Works (6)

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

Empirical Software Engineering, 22(4), 2127–2178.

By: M. Riaz, J. King, J. Slankas, L. Williams, F. Massacci, C. Quesada-Lopez, M. Jenkins

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

To log, or not to log: Using heuristics to identify mandatory log events - a controlled experiment

Empirical Software Engineering, 22(5), 2684–2717.

By: J. King, J. Stallings, M. Riaz & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

systematically developing prevention, detection, and response patterns for security requirements

2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

How have we evaluated software pattern application? A systematic mapping study of research design practices

Information and Software Technology, 65, 14–38.

By: M. Riaz, T. Breaux & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz, J. King, J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Towards a framework to measure security expertise in requirements analysis

2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18.

By: H. Hibshi, T. Breaux, M. Riaz & L. Williams

Source: NC State University Libraries
Added: August 6, 2018