Jaspreet Bhatia
Titel
Geciteerd door
Geciteerd door
Jaar
Toward a Framework for Detecting Privacy Policy Violation in Android Application Code
R Slavin, X Wang, MB Hosseini, W Hester, R Krishnan, J Bhatia, ...
International Conference on Software Engineering, 25-36, 2016
982016
Ambiguity in privacy policies and the impact of regulation
JR Reidenberg, J Bhatia, TD Breaux, TB Norton
The Journal of Legal Studies 45 (S2), S163-S190, 2016
492016
A Theory of Vagueness and Privacy Risk Perception
J Bhatia, T Breaux, JR Reidenberg, TB Norton
24th International Requirements Engineering Conference, 10, 2016
362016
Towards an information type lexicon for privacy policies
J Bhatia, TD Breaux
2015 IEEE eighth international workshop on requirements engineering and law …, 2015
362015
Mining privacy goals from privacy policies using hybridized task recomposition
J Bhatia, TD Breaux, F Schaub
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (3), 1-24, 2016
302016
An evaluation of constituency-based hyponymy extraction from privacy policies
MC Evans, J Bhatia, S Wadkar, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 312-321, 2017
262017
Privacy risk in cybersecurity data sharing
J Bhatia, TD Breaux, L Friedberg, H Hibshi, D Smullen
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
192016
Automated Extraction of Regulated Information Types using Hyponymy Relations
J Bhatia, M Evans, S Wadkar, TD Breaux
3rd International Workshop on Artificial Intelligence for Requirements …, 2016
182016
Empirical Measurement of Perceived Privacy Risk
J Bhatia, TD Breaux
Accepted to ACM Transaction on Computer-Human Interaction (TOCHI), 2018
132018
Using grammatical knowledge patterns for structuring requirements specifications
J Bhatia, R Sharma, KK Biswas, S Ghaisas
2013 3rd International Workshop on Requirements Patterns (RePa), 31-34, 2013
132013
Semantic incompleteness in privacy policy goals
J Bhatia, TD Breaux
2018 IEEE 26th International Requirements Engineering Conference (RE), 159-169, 2018
112018
A data purpose case study of privacy policies
J Bhatia, TD Breaux
2017 IEEE 25th International Requirements Engineering Conference (RE), 394-399, 2017
102017
Automated identification of business rules in requirements documents
R Sharma, J Bhatia, KK Biswas
2014 IEEE International Advance Computing Conference (IACC), 1442-1447, 2014
92014
Privacy goal mining through hybridized task re-composition
J Bhatia, TD Breaux, F Schaub
ACM Trans. Soft. Engr. Method 25 (3), 22, 2016
72016
Machine learning for constituency test of coordinating conjunctions in requirements specifications
R Sharma, J Bhatia, KK Biswas
Proceedings of the 3rd International Workshop on Realizing Artificial …, 2014
42014
Comparative study of Open Source Software reliability assessment models
K Yadav, E Jain, J Bhatia
2011 3rd International Conference on Computer Research and Development 1 …, 2011
42011
Identifying incompleteness in privacy policy goals using semantic frames
J Bhatia, MC Evans, TD Breaux
Requirements Engineering 24 (3), 291-313, 2019
32019
Improved cyber threat indicator sharing by scoring privacy risk
DM Best, J Bhatia, ES Peterson, TD Breaux
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
22017
PVDetector: a detector of privacy-policy violations for Android apps
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
2016 IEEE/ACM International Conference on Mobile Software Engineering and …, 2016
22016
The 6th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE'19)
J Bhatia, PK Murukannaiah, N Niu, F Dalpiaz
2019 IEEE 27th International Requirements Engineering Conference Workshops …, 2019
2019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20