Awais Rashid

Orcid: 0000-0002-0109-1341

Affiliations:
  • University of Bristol, UK
  • The University of Lancaster, UK (former)


According to our database1, Awais Rashid authored at least 266 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS/SVM - 2024).
ACM SIGSOFT Softw. Eng. Notes, October, 2024

Threat models over space and time: A case study of end-to-end-encrypted messaging applications.
Softw. Pract. Exp., 2024

Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study.
IEEE Secur. Priv., 2024

Saltzer & Schroeder for 2030: Security engineering principles in a world of AI.
CoRR, 2024

Assessing Effectiveness of Cyber Essentials Technical Controls.
CoRR, 2024

A framework for mapping organisational workforce knowledge profile in cyber security.
Comput. Secur., 2024

Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense.
Proceedings of the 33rd USENIX Security Symposium, 2024

Community Security Champions: Studying the Most Influential Users on Security Stack Exchange.
Proceedings of the IEEE Secure Development Conference, 2024

Usability Study of Security Features in Programmable Logic Controllers.
Proceedings of the 2024 European Symposium on Usable Security, 2024

Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

Towards Linking Indicators of Compromise to Operational Resilience and Safety Requirements.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Conceptual Designs for Security interfaces in Industrial Control Systems.
Proceedings of the Companion Publication of the 2024 ACM Designing Interactive Systems Conference, 2024

2023
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices.
IEEE Trans. Software Eng., September, 2023

Making Sense of the Unknown: How Managers Make Cyber Security Decisions.
ACM Trans. Softw. Eng. Methodol., July, 2023

SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations.
ACM Trans. Softw. Eng. Methodol., May, 2023

What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study.
ACM Trans. Priv. Secur., 2023

Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities.
Proc. ACM Hum. Comput. Interact., 2023

Embedding Privacy Into Design Through Software Developers: Challenges and Solutions.
IEEE Secur. Priv., 2023

Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

On the privacy of mental health apps.
Empir. Softw. Eng., 2023

Towards Equitable Privacy.
CoRR, 2023

Decisions & Disruptions 2: Decide Harder.
CoRR, 2023

Threat Models over Space and Time: A Case Study of E2EE Messaging Applications.
CoRR, 2023

Towards Human-Centric Endpoint Security.
Proceedings of the Security Protocols XXVIII, 2023

ExD: Explainable Deletion.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow.
Proceedings of the 2023 European Symposium on Usable Security, 2023

A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Analysing The Activities Of Far-Right Extremists On The Parler Social Network.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?
Big Data Soc., January, 2022

The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups.
IEEE Trans. Software Eng., 2022

The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers.
IEEE Trans. Software Eng., 2022

The Case for Adaptive Security Interventions.
ACM Trans. Softw. Eng. Methodol., 2022

Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks.
Proc. Priv. Enhancing Technol., 2022

The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study.
IEEE Secur. Priv., 2022

A Survey of Relevant Text Mining Technology.
CoRR, 2022

Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices.
CoRR, 2022

Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j.
CoRR, 2022

Embedding Privacy Into Design Through Software Developers: Challenges & Solutions.
CoRR, 2022

"Yeah, it does have a...Windows '98 Vibe": Usability Study of Security Features in Programmable Logic Controllers.
CoRR, 2022

Contrasting global approaches for identifying and managing cybersecurity risks in supply chains.
CoRR, 2022

Automatic User Profiling in Darknet Markets: a Scalability Study.
CoRR, 2022

Understanding motivations and characteristics of financially-motivated cybercriminals.
CoRR, 2022

How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces.
CoRR, 2022

The Political Economy of Privacy Enhancing Technologies.
CoRR, 2022

Characterising Cybercriminals: A Review.
CoRR, 2022

A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools.
CoRR, 2022

On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development.
CoRR, 2022

Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Influences of developers' perspectives on their engagement with security in code.
Proceedings of the 15th IEEE/ACM International Workshop on Cooperative and Human Aspects of Software Engineering , 2022

Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Adaptive Cyber Security for Critical Infrastructure.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2022

Privacy Design Strategies for Home Energy Management Systems (HEMS).
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations.
CoRR, 2021

Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks.
Comput. Secur., 2021

Developers Are Neither Enemies Nor Users: They Are Collaborators.
Proceedings of the IEEE Secure Development Conference, 2021

"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Vision: Security-Usability Threat Modeling for Industrial Control Systems.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Building a Privacy Testbed: Use Cases and Design Considerations.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Six Software Engineering Principles for Smarter Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
SLR_Dataset.
Dataset, December, 2020

"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making.
ACM Trans. Priv. Secur., 2020

Automatically Dismantling Online Dating Fraud.
IEEE Trans. Inf. Forensics Secur., 2020

Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.
Softw. Pract. Exp., 2020

Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education.
IEEE Secur. Priv., 2020

Challenging software developers: dialectic as a foundation for security assurance techniques.
J. Cybersecur., 2020

Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
CoRR, 2020

Contextualising and aligning security metrics and business objectives: A GQM-based methodology.
Comput. Secur., 2020

Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Security but not for security's sake: The impact of social considerations on app developers' choices.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Schrödinger's security: opening the box on app developers' security rationale.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game.
IEEE Trans. Software Eng., 2019

Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy.
Proc. Priv. Enhancing Technol., 2019

Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables.
IEEE Secur. Priv., 2019

Basic Cyber Hygiene: Does It Work?
Computer, 2019

Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Interventions for software security: creating a lightweight program of assurance techniques for developers.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Understanding security requirements for industrial control system supply chains.
Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2019

Trust beyond computation alone: human aspects of trust in blockchain technologies.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2019

Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
The Effect of Software Warranties on Cybersecurity.
ACM SIGSOFT Softw. Eng. Notes, 2018

Data exfiltration: A review of external attack vectors and countermeasures.
J. Netw. Comput. Appl., 2018

Scoping the Cyber Security Body of Knowledge.
IEEE Secur. Priv., 2018

μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating.
Comput. Lang. Syst. Struct., 2018

Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Towards forensic-ready software systems.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Safe cryptography for all: towards visual metaphor driven cryptography building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Predicting Collective Action from Micro-Blog Data.
Proceedings of the Prediction and Inference from Social Networks and Social Media, 2017

Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions.
ACM SIGSOFT Softw. Eng. Notes, 2017

Detecting broken pointcuts using structural commonality and degree of interest.
Sci. Comput. Program., 2017

All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications.
Computer, 2017

Panning for gold: Automatically analysing online social engineering attack surfaces.
Comput. Secur., 2017

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017

Privacy Requirements: Present & Future.
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society Track, 2017

LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
AspectJ code analysis and verification with GASR.
J. Syst. Softw., 2016

Flash mobs, Arab Spring and protest movements: Can we analyse group identities in online conversations?
Expert Syst. Appl., 2016

iCOP: Live forensics to reveal previously unknown criminal media on P2P networks.
Digit. Investig., 2016

Information assurance techniques: Perceived cost effectiveness.
Comput. Secur., 2016

How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Reaching the masses: a new subdiscipline of app programmer education.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Discovering "unknown known" security requirements.
Proceedings of the 38th International Conference on Software Engineering, 2016

On the role of latent design conditions in cyber-physical systems security.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Early Report: How to Improve Programmers' Expertise at App Security?
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Assured Deletion in the Cloud: Requirements, Challenges and Future Directions.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Sampling labelled profile data for identity resolution.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Mimicry in online conversations: An exploratory study of linguistic analysis techniques.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement.
ACM Comput. Surv., 2015

Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software.
Proceedings of the Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, 2015

Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Managing Emergent Ethical Concerns for Software Engineering in Society.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Engineering Sustainability Through Language.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Software Engineering for Privacy in-the-Large.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Software Engineering for Social Sustainability.
Proceedings of the 29th International Conference on Environmental Informatics, 2015

