Match!
Kavya Reddy Mahakala
University of Cincinnati
2Publications
1H-index
2Citations
Publications 2
Newest
#1Wentao Wang (UC: University of Cincinnati)H-Index: 5
#2Kavya Reddy Mahakala (UC: University of Cincinnati)H-Index: 1
Last.Yinglin Wang (SUFE: Shanghai University of Finance and Economics)H-Index: 1
view all 5 authors...
Abstract The datasets presented in this article are related the research paper entitled “A Linear Classifier Approach for Identifying Security Requirements in Open Source Software Development” Wang et al. (2018) [1] . This article describes requirements collected from three open-source software (OSS) projects and labels of security requirements. The datasets are made available to support automated security requirements analyzing tools development as well as tools’ evaluation.
Source
#1Wentao Wang (UC: University of Cincinnati)H-Index: 5
#2Kavya Reddy Mahakala (UC: University of Cincinnati)H-Index: 1
Last.Yinglin Wang (SUFE: Shanghai University of Finance and Economics)H-Index: 1
view all 5 authors...
Abstract There are several security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss security aspect in comments by providing code snippets, attachments, and external resource links. Since most security requirements identification methods in up-front RE are based on textua...
2 CitationsSource
1