Please use this identifier to cite or link to this item:
Title: Discovering “unknown known” security requirements
Authors: Rashid, A.
Naqvi, A.
Ramdhany, R.
Edwards, M.
Chitchyan, Ruzanna
Babar, M. A.
First Published: 2016
Presented at: 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering (ICSE) , 14-22 May 2016, Austin, TX, USA
Publisher: Institute of Electrical and Electronics Engineers (IEEE), United States
Citation: 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering (ICSE) (Accepted, In Press)
Abstract: x
Embargo on file until: 1-Jan-10000
Version: Post-print
Status: Peer-reviewed
Type: Conference Paper
Rights: Copyright © 2016, IEEE. All rights reserved. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Description: The file associated with this record is under a permanent embargo while publication is In Press in accordance with the publisher's self-archiving policy. The full text may be available through the publisher links provided above.
Appears in Collections:Conference Papers & Presentations, Dept. of Computer Science

Files in This Item:
File Description SizeFormat 
icse2016_rashid_etal.pdfPost-review (final submitted)2.71 MBAdobe PDFView/Open

Items in LRA are protected by copyright, with all rights reserved, unless otherwise indicated.