2016 journal article
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.
2016 journal article
To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment
EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717.
Contributors: J. King n , J. Stallings n, n & L. Williams n
2016 conference paper
systematically developing prevention, detection, and response patterns for security requirements
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.
2015 journal article
How have we evaluated software pattern application? A systematic mapping study of research design practices
INFORMATION AND SOFTWARE TECHNOLOGY, 65, 14–38.
2014 conference paper
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
2014 ieee 22nd international requirements engineering conference (re), 183–192.
2014 conference paper
Towards a framework to measure security expertise in requirements analysis
2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.