default search action
Inah Omoronyia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Sana Belguith, Inah Omoronyia, Ruzanna Chitchyan:
Personal Data-Less Personalized Software Applications. SIGSOFT FSE Companion 2024: 477-481 - 2023
- [j8]Saad Alahmari, Karen Renaud, Inah Omoronyia:
Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf. Syst. E Bus. Manag. 21(1): 123-158 (2023) - 2021
- [c22]Peter Inglis, Inah Omoronyia:
Analysing Privacy Conflicts in Web-Based Systems. RE 2021: 430-431 - 2020
- [j7]Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. Comput. Secur. 89 (2020) - [j6]Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Towards using unstructured user input request for malware detection. Comput. Secur. 93: 101783 (2020) - [c21]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
Implement a Model for Describing and Maximising Security Knowledge Sharing. ICITST 2020: 1-4
2010 – 2019
- 2019
- [j5]Inah Omoronyia, Ubong Etuk, Peter Inglis:
A Privacy Awareness System for Software Design. Int. J. Softw. Eng. Knowl. Eng. 29(10): 1557-1604 (2019) - [c20]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. EMCIS 2019: 376-390 - [c19]Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Permission-based Risk Signals for App Behaviour Characterization in Android Apps. ICISSP 2019: 183-192 - 2018
- [c18]Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Systematic Review of Information Security Knowledge-Sharing Research. HAISA 2018: 101-110 - 2017
- [c17]Inah Omoronyia:
Privacy engineering in dynamic settings. ICSE (Companion Volume) 2017: 297-299 - 2016
- [j4]Inah Omoronyia:
The Case for Privacy Awareness Requirements. Int. J. Secur. Softw. Eng. 7(2): 19-36 (2016) - [c16]Inah Omoronyia:
Reasoning with imprecise privacy preferences. SIGSOFT FSE 2016: 952-955 - 2013
- [c15]Inah Omoronyia, Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, Bashar Nuseibeh:
Engineering adaptive privacy: on the role of privacy awareness requirements. ICSE 2013: 632-641 - [p2]Olawande J. Daramola, Tor Stålhane, Inah Omoronyia, Guttorm Sindre:
Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis. Managing Requirements Knowledge 2013: 117-141 - 2012
- [c14]Raian Ali, Carlos Solís, Inah Omoronyia, Mazeiar Salehie, Bashar Nuseibeh:
Social Adaptation - When Software Gives Users a Voice. ENASE 2012: 75-84 - [c13]Raian Ali, Carlos Solís, Inah Omoronyia, Mazeiar Salehie, Bashar Nuseibeh:
Social Adaptation at Runtime. ENASE (Selected Papers) 2012: 110-127 - [c12]Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Bashar Nuseibeh:
Adaptive security and privacy in smart grids: a software engineering vision. SE4SG@ICSE 2012: 46-49 - [c11]Liliana Pasquale, Mazeiar Salehie, Raian Ali, Inah Omoronyia, Bashar Nuseibeh:
On the role of primary and secondary assets in adaptive security: An application in smart grids. SEAMS 2012: 165-170 - [c10]Inah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin J. Doherty, Bashar Nuseibeh:
Caprice: a tool for engineering adaptive privacy. ASE 2012: 354-357 - [c9]Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Raian Ali, Bashar Nuseibeh:
Requirements-driven adaptive security: Protecting variable assets at runtime. RE 2012: 111-120 - [c8]Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles B. Haley, Inah Omoronyia, Bashar Nuseibeh:
Privacy arguments: Analysing selective disclosure requirements for mobile applications. RE 2012: 131-140 - [c7]Liliana Pasquale, Claudio Menghi, Mazeiar Salehie, Luca Cavallaro, Inah Omoronyia, Bashar Nuseibeh:
SecuriTAS: a tool for engineering adaptive security. SIGSOFT FSE 2012: 19 - 2011
- [j3]Inah Omoronyia, Guttorm Sindre, Tor Stålhane:
Exploring a Bayesian and linear approach to requirements traceability. Inf. Softw. Technol. 53(8): 851-871 (2011) - [c6]Stefan Farfeleder, Thomas Moser, Andreas Krall, Tor Stålhane, Inah Omoronyia, Herbert Zojer:
Ontology-Driven Guidance for Requirements Elicitation. ESWC (2) 2011: 212-226 - [c5]Olawande J. Daramola, Tor Stålhane, Guttorm Sindre, Inah Omoronyia:
Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. MARK@RE 2011: 3-11 - [c4]Raian Ali, Carlos Solís, Mazeiar Salehie, Inah Omoronyia, Bashar Nuseibeh, Walid Maalej:
Social sensing: when users become monitors. SIGSOFT FSE 2011: 476-479 - [p1]Inah Omoronyia, Guttorm Sindre, Stefan Biffl, Tor Stålhane:
Understanding Architectural Elements from Requirements Traceability Networks. Relating Software Requirements and Architectures 2011: 61-83 - 2010
- [j2]Inah Omoronyia, John D. Ferguson, Marc Roper, Murray Wood:
A review of awareness in distributed collaborative software engineering. Softw. Pract. Exp. 40(12): 1107-1133 (2010) - [c3]Inah Omoronyia, Guttorm Sindre, Tor Stålhane, Stefan Biffl, Thomas Moser, Wikan Danar Sunindyo:
A Domain Ontology Building Process for Guiding Requirements Elicitation. REFSQ 2010: 188-202
2000 – 2009
- 2009
- [j1]Inah Omoronyia, John D. Ferguson, Marc Roper, Murray Wood:
Using Developer Activity Data to Enhance Awareness during Collaborative Software Development. Comput. Support. Cooperative Work. 18(5-6): 509-558 (2009) - [c2]Inah Omoronyia, Guttorm Sindre, Marc Roper, John D. Ferguson, Murray Wood:
Use Case to Source Code Traceability: The Developer Navigation View Point. RE 2009: 237-242 - 2008
- [b1]Inah Omoronyia:
Sharing awareness during distributed collaborative software development. University of Strathclyde, Glasgow, UK, 2008 - 2007
- [c1]Inah Omoronyia, John D. Ferguson, Marc Roper, Murray Wood:
A 3-Dimensional Relevance Model for Collaborative Software Engineering Spaces. ICGSE 2007: 204-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint