Hanan Hibshi
Orcid: 0000-0003-0250-3616
According to our database1,
Hanan Hibshi
authored at least 18 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
"Against the Void": An Interview and Survey Study on How Rust Developers Use Unsafe Code.
CoRR, 2024
2022
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements.
IEEE Trans. Dependable Secur. Comput., 2022
Observations From an Online Security Competition and Its Implications on Crowdsourced Security.
CoRR, 2022
2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2018
2017
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017
2016
J. Cybersecur., 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Detecting repurposing and over-collection in multi-party privacy requirements specifications.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
2014
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements.
Requir. Eng., 2014
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014
Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
2012
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012
2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011