requirements RC Laney, TT Tun, M Jackson, B Nuseibeh ICFI, 129-144, 2007 | 31 | 2007 |
International journal of advanced research in computer science and software engineering S Roy, S Nag, IK Maitra, SK Bandyopadhyay International Journal 3 (6), 2013 | 29 | 2013 |
Towards forensic-ready software systems L Pasquale, D Alrajeh, C Peersman, T Tun, B Nuseibeh, A Rashid 2018 IEEE/ACM 40th International Conference on Software Engineering: New …, 2018 | 26 | 2018 |
Privacy arguments: Analysing selective disclosure requirements for mobile applications TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh 2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012 | 26 | 2012 |
OpenArgue: Supporting argumentation to evolve secure software systems Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh 2011 IEEE 19th international requirements engineering conference, 351-352, 2011 | 25 | 2011 |
Using problem descriptions to represent variabilities for context-aware applications M Salifu, B Nuseibeh, L Rapanotti, TT Tun | 25 | 2007 |
An anatomy of security conversations in stack overflow T Lopez, T Tun, A Bandara, L Mark, B Nuseibeh, H Sharp 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 24 | 2019 |
Model-based argument analysis for evolving security requirements TT Tun, Y Yu, C Haley, B Nuseibeh 2010 Fourth International Conference on Secure Software Integration and …, 2010 | 24 | 2010 |
Towards safer composition A Classen, P Heymans, TT Tuny, B Nuseibeh 2009 31st International Conference on Software Engineering-Companion Volume …, 2009 | 24 | 2009 |
Specifying and detecting meaningful changes in programs Y Yu, TT Tun, B Nuseibeh 2011 26th IEEE/ACM International Conference on Automated Software …, 2011 | 23 | 2011 |