Works (6)

Updated: July 5th, 2023 15:43

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.

By: M. Riaz n, J. King n, J. Slankas n, L. Williams n, F. Massacci*, C. Quesada-Lopez*, M. Jenkins*

co-author countries: Costa Rica 🇨🇷 Italy 🇮🇹 United States of America 🇺🇸
author keywords: Security requirements; Controlled experiment; Replication; Requirements engineering; Templates; Patterns; Automation
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik n, K. Lubick n, J. Smith n, J. Slankas n & E. Murphy-Hill n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz n, J. King n, J. Slankas n & L. Williams n

co-author countries: United States of America 🇺🇸
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2013 article

Access Control Policy Extraction from Unconstrained Natural Language Text

2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), pp. 435–440.

By: J. Slankas n & L. Williams n

co-author countries: United States of America 🇺🇸
author keywords: access control; documentation; machine learning; natural language processing; relation extraction; security
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Automated extraction of non-functional requirements in available documentation

2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16.

By: J. Slankas n & L. Williams n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Implementing database access control policy from unconstrained natural language text

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360.

By: J. Slankas n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.