Assurance Techniques for Industrial Control Systems (ICS).
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Evaluation of the Dynamic Construct Competition Miner for an eHealth System.
Proceedings of the Business Information Systems - 18th International Conference, 2015

Weak Signals as Predictors of Real-World Phenomena in Social Media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
iCOP: Automatically Identifying New Child Abuse Media in P2P Networks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Dynamic Constructs Competition Miner - Occurrence- vs. Time-Based Ageing.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

Scalable Dynamic Business Process Discovery with the Constructs Competition Miner.
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), 2014

Tackling the requirements jigsaw puzzle.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

A Service-Indepenent Model for Linking Online User Profile Information.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Introducing a Framework for Scalable Dynamic Process Discovery.
Proceedings of the Advances in Enterprise Engineering VIII, 2014

Constructs Competition Miner: Process Control-Flow Discovery of BP-Domain Constructs.
Proceedings of the Business Process Management - 12th International Conference, 2014

2013
Mastering crosscutting architectural decisions with aspects.
Softw. Pract. Exp., 2013

Towards the practical mutation testing of AspectJ programs.
Sci. Comput. Program., 2013

Who Am I? Analyzing Digital Personas in Cybercrime Investigations.
Computer, 2013

Social Networking Privacy: Understanding the Disconnect from Policy to Controls.
Computer, 2013

EA-Analyzer: automating conflict detection in a large set of textual aspect-oriented requirements.
Autom. Softw. Eng., 2013

Aspect Identification in Textual Requirements with EA-Miner.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

Conflict Identification with EA-Analyzer.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

2012
Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software.
IEEE Trans. Software Eng., 2012

EA-tracer: identifying traceability links between code aspects and early aspects.
Proceedings of the ACM Symposium on Applied Computing, 2012

UDesignIt: Towards social media for community-driven design.
Proceedings of the 34th International Conference on Software Engineering, 2012

A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Unveiling and taming liabilities of aspects in the presence of exceptions: A static analysis based approach.
Inf. Sci., 2011

Do the Privacy Policies Reflect the Privacy Controls on Social Networks?
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Inferring test results for dynamic software product lines.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Modelling adaptability and variability in requirements.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Research Challenges for Business Process Models at Run-Time.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

Aspect assumptions: a retrospective study of AspectJ developers' assumptions about aspect usage.
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011

Proteum/AJ: a mutation system for AspectJ programs.
Proceedings of the Companion Volume of the 10th International Conference on Aspect-Oriented Software Development, 2011

2010
Relating Feature Models to Other Models of a Software Product Line - A Comparative Study of FeatureMapper and VML*.
LNCS Trans. Aspect Oriented Softw. Dev., 2010

Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe.
Computer, 2010

Automating the mutation testing of aspect-oriented Java programs.
Proceedings of the 5th Workshop on Automation of Software Test, 2010

An exploratory study of fault-proneness in evolving aspect-oriented programs.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Taming Unbounded Variability in Service Engineering.
Proceedings of the Business Process Management Workshops, 2010

2009
Formal semantic conflict detection in aspect-oriented requirements.
Requir. Eng., 2009

Software Engineering Ethics in a Digital World.
Computer, 2009

Modelling Imperfect Product Line Requirements with Fuzzy Feature Diagrams.
Proceedings of the Third International Workshop on Variability Modelling of Software-Intensive Systems, 2009

A framework for constructing semantically composable feature models from natural language requirements.
Proceedings of the Software Product Lines, 13th International Conference, 2009

VML* - A Family of Languages for Variability Management in Software Product Lines.
Proceedings of the Software Language Engineering, Second International Conference, 2009

Domain-Specific Metamodelling Languages for Software Language Engineering.
Proceedings of the Software Language Engineering, Second International Conference, 2009

EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements.
Proceedings of the ASE 2009, 2009

ArborCraft: automatic feature models from textual requirements documents.
Proceedings of the 15th workshop on Early aspects, 2009

EA-Analyzer: a tool for identifying conflicting dependencies in requirements documents.
Proceedings of the 15th workshop on Early aspects, 2009

Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

Composing architectural aspects based on style semantics.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

2008
Aspect-Oriented Software Development: an Introduction.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Early Aspects: Aspect-Oriented Requirements and Architecture for Product Lines (EA@SPLC.08).
Proceedings of the Software Product Lines, 12th International Conference, 2008

An Exploratory Study of Information Retrieval Techniques in Domain Analysis.
Proceedings of the Software Product Lines, 12th International Conference, 2008

Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Unveiling and Taming Liabilities of Aspect Libraries Reuse.
Proceedings of the 22nd Brazilian Symposium on Software Engineering, 2008

A Formal Approach to Semantic Composition of Aspect-Oriented Requirements.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Aspect-Oriented Requirements Engineering: An Introduction.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Cross-Document Dependency Analysis for System-of-System Integration.
Proceedings of the Foundations of Computer Software. Future Trends and Techniques for Development, 2008

Aspect Mining in Procedural Object Oriented Code.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

Supporting Law Enforcement in Digital Communities through Natural Language Analysis.
Proceedings of the Computational Forensics, Second International Workshop, 2008

Mutation Testing for Aspect-Oriented Programs.
Proceedings of the First International Conference on Software Testing, 2008

Mining early aspects from requirements with ea-miner.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Aspect-oriented requirements engineering: a roadmap.
Proceedings of the 13th international workshop on Early Aspects, 2008

Early aspects at ICSE 2008: workshop on aspect-oriented requirements engineering and architecture design.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Assessing the Impact of Aspects on Exception Flows: An Exploratory Study.
Proceedings of the ECOOP 2008, 2008

On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

2007
EA-Miner: Towards Automation in Aspect-Oriented Requirements Engineering.
LNCS Trans. Aspect Oriented Softw. Dev., 2007

COMPASS: Composition-Centric Mapping of Aspectual Requirements to Architecture.
LNCS Trans. Aspect Oriented Softw. Dev., 2007

JAT: A Test Automation Framework for Multi-Agent Systems.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007


Early Aspects at ICSE 2007: Workshop on Aspect-Oriented Requirements Engineering and Architecture Design.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

A Comparative Study of Aspect-Oriented Requirements Engineering Approaches.
Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, 2007

On the Impact of Aspectual Decompositions on Design Stability: An Empirical Study.
Proceedings of the ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30, 2007

Early Aspects: Are There Any Other Kind?
Proceedings of the Early Aspects: Current Challenges and Future Directions, 2007

Semantics-based composition for aspect-oriented requirements engineering.
Proceedings of the 6th International Conference on Aspect-Oriented Software Development, 2007

2006
An architectural pattern for designing component-based application frameworks.
Softw. Pract. Exp., 2006

A Model Curriculum for Aspect-Oriented Software Development.
IEEE Softw., 2006

Discovering Early Aspects.
IEEE Softw., 2006

Driving and managing architectural decisions with aspects.
ACM SIGSOFT Softw. Eng. Notes, 2006

Domain Models Are NOT Aspect Free.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

Aspect-Oriented Software Development Beyond Programming.
Proceedings of the Reuse of Off-the-Shelf Components, 2006

On the Modular Representation of Architectural Aspects.
Proceedings of the Software Architecture, Third European Workshop, 2006

Aspects and Evolution: The Case for Versioned Types and Meta-Aspect Protocols.
Proceedings of the RAM-SE'06-ECOOP'06 Workshop on Reflection, 2006

2005
A database evolution taxonomy for object-oriented databases.
J. Softw. Maintenance Res. Pract., 2005

Towards a taxonomy of software change.
J. Softw. Maintenance Res. Pract., 2005

Comparing Requirement Engineering Approaches for Handling Crosscutting Concerns.
Proceedings of the Anais do WER05, 2005

From Requirements Documents to Feature Models for Aspect Oriented Product Line Implementation.
Proceedings of the Satellite Events at the MoDELS 2005 Conference, 2005

Early-AIM: An Approach for Identifying Aspects in Requirements.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Multi-Dimensional Separation of Concerns in Requirements Engineering.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

