John Slankas
John Slankas
Vahvistettu sähköpostiosoite verkkotunnuksessa ncsu.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Automated extraction of non-functional requirements in available documentation
J Slankas, L Williams
2013 1st International workshop on natural language analysis in software …, 2013
952013
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
572014
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 486-489, 2015
302015
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
272014
Access control policy extraction from unconstrained natural language text
J Slankas, L Williams
2013 International Conference on Social Computing, 435-440, 2013
222013
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
202016
Task-driven software summarization
D Binkley, D Lawrie, E Hill, J Burge, I Harris, R Hebig, O Keszocze, ...
2013 IEEE International Conference on Software Maintenance, 432-435, 2013
202013
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014
172014
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ...
Empirical Software Engineering 22 (4), 2127-2178, 2017
122017
Classifying natural language sentences for policy
J Slankas, L Williams
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
82012
Implementing database access control policy from unconstrained natural language text
J Slankas
2013 35th International Conference on Software Engineering (ICSE), 1357-1360, 2013
72013
Learning Contextual Embeddings for Knowledge Graph Completion
C Moon, S Harenberg, J Slankas, N Samatova
Pacific Asia Conference on Information Systems (PACIS) 10 (3132847.3133095), 2017
32017
Access control policy identification and extraction from project documentation
J Slankas, L Williams
SCIENCE 2 (3), 145-159, 2013
32013
Discovering security requirements from natural language project artifacts
J Slankas, M Riaz, J King, LA Williams
North Carolina State University. Dept. of Computer Science, 2013
22013
Implementing Database Access Control Policy from Unconstrained Natural Language Text.
JB Slankas
12015
Extracting database role based access control from unconstrained natural language text
J Slankas, LA Williams
North Carolina State University. Dept. of Computer Science, 2012
12012
Discovering Security Requirements from Natural Language
J Slankas, M Riaz, J King, L Williams
Carnegie Mellon University Pittsburgh United States, 2014
2014
External Reviewers file:///L:/JOBS/55479 IEEE ISSRE/55479 HTML Flash Drive/HTML/da...
A Bosu, A Bandyopadhyay, A Nanthaamornphong, B Tegawendé, ...
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–18