Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Kavya Reddy Mahakala
University of Cincinnati
2Publications
1H-index
2Citations
Publications 2
Newest
Published on Dec 1, 2018in Data in Brief
Wentao Wang4
Estimated H-index: 4
(UC: University of Cincinnati),
Kavya Reddy Mahakala1
Estimated H-index: 1
(UC: University of Cincinnati)
+ 2 AuthorsYinglin Wang1
Estimated H-index: 1
(SUFE: Shanghai University of Finance and Economics)
Abstract The datasets presented in this article are related the research paper entitled “A Linear Classifier Approach for Identifying Security Requirements in Open Source Software Development” Wang et al. (2018) [1] . This article describes requirements collected from three open-source software (OSS) projects and labels of security requirements. The datasets are made available to support automated security requirements analyzing tools development as well as tools’ evaluation.
Wentao Wang4
Estimated H-index: 4
(UC: University of Cincinnati),
Kavya Reddy Mahakala1
Estimated H-index: 1
(UC: University of Cincinnati)
+ 2 AuthorsYinglin Wang1
Estimated H-index: 1
(SUFE: Shanghai University of Finance and Economics)
Abstract There are several security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss security aspect in comments by providing code snippets, attachments, and external resource links. Since most security requirements identification methods in up-front RE are based on textua...
1