Automated extraction of non-functional requirements in available documentation J Slankas, L Williams 2013 1st International workshop on natural language analysis in software …, 2013 | 178 | 2013 |
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts M Riaz, J King, J Slankas, L Williams 2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014 | 101 | 2014 |
Relation extraction for inferring access control rules from natural language artifacts J Slankas, X Xiao, L Williams, T Xie Proceedings of the 30th annual computer security applications conference …, 2014 | 59 | 2014 |
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 486-489, 2015 | 44 | 2015 |
Access control policy extraction from unconstrained natural language text J Slankas, L Williams 2013 International Conference on Social Computing, 435-440, 2013 | 35 | 2013 |
DIGS: A framework for discovering goals for security requirements engineering M Riaz, J Stallings, MP Singh, J Slankas, L Williams Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016 | 32 | 2016 |
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ... Empirical software engineering 22, 2127-2178, 2017 | 28 | 2017 |
Using templates to elicit implied security requirements from functional requirements-a controlled experiment M Riaz, J Slankas, J King, L Williams Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014 | 27 | 2014 |
Task-driven software summarization D Binkley, D Lawrie, E Hill, J Burge, I Harris, R Hebig, O Keszocze, ... 2013 IEEE International Conference on Software Maintenance, 432-435, 2013 | 25 | 2013 |
Learning contextual embeddings for knowledge graph completion C Moon, S Harenberg, J Slankas, N Samatova Pacific Asia Conference on Information Systems (PACIS) 10 (3132847.3133095), 2017 | 16 | 2017 |
Classifying natural language sentences for policy J Slankas, L Williams 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 12 | 2012 |
Access control policy identification and extraction from project documentation J Slankas, L Williams Science 2 (3), 145-159, 2013 | 9 | 2013 |
Implementing database access control policy from unconstrained natural language text J Slankas 2013 35th International Conference on Software Engineering (ICSE), 1357-1360, 2013 | 7 | 2013 |
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill IEEE, IEEE/ACM, Florence, Italy, 486-489, 2015 | 6 | 2015 |
Discovering security requirements from natural language project artifacts J Slankas, M Riaz, J King, LA Williams North Carolina State University. Dept. of Computer Science, 2013 | 2 | 2013 |
Implementing Database Access Control Policy from Unconstrained Natural Language Text JB Slankas North Carolina State University, 2015 | 1 | 2015 |
Extracting database role based access control from unconstrained natural language text J Slankas, LA Williams North Carolina State University. Dept. of Computer Science, 2012 | 1 | 2012 |
DIGS M Riaz, J Stallings, MP Singh, J Slankas, L Williams Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016 | | 2016 |
Discovering Security Requirements from Natural Language J Slankas, M Riaz, J King, L Williams, ... | | 2014 |
External Reviewers file:///L:/JOBS/55479 IEEE ISSRE/55479 HTML Flash Drive/HTML/da... A Bosu, A Bandyopadhyay, A Nanthaamornphong, B Tegawendé, ... | | |