Hanan Hibshi
Title
Cited by
Cited by
Year
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
TD Breaux, H Hibshi, A Rao
Requirements Engineering 19 (3), 281-307, 2014
762014
Usability of forensics tools: a user study
H Hibshi, T Vidas, L Cranor
2011 Sixth International Conference on IT Security Incident Management and …, 2011
482011
Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications
TD Breaux, D Smullen, H Hibshi
IEEE 23rd International Requirements Engineering Conference, 166 - 175, 2015
272015
Ask the Experts: What Should Be on an IoT Privacy and Security Label?
P Emami-Naeini, Y Agarwal, LF Cranor, H Hibshi
arXiv preprint arXiv:2002.04631, 2020
222020
Privacy Risk in Cybersecurity Data Sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
202016
Assessment of Risk Perception in Security Requirements Composition
H Hibshi, T Breaux, SB Broomell
2015 IEEE 23rd International Requirements Engineering Conference (RE), 146-155, 2015
152015
A Grounded Analysis of Experts' Decision-Making during Security Assessments
H Hibshi, TD Breaux, M Riaz, L Williams
Journal of Cybersecurity, 2016
142016
Towards a framework to measure security expertise in requirements analysis
H Hibshi, T Breaux, M Riaz, L Williams
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
92014
Improving security requirements adequacy
H Hibshi, TD Breaux, C Wagner
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
72016
Evaluation of linguistic labels used in applications
H Hibshi, TD Breaux
Carnegie Mellon University, 2016
62016
Rethinking security requirements in RE research
H Hibshi, R Slavin, J Niu, TD Breaux
Technical Report, Tech. Rep. Report CSTR-2014-001, 2014
62014
Discovering Decision-Making Patterns for Security Novices and Experts
H Hibshi
ISR TECHNICAL REPORTS, 2015
42015
Less is more? investigating the role of examples in security studies using analogical transfer
A Rao, H Hibshi, T Breaux, JM Lehker, J Niu
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014
42014
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
TD Breaux, H Hibshi, A Rao, JM Lehker
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012
32012
Composite Security Requirements in the Presence of Uncertainty
H Hibshi
PhD thesis, 2018
22018
Reinforcing security requirements with multifactor quality measurement
H Hibshi, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 144-153, 2017
22017
Systematic analysis of qualitative data in security
H Hibshi
Proceedings of the Symposium and Bootcamp on the Science of Security, 52-52, 2016
12016
Panel 12. Key Challenges in Design and Engineering Management of Programs
R Carlson, W Vaneman, D Rhodes, J Reid, H Hibshi, T Breaux
Sixteenth Annual Acquisition Research Symposium, 2019
2019
Decision Support for Cybersecurity Risk Assessment
H Hibshi, TD Breaux
Acquisition Research Program, 2017
2017
Usability of Digital Forensics Tools: A User Study
H Hibshi, T Vidas, L Cranor
IEEE, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20