Follow
John Slankas
Title
Cited by
Cited by
Year
Automated extraction of non-functional requirements in available documentation
J Slankas, L Williams
2013 1st International workshop on natural language analysis in software …, 2013
1252013
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
722014
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
402014
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 486-489, 2015
352015
Access control policy extraction from unconstrained natural language text
J Slankas, L Williams
2013 International Conference on Social Computing, 435-440, 2013
262013
DIGS: A framework for discovering goals for security requirements engineering
M Riaz, J Stallings, MP Singh, J Slankas, L Williams
Proceedings of the 10th ACM/IEEE International Symposium on Empirical …, 2016
232016
Task-driven software summarization
D Binkley, D Lawrie, E Hill, J Burge, I Harris, R Hebig, O Keszocze, ...
2013 IEEE International Conference on Software Maintenance, 432-435, 2013
232013
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE international symposium on empirical …, 2014
202014
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ...
Empirical software engineering 22 (4), 2127-2178, 2017
172017
Classifying natural language sentences for policy
J Slankas, L Williams
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
82012
Implementing database access control policy from unconstrained natural language text
J Slankas
2013 35th International Conference on Software Engineering (ICSE), 1357-1360, 2013
72013
Learning Contextual Embeddings for Knowledge Graph Completion.
C Moon, S Harenberg, J Slankas, NF Samatova
PACIS, 248, 2017
62017
Access control policy identification and extraction from project documentation
J Slankas, L Williams
SCIENCE 2 (3), 145-159, 2013
42013
Discovering security requirements from natural language project artifacts
J Slankas, M Riaz, J King, LA Williams
North Carolina State University. Dept. of Computer Science, 2013
22013
Implementing Database Access Control Policy from Unconstrained Natural Language Text
JB Slankas
North Carolina State University, 2015
12015
Extracting database role based access control from unconstrained natural language text
J Slankas, LA Williams
North Carolina State University. Dept. of Computer Science, 2012
12012
Discovering Security Requirements from Natural Language
J Slankas, M Riaz, J King, L Williams
Carnegie Mellon University Pittsburgh United States, 2014
2014
External Reviewers file:///L:/JOBS/55479 IEEE ISSRE/55479 HTML Flash Drive/HTML/da...
A Bosu, A Bandyopadhyay, A Nanthaamornphong, B Tegawendé, ...
The system can't perform the operation now. Try again later.
Articles 1–18