publications

 
 

Here is a list of papers that are related to my current research interests. My previous work can be found at my Google Scholar page, which is supposed to have complete and up-to-date information.

Conference

  1. Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers and John Mylopoulos. Analyzing Attack Strategies Through Anti-goal Refinement. 8th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling (PoEM 2015), Valencia, 2015, 75-90.


  1. Tong Li, Jennifer Horkoff, and John Mylopoulos. Analyzing and Enforcing Security Mechanisms on Requirements Specifications. Requirements Engineering: Foundation for Software Quality. Springer International Publishing, 2015, 115-131.


  1. Tong Li and Jennifer Horkoff. Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach. 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), Thessaloniki, 2014, 285-300. Acceptance rate: 18% (41/226).


  1. Tong Li, Jennifer Horkoff, and John Mylopoulos. Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models. 7th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling (PoEM 2014), Manchester, 2014, 208-223.


  1. Jennifer Horkoff, Tong Li, Fenglin Li, João Pimentel, Mattia Salnitri, Evellin Cardoso, Paolo Giorgini, and John Mylopoulos. Taking Goal Models Downstream: A Systematic Roadmap. 8th IEEE International Conference on Research Challenges in Information Science (RCIS 2014), Marrakesh, 2014. Best paper award.


  1. Jenifer Horkoff, Fatma Başak Aydemir, Fenglin Li, Tong Li, and John Mylopoulos. Evaluating Modeling Languages: An Example from the Requirements Domain. 33rd International Conference on Conceptual Modeling (ER 2014), Atlanta, 2014.


  1. Yudis Asnar, Tong Li, Fabio Massacci, and Federica Paci. Computer Aided Threat Identification. 13th IEEE Conference on Commerce and Enterprise Computing, Luxembourg, 2011. Acceptance rate: 24% (21/88).

Workshop

  1. Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff and Kristian Beckers. Holistic security requirements analysis: An attacker's perspective. Requirements Engineering Conference (RE), 2015 IEEE 23rd International, 282-283.


  1. Tong Li, Jennifer Horkoff, and John Mylopoulos. A Prototype Tool for Modeling and 2014 Analyzing Security Requirements from A Holistic Viewpoint. 26th International Conference on Advanced Information Systems Engineering Forum (CAISE 2014 Forum), 2014.

  1. Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja and John Mylopoulos. A Holistic Approach to Security Attack Modeling and Analysis. 8th International i* Workshop (iStar15), Ottawa, 2015, 49-54.


  1. Tong Li and John Mylopoulos. Modeling and Applying Security Patterns Using Contextual Goal Models. 7th International i* Workshop (iStar14), Thessaloniki, 2014.

Poster and Demo