Thein Than Tun
Citado por
Citado por
Text filtering and ranking for security bug report prediction
F Peters, TT Tun, Y Yu, B Nuseibeh
IEEE Transactions on Software Engineering 45 (6), 615-631, 2017
An NFR pattern approach to dealing with NFRs
S Supakkul, T Hill, L Chung, TT Tun, JCS do Prado Leite
2010 18th IEEE International Requirements Engineering Conference, 179-188, 2010
Relating requirements and feature configurations: A systematic approach
TT Tun, Q Boucher, A Classen, A Hubaux, P Heymans
Proceedings of the 13th International Software Product Lines Conference …, 2009
Risk and argument: A risk-based argumentation method for practical security
VNL Franqueira, TT Tun, Y Yu, R Wieringa, B Nuseibeh
2011 IEEE 19th International Requirements Engineering Conference, 239-248, 2011
An extended ontology for security requirements
F Massacci, J Mylopoulos, F Paci, TT Tun, Y Yu
Advanced Information Systems Engineering Workshops: CAiSE 2011 International …, 2011
Towards forensic-ready software systems
L Pasquale, D Alrajeh, C Peersman, T Tun, B Nuseibeh, A Rashid
Proceedings of the 40th International Conference on Software Engineering …, 2018
An anatomy of security conversations in stack overflow
T Lopez, T Tun, A Bandara, L Mark, B Nuseibeh, H Sharp
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
Schrödinger's security: opening the box on app developers' security rationale
D Van Der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Automated analysis of security requirements through risk-based argumentation
Y Yu, VNL Franqueira, TT Tun, RJ Wieringa, B Nuseibeh
Journal of systems and software 106, 102-116, 2015
Separation of concerns in feature diagram languages: A systematic survey
A Hubaux, TT Tun, P Heymans
ACM Computing Surveys (CSUR) 45 (4), 1-23, 2013
International journal of advanced research in computer science and software engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
Requirements engineering
A Bennaceur, TT Tun, Y Yu, B Nuseibeh
Handbook of software engineering, 51-92, 2019
Composing features by managing inconsistent requirements
RC Laney, TT Tun, M Jackson, B Nuseibeh
ICFI, 129-144, 2007
" Hopefully We Are Mostly Secure": Views on Secure Code in Professional Practice
T Lopez, H Sharp, T Tun, A Bandara, M Levine, B Nuseibeh
2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects …, 2019
Specifying features of an evolving software system
TT Tun, T Trew, M Jackson, R Laney, B Nuseibeh
Software: Practice and Experience 39 (11), 973-1002, 2009
The case for adaptive security interventions
I Rauf, M Petre, T Tun, T Lopez, P Lunn, D Van Der Linden, J Towse, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-52, 2021
An investigation of security conversations in stack overflow: Perceptions of security and community involvement
T Lopez, TT Tun, A Bandara, M Levine, B Nuseibeh, H Sharp
Proceedings of the 1st international workshop on security awareness from …, 2018
OpenArgue: Supporting argumentation to evolve secure software systems
Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh
2011 IEEE 19th international requirements engineering conference, 351-352, 2011
Using problem descriptions to represent variabilities for context-aware applications
M Salifu, B Nuseibeh, L Rapanotti, TT Tun
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20