Ontology-driven guidance for requirements elicitation S Farfeleder, T Moser, A Krall, T Stålhane, I Omoronyia, H Zojer The Semanic Web: Research and Applications: 8th Extended Semantic Web …, 2011 | 105 | 2011 |
Requirements-driven adaptive security: Protecting variable assets at runtime M Salehie, L Pasquale, I Omoronyia, R Ali, B Nuseibeh 2012 20th IEEE international requirements engineering conference (RE), 111-120, 2012 | 98 | 2012 |
Engineering adaptive privacy: on the role of privacy awareness requirements I Omoronyia, L Cavallaro, M Salehie, L Pasquale, B Nuseibeh 2013 35th International Conference on Software Engineering (ICSE), 632-641, 2013 | 88 | 2013 |
Social adaptation: when software gives users a voice R Ali, C Solis, I Omoronyia, M Salehie, B Nuseibeh | 85 | 2012 |
Social sensing: when users become monitors R Ali, C Solis, M Salehie, I Omoronyia, B Nuseibeh, W Maalej Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011 | 85 | 2011 |
A review of awareness in distributed collaborative software engineering I Omoronyia, J Ferguson, M Roper, M Wood Software: Practice and Experience 40 (12), 1107-1133, 2010 | 84 | 2010 |
A domain ontology building process for guiding requirements elicitation I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo Requirements Engineering: Foundation for Software Quality: 16th …, 2010 | 75 | 2010 |
Using developer activity data to enhance awareness during collaborative software development I Omoronyia, J Ferguson, M Roper, M Wood Computer Supported Cooperative Work (CSCW) 18, 509-558, 2009 | 47 | 2009 |
SecuriTAS: a tool for engineering adaptive security L Pasquale, C Menghi, M Salehie, L Cavallaro, I Omoronyia, B Nuseibeh Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012 | 34 | 2012 |
Enabling hazard identification from requirements and reuse-oriented HAZOP analysis O Daramola, T Stålhane, G Sindre, I Omoronyia 2011 4th International Workshop on Managing Requirements Knowledge, 3-11, 2011 | 33 | 2011 |
Using ontologies and machine learning for hazard identification and safety analysis O Daramola, T Stålhane, I Omoronyia, G Sindre Managing requirements knowledge, 117-141, 2013 | 32 | 2013 |
Privacy arguments: Analysing selective disclosure requirements for mobile applications TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh 2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012 | 26 | 2012 |
Moving beyond cyber security awareness and training to engendering security knowledge sharing S Alahmari, K Renaud, I Omoronyia Information Systems and e-Business Management 21 (1), 123-158, 2023 | 25 | 2023 |
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests O Olukoya, L Mackenzie, I Omoronyia Computers & Security 89, 101685, 2020 | 25 | 2020 |
Ontology-guided requirements and safety analysis T Stålhane, I Omoronyia, F Reicenbach | 21 | 2010 |
Exploring a Bayesian and linear approach to requirements traceability I Omoronyia, G Sindre, T Stålhane Information and Software Technology 53 (8), 851-871, 2011 | 20 | 2011 |
Adaptive security and privacy in smart grids: A software engineering vision M Salehie, L Pasquale, I Omoronyia, B Nuseibeh 2012 First International Workshop on Software Engineering Challenges for the …, 2012 | 19 | 2012 |
Use case to source code traceability: The developer navigation view point I Omoronyia, G Sindre, M Roper, J Ferguson, M Wood 2009 17th IEEE International Requirements Engineering Conference, 237-242, 2009 | 19 | 2009 |
Systems and methods for runtime adaptive security to protect variable assets M Salehie, L Pasquale, C Menghi, I Omoronyia, B Nuseibeh US Patent 9,330,262, 2016 | 18 | 2016 |
A 3-dimensional relevance model for collaborative software engineering spaces I Omoronyia, J Ferguson, M Roper, M Wood International Conference on Global Software Engineering (ICGSE 2007), 204-216, 2007 | 15 | 2007 |