Ask the experts: What should be on an IoT privacy and security label? P Emami-Naeini, Y Agarwal, LF Cranor, H Hibshi 2020 IEEE Symposium on Security and Privacy (SP), 447-464, 2020 | 209 | 2020 |
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements TD Breaux, H Hibshi, A Rao Requirements Engineering 19 (3), 281-307, 2014 | 123 | 2014 |
Usability of forensics tools: a user study H Hibshi, T Vidas, L Cranor 2011 Sixth International Conference on IT Security Incident Management and …, 2011 | 71 | 2011 |
Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications TD Breaux, D Smullen, H Hibshi IEEE 23rd International Requirements Engineering Conference, 166 - 175, 2015 | 41 | 2015 |
Privacy Risk in Cybersecurity Data Sharing J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016 | 33 | 2016 |
Assessment of Risk Perception in Security Requirements Composition H Hibshi, T Breaux, SB Broomell 2015 IEEE 23rd International Requirements Engineering Conference (RE), 146-155, 2015 | 24 | 2015 |
A Grounded Analysis of Experts' Decision-Making during Security Assessments H Hibshi, TD Breaux, M Riaz, L Williams Journal of Cybersecurity, 2016 | 22 | 2016 |
Improving security requirements adequacy H Hibshi, TD Breaux, C Wagner 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 9 | 2016 |
Towards a framework to measure security expertise in requirements analysis H Hibshi, T Breaux, M Riaz, L Williams 2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014 | 9 | 2014 |
Rethinking security requirements in RE research H Hibshi, R Slavin, J Niu, T Breaux Department of Computer Science, University of Texas at San Antonio, 2014 | 7 | 2014 |
Less is more? investigating the role of examples in security studies using analogical transfer A Rao, H Hibshi, T Breaux, JM Lehker, J Niu Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014 | 7 | 2014 |
Evaluation of linguistic labels used in applications H Hibshi, TD Breaux Carnegie Mellon University, 2016 | 6 | 2016 |
Discovering Decision-Making Patterns for Security Novices and Experts H Hibshi ISR TECHNICAL REPORTS, 2015 | 5 | 2015 |
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements H Hibshi, S Jones, T Breaux IEEE Transactions on Dependable and Secure Computing, 2021 | 4 | 2021 |
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns TD Breaux, H Hibshi, A Rao, JM Lehker 2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012 | 4 | 2012 |
Observations From an Online Security Competition and Its Implications on Crowdsourced Security A Cuevas, E Hogan, H Hibshi, N Christin arXiv preprint arXiv:2204.12601, 2022 | 3 | 2022 |
Composite Security Requirements in the Presence of Uncertainty H Hibshi PhD thesis, Carnegie Mellon University, 2018 | 2 | 2018 |
Reinforcing security requirements with multifactor quality measurement H Hibshi, TD Breaux 2017 IEEE 25th International Requirements Engineering Conference (RE), 144-153, 2017 | 2 | 2017 |
Hiding the Topology of an IEEE 802.15. 4 Network with Limited Energy SB Schwarz, DG Akestoridis, P Tague, H Hibshi 2021 IEEE Conference on Communications and Network Security (CNS), 74-82, 2021 | 1 | 2021 |
Systematic analysis of qualitative data in security H Hibshi Proceedings of the Symposium and Bootcamp on the Science of Security, 52-52, 2016 | 1 | 2016 |