Follow
Rocky Slavin
Title
Cited by
Cited by
Year
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016
2352016
Guileak: Tracing privacy policy claims on user input data for android applications
X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu
Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018
1012018
How does misconfiguration of analytic services compromise mobile privacy?
X Zhang, X Wang, R Slavin, T Breaux, J Niu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
272020
Condysta: Context-aware dynamic supplement to static taint analysis
X Zhang, X Wang, R Slavin, J Niu
2021 IEEE Symposium on Security and Privacy (SP), 796-812, 2021
232021
Managing security requirements patterns using feature diagram hierarchies
R Slavin, JM Lehker, J Niu, TD Breaux
2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014
222014
Privacy assurance for android augmented reality apps
X Zhang, R Slavin, X Wang, J Niu
2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing …, 2019
162019
PVDetector: a detector of privacy-policy violations for Android apps
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the International Conference on Mobile Software Engineering …, 2016
162016
Analyzing privacy policies through syntax-driven semantic analysis of information types
MB Hosseini, TD Breaux, R Slavin, J Niu, X Wang
Information and Software Technology 138, 106608, 2021
152021
Characterizations and boundaries of security requirements patterns
R Slavin, H Shen, J Niu
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 48-53, 2012
152012
Ambiguity and generality in natural language privacy policies
MB Hosseini, J Heaps, R Slavin, J Niu, T Breaux
2021 IEEE 29th International Requirements Engineering Conference (RE), 70-81, 2021
82021
Disambiguating requirements through syntax-driven semantic analysis of information types
M Bokaei Hosseini, R Slavin, T Breaux, X Wang, J Niu
Requirements Engineering: Foundation for Software Quality: 26th …, 2020
72020
Rethinking security requirements in RE research
H Hibshi, R Slavin, J Niu, T Breaux
Department of Computer Science, University of Texas at San Antonio, 2014
72014
Security patterns repository
R Slavin, J Niu
URL http://sefm. cs. utsa. edu/repository, 2017
52017
GUILeak: Identifying privacy practices on GUI-based data
X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu
Academic Press, 2019
42019
Sequence Diagram Aided Privacy Policy Specification
H Shen, R Krishnan, R Slavin, J Niu
IEEE Transactions on Dependable and Secure Computing 13 (3), 381-393, 2016
3*2016
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data
X Zhang, J Heaps, R Slavin, J Niu, T Breaux, X Wang
ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023
12023
Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows
GA Morales, A Bienek-Parrish, P Jenkins, R Slavin
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 19-24, 2023
12023
A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones
Z Wang, K Liu, J Wang, J Xu, J Chen, Y Jin, R Slavin
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
12022
Toward a code pattern based vulnerability measurement model
J Heaps, R Slavin, X Wang
Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018
12018
An intelligent assistive driving solution based on smartphone for power wheelchair mobility
Z Wang, J Xu, J Zhang, R Slavin, D Zhu
Journal of Systems Architecture 149, 103105, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20