Works (6)

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.

By: M. Riaz, J. King, J. Slankas, L. Williams, F. Massacci*, C. Quesada-Lopez*, M. Jenkins*

author keywords: Security requirements; Controlled experiment; Replication; Requirements engineering; Templates; Patterns; Automation
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik, K. Lubick, J. Smith, J. Slankas & E. Murphy-Hill

Source: Web Of Science
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz, J. King, J. Slankas & L. Williams

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2013 article

Access Control Policy Extraction from Unconstrained Natural Language Text

2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), pp. 435–440.

By: J. Slankas & L. Williams

author keywords: access control; documentation; machine learning; natural language processing; relation extraction; security
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Automated extraction of non-functional requirements in available documentation

2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16.

By: J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Implementing database access control policy from unconstrained natural language text

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360.

By: J. Slankas

Source: NC State University Libraries
Added: August 6, 2018