Text filtering and ranking for security bug report prediction F Peters, TT Tun, Y Yu, B Nuseibeh IEEE Transactions on Software Engineering 45 (6), 615-631, 2017 | 95 | 2017 |
An NFR pattern approach to dealing with NFRs S Supakkul, T Hill, L Chung, TT Tun, JCS do Prado Leite 2010 18th IEEE International Requirements Engineering Conference, 179-188, 2010 | 90 | 2010 |
Relating requirements and feature configurations: A systematic approach TT Tun, Q Boucher, A Classen, A Hubaux, P Heymans Proceedings of the 13th International Software Product Lines Conference …, 2009 | 78 | 2009 |
Risk and argument: A risk-based argumentation method for practical security VNL Franqueira, TT Tun, Y Yu, R Wieringa, B Nuseibeh 2011 IEEE 19th International Requirements Engineering Conference, 239-248, 2011 | 58 | 2011 |
Schrödinger's security: opening the box on app developers' security rationale D Van Der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ... Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 52 | 2020 |
An extended ontology for security requirements F Massacci, J Mylopoulos, F Paci, TT Tun, Y Yu Advanced Information Systems Engineering Workshops: CAiSE 2011 International …, 2011 | 52 | 2011 |
Towards forensic-ready software systems L Pasquale, D Alrajeh, C Peersman, T Tun, B Nuseibeh, A Rashid Proceedings of the 40th International Conference on Software Engineering …, 2018 | 51 | 2018 |
An anatomy of security conversations in stack overflow T Lopez, T Tun, A Bandara, L Mark, B Nuseibeh, H Sharp 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 49 | 2019 |
Automated analysis of security requirements through risk-based argumentation Y Yu, VNL Franqueira, TT Tun, RJ Wieringa, B Nuseibeh Journal of systems and software 106, 102-116, 2015 | 41 | 2015 |
Requirements engineering A Bennaceur, TT Tun, Y Yu, B Nuseibeh Handbook of software engineering, 51-92, 2019 | 40 | 2019 |
Separation of concerns in feature diagram languages: A systematic survey A Hubaux, TT Tun, P Heymans ACM Computing Surveys (CSUR) 45 (4), 1-23, 2013 | 39 | 2013 |
International journal of advanced research in computer science and software engineering S Roy, S Nag, IK Maitra, SK Bandyopadhyay International Journal 3 (6), 2013 | 39 | 2013 |
Security patterns: Comparing modeling approaches A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ... Software engineering for secure systems: Industrial and research …, 2011 | 39 | 2011 |
" Hopefully We Are Mostly Secure": Views on Secure Code in Professional Practice T Lopez, H Sharp, T Tun, A Bandara, M Levine, B Nuseibeh 2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects …, 2019 | 36 | 2019 |
The case for adaptive security interventions I Rauf, M Petre, T Tun, T Lopez, P Lunn, D Van Der Linden, J Towse, ... ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-52, 2021 | 34 | 2021 |
Composing features by managing inconsistent requirements RC Laney, TT Tun, M Jackson, B Nuseibeh ICFI, 129-144, 2007 | 34 | 2007 |
Specifying features of an evolving software system TT Tun, T Trew, M Jackson, R Laney, B Nuseibeh Software: Practice and Experience 39 (11), 973-1002, 2009 | 32 | 2009 |
An investigation of security conversations in stack overflow: Perceptions of security and community involvement T Lopez, TT Tun, A Bandara, M Levine, B Nuseibeh, H Sharp Proceedings of the 1st international workshop on security awareness from …, 2018 | 29 | 2018 |
OpenArgue: Supporting argumentation to evolve secure software systems Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh 2011 IEEE 19th international requirements engineering conference, 351-352, 2011 | 29 | 2011 |
Using problem descriptions to represent variabilities for context-aware applications M Salifu, B Nuseibeh, L Rapanotti, TT Tun | 27 | 2007 |