John Slankas

According to our database1, John Slankas authored at least 12 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evolving FinTech 512 'Software Engineering For Financial Technology'.
Proceedings of the 5th IEEE/ACM International Workshop on Software Engineering Education for the Next Generation, 2023

2017
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.
Empir. Softw. Eng., 2017

Learning Contextual Embeddings for Knowledge Graph Completion.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

2016
DIGS: A Framework for Discovering Goals for Security Requirements Engineering.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

2015
Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

2014
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Using templates to elicit implied security requirements from functional requirements - a controlled experiment.
Proceedings of the 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2014

Relation extraction for inferring access control rules from natural language artifacts.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Access Control Policy Extraction from Unconstrained Natural Language Text.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Task-Driven Software Summarization.
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013

Implementing database access control policy from unconstrained natural language text.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
Classifying Natural Language Sentences for Policy.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012


  Loading...