Author of the publication

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts.

, , , and . RE, page 183-192. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Log your CRUD: design principles for software logging mechanisms., and . HotSoS, page 5. ACM, (2014)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Using templates to elicit implied security requirements from functional requirements - a controlled experiment., , , and . ESEM, page 22:1-22:10. ACM, (2014)Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms., , and . IHI, page 305-314. ACM, (2012)Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry., and . HealthSec, USENIX Association, (2012)Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse., , and . Int. J. Comput. Model. Algorithms Medicine, 3 (2): 23-42 (2012)Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems., and . HealthTech, USENIX Association, (2013)Hidden in plain sight: Automatically identifying security requirements from natural language artifacts., , , and . RE, page 183-192. IEEE Computer Society, (2014)