default search action
Thein Than Tun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Thein Than Tun, Loulin Huang, Mark Anthony Preece:
Development and High-Fidelity Simulation of Trajectory Tracking Control Schemes of a UUV for Fish Net-Pen Visual Inspection in Offshore Aquaculture. IEEE Access 11: 135764-135787 (2023) - [c43]Irum Rauf, Marian Petre, Thein Than Tun, Tamara Lopez, Bashar Nuseibeh:
Security Thinking in Online Freelance Software Development. ICSE (SEIS) 2023: 13-24 - 2021
- [j11]Thejus Pathmakumar, Vinu Sivanantham, Saurav Ghante Anantha Padmanabha, Mohan Rajesh Elara, Thein Than Tun:
Towards an Optimal Footprint Based Area Coverage Strategy for a False-Ceiling Inspection Robot. Sensors 21(15): 5168 (2021) - [j10]S. M. Bhagya P. Samarakoon, M. A. Viraj J. Muthugala, Raihan Enjikalayil Abdulkader, Soh Wei Si, Thein Than Tun, Mohan Rajesh Elara:
Modelling and Control of a Reconfigurable Robot for Achieving Reconfiguration and Locomotion with Different Shapes. Sensors 21(16): 5362 (2021) - 2020
- [j9]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
Taking the Middle Path: Learning About Security Through Online Social Interaction. IEEE Softw. 37(1): 25-30 (2020) - [c42]Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. ICSE 2020: 149-160 - [c41]Thein Than Tun, Amel Bennaceur, Bashar Nuseibeh:
OASIS: Weakening User Obligations for Security-critical Systems. RE 2020: 113-124
2010 – 2019
- 2019
- [j8]Fayola Peters, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Text Filtering and Ranking for Security Bug Report Prediction. IEEE Trans. Software Eng. 45(6): 615-631 (2019) - [c40]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
An anatomy of security conversations in stack overflow. ICSE-SEIS 2019: 31-40 - [c39]Tamara Lopez, Helen Sharp, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
Talking about security with professional developers. CESSER-IP@ICSE 2019: 34-40 - [c38]Tamara Lopez, Helen Sharp, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh:
"Hopefully we are mostly secure": views on secure code in professional practice. CHASE@ICSE 2019: 61-68 - [p4]Amel Bennaceur, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements Engineering. Handbook of Software Engineering 2019: 51-92 - 2018
- [j7]Amel Bennaceur, Thein Than Tun, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Trans. Cyber Phys. Syst. 2(3): 21:1-21:25 (2018) - [c37]Liliana Pasquale, Dalal Alrajeh, Claudia Peersman, Thein Than Tun, Bashar Nuseibeh, Awais Rashid:
Towards forensic-ready software systems. ICSE (NIER) 2018: 9-12 - [c36]Tamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp:
An investigation of security conversations in stack overflow: perceptions of security and community involvement. SEAD@ICSE 2018: 26-32 - [c35]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - [c34]Thein Than Tun, Amel Bennaceur:
Agree to disagree: security requirements are different, but mechanisms for security adaptation are not. SEAMS@ICSE 2018: 194-195 - 2017
- [c33]Yijun Yu, Thein Than Tun:
Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection. SERF@ESEC/SIGSOFT FSE 2017: 10-11 - 2016
- [c32]Thein Than Tun, Blaine A. Price, Arosha K. Bandara, Yijun Yu, Bashar Nuseibeh:
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. RE Workshops 2016: 102-105 - 2015
- [j6]Yijun Yu, Virginia N. L. Franqueira, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh:
Automated analysis of security requirements through risk-based argumentation. J. Syst. Softw. 106: 102-116 (2015) - [j5]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - [c31]Thein Than Tun, Robyn R. Lutz, Brian Nakayama, Yijun Yu, Divita Mathur, Bashar Nuseibeh:
The Role of Environmental Assumptions in Failures of DNA Nanosystems. COUFLESS@ICSE 2015: 27-33 - [c30]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - 2014
- [j4]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [c29]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - [c28]Amel Bennaceur, Arosha K. Bandara, Michael Jackson, Wei Liu, Lionel Montrieux, Thein Than Tun, Yijun Yu, Bashar Nuseibeh:
Requirements-driven mediation for collaborative security. SEAMS 2014: 37-42 - [i1]Liliana Pasquale, Yijun Yu, Luca Cavallaro, Mazeiar Salehie, Thein Than Tun, Bashar Nuseibeh:
Engineering Adaptive Digital Investigations using Forensics Requirements. CoRR abs/1402.0997 (2014) - 2013
- [j3]Thein Than Tun, Robin C. Laney, Yijun Yu, Bashar Nuseibeh:
Specifying software features for composition: A tool-supported approach. Comput. Networks 57(12): 2454-2464 (2013) - [j2]Arnaud Hubaux, Thein Than Tun, Patrick Heymans:
Separation of concerns in feature diagram languages: A systematic survey. ACM Comput. Surv. 45(4): 51:1-51:23 (2013) - [c27]Liliana Pasquale, Yijun Yu, Mazeiar Salehie, Luca Cavallaro, Thein Than Tun, Bashar Nuseibeh:
Requirements-driven adaptive digital forensics. RE 2013: 340-341 - [p3]Arnaud Hubaux, Mathieu Acher, Thein Than Tun, Patrick Heymans, Philippe Collet, Philippe Lahire:
