Works (6)
2016 article
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-López, C., & Jenkins, M. (2016, December 16). Empirical Software Engineering, Vol. 22, pp. 2127–2178.
2016 article
To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment
King, J., Stallings, J., Riaz, M., & Williams, L. (2016, August 24). Empirical Software Engineering, Vol. 22, pp. 2684–2717.
Contributors: J. King n , J. Stallings n, n & L. Williams n
2016 conference paper
systematically developing prevention, detection, and response patterns for security requirements
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.
2015 article
How have we evaluated software pattern application? A systematic mapping study of research design practices
Riaz, M., Breaux, T., & Williams, L. (2015, April 11). Information and Software Technology.
2014 article
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
Riaz, M., King, J., Slankas, J., & Williams, L. (2014, August 1). 2014 Ieee 22nd International Requirements Engineering Conference (Re), pp. 183–192.
2014 article
Towards a framework to measure security expertise in requirements analysis
Hibshi, H., Breaux, T., Riaz, M., & Williams, L. (2014, August 1).