- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
- 2008
- 2007
- 2006
- 2005
- 2004
- 2003
- 2002
- 2001
- 2000
- 1999
- 1998
- 1995
- 1994
2024
- Cost of Flaky Tests in Continuous Integration: An Industrial Case Study, 2024 more… Full text (mediaTUM)
- On the Impact of Hitting System Resource Limits on Test Flakiness, 2024 more… Full text ( DOI ) Full text (mediaTUM)
- SAST-Guided Grey-Box Fuzzing, 2024 more… Full text (mediaTUM)
- System-Level Test Case Generation and Execution for Distributed Cooperative Unmanned Aerial Systems. 2024 IEEE Intelligent Vehicles Symposium (IV), 2024 more… Full text ( DOI )
- Understanding Integration Testing. Engineering Safe and Trustworthy Cyber Physical Systems -- Essays Dedicated to Werner Damm on the Occasion of His 71st Birthday, Springer Nature Switzerland AG, 2024 more… Full text (mediaTUM)
2023
- BinaryRTS: Cross-language Regression Test Selection for C++ Binaries in CI. 2023 IEEE Conference on Software Testing, Verification and Validation (ICST), 2023, 327-338 more… Full text ( DOI ) Full text (mediaTUM)
- Revisiting Inter-Class Maintainability Indicators. 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), IEEE, 2023, 805–814 more… Full text ( DOI ) Full text (mediaTUM)
- DIRTS: Dependency Injection Aware Regression Test Selection. 2023 IEEE Conference on Software Testing, Verification and Validation (ICST), 2023, 422-432 more… Full text ( DOI ) Full text (mediaTUM)
- Generation of Tailored and Confined Datasets for IDS Evaluation in Cyber-Physical Systems. IEEE Transactions on Dependable and Secure Computing, 2023, 1-15 more… Full text ( DOI ) Full text (mediaTUM)
- When to Apply Scenario-Based Testing to a New System Domain? 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), IEEE, 2023 more… Full text ( DOI )
- Trusting a Smart Contract Means Trusting Its Owners: Understanding Centralization Risk. Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), IEEE, 2023 more… Full text ( DOI ) Full text (mediaTUM)
- Green Fuzzing: A Saturation-based Stopping Criterion using Vulnerability Prediction. ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023Accepted for publication more… Full text (mediaTUM)
- Reachable Coverage: Estimating Saturation in Fuzzing. Proceedings of the 45th IEEE/ACM International Conference on Software Engineering (ICSE'23), 17-19 May 2023, Australia, 2023Accepted for publication more…
- Sichere Konfigurationshärtung laufender Systeme. Sicherheit in vernetzten Systemen: 30. DFN-Konferenz, BoD - Books on Demand, 2023, 20 more… Full text (mediaTUM)
- Automatisierte Identifikation von sicherheitsrelevanten Konfigurationseinstellungen mittels NLP. Software Engineering 2023, Gesellschaft für Informatik e.V., 2023, 2 more… Full text (mediaTUM)
- Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules. ACM/IEEE International Conference on Automation of Software Test (AST) (AST '23), 2023, 10 more… Full text (mediaTUM)
- Severity-Aware Prioritization of System-Level Regression Tests in Automotive Software. 2023 IEEE Conference on Software Testing, Verification and Validation (ICST), 2023, 398-409 more… Full text ( DOI ) Full text (mediaTUM)
- Data Owner Benefit-Driven Design of People Analytics. Proceedings of the ACM on Human-Computer Interaction 7 (EICS), 2023, 173:1–38 more… Full text ( DOI ) Full text (mediaTUM)
- The Inverse Transparency Toolchain: A Fully Integrated and Quickly Deployable Data Usage Logging Infrastructure. Software Impacts 17, 2023, 100554:1–4 more… Full text ( DOI ) Full text (mediaTUM)
- Decentralized Inverse Transparency With Blockchain. Distributed Ledger Technologies: Research and Practice 2 (3), 2023, 17:1–28 more… Full text ( DOI ) Full text (mediaTUM)
- Rethinking People Analytics With Inverse Transparency by Design. Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 2023, 292:1–29 more… Full text ( DOI ) Full text (mediaTUM)
2022
- Daten – Innovation – Privatheit – Mit Inverser Transparenz das Gestaltungsdilemma der digitalen Arbeitswelt lösen. 2022 more… Full text ( DOI ) Full text (mediaTUM)
- Challenges in Regression Test Selection for End-to-End Testing of Microservice-based Software Systems. 2022 IEEE/ACM International Conference on Automation of Software Test (AST), 2022, 1-5 more… Full text (mediaTUM)
- Probe-based Syscall Tracing for Efficient and Practical File-level Test Traces. 2022 IEEE/ACM International Conference on Automation of Software Test (AST), 2022, 126-137 more… Full text (mediaTUM)
- Build System Aware Multi-language Regression Test Selection in Continuous Integration. 2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2022, 87-96 more… Full text ( DOI ) Full text (mediaTUM)
