Works (6)

Updated: July 5th, 2023 15:40

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.

By: M. Riaz n, J. King n, J. Slankas n, L. Williams n, F. Massacci*, C. Quesada-Lopez*, M. Jenkins*

co-author countries: Costa Rica 🇨🇷 Italy 🇮🇹 United States of America 🇺🇸
author keywords: Security requirements; Controlled experiment; Replication; Requirements engineering; Templates; Patterns; Automation
Sources: Web Of Science, ORCID
Added: August 6, 2018

2017 journal article

To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment

EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717.

By: J. King n, J. Stallings n, M. Riaz n & L. Williams n

co-author countries: United States of America 🇺🇸
author keywords: Logging; User activity logs; Security; Controlled experiment; User study; Mandatory log events
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

systematically developing prevention, detection, and response patterns for security requirements

2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.

Maria Riaz; Sarah Elder; Laurie Williams

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

How have we evaluated software pattern application? A systematic mapping study of research design practices

INFORMATION AND SOFTWARE TECHNOLOGY, 65, 14–38.

By: M. Riaz n, T. Breaux* & L. Williams n

co-author countries: United States of America 🇺🇸
author keywords: Software pattern; Mapping study; Systematic review; Empirical evaluation; Empirical design
Source: Web Of Science
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz n, J. King n, J. Slankas n & L. Williams n

co-author countries: United States of America 🇺🇸
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2014 conference paper

Towards a framework to measure security expertise in requirements analysis

2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18.

By: H. Hibshi*, T. Breaux, M. Riaz n & L. Williams n

co-author countries: Saudi Arabia 🇸🇦 United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.