Follow
John Slankas
Title
Cited by
Cited by
Year
Automated extraction of non-functional requirements in available documentation
J Slankas, L Williams
2013 1st International workshop on natural language analysis in software …, 2013
1662013
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
942014
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th annual computer security applications conference …, 2014
542014
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 486-489, 2015
442015
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
302016
Access control policy extraction from unconstrained natural language text
J Slankas, L Williams
2013 International Conference on Social Computing, 435-440, 2013
302013
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ...
Empirical software engineering 22, 2127-2178, 2017
262017
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014
262014
Task-driven software summarization
D Binkley, D Lawrie, E Hill, J Burge, I Harris, R Hebig, O Keszocze, ...
2013 IEEE International Conference on Software Maintenance, 432-435, 2013
242013
Learning contextual embeddings for knowledge graph completion
C Moon, S Harenberg, J Slankas, N Samatova
Pacific Asia Conference on Information Systems (PACIS) 10 (3132847.3133095), 2017
112017
Classifying natural language sentences for policy
J Slankas, L Williams
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
112012
Access control policy identification and extraction from project documentation
J Slankas, L Williams
Science 2 (3), 145-159, 2013
82013
Implementing database access control policy from unconstrained natural language text
J Slankas
2013 35th International Conference on Software Engineering (ICSE), 1357-1360, 2013
72013
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
IEEE, IEEE/ACM, Florence, Italy, 486-489, 2015
52015
Discovering security requirements from natural language project artifacts
J Slankas, M Riaz, J King, LA Williams
North Carolina State University. Dept. of Computer Science, 2013
22013
Implementing Database Access Control Policy from Unconstrained Natural Language Text
JB Slankas
North Carolina State University, 2015
12015
Extracting database role based access control from unconstrained natural language text
J Slankas, LA Williams
North Carolina State University. Dept. of Computer Science, 2012
12012
DIGS
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
2016
Discovering Security Requirements from Natural Language
J Slankas, M Riaz, J King, L Williams, ...
2014
External Reviewers file:///L:/JOBS/55479 IEEE ISSRE/55479 HTML Flash Drive/HTML/da...
A Bosu, A Bandyopadhyay, A Nanthaamornphong, B Tegawendé, ...
The system can't perform the operation now. Try again later.
Articles 1–20