Pauline Anthonysamy
Title
Cited by
Cited by
Year
Scientific Research
SS SOM, P ANTHONYSAMY
153*
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game
S Frey, A Rashid, P Anthonysamy, M Pinto-Albuquerque, SA Naqvi
IEEE Transactions on Software Engineering 45 (5), 521-536, 2017
392017
Social networking privacy: Understanding the disconnect from policy to controls
P Anthonysamy, P Greenwood, A Rashid
Computer 46 (6), 60-67, 2013
372013
Privacy requirements: Present & future
P Anthonysamy, A Rashid, R Chitchyan
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
242017
Collaborative privacy management for third-party applications in online social networks
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Proceedings of the 1st Workshop on Privacy and Security in Online Social …, 2012
202012
Do the privacy policies reflect the privacy controls on social networks?
P Anthonysamy, A Rashid, P Greenwood
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
192011
A method for analysing traceability between privacy policies and privacy controls of online social networks
P Anthonysamy, P Greenwood, A Rashid
Annual Privacy Forum, 187-202, 2012
162012
An approach for aspect-oriented use case modeling
SS Somé, P Anthonysamy
Proceedings of the 13th international workshop on Early Aspects, 27-34, 2008
112008
Aspect-oriented use case modeling for software product lines
P Anthonysamy, SS Somé
Proceedings of the 2008 AOSD workshop on Early aspects, 1-8, 2008
102008
Schrödinger's security: opening the box on app developers' security rationale
D van der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
82020
Hidden in plain sight: Obfuscated strings threatening your privacy
L Glanz, P Müller, L Baumgärtner, M Reif, S Amann, P Anthonysamy, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
62020
Reducing Permission Requests in Mobile Apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the Internet Measurement Conference, 259-266, 2019
62019
Inferring semantic mapping between policies and code: the clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
62016
Software engineering for privacy in-the-large
P Anthonysamy, A Rashid
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
42015
Can privacy policies be traced to privacy controls on social networking sites?: A qualitative study
P Anthonysamy, P Greenwood, A Rashid
Computer, 1, 2012
32012
Taming unbounded variability in service engineering
P Anthonysamy, A Rashid, A Rummler
International Conference on Business Process Management, 615-619, 2010
22010
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
12020
Collaborative Privacy Management for Third-Party Applications
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Arizona State University, 2011
2011
Modeling Crosscutting Concerns in Use Cases Using Aspect-oriented Techniques
P Anthonysamy
ProQuest, 2008
2008
Modélisation orientée-aspects de systèmes de ligne de produits par des cas d'utilisations
SS Somé, P Anthonysamy
L'Objet (Paris) 14 (3), 59-73, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20