Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2016 journal article
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.
2015 article
FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets
12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.
2014 conference paper
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
2014 ieee 22nd international requirements engineering conference (re), 183–192.
2013 article
Access Control Policy Extraction from Unconstrained Natural Language Text
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), pp. 435–440.
2013 conference paper
Automated extraction of non-functional requirements in available documentation
2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16.
2013 conference paper
Implementing database access control policy from unconstrained natural language text
Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.