Follow
Pauline Anthonysamy
Title
Cited by
Cited by
Year
Scientific Research
SS SOM, P ANTHONYSAMY
640*
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game
S Frey, A Rashid, P Anthonysamy, M Pinto-Albuquerque, SA Naqvi
IEEE Transactions on Software Engineering 45 (5), 521-536, 2017
662017
Social networking privacy: Understanding the disconnect from policy to controls
P Anthonysamy, P Greenwood, A Rashid
Computer 46 (6), 60-67, 2013
472013
Privacy requirements: Present & future
P Anthonysamy, A Rashid, R Chitchyan
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
332017
Collaborative privacy management for third-party applications in online social networks
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Proceedings of the 1st Workshop on Privacy and Security in Online Social …, 2012
252012
Do the privacy policies reflect the privacy controls on social networks?
P Anthonysamy, A Rashid, P Greenwood
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
242011
Reducing Permission Requests in Mobile Apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the Internet Measurement Conference, 259-266, 2019
222019
Schrödinger's security: opening the box on app developers' security rationale
D van der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
212020
A method for analysing traceability between privacy policies and privacy controls of online social networks
P Anthonysamy, P Greenwood, A Rashid
Annual Privacy Forum, 187-202, 2012
182012
Hidden in plain sight: Obfuscated strings threatening your privacy
L Glanz, P Müller, L Baumgärtner, M Reif, S Amann, P Anthonysamy, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
152020
An approach for aspect-oriented use case modeling
SS Somé, P Anthonysamy
Proceedings of the 13th international workshop on Early Aspects, 27-34, 2008
132008
Inferring semantic mapping between policies and code: the clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
112016
Aspect-oriented use case modeling for software product lines
P Anthonysamy, SS Somé
Proceedings of the 2008 AOSD workshop on Early aspects, 1-8, 2008
112008
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
92020
Software engineering for privacy in-the-large
P Anthonysamy, A Rashid
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
42015
Can privacy policies be traced to privacy controls on social networking sites?: A qualitative study
P Anthonysamy, P Greenwood, A Rashid
Computer, 1, 2012
32012
Taming unbounded variability in service engineering
P Anthonysamy, A Rashid, A Rummler
International Conference on Business Process Management, 615-619, 2010
22010
Analyzing user perspectives on mobile app privacy at scale
P Nema, P Anthonysamy, N Taft, ST Peddinti
Proceedings of the 44th International Conference on Software Engineering …, 2022
12022
Collaborative Privacy Management for Third-Party Applications
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Arizona State University, 2011
2011
Modeling crosscutting concerns in use cases using aspect-oriented techniques.
P Anthonysamy
Library and Archives Canada= Bibliothèque et Archives Canada, Ottawa, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20