关注
John Slankas
标题
引用次数
引用次数
年份
Automated extraction of non-functional requirements in available documentation
J Slankas, L Williams
2013 1st International workshop on natural language analysis in software …, 2013
1772013
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
1002014
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th annual computer security applications conference …, 2014
592014
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 486-489, 2015
442015
Access control policy extraction from unconstrained natural language text
J Slankas, L Williams
2013 International Conference on Social Computing, 435-440, 2013
352013
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
322016
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ...
Empirical software engineering 22, 2127-2178, 2017
282017
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014
272014
Task-driven software summarization
D Binkley, D Lawrie, E Hill, J Burge, I Harris, R Hebig, O Keszocze, ...
2013 IEEE International Conference on Software Maintenance, 432-435, 2013
252013
Learning contextual embeddings for knowledge graph completion
C Moon, S Harenberg, J Slankas, N Samatova
Pacific Asia Conference on Information Systems (PACIS) 10 (3132847.3133095), 2017
162017
Classifying natural language sentences for policy
J Slankas, L Williams
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
122012
Access control policy identification and extraction from project documentation
J Slankas, L Williams
Science 2 (3), 145-159, 2013
92013
Implementing database access control policy from unconstrained natural language text
J Slankas
2013 35th International Conference on Software Engineering (ICSE), 1357-1360, 2013
72013
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
IEEE, IEEE/ACM, Florence, Italy, 486-489, 2015
62015
Discovering security requirements from natural language project artifacts
J Slankas, M Riaz, J King, LA Williams
North Carolina State University. Dept. of Computer Science, 2013
22013
Implementing Database Access Control Policy from Unconstrained Natural Language Text
JB Slankas
North Carolina State University, 2015
12015
Extracting database role based access control from unconstrained natural language text
J Slankas, LA Williams
North Carolina State University. Dept. of Computer Science, 2012
12012
DIGS
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
2016
Discovering Security Requirements from Natural Language
J Slankas, M Riaz, J King, L Williams, ...
2014
External Reviewers file:///L:/JOBS/55479 IEEE ISSRE/55479 HTML Flash Drive/HTML/da...
A Bosu, A Bandyopadhyay, A Nanthaamornphong, B Tegawendé, ...
系统目前无法执行此操作,请稍后再试。
文章 1–20