HHCitations.bib

@INPROCEEDINGS{HB17,
author={H. Hibshi and T. D. Breaux},
booktitle={2017 IEEE 25th International Requirements Engineering Conference (RE)},
title={Reinforcing Security Requirements with Multifactor Quality Measurement},
year={2017},
pages={144-153},
keywords={formal specification;natural languages;security of data;software quality;statistical analysis;MQM;Multifactor Quality Method;Multifactor Quality measurement;elicited expert preferences;minimal analyst expertise;natural language scenarios;quantitative statistical analysis;requirements analysts;security quality ratings;security requirements elicitation;security requirements reinforcement;weak security constraints;Analytical models;Authentication;Databases;Operating systems;Requirements engineering;Stakeholders;context;qualitative analysis;requirements elicitation;scenarios;security requirements;user study;vignettes},
doi={10.1109/RE.2017.77},
month={Sept},}


@INPROCEEDINGS{HBW16,
author={H. Hibshi and T. D. Breaux and C. Wagner},
booktitle={2016 IEEE Symposium Series on Computational Intelligence (SSCI)},
title={Improving security requirements adequacy},
year={2016},
pages={1-8},
keywords={Frequency selective surfaces;Fuzzy logic;Fuzzy sets;Pragmatics;Reliability;Security;Uncertainty;fuzzy logic;recommender system;scenarios;security requirements;type-2;uncertainty;user study;vignettes},
doi={10.1109/SSCI.2016.7849906},
month={Dec},}


@inproceedings{BBHF16,
 author = {Bhatia, Jaspreet and Breaux, Travis D. and Friedberg, Liora and Hibshi, Hanan and Smullen, Daniel},
 title = {Privacy Risk in Cybersecurity Data Sharing},
 booktitle = {Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security},
 series = {WISCS '16},
 year = {2016},
 isbn = {978-1-4503-4565-1},
 location = {Vienna, Austria},
 pages = {57--64},
 numpages = {8},
 url = {http://doi.acm.org/10.1145/2994539.2994541},
 doi = {10.1145/2994539.2994541},
 acmid = {2994541},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cybersecurity data sharing, data usage, personal privacy, risk perception},
}





@article{HBRW16,

  author = {Hibshi, Hanan and Breaux, Travis D. and Riaz, Maria and Williams, Laurie},
	title = {A grounded analysis of experts{\textquoteright} decision-making during security assessments},
	year = {2016},
	doi = {10.1093/cybsec/tyw010},
	publisher = {The Oxford University Press},
	issn = {2057-2085},
	URL = {http://cybersecurity.oxfordjournals.org/content/early/2016/10/04/cybsec.tyw010},
	eprint = {http://cybersecurity.oxfordjournals.org/content/early/2016/10/04/cybsec.tyw010.full.pdf},
	journal = {Journal of Cybersecurity}
}
@inproceedings{HBB15,

  author={Hibshi, Hanan and Breaux, Travis D. and Broomell, Stephen B.},
	booktitle={2015 IEEE 23rd International Requirements Engineering Conference (RE15)},
	title={Assessment of risk perception in security requirements composition},
	year={2015},
	pages={146-155},
	keywords={Analytical models;Atmospheric measurements;Computational modeling;Cryptography;Particle measurements;Standards;factor surveys;requirements elicitation;security requirements;user study;vignettes},
	doi={10.1109/RE.2015.7320417}
}
@inproceedings{BSH15,

author={Breaux, Travis D. and Smullen, Daniel and Hibshi, Hanan},
booktitle={2015 IEEE 23rd International Requirements Engineering Conference (RE15)},
title={Detecting repurposing and over-collection in multi-party privacy requirements specifications},
year={2015},
pages={166-175},
keywords={Advertising;Data privacy;Facebook;Limiting;Privacy;Terminology;Data flow analysis;privacy principles;requirements validation},
doi={10.1109/RE.2015.7320419}
}
@INPROCEEDINGS{HBRW14,
author={H. Hibshi and T. Breaux and M. Riaz and L. Williams},
booktitle={2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)},
title={Towards a framework to measure security expertise in requirements analysis},
year={2014},
pages={13-18},
keywords={decision making;formal specification;security of data;source code (software);coding theory;cognitive theory;decision-making patterns;decision-making process;grounded analysis;network diagrams;requirements checklist;security expertise;security experts;security requirements analysis;security vulnerabilities;situation awareness;source code;specifications ambiguity;Decision making;Encoding;Firewalls (computing);Interviews;Software;Uncertainty;Security;decision-making;patterns;requirements analysis;situation awareness},
doi={10.1109/ESPRE.2014.6890522},  
month={Aug},}

@inproceedings{BHRL12,
  author = {Breaux, T.D. and Hibshi, H. and Rao, A. and Lehker, J.},
  booktitle = {IEEE Second International Workshop on Requirements Patterns (RePa)},
  title = {Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns},
  year = {2012},
  pages = {41-47},
  doi = {10.1109/RePa.2012.6359975}
}
@inproceedings{HVC11,
  author = {Hibshi, H. and Vidas, T. and Cranor, L.F.},
  booktitle = {Sixth International Conference on IT Security Incident Management and IT Forensics (IMF)},
  title = {Usability of Forensics Tools: A User Study},
  year = {2011},
  pages = {81-91},
  doi = {10.1109/IMF.2011.19}
}
@inproceedings{RHBL14,
   author = {Rao, Ashwini and Hibshi, Hanan and Breaux, Travis and Lehker, Jean-Michel and Niu, Jianwei},
 title = {Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer},
 booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security},
 series = {HotSoS '14},
 year = {2014},
 isbn = {978-1-4503-2907-1},
 location = {Raleigh, North Carolina, USA},
 pages = {7:1--7:12},
 articleno = {7},
 numpages = {12},
 url = {http://doi.acm.org/10.1145/2600176.2600182},
 doi = {10.1145/2600176.2600182},
 acmid = {2600182},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {analogical transfer, human factors, psychology, security}
}
@article{BHR13,
  author = {Breaux, TravisD. and Hibshi, Hanan and Rao, Ashwini},
  year = {2014},
  issn = {0947-3602},
  journal = {Requirements Engineering},
  title = {Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements},
  url = {http://dx.doi.org/10.1007/s00766-013-0190-7},
  publisher = {Springer London},
  keywords = {Privacy; Requirements; Standardization; Description logic; Formal analysis},
  pages = {1-27},
  language = {English},
  doi = {10.1007/s00766-013-0190-7}
}

This file was generated by bibtex2html 1.97.