关注
Hanan Hibshi
标题
引用次数
引用次数
年份
Ask the experts: What should be on an IoT privacy and security label?
P Emami-Naeini, Y Agarwal, LF Cranor, H Hibshi
2020 IEEE Symposium on Security and Privacy (SP), 447-464, 2020
2092020
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
TD Breaux, H Hibshi, A Rao
Requirements Engineering 19 (3), 281-307, 2014
1232014
Usability of forensics tools: a user study
H Hibshi, T Vidas, L Cranor
2011 Sixth International Conference on IT Security Incident Management and …, 2011
712011
Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications
TD Breaux, D Smullen, H Hibshi
IEEE 23rd International Requirements Engineering Conference, 166 - 175, 2015
412015
Privacy Risk in Cybersecurity Data Sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
332016
Assessment of Risk Perception in Security Requirements Composition
H Hibshi, T Breaux, SB Broomell
2015 IEEE 23rd International Requirements Engineering Conference (RE), 146-155, 2015
242015
A Grounded Analysis of Experts' Decision-Making during Security Assessments
H Hibshi, TD Breaux, M Riaz, L Williams
Journal of Cybersecurity, 2016
222016
Improving security requirements adequacy
H Hibshi, TD Breaux, C Wagner
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
92016
Towards a framework to measure security expertise in requirements analysis
H Hibshi, T Breaux, M Riaz, L Williams
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
92014
Rethinking security requirements in RE research
H Hibshi, R Slavin, J Niu, T Breaux
Department of Computer Science, University of Texas at San Antonio, 2014
72014
Less is more? investigating the role of examples in security studies using analogical transfer
A Rao, H Hibshi, T Breaux, JM Lehker, J Niu
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014
72014
Evaluation of linguistic labels used in applications
H Hibshi, TD Breaux
Carnegie Mellon University, 2016
62016
Discovering Decision-Making Patterns for Security Novices and Experts
H Hibshi
ISR TECHNICAL REPORTS, 2015
52015
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements
H Hibshi, S Jones, T Breaux
IEEE Transactions on Dependable and Secure Computing, 2021
42021
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
TD Breaux, H Hibshi, A Rao, JM Lehker
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012
42012
Observations From an Online Security Competition and Its Implications on Crowdsourced Security
A Cuevas, E Hogan, H Hibshi, N Christin
arXiv preprint arXiv:2204.12601, 2022
32022
Composite Security Requirements in the Presence of Uncertainty
H Hibshi
PhD thesis, Carnegie Mellon University, 2018
22018
Reinforcing security requirements with multifactor quality measurement
H Hibshi, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 144-153, 2017
22017
Hiding the Topology of an IEEE 802.15. 4 Network with Limited Energy
SB Schwarz, DG Akestoridis, P Tague, H Hibshi
2021 IEEE Conference on Communications and Network Security (CNS), 74-82, 2021
12021
Systematic analysis of qualitative data in security
H Hibshi
Proceedings of the Symposium and Bootcamp on the Science of Security, 52-52, 2016
12016
系统目前无法执行此操作,请稍后再试。
文章 1–20