Author of the publication

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.

, , , , , , and . Empirical Software Engineering, 22 (4): 2127-2178 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing database access control policy from unconstrained natural language text.. ICSE, page 1357-1360. IEEE Computer Society, (2013)DIGS: A Framework for Discovering Goals for Security Requirements Engineering., , , , and . ESEM, page 35:1-35:10. ACM, (2016)Using templates to elicit implied security requirements from functional requirements - a controlled experiment., , , and . ESEM, page 22:1-22:10. ACM, (2014)Classifying Natural Language Sentences for Policy., and . POLICY, page 33-36. IEEE Computer Society, (2012)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empirical Software Engineering, 22 (4): 2127-2178 (2017)Hidden in plain sight: Automatically identifying security requirements from natural language artifacts., , , and . RE, page 183-192. IEEE Computer Society, (2014)Access Control Policy Extraction from Unconstrained Natural Language Text., and . SocialCom, page 435-440. IEEE Computer Society, (2013)Relation extraction for inferring access control rules from natural language artifacts., , , and . ACSAC, page 366-375. ACM, (2014)Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets., , , , and . MSR, page 486-489. IEEE Computer Society, (2015)Task-Driven Software Summarization., , , , , , , , and . ICSM, page 432-435. IEEE Computer Society, (2013)