Inferring Security Requirements from Natural Language Requirements Artifacts.

dc.contributor.advisorLaurie Williams, Chairen_US
dc.contributor.advisorEmerson Murphy-Hill, Memberen_US
dc.contributor.advisorMunindar Singh, Memberen_US
dc.contributor.advisorMladen Vouk, Memberen_US
dc.contributor.advisorJulia Earp, Memberen_US
dc.contributor.authorRiaz, Mariaen_US
dc.date.accepted2016-07-13en_US
dc.date.accessioned2016-07-22T12:31:23Z
dc.date.available2016-07-22T12:31:23Z
dc.date.defense2016-06-21en_US
dc.date.issued2016-06-21en_US
dc.date.released2016-07-22en_US
dc.date.reviewed2016-06-29en_US
dc.date.submitted2016-06-21en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.leveldissertationen_US
dc.degree.nameDoctor of Philosophyen_US
dc.identifier.otherdeg5358en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/11378
dc.rightsen_US
dc.titleInferring Security Requirements from Natural Language Requirements Artifacts.en_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
4.34 MB
Format:
Adobe Portable Document Format

Collections