Works (6)

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

Empirical Software Engineering, 22(4), 2127–2178.

By: M. Riaz, J. King, J. Slankas, L. Williams, F. Massacci, C. Quesada-Lopez, M. Jenkins

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

FUSE: A reproducible, extendable, internet-scale corpus of spreadsheets

12th Working Conference on Mining Software Repositories (MSR 2015), 486–489.

By: T. Barik, K. Lubick, J. Smith, J. Slankas & E. Murphy-Hill

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz, J. King, J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Access control policy extraction from unconstrained natural language text

2013 ASE/IEEE International Conference on Social Computing (SocialCom), 435–440.

By: J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Automated extraction of non-functional requirements in available documentation

2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16.

By: J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Implementing database access control policy from unconstrained natural language text

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360.

By: J. Slankas

Source: NC State University Libraries
Added: August 6, 2018