Maria Riaz Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-Lopez, C., & Jenkins, M. (2017). Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178. https://doi.org/10.1007/s10664-016-9481-1 King, J., Stallings, J., Riaz, M., & Williams, L. (2017). To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment. EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717. https://doi.org/10.1007/s10664-016-9449-1 systematically developing prevention, detection, and response patterns for security requirements. (2016). 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67. Riaz, M., Breaux, T., & Williams, L. (2015). How have we evaluated software pattern application? A systematic mapping study of research design practices. INFORMATION AND SOFTWARE TECHNOLOGY, 65, 14–38. https://doi.org/10.1016/j.infsof.2015.04.002 Riaz, M., King, J., Slankas, J., & Williams, L. (2014). Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 2014 ieee 22nd international requirements engineering conference (re), 183–192. https://doi.org/10.1109/re.2014.6912260 Hibshi, H., Breaux, T., Riaz, M., & Williams, L. (2014). Towards a framework to measure security expertise in requirements analysis. 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18. https://doi.org/10.1109/espre.2014.6890522