CoCA: A Composition-Centric Approach to Requirements Engineering.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modular Aspect Verification for Safer Aspect-Based Evolution.
Proceedings of the RAM-SE'05-ECOOP'05 Workshop on Reflection, 2005

A Concern-Oriented Requirements Engineering Model.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

2004
Special issue on Early aspects: aspect-oriented requirements engineering and architecture design.
IEE Proc. Softw., 2004

From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Framed Aspects: Supporting Variability and Configurability for AOP.
Proceedings of the Software Reuse: Methods, 2004

Supporting Flexible Object Database Evolution with Aspects.
Proceedings of the Generative Programming and Component Engineering: Third International Conference, 2004

2003
Editorial: Aspect-oriented Programming and Separation of Crosscutting Concerns.
Comput. J., 2003

Reengineering a PC-Based System into the Mobile Device Product Line.
Proceedings of the 6th International Workshop on Principles of Software Evolution (IWPSE 2003), 2003

A Framework for Customisable Schema Evolution in Object-Oriented Databases.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Analysis of Aspect-Oriented Software.
Proceedings of the Object-Oriented Technology: ECOOP 2003 Workshop Reader, 2003

Modularisation and composition of aspectual requirements.
Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2003

Persistence as an aspect.
Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2003

Aspect-Oriented Database Systems
Springer, ISBN: 3-540-00948-5, 2003

2002
Weaving Aspects in a Persistent Environment.
ACM SIGPLAN Notices, 2002

Early Aspects: A Model for Aspect-Oriented Requirements Engineerin.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

Relational Database Support for Aspect-Oriented Programming.
Proceedings of the Objects, 2002

2001
A database evolution approach for object oriented databases.
PhD thesis, 2001

Aspect-orientation and database systems: an effective customisation approach.
IEE Proc. Softw., 2001

Aspect-oriented and component-based software engineering.
IEE Proc. Softw., 2001

A Hybrid Approach to Separation of Concerns: The Story of SADES.
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001

A Database Evolution Approach for Object-Oriented Databases.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

A Strategy for Managing Risk in Component-Based Software Development.
Proceedings of the 27th EUROMICRO Conference 2001: A Net Odyssey, 2001

EProMS: An E-commerce Based Process Model for Cooperative Software Development in Small Organisations.
Proceedings of the Electronic Commerce and Web Technologies, 2001

2000
Object Database Evolution Using Separation of Concerns.
SIGMOD Rec., 2000

Transparent Dynamic Database Evolution from Java.
Obj. Logiciel Base données Réseaux, 2000

Implementing Collaboration-Based Designs Using Aspect-Oriented Programming.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

Reconfigurability in Object Database Management Systems: An Aspect-Oriented Approach.
Proceedings of the 6th International Conference on Object Oriented Information Systems, 2000

A Flexible Approach for Instance Adaptation During Class Versioning.
Proceedings of the Objects and Databases, 2000

On to Aspect Persistence.
Proceedings of the Generative and Component-Based Software Engineering, 2000

Aspect Composition Applying the Design by Contract Principle.
Proceedings of the Generative and Component-Based Software Engineering, 2000

From Object-Oriented to Aspect-Oriented Databases.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
A "Framework" for Object Oriented Frameworks Design.
Proceedings of the TOOLS Europe 1999: 29th International Conference on Technology of Object-Oriented Languages and Systems, 1999

Evaluation for Evolution: How Well Commercial Systems Do.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

9th Workshop for PhD Students in Object Oriented Systems.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

Systematic Change Impact Determination in Complex Object Database Schemata.
Proceedings of the ECOOP'99 Workshop for PhD Students in OO Systems (PhDOOS '99), 1999

Dynamic Relationships in Object Oriented Databases: A Uniform Approach.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

1998
SADES - a Semi-Autonomous Database Evolution System.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Facilitating Virtual Representation of CAD Data Through A Learning Based Approach to Conceptual Database Evolution Employing Direct Instance Sharing.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998


  Loading...