John Slankas Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-Lopez, C., & Jenkins, M. (2017). Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178. https://doi.org/10.1007/s10664-016-9481-1 Barik, T., Lubick, K., Smith, J., Slankas, J., & Murphy-Hill, E. (2015). FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets. 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489. https://doi.org/10.1109/msr.2015.70 Riaz, M., King, J., Slankas, J., & Williams, L. (2014). Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 2014 ieee 22nd international requirements engineering conference (re), 183–192. https://doi.org/10.1109/re.2014.6912260 Slankas, J., & Williams, L. (2013). Access Control Policy Extraction from Unconstrained Natural Language Text. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), pp. 435–440. https://doi.org/10.1109/socialcom.2013.68 Slankas, J., & Williams, L. (2013). Automated extraction of non-functional requirements in available documentation. 2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16. https://doi.org/10.1109/naturalise.2013.6611715 Slankas, J. (2013). Implementing database access control policy from unconstrained natural language text. Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360. https://doi.org/10.1109/icse.2013.6606716