Thein Than Tun
Title
Cited by
Cited by
Year
Relating requirements and feature configurations: A systematic approach
T Than Tun, Q Boucher, A Classen, A Hubaux, P Heymans
Proceedings of the 13th International Software Product Line Conference, 201-210, 2009
782009
An NFR pattern approach to dealing with NFRs
S Supakkul, T Hill, L Chung, TT Tun, JCS do Prado Leite
2010 18th IEEE International Requirements Engineering Conference, 179-188, 2010
712010
Risk and argument: A risk-based argumentation method for practical security
VNL Franqueira, TT Tun, Y Yu, R Wieringa, B Nuseibeh
2011 IEEE 19th International Requirements Engineering Conference, 239-248, 2011
532011
An extended ontology for security requirements
F Massacci, J Mylopoulos, F Paci, TT Tun, Y Yu
International Conference on Advanced Information Systems Engineering, 622-636, 2011
392011
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
352011
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
352011
Separation of concerns in feature diagram languages: A systematic survey
A Hubaux, TT Tun, P Heymans
ACM Computing Surveys (CSUR) 45 (4), 1-23, 2013
332013
International Journal of Advanced Research in Computer Science and Software Engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
322013
Automated analysis of security requirements through risk-based argumentation
Y Yu, VNL Franqueira, TT Tun, RJ Wieringa, B Nuseibeh
Journal of Systems and Software 106, 102-116, 2015
302015
Composing features by managing inconsistent requirements
R Laney, TT Tun, M Jackson, B Nuseibeh
ICFI, 129-144, 2007
282007
Using problem descriptions to represent variabilities for context-aware applications
M Salifu, B Nuseibeh, L Rapanotti, TT Tun
262007
Specifying features of an evolving software system
TT Tun, T Trew, M Jackson, R Laney, B Nuseibeh
Software: Practice and Experience 39 (11), 973-1002, 2009
242009
Towards safer composition
A Classen, P Heymans, TT Tuny, B Nuseibeh
2009 31st International Conference on Software Engineering-Companion Volume …, 2009
242009
On the structure of problem variability: From feature diagrams to problem frames
A Classen, P Heymans, R Laney, B Nuseibeh, TT Tun
242007
Model-based argument analysis for evolving security requirements
TT Tun, Y Yu, C Haley, B Nuseibeh
2010 Fourth International Conference on Secure Software Integration and …, 2010
222010
Privacy arguments: Analysing selective disclosure requirements for mobile applications
TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh
2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012
212012
Specifying and detecting meaningful changes in programs
Y Yu, TT Tun, B Nuseibeh
2011 26th IEEE/ACM International Conference on Automated Software …, 2011
202011
OpenArgue: Supporting argumentation to evolve secure software systems
Y Yu, TT Tun, A Tedeschi, VNL Franqueira, B Nuseibeh
2011 IEEE 19th International Requirements Engineering Conference, 351-352, 2011
202011
Text filtering and ranking for security bug report prediction
F Peters, T Tun, Y Yu, B Nuseibeh
IEEE Transactions on Software Engineering, 2017
182017
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
International Journal of Secure Software Engineering (IJSSE) 5 (4), 48-98, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20