- Literature Research: A Cryptographic Protocol to Maintain Confidentiality When Storing Multi-Owner Data. Studien thesis, 2022 more… Full text (mediaTUM)
- Robots Enact Malignant Stereotypes. 2022 ACM Conference on Fairness, Accountability, and Transparency, ACM, 2022 more… Full text ( DOI )
- Why Did the Test Execution Fail? Failure Classification for SystemLevel Testing Using Only Test Step Results. International Symposium on Software Reliability Engineering (ISSRE), IEEE, 2022 more… Full text (mediaTUM)
- Unreliable Test Infrastructures in Automotive Testing Setups. 44th International Conference on Software Engineering: Software Engineering in Practice, 2022, 307-308 more… Full text ( DOI ) Full text (mediaTUM)
- Data-Driven Assessment of Parameterized Scenarios for Autonomous Vehicles. In: Lecture Notes in Computer Science. Springer International Publishing, 2022 more… Full text ( DOI )
- Automatic Evaluation of Automatically Derived Semantic Scenario Instance Descriptions. 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), IEEE, 2022 more… Full text ( DOI )
- An Empirical Study on the Effectiveness of Static C Code Analyzers for Vulnerability Detection. Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22), July 18--22, 2022, Virtual, South Korea, 2022accepted for publication more… Full text (mediaTUM)
- FuzzTastic: A Fine-grained, Fuzzer-agnostic Coverage Analyzer. 44th International Conference on Software Engineering Companion (ICSE '22 Companion), May 21--29, 2022, Pittsburgh, PA, USA , 2022accepted for publication more… Full text (mediaTUM)
- Defining adaptivity and logical architecture for engineering (smart) self-adaptive cyber-physical systems. Information and Software Technology, 2022, 106866 more… Full text ( DOI )
- Realization of adaptive system transitions in self-adaptive autonomous robots. Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, ACM, 2022 more… Full text ( DOI )
- StellaUAV: A Tool for Testing the Safe Behavior of UAVs with Scenario-Based Testing. IEEE International Symposium on Software Reliability Engineering (ISSRE) , IEEE, 2022, 37-48 more… Full text ( DOI ) Full text (mediaTUM)
- Exploring a Maximal Number of Relevant Obstacles for Testing UAVs. In: Lecture Notes in Computer Science. Springer International Publishing, 2022 more… Full text ( DOI )
- A Preliminary Study on Using Text- and Image-Based Machine Learning to Predict Software Maintainability. In: Software Quality: The Next Big Thing in Software Engineering and Quality. Springer International Publishing, 2022 more… Full text ( DOI )
- Deep learning with RGB and thermal images onboard a drone for monitoring operations. Journal of Field Robotics 39 (6), 2022 more… Full text ( DOI )
- Automated Identification of Security-Relevant Configuration Settings Using NLP. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), Association for Computing Machinery, 2022 more… Full text (mediaTUM)
- Sicherheitskonfigurationsrichtlinien effizient verwalten und umsetzen: Der Scapolite-Ansatz. Sicherheit in vernetzten Systemen: 29. DFN-Konferenz, BoD - Books on Demand, 2022 more… Full text (mediaTUM)
- Hardening with Scapolite: A DevOps-Based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations. Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY '22), Association for Computing Machinery, 2022 more… Full text ( DOI ) Full text (mediaTUM)
- Evaluating the Impact of Knowledge Aggregation with Subjective Logic on the Overall Systems Adaptivity in Multi-Agent Self-Adaptive Cyber-Physical Systems. Master thesis, 2022 more… Full text (mediaTUM)
- Investigating Differences in Behavior and Brain in Human-Human and Human-Autonomous Vehicle Interactions in Time-Critical Situations. Frontiers in Neuroergonomics 3, 2022 more… Full text ( DOI )
- Increasing Employees’ Willingness to Share: Introducing Appeal Strategies for People Analytics. Proceedings of the 13th International Conference on Software Business (ICSOB) (Lecture Notes in Business Information Processing 463), Springer, 2022, 213–226 more… Full text ( DOI ) Full text (mediaTUM)
- Transparency by Design: Softwaredesign für einen transparenten Umgang mit Daten am Arbeitsplatz. 2022 more… Full text (mediaTUM)
- Empowered and embedded: ethics and agile processes. Humanities and Social Sciences Communications 9 (1), 2022 more… Full text ( DOI )
2021
- Run-time Reasoning from Uncertain Observations with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems. 16th Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS, 2021 more… Full text (mediaTUM)
- Smart Self-Adaptive Cyber-Physical Systems: How can Exploration and Learning Improve Performance in a Partially Observable Multi-Agent Context? ADAPTIVE 2021 : The Thirteenth International Conference on Adaptive and Self-Adaptive Systems and Applications, 2021 more… Full text (mediaTUM)
- Dynamic Taint Analysis versus Obfuscated Self-Checking. Annual Computer Security Applications Conference, ACM, 2021 more… Full text ( DOI )
- A Causal Model of Intersection-Related Collisions for Drivers With and Without Visual Field Loss. In: HCI International 2021 - Late Breaking Papers: HCI Applications in Health, Transport, and Industry. Springer International Publishing, 2021 more… Full text ( DOI )
- Empirically evaluating readily available information for regression test optimization in continuous integration. Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2021 more… Full text ( DOI ) Full text (mediaTUM)
- Leading Agents or Stewards? Exploring Design Principles for Empowerment Through Workplace Technologies. Proceedings of the 42nd International Conference on Information System (ICIS), AIS, 2021, 1–9 more…
- Ethics in the Software Development Process: from Codes of Conduct to Ethical Deliberation. Philosophy & Technology, 2021 more… Full text ( DOI )
- How can manual testing processes be optimized? developer survey, optimization guidelines, and case studies. Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ACM, 2021 more… Full text ( DOI ) Full text (mediaTUM)
- A comparative, sociotechnical design perspective on Responsible Innovation: multidisciplinary research and education on digitized energy and Automated Vehicles. Journal of Responsible Innovation 8 (3), 2021, 421-444 more… Full text ( DOI )
- Causality-based accountability mechanisms for socio-technical systems. Journal of Responsible Technology 7-8, 2021, 100016 more… Full text ( DOI )
- Designing Accountable Systems. Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, ACM, 2021 more… Full text ( DOI )
- Fitness Function Templates for Testing Automated and Autonomous Driving Systems in Intersection Scenarios. 2021 IEEE International Intelligent Transportation Systems Conference (ITSC), IEEE, 2021 more… Full text ( DOI )
- Self-Awareness as a Prerequisite for Self-Adaptivity in Computing Systems. 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), IEEE, 2021 more… Full text ( DOI )
- Bayesian Optimization-Based Analysis and Planning Approach for Self-Adaptive Cyber-Physical Systems. 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), IEEE, 2021 more… Full text ( DOI )
- Algorithmic Accountability in Context. Socio-Technical Perspectives on Structural Causal Models. Frontiers in Big Data 3, 2021 more… Full text ( DOI )
- Tests für automatisierte und autonome Fahrsysteme. Informatik Spektrum, 2021 more… Full text ( DOI )
- Accountability for Cyber- Physical Systems. In: Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021 more… Full text ( DOI )
- Ethik in der agilen Software-Entwicklung. Informatik Spektrum, 2021 more… Full text ( DOI )
- Towards Accurate Labeling of Android Apps for Reliable Malware Detection. Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, ACM, 2021 more… Full text ( DOI )
- Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection. ACM Transactions on Privacy and Security 24 (4), 2021, 1-35 more… Full text ( DOI )
- Understanding Safety for Unmanned Aerial Vehicles in Urban Environments. 2021 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2021 more… Full text ( DOI )
- Human-level Ordinal Maintainability Prediction Based on Static Code Metrics. Evaluation and Assessment in Software Engineering, ACM, 2021 more… Full text ( DOI )
- Efficient Platform Migration of a Mainframe Legacy System Using Custom Transpilation. 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2021 more… Full text ( DOI )
- Towards a Taxonomy of Autonomous Systems. 15th European Conference on Software Architecture (ECSA 2021), 2021 more… Full text (mediaTUM)
- Automated Implementation of Windows-related Security-Configuration Guides. Software Engineering 2021, Gesellschaft für Informatik e.V., 2021 more… Full text ( DOI ) Full text (mediaTUM)
- Designing Trustworthy User Interfaces. Proceedings of the 33rd Australian Conference on Human-Computer Interaction (OzCHI), ACM, 2021, 182–189 more… Full text ( DOI ) Full text (mediaTUM)
- GDPR-Compliant Use of Blockchain for Secure Usage Logs. Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering (EASE), ACM, 2021, 313–320 more… Full text ( DOI ) Full text (mediaTUM)
2020
- deleteme. , deleteme. , 2020 more…
- Do cut-ins matter? Assessing the impact of lane changing and string stability on traffic flow behavior. , IEEE Intelligent Transportation Systems Conference (ITSC). , 2020 more…
- Modellierung von Funktionen in der Modellbasierten Entwicklung von Systemverbünden Kollaborierender Cyber-Physischer Systeme. EKA 2020 - Entwurf komplexer Automatisierungssysteme, 2020 more… Full text (mediaTUM)
- Mining Gender Bias: A Preliminary Study on Implicit Biases and Gender Identity in the Department of Computer Science at the Technical University of Munich. European Conference on Software Architecture, 2020 more… Full text (mediaTUM)
- Knowledge Aggregation with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems. 2020 IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2020 more… Full text (mediaTUM)
- Generating Avoidable Collision Scenarios for Testing Autonomous Driving Systems. 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), IEEE, 2020 more… Full text ( DOI )
- Simultaneously searching and solving multiple avoidable collisions for testing autonomous driving systems. Proceedings of the 2020 Genetic and Evolutionary Computation Conference, ACM, 2020 more… Full text ( DOI )
- Runtime Verification for Dynamic Architectures. Journal of Logical and Algebraic Methods in Programming, 2020 more…
- Re-Using Concrete Test Scenarios Generally Is a Bad Idea. 2020 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2020 more… Full text ( DOI ) Full text (mediaTUM)
- A sound approach to scenario-based testing as the basis for safety argumentations. Automotive Testing Technology Magazine Special Issue, 2020 more…
- Clustering Traffic Scenarios Using Mental Models as Little as Possible. 2020 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2020 more… Full text ( DOI ) Full text (mediaTUM)
- Can We Predict the Quality of Spectrum-based Fault Localization? 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), IEEE, 2020 more… Full text ( DOI )
- Function Modeling for Collaborative Embedded Systems. In: Model-Based Engineering of Collaborative Embedded Systems. Springer International Publishing, 2020 more… Full text ( DOI )
- How to Conduct Experiments with a Real Car? Experiences and Practical Guidelines. In: Communications in Computer and Information Science. Springer International Publishing, 2020 more… Full text ( DOI ) Full text (mediaTUM)
- Actual Causality Canvas: A General Framework for Explanation-Based Socio-Technical Constructs. Frontiers in Artificial Intelligence and Applications 325 (ECAI 2020), 2020, 2978-2985 more… Full text ( DOI )
- From Checking to Inference: Actual Causality Computations as Optimization Problems. In: Automated Technology for Verification and Analysis. Springer International Publishing, 2020 more… Full text ( DOI )
- Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks. In: Graphical Models for Security. Springer International Publishing, 2020 more… Full text ( DOI )
- Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study. 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), IEEE, 2020 more… Full text ( DOI )
- A Proof of Authority Blockchain Protocol for Secure Logging. Studien thesis, 2020 more… Full text (mediaTUM)
- Dynamic Safety Certification for Collaborative Embedded Systems at Runtime. In: Model-Based Engineering of Collaborative Embedded Systems. Springer International Publishing, 2020 more… Full text ( DOI )
- Automated Anomaly Detection in CPS Log Files. In: Lecture Notes in Computer Science. Springer International Publishing, 2020 more… Full text ( DOI )
- A Software Maintainability Dataset. 2020 more… Full text ( DOI )
- Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability. 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2020 more… Full text ( DOI )
- Automated Implementation of Windows-Related Security-Configuration Guides. Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE '20), Association for Computing Machinery, 2020 more… Full text ( DOI ) Full text (mediaTUM)
- Extending Signal Temporal Logic with Quantitative Semantics by Intervals for Robust Monitoring of Cyber-Physical Systems. ACM Transactions on Cyber-Physical Systems, 2020 more… Full text ( DOI )
2019
- Efficient Checking of Actual Causality with SAT Solving. , Engineering Secure and Dependable Software Systems (2019). IOS Press, 2019 more… Full text ( DOI )
- A Framework for Safety Violation Identification and Assessment in Autonomous Driving. , Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the 28th International Joint Conference on Artificial Intelligence, AISafety@IJCAI 2019, Macao, China, August 11-12, 2019.. , 2019 more… Full text (mediaTUM)
- Monitoring Safety of Autonomous Vehicles with Crash Prediction Networks. , Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 . , 2019 more… Full text (mediaTUM)
- VirtSC: Combining Virtualization Obfuscation with Self-Checksumming. Proceedings of the 3rd ACM Workshop on Software Protection - SPRO'19, ACM Press, 2019 more… Full text ( DOI )
- SIP shaker: software integrity protection composition. Proceedings of the 35th Annual Computer Security Applications Conference on - ACSAC '19, ACM Press, 2019 more… Full text ( DOI )
- Towards Empirically Assessing Behavior Stimulation Approaches for Android Malware. SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies, 2019, 47-52 more… Full text (mediaTUM)
- Supplementary material for the paper "Fitness Functions for Testing Automated and Autonomous Driving Systems". Chair of Software and Systems Engineering, 2019, more… Full text (mediaTUM)
- Fitness Functions for Testing Automated and Autonomous Driving Systems. 38th International Conference on Computer Safety, Reliability and Security, Springer International Publishing , 2019 more… Full text ( DOI ) Full text (mediaTUM)
- How Many Test Scenarios Do We Need for Testing Automated and Autonomous Driving Systems? TÜV / TUM Fachtagung "Automatisiertes Fahren" 2019 more… Full text (mediaTUM)
- Did We Test All Scenarios for Automated and Autonomous Driving Systems? 2019 IEEE Intelligent Transportation Systems Conference (ITSC) , IEEE , 2019 more… Full text ( DOI ) Full text (mediaTUM)
- Failure clustering without coverage. Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2019, ACM Press, 2019 more… Full text ( DOI )
- Selecting Flow Optimal System Parameters for Automated Driving Systems. 2019 IEEE Intelligent Transportation Systems Conference (ITSC), IEEE, 2019 more… Full text ( DOI )
- EURECA: Epistemic Uncertainty Classification Scheme for Runtime Information Exchange in Collaborative System Groups. SICS Software-Intensive Cyber-Physical Systems, 2019 more… Full text (mediaTUM)
- A Comprehensive Attack and Defense Model for the Automotive Domain. SAE International Journal of Transportation Cybersecurity and Privacy 2 (1), 2019 more… Full text ( DOI ) Full text (mediaTUM)
- Attack graph generation for microservice architecture. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19, ACM Press, 2019 more… Full text ( DOI )
- Practical Causal Models for Cyber-Physical Systems. In: Lecture Notes in Computer Science. Springer International Publishing, 2019 more… Full text ( DOI )
- Framework for Flexible, Adaptive Support of Test Management by Means of Software Agents. IEEE Robotics and Automation Letters 4 (3), 2019, 2754-2761 more… Full text ( DOI )
- Detecting Architectural Erosion using Runtime Verification. 12th Interaction and Concurrency Experience (ICE 2019), 2019 more… Full text (mediaTUM)
- Learning Approach for Smart Self-Adaptive Cyber-Physical Systems. 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W), IEEE, 2019 more… Full text (mediaTUM)
- Learning a Classifier for Prediction of Maintainability Based on Static Analysis Tools. 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC), IEEE, 2019 more… Full text ( DOI )
- Anomaly Detection for Advanced Driver Assistance Systems Using Online Feature Selection. 2019 IEEE Intelligent Vehicles Symposium (IV), IEEE, 2019 more… Full text ( DOI )
- Evaluation of Feature Selection for Anomaly Detection in Automotive E/E Architectures. 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), IEEE, 2019 more… Full text ( DOI )
- A real-time remote IDS testbed for connected vehicles. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC), ACM, 2019, 1898–1905 more… Full text ( DOI ) Full text (mediaTUM)
2018
- Towards Context Modeling for Dynamic Collaborative Embedded Systems in Open Context. , Tenth International Workshop Modelling and Reasoning in Context (MRC). , 2018 more… Full text (mediaTUM)
- Automatically Assessing Vulnerabilities Discovered by Compositional Analysis. , 1st International Workshop on Machine Learning and Software Engineering in Symbiosis (MASES'18), co-located with IEEE/ACM International Conference on Automated Software Engineering. . , 2018 more… Full text ( DOI ) Full text (mediaTUM)
- Presentation: Reviewing KLEE’s Sonar-Search Strategy in Context of Greybox Fuzzing. , 1st International KLEE Workshop, London. , 2018 more… Full text ( DOI ) Full text (mediaTUM)
- Practical Integrity Protection with Oblivious Hashing. Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18, ACM Press, 2018 more… Full text ( DOI )
- Integrity Protection Against Insiders in Microservice-Based Infrastructures: From Threats to a Security Framework. In: Software Technologies: Applications and Foundations. Springer International Publishing, 2018 more… Full text ( DOI )
- A Taxonomy of Software Integrity Protection Techniques. In: Advances in Computers. Elsevier, 2018 more… Full text ( DOI )
- Stimulation and Detection of Android Repackaged Malware with Active Learning. (Talk) 2018 more… Full text (mediaTUM)
- GoldRusher: A Miner for Rapid Identification of Hidden Code. Proceedings of the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE, 2018, 517--521 more… Full text (mediaTUM)
- Requirements for modeling dynamic function networks for collaborative embedded systems. Workshops at Modellierung 2018, Modellierung in der Entwicklung von kollaborativen eingebetteten Systemen (MEKES), 2018 more… Full text (mediaTUM)
- Enhancement of Automotive Penetration Testing with Threat Analyses Results. To appear in SAE International Journal of Transportation Cybersecurity and Privacy, 2018 more… Full text (mediaTUM)
- Szenario-Optimierung für die Absicherung von automatisierten und autonomen Fahrsystemen – PrePrint für den Tagungsband der FKFS AutoTest Fachtagung 2018. Chair of Software and Systems Engineering, 2018, more… Full text (mediaTUM)
- Data Usage Control for Distributed Systems. ACM Transactions on Privacy and Security, 2018 more… Full text (mediaTUM)
- Aletheia. Proceedings of the 40th International Conference on Software Engineering Companion Proceeedings - ICSE '18, ACM Press, 2018 more… Full text ( DOI )
- Machine learning-based run-time anomaly detection in software systems: An industrial evaluation. 2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), IEEE, 2018 more… Full text ( DOI )
- Extension of the Plant Feature Approach Introducing Temporal Relations. 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), IEEE, 2018 more… Full text ( DOI )
- SATE: Model-Based Testing with Design-to-Test and Plant Features. IFAC-PapersOnLine 51 (7), 2018, 310-315 more… Full text ( DOI )
- Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach. Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, ACM Press, 2018 more… Full text ( DOI )
- An Automated Approach for Classifying Reverse-Engineered and Forward-Engineered UML Class Diagrams. 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), IEEE, 2018 more… Full text ( DOI )
- Ambiguous software requirement specification detection. Proceedings of the 5th International Workshop on Requirements Engineering and Testing - RET '18, ACM Press, 2018 more… Full text ( DOI )
- Pairika. Proceedings of the 40th International Conference on Software Engineering Companion Proceeedings - ICSE '18, ACM Press, 2018 more… Full text ( DOI )
- Repackman: a tool for automatic repackaging of Android apps. Proceedings of the 1st International Workshop on Advances in Mobile App Analysis - A-Mobile 2018, ACM Press, 2018 more… Full text ( DOI )
- Poking the bear: lessons learned from probing three Android malware datasets. Proceedings of the 1st International Workshop on Advances in Mobile App Analysis - A-Mobile 2018, ACM Press, 2018 more… Full text ( DOI )
- Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models. In: Lecture Notes in Computer Science. Springer International Publishing, 2018 more… Full text ( DOI )
- Software quality assessment in practice. Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '18, ACM Press, 2018 more… Full text ( DOI )
- Uncertainty in Machine Learning: A Safety Perspective on Autonomous Driving. In: Developments in Language Theory. Springer International Publishing, 2018 more… Full text ( DOI )
- Diagnosis of Safety Incidents for Cyber-Physical Systems: A UAV Example. 2018 3rd International Conference on System Reliability and Safety (ICSRS), IEEE, 2018 more… Full text ( DOI )
- Real-Time Remote Intrusion Detection. Master thesis, 2018 more… Full text (mediaTUM)
2017
- Detecting Patching of Executables without System Calls. Proceedings of the Conference on Data and Application Security and Privacy, 2017 more… Full text ( DOI ) Full text (mediaTUM)
- Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning. To appear in Usenix Security, 2017, 2017 more… Full text (mediaTUM)
- A Tutorial on Software Obfuscation. to appear in advances in computing, 2017 more… Full text (mediaTUM)
- Arguing on Software-Level Verification Techniques Appropriateness. In: Lecture Notes in Computer Science. Springer International Publishing, 2017 more… Full text ( DOI )
- Security for the Robot Operating System. Robotics and Autonomous Systems 98, 2017, 192-203 more… Full text ( DOI )
- A Framework for Failure Diagnosis. 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), IEEE, 2017 more… Full text ( DOI )
