Inah Omoronyia
Inah Omoronyia
Lecturer in Software Engineering and Information Security, University of Glasgow
E-mail confirmado em glasgow.ac.uk
Título
Citado por
Citado por
Ano
Ontology-driven guidance for requirements elicitation
S Farfeleder, T Moser, A Krall, T Stålhane, I Omoronyia, H Zojer
Extended Semantic Web Conference, 212-226, 2011
772011
Social adaptation: when software gives users a voice
R Ali, C Solis, I Omoronyia, M Salehie, B Nuseibeh
732012
A review of awareness in distributed collaborative software engineering
I Omoronyia, J Ferguson, M Roper, M Wood
Software: Practice and Experience 40 (12), 1107-1133, 2010
722010
Requirements-driven adaptive security: Protecting variable assets at runtime
M Salehie, L Pasquale, I Omoronyia, R Ali, B Nuseibeh
2012 20th IEEE international requirements engineering conference (RE), 111-120, 2012
662012
Social sensing: when users become monitors
R Ali, C Solis, M Salehie, I Omoronyia, B Nuseibeh, W Maalej
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
652011
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
International working conference on requirements engineering: Foundation for …, 2010
572010
Engineering adaptive privacy: on the role of privacy awareness requirements
I Omoronyia, L Cavallaro, M Salehie, L Pasquale, B Nuseibeh
2013 35th International Conference on Software Engineering (ICSE), 632-641, 2013
542013
Using developer activity data to enhance awareness during collaborative software development
I Omoronyia, J Ferguson, M Roper, M Wood
Computer Supported Cooperative Work (CSCW) 18 (5-6), 509, 2009
362009
SecuriTAS: a tool for engineering adaptive security
L Pasquale, C Menghi, M Salehie, L Cavallaro, I Omoronyia, B Nuseibeh
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
212012
Privacy arguments: Analysing selective disclosure requirements for mobile applications
TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh
2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012
212012
Enabling hazard identification from requirements and reuse-oriented HAZOP analysis
O Daramola, T Stålhane, G Sindre, I Omoronyia
2011 4th International Workshop on Managing Requirements Knowledge, 3-11, 2011
212011
Ontology-guided requirements and safety analysis
T Stålhane, I Omoronyia, F Reicenbach
172010
Use case to source code traceability: The developer navigation view point
I Omoronyia, G Sindre, M Roper, J Ferguson, M Wood
2009 17th IEEE International Requirements Engineering Conference, 237-242, 2009
172009
Adaptive security and privacy in smart grids: A software engineering vision
M Salehie, L Pasquale, I Omoronyia, B Nuseibeh
2012 First International Workshop on Software Engineering Challenges for the …, 2012
162012
Exploring a Bayesian and linear approach to requirements traceability
I Omoronyia, G Sindre, T Stålhane
Information and Software Technology 53 (8), 851-871, 2011
162011
A 3-dimensional relevance model for collaborative software engineering spaces
I Omoronyia, J Ferguson, M Roper, M Wood
International Conference on Global Software Engineering (ICGSE 2007), 204-216, 2007
152007
Using ontologies and machine learning for hazard identification and safety analysis
O Daramola, T Stålhane, I Omoronyia, G Sindre
Managing requirements knowledge, 117-141, 2013
102013
Caprice: a tool for engineering adaptive privacy
I Omoronyia, L Pasquale, M Salehie, L Cavallaro, G Doherty, B Nuseibeh
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
102012
Systems and methods for runtime adaptive security to protect variable assets
M Salehie, L Pasquale, C Menghi, I Omoronyia, B Nuseibeh
US Patent 9,330,262, 2016
82016
On the role of primary and secondary assets in adaptive security: An application in smart grids
L Pasquale, M Salehie, R Ali, I Omoronyia, B Nuseibeh
2012 7th International Symposium on Software Engineering for Adaptive and …, 2012
72012
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20