Separating Concerns in Feature Models: Retrospective and Support for Multi-Views. Domain Engineering, Product Lines, Languages, and Conceptual Models 2013: 3-28 - [p2]Saad Bin Saleem, Lionel Montrieux, Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies. Aspect-Oriented Requirements Engineering 2013: 167-181 - [p1]Thein Than Tun, Yijun Yu, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Aspect Interactions: A Requirements Engineering Perspective. Aspect-Oriented Requirements Engineering 2013: 271-286 - 2012
- [c26]Azadeh Alebrahim, Thein Than Tun, Yijun Yu, Maritta Heisel, Bashar Nuseibeh:
An Aspect-Oriented Approach to Relating Security Requirements and Access Control. CAiSE Forum 2012: 15-22 - [c25]Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles B. Haley, Inah Omoronyia, Bashar Nuseibeh:
Privacy arguments: Analysing selective disclosure requirements for mobile applications. RE 2012: 131-140 - 2011
- [c24]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56 - [c23]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125 - [c22]Fabio Massacci, John Mylopoulos, Federica Paci, Thein Than Tun, Yijun Yu:
An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636 - [c21]Yijun Yu, Thein Than Tun, Arosha K. Bandara, Tian Zhang, Bashar Nuseibeh:
From Model-Driven Software Development Processes to Problem Diagnoses at Runtime. Models@run.time@Dagstuhl 2011: 188-207 - [c20]Yijun Yu, Thein Than Tun, Bashar Nuseibeh:
Specifying and detecting meaningful changes in programs. ASE 2011: 273-282 - [c19]Virginia N. L. Franqueira, Zornitza Bakalova, Thein Than Tun, Maya Daneva:
Towards agile security risk management in RE and beyond. EmpiRE 2011: 33-36 - [c18]Virginia N. L. Franqueira, Thein Than Tun, Yijun Yu, Roel J. Wieringa, Bashar Nuseibeh:
Risk and argument: A risk-based argumentation method for practical security. RE 2011: 239-248 - [c17]Yijun Yu, Thein Than Tun, Alessandra Tedeschi, Virginia N. L. Franqueira, Bashar Nuseibeh:
OpenArgue: Supporting argumentation to evolve secure software systems. RE 2011: 351-352 - [c16]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322 - 2010
- [c15]Sam Supakkul, Tom Hill, Lawrence Chung, Thein Than Tun, Julio César Sampaio do Prado Leite:
An NFR Pattern Approach to Dealing with NFRs. RE 2010: 179-188 - [c14]Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh:
Model-Based Argument Analysis for Evolving Security Requirements. SSIRI 2010: 88-97
2000 – 2009
- 2009
- [j1]Thein Than Tun, Tim Trew, Michael Jackson, Robin C. Laney, Bashar Nuseibeh:
Specifying features of an evolving software system. Softw. Pract. Exp. 39(11): 973-1002 (2009) - [c13]Thein Than Tun, Rod Chapman, Charles B. Haley, Robin C. Laney, Bashar Nuseibeh:
A Framework for Developing Feature-Rich Software Systems. ECBS 2009: 206-214 - [c12]Andreas Classen, Patrick Heymans, Thein Than Tun, Bashar Nuseibeh:
Towards safer composition. ICSE Companion 2009: 227-230 - [c11]Thein Than Tun, Michael Jackson, Robin C. Laney, Bashar Nuseibeh, Yijun Yu:
Are Your Lights Off? Using Problem Frames to Diagnose System Failures. RE 2009: 343-348 - [c10]Thein Than Tun, Yijun Yu, Robin C. Laney, Bashar Nuseibeh:
Early Identification of Problem Interactions: A Tool-Supported Approach. REFSQ 2009: 74-88 - [c9]Thein Than Tun, Quentin Boucher, Andreas Classen, Arnaud Hubaux, Patrick Heymans:
Relating requirements and feature configurations: a systematic approach. SPLC 2009: 201-210 - 2008
- [c8]Andreas Classen, Robin C. Laney, Thein Than Tun, Patrick Heymans, Arnaud Hubaux:
Using the event calculus to reason about problem diagrams. IWAAPF@ICSE 2008: 74-77 - [c7]Thein Than Tun, Jon G. Hall, Lucia Rapanotti, Karl Cox, Zhi Jin:
3rd international workshop on advances and applications of problem frames. ICSE Companion 2008: 1029-1030 - 2007
- [c6]Robin C. Laney, Thein Than Tun, Michael Jackson, Bashar Nuseibeh:
Composing Features by Managing Inconsistent Requirements. ICFI 2007: 129-144 - [c5]Andreas Classen, Patrick Heymans, Robin C. Laney, Bashar Nuseibeh, Thein Than Tun:
On the Structure of Problem Variability: From Feature Diagrams to Problem Frames. VaMoS 2007: 109-117 - [c4]Mohammed Salifu, Bashar Nuseibeh, Lucia Rapanotti, Thein Than Tun:
Using Problem Descriptions to Represent Variabilities For Context-Aware Applications. VaMoS 2007: 149-156 - 2006
- [c3]Thein Than Tun, Jon G. Hall:
Developer requirements in the PF approach. IWAAPF@ICSE 2006: 87-90 - 2005
- [b1]Thein Than Tun:
An assessment of existing component-based software development methodologies and a holistic approach to CBSD. London Metropolitan University, UK, 2005 - 2002
- [c2]Peter Bielkowicz, Preeti Patel, Thein Than Tun:
Evaluating Information Systems Development Methods: A New Framework. OOIS 2002: 311-322 - 2001
- [c1]Peter Bielkowicz, Thein Than Tun:
A Comparison and Evaluation of Data Requirement Specification Techniques in SSADM and the Unified Process. CAiSE 2001: 46-59
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint