Follow
Pauline Anthonysamy
Title
Cited by
Cited by
Year
Scientific Research
SS SOM, P ANTHONYSAMY
750*
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game
S Frey, A Rashid, P Anthonysamy, M Pinto-Albuquerque, SA Naqvi
IEEE Transactions on Software Engineering 45 (5), 521-536, 2017
942017
Privacy requirements: Present & future
P Anthonysamy, A Rashid, R Chitchyan
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
482017
Social networking privacy: Understanding the disconnect from policy to controls
P Anthonysamy, P Greenwood, A Rashid
Computer 46 (6), 60-67, 2013
482013
Schrödinger's security: opening the box on app developers' security rationale
D van der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
442020
Reducing Permission Requests in Mobile Apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the Internet Measurement Conference, 259-266, 2019
302019
Analyzing user perspectives on mobile app privacy at scale
P Nema, P Anthonysamy, N Taft, ST Peddinti
Proceedings of the 44th International Conference on Software Engineering …, 2022
262022
Hidden in plain sight: Obfuscated strings threatening your privacy
L Glanz, P Müller, L Baumgärtner, M Reif, S Amann, P Anthonysamy, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
252020
Do the privacy policies reflect the privacy controls on social networks?
P Anthonysamy, A Rashid, P Greenwood
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
252011
Collaborative privacy management for third-party applications in online social networks
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Proceedings of the 1st Workshop on Privacy and Security in Online Social …, 2012
242012
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
182020
A method for analysing traceability between privacy policies and privacy controls of online social networks
P Anthonysamy, P Greenwood, A Rashid
Annual Privacy Forum, 187-202, 2012
172012
An approach for aspect-oriented use case modeling
SS Somé, P Anthonysamy
Proceedings of the 13th international workshop on Early Aspects, 27-34, 2008
132008
Aspect-oriented use case modeling for software product lines
P Anthonysamy, SS Somé
Proceedings of the 2008 AOSD workshop on Early aspects, 1-8, 2008
132008
Inferring semantic mapping between policies and code: the clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
112016
Software engineering for privacy in-the-large
P Anthonysamy, A Rashid
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
42015
Can privacy policies be traced to privacy controls on social networking sites?: A qualitative study
P Anthonysamy, P Greenwood, A Rashid
Computer, 1, 2012
32012
Taming unbounded variability in service engineering
P Anthonysamy, A Rashid, A Rummler
International Conference on Business Process Management, 615-619, 2010
22010
Collaborative Privacy Management for Third-Party Applications
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Arizona State University, 2011
2011
Modeling crosscutting concerns in use cases using aspect-oriented techniques.
P Anthonysamy
Library and Archives Canada= Bibliothèque et Archives Canada, Ottawa, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20