Arosha K. Bandara

Orcid: 0000-0001-8974-0555

According to our database1, Arosha K. Bandara authored at least 91 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reflections on using the story completion method in designing tangible user interfaces.
Int. J. Hum. Comput. Stud., 2024

Taming App Reliability: Mobile Analytics "in the wild".
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024

Understanding Pedestrians' Perception of Safety and Safe Mobility Practices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

How Do People Use a Public Gratitude Platform in the Wild?
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Security Responses in Software Development.
ACM Trans. Softw. Eng. Methodol., May, 2023

A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools.
Proceedings of the Seventeenth International Conference on Tangible, 2023

Socio-Technical Resilience for Community Healthcare.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

Towards a Socio-Technical Understanding of Police-Citizen Interactions.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023

2022
Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers.
Sensors, 2022

Evaluating Malware Forensics Tools.
CoRR, 2022

Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Privacy Care: A Tangible Interaction Framework for Privacy Management.
ACM Trans. Internet Techn., 2021

Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control.
Proceedings of the TEI '21: Fifteenth International Conference on Tangible, 2021

2020
Taking the Middle Path: Learning About Security Through Online Social Interaction.
IEEE Softw., 2020

EUD-MARS: End-user development of model-driven adaptive robotics software systems.
Sci. Comput. Program., 2020

Designing privacy-aware internet of things applications.
Inf. Sci., 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools.
CoRR, 2020

Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland.
CoRR, 2020

Building trust in digital policing: A scoping review of community policing apps.
CoRR, 2020

How are you feeling?: Using Tangibles to Log the Emotions of Older Adults.
Proceedings of the TEI '20: Fourteenth International Conference on Tangible, 2020

Designing Technologies for Community Policing.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Finding & Reviewing Community Policing Apps in Asia.
Proceedings of the AsianCHI '20: Proceedings of the 2020 Symposium on Emerging Research from Asia and on Asian Contexts and Cultures, 2020

2019
LiveBox: A Self-Adaptive Forensic-Ready Service for Drones.
IEEE Access, 2019

Knowledge-Based Architecture for Recognising Activities of Older People.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

An anatomy of security conversations in stack overflow.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019

Talking about security with professional developers.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

"Hopefully we are mostly secure": views on secure code in professional practice.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

2018
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things.
ACM Trans. Cyber Phys. Syst., 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

An investigation of security conversations in stack overflow: perceptions of security and community involvement.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

2017
Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects.
ACM Trans. Comput. Hum. Interact., 2017

Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Valorising the IoT <i>Databox</i>: creating value for everyone.
Trans. Emerg. Telecommun. Technol., 2017

Designing Privacy-aware Internet of Things Applications.
CoRR, 2017

Identifying Conflicting Requirements in Systems of Systems.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Learning to share: engineering adaptive decision-support for online social networks.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Engineering Adaptive Model-Driven User Interfaces.
IEEE Trans. Software Eng., 2016

Valorising the IoT Databox: Creating Value for Everyone.
CoRR, 2016

Protecting Privacy in the Cloud: Current Practices, Future Directions.
Computer, 2016

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Privacy dynamics: learning privacy norms for social software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Wearables for physical privacy.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Towards a framework for managing inconsistencies in systems of systems.
Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, 2016

Privacy Itch and Scratch: On Body Privacy Warnings and Controls.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self Adapt. Syst., 2015

Teaching Software Systems Thinking at The Open University.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Adaptive Model-Driven User Interface Development Systems.
ACM Comput. Surv., 2014

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Distilling privacy requirements for mobile applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Requirements-driven mediation for collaborative security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Integrating adaptive user interface capabilities in enterprise applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Personal informatics for non-geeks: lessons learned from ordinary people.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Educating the Internet-of-Things Generation.
Computer, 2013

Cedar studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior.
Proceedings of the Workshop on Context-Aware Adaptation of Service Front-Ends, 2013

2012
Engineering Autonomic Systems (EASy) (NII Shonan Meeting 2012-3).
NII Shonan Meet. Rep., 2012

Analysing monitoring and switching problems for adaptive systems.
J. Syst. Softw., 2012

Teaching cybersecurity at a distance.
Inroads, 2012

Starting with Ubicomp: using the senseboard to introduce computing.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Privacy arguments: Analysing selective disclosure requirements for mobile applications.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications.
Proceedings of the ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, Volume 3, Wroclaw, Poland, 28 June, 2012

2011
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
Proceedings of the POLICY 2011, 2011

From Model-Driven Software Development Processes to Problem Diagnoses at Runtime.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

In the best families: tracking and relationships.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Commentary on 'Software architectures and mobility: A Roadmap'.
J. Syst. Softw., 2010

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

"Privacy-shake", : a haptic interface for managing privacy settings in mobile location sharing applications.
Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, 2010

ContraVision: presenting contrasting visions of future technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Contravision: exploring users' reactions to futuristic technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Policy conflict analysis for diffserv quality of service management.
IEEE Trans. Netw. Serv. Manag., 2009

Studying location privacy in mobile applications: 'predator vs. prey' probes.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Using argumentation logic for firewall configuration management.
Proceedings of the Integrated Network Management, 2009

Learning Rules from User Behaviour.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

From spaces to places: emerging contexts in mobile privacy.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Expressive policy analysis with enhanced system dynamicity.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
A formal logic approach to firewall packet filtering analysis and generation.
Artif. Intell. Rev., 2008

2007
Towards Learning Privacy Policies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2006
Policy refinement for IP differentiated services Quality of Service management.
IEEE Trans. Netw. Serv. Manag., 2006

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Using Argumentation Logic for Firewall Policy Specification and Analysis.
Proceedings of the Large Scale Management of Distributed Systems, 2006

2005
A formal approach to analysis and refinement of policies.
PhD thesis, 2005

Policy Conflict Analysis for Quality of Service Management.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Policy refinement for DiffServ quality of service management.
Proceedings of the Integrated Network Management, 2005

2004
A Goal-based Approach to Policy Refinement.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Using Event Calculus to Formalise Policy Specification and Analysis.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003


  Loading...