{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:20Z","timestamp":1750221380397,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T00:00:00Z","timestamp":1523318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,10]]},"DOI":"10.1145\/3190619.3191684","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T12:31:17Z","timestamp":1523449877000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A comparative analysis of manual methods for analyzing security requirements in regulatory documents"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Elder","sequence":"first","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna","family":"Mattapallil","sequence":"additional","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laurie","family":"Williams","sequence":"additional","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70746"},{"key":"e_1_3_2_1_2_1","unstructured":"IEC ISO. 2011. IEEE. 29148: 2011-Systems and software engineering-Requirements engineering. (2011).  IEC ISO. 2011. IEEE. 29148: 2011-Systems and software engineering-Requirements engineering. (2011)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2013.6671343"},{"volume-title":"Evidence-based software engineering and systematic reviews","author":"Kitchenham Barbara Ann","key":"e_1_3_2_1_4_1","unstructured":"Barbara Ann Kitchenham , David Budgen , and Pearl Brereton . 2015. Evidence-based software engineering and systematic reviews . Vol. 4 . CRC Press . Barbara Ann Kitchenham, David Budgen, and Pearl Brereton. 2015. Evidence-based software engineering and systematic reviews. Vol. 4. CRC Press."},{"key":"e_1_3_2_1_5_1","volume-title":"Williams and Jianwei Niu","author":"Maria Riaz Laurie Breaux","year":"2012","unstructured":"Laurie Breaux Travis D. Maria Riaz , Williams and Jianwei Niu . 2012 . On the design of empirical studies to evaluate software patterns: A survey. Technical Report. North Carolina State University. Dept . of Computer Science. Laurie Breaux Travis D. Maria Riaz, Williams and Jianwei Niu. 2012. On the design of empirical studies to evaluate software patterns: A survey. Technical Report. North Carolina State University. Dept. of Computer Science."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2017.28"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646580.697774"}],"event":{"name":"HoTSoS '18: Symposium and Bootcamp","sponsor":["National Security Agency National Security Agency","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina","acronym":"HoTSoS '18"},"container-title":["Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3190619.3191684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3190619.3191684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:50Z","timestamp":1750213610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3190619.3191684"}},"subtitle":["POSTER"],"short-title":[],"issued":{"date-parts":[[2018,4,10]]},"references-count":7,"alternative-id":["10.1145\/3190619.3191684","10.1145\/3190619"],"URL":"https:\/\/doi.org\/10.1145\/3190619.3191684","relation":{},"subject":[],"published":{"date-parts":[[2018,4,10]]},"assertion":[{"value":"2018-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}