- Challenges of Operationalizing Spectrum-Based Fault Localization from a Data-Centric Perspective. 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), IEEE, 2017 more… Full text ( DOI )
- Reducing failure analysis time: an industrial evaluation. 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP), IEEE, 2017 more… Full text ( DOI )
- Industrial Evaluation of Search-Based Test Generation Techniques for Control Systems. 2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), IEEE, 2017 more… Full text ( DOI )
- An educational toolbox on supervisory control theory using MATLAB Simulink stateflow: From Theory to practice in one week. 2017 IEEE Global Engineering Education Conference (EDUCON), IEEE, 2017 more… Full text ( DOI )
- How Accountability is Implemented and Understood in Research Tools. In: Product-Focused Software Process Improvement. Springer International Publishing, 2017 more… Full text ( DOI )
- ACCBench: A Framework for Comparing Causality Algorithms. Electronic Proceedings in Theoretical Computer Science 259, 2017, 16-30 more… Full text ( DOI )
- Monopedia. Proceedings of the VLDB Endowment 10 (12), 2017, 1921-1924 more… Full text ( DOI )
- Leveraging Compression-based Graph Mining for Behavior-based Malware Detection. IEEE Transactions on Dependable and Secure Computing, 2017, 2017 more… Full text (mediaTUM)
2016
- Requirements Reconciliation for Scalable and Secure Microservice (De)composition. 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), IEEE, 2016 more… Full text ( DOI )
- Enhancing Operation Security using Secret Sharing. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, SCITEPRESS - Science and Technology Publications, 2016 more… Full text ( DOI )
- Metadata Recovery From Obfuscated Programs Using Machine Learning. Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, ACM, 2016, 1:1--1:11 more… Full text ( DOI ) Full text (mediaTUM)
- Code Obfuscation Against Symbolic Execution Attacks. Proceedings of the 32Nd Annual Conference on Computer Security Applications, ACM, 2016, 189--200 more… Full text ( DOI ) Full text (mediaTUM)
- VOT4CS: A Virtualization Obfuscation Tool for C\#. Proceedings of the 2016 ACM Workshop on Software PROtection, ACM, 2016, 39--49 more… Full text ( DOI ) Full text (mediaTUM)
- Application-level security for ROS-based applications. International Conference on Intelligent Robots and Systems, IEEE, 2016 more… Full text ( DOI ) Full text (mediaTUM)
- Persona-Driven Information Security Awareness. Proceedings of British HCI, ACM, 2016, to appear more… Full text ( DOI ) Full text (mediaTUM)
- Nequivack: Assessing Mutation Score Confidence. 2016 IEEE Ninth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2016, 152-161 more… Full text ( DOI ) Full text (mediaTUM)
- Security Testing. In: Advances in Computers. Elsevier BV, 2016 more… Full text ( DOI )
- Security Testing. In: Advances in Computers. Elsevier BV, 2016 more… Full text ( DOI )
- Profiting from Unit Tests for Integration Testing. 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST), Institute of Electrical and Electronics Engineers (IEEE), 2016 more… Full text ( DOI )
- Failure Models for Testing Continuous Controllers. 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), Institute of Electrical and Electronics Engineers (IEEE), 2016 more… Full text ( DOI )
- Compositional Analysis for Exposing Vulnerabilities – A Symbolic Execution Approach. Master thesis, 2016 more… Full text (mediaTUM)
- StIns4CS: A State Inspection Tool for C\#. Proceedings of the 2016 ACM Workshop on Software PROtection, ACM, 2016, 61--71 more… Full text ( DOI ) Full text (mediaTUM)
- Compliance Monitoring of Third-Party Applications in Online Social Networks. The 8th International Workshop on Privacy Engineering (Proceedings of the 8th International Workshop on Privacy Engineering), IEEE, 2016, 9-16 more… Full text ( DOI ) Full text (mediaTUM)
- A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface. Reliability Engineering & System Safety, 2016 more… Full text ( DOI ) Full text (mediaTUM)
- Data Accountability in Socio-Technical Systems. Enterprise, Business-Process and Information Systems Modeling - 17th International Conference, BPMDS 2016, 21st International Conference, EMMSAD 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings, Springer, 2016, 335-348 more… Full text ( DOI ) Full text (mediaTUM)
- Standard Compliant Hazard and Threat Analysis for the Automotive Domain. Information 36 (7), 2016 more… Full text ( DOI ) Full text (mediaTUM)
- A Serious Game for Eliciting Social Engineering Security Requirements. Proceedings of the International Conference on Requirements Engineering, RE, 2016, to appear more… Full text ( DOI ) Full text (mediaTUM)
- HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering. Proceedings of British HCI, ACM, 2016, to appear more… Full text ( DOI ) Full text (mediaTUM)
- Sound and Precise Cross-Layer Data Flow Tracking. In: Lecture Notes in Computer Science. Springer Nature, 2016 more… Full text ( DOI )
- MACKE: compositional analysis of low-level vulnerabilities with symbolic execution. Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016, 780--785 more… Full text ( DOI ) Full text (mediaTUM)
- A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology. 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July, 2016, Proceedings, to appear, 2016, 241-251 more… Full text ( DOI ) Full text (mediaTUM)
- Towards a Unified Model of Accountability Infrastructures. Proceedings First Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies (CREST 2016), Open Publishing Association, 2016, 40-54 more… Full text (mediaTUM)
- MalFlow: identification of C\&C servers through host-based data flow profiling. Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, 2016, 2087--2094 more… Full text ( DOI ) Full text (mediaTUM)
- Security Attack Analysis Using Attack Patterns. 10th IEEE International Conference on Research Challenges in Information Science, RCIS 2016, IEEE, 2016, to appear more… Full text ( DOI ) Full text (mediaTUM)
- Resilience Metrics. Seminars FI / IITM SS 16, 2016 more… Full text ( DOI )
2015
- A framework for empirical evaluation of malware detection resilience against behavior obfuscation. 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015, 40-47 more… Full text ( DOI ) Full text (mediaTUM)
- Idea: Benchmarking Indistinguishability Obfuscation – A Candidate Implementation. 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings, Springer Science + Business Media, 2015 more… Full text ( DOI ) Full text (mediaTUM)
- Software-Based Protection against "Changeware". Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2015 more… Full text ( DOI ) Full text (mediaTUM)
- Illumination Compensation and Normalization Using Low-Rank Decomposition of Multispectral Images in Dermatology. Information Processing in Medical Imaging (Lecture Notes in Computer Science), Springer International Publishing, 2015, 613--625 more… Full text ( DOI ) Full text (mediaTUM)
- Illumination Compensation and Normalization Using Low-Rank Decomposition of Multispectral Images in Dermatology. Information Processing in Medical Imaging (Lecture Notes in Computer Science), Springer International Publishing, 2015, 613--625 more… Full text ( DOI ) Full text (mediaTUM)
- Field Study on the Elicitation and Classification of Defects for Defect Models Pages contribution. Product-Focused Software Process Improvement - 16th International Conference, {PROFES} 2015, Bolzano, Italy, December 2-4, 201 (Lecture Notes in Computer Science), Springer Berlin Heidelberg , 2015, 380-396 more… Full text (mediaTUM)
- Adaptive video streaming for UAV networks. Proceedings of the 7th ACM International Workshop on Mobile Video, 2015, 25-30 more…
- SHRIFT System-wide HybRid Information Flow Tracking. ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Springer International Publishing, 2015, 371-385 more… Full text ( DOI ) Full text (mediaTUM)
- Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings, Springer Science + Business Media, 2015 more… Full text ( DOI )
- Holistic security requirements analysis: An attacker's perspective. IEEE 23rd International Requirements Engineering Conference (RE) (Proceedings of the 2015 IEEE 23rd International Requirements Engineering Conference (RE)), IEEE, 2015, 282-283 more… Full text ( DOI ) Full text (mediaTUM)
- Analyzing Attack Strategies Through Anti-goal Refinement. 8th IFIP WG 8.1. Working Conference (8th IFIP WG 8.1. Working Conference, PoEM 2015, Valencia, Spain, November 10-12, 2015, Proceedings), Springer International Publishing, 2015, 75-90 more… Full text ( DOI ) Full text (mediaTUM)
- Fast Feedback Cycles in Empirical Software Engineering Research. International Conference on Software Engineering (Lecture Notes in Computer Science), IEEE, 2015, 583-586 more… Full text ( DOI ) Full text (mediaTUM)
- Fast Feedback Cycles in Empirical Software Engineering Research. International Conference on Software Engineering (Lecture Notes in Computer Science ), IEEE, 2015, 583 -- 586 more… Full text (mediaTUM)
2014
- Achieving Accountability with Distributed Data Usage Control Technology. 2nd International Workshop on Accountability: Science, Technology, and Policy. Massachusetts Institute of Technology, 2014 more… Full text (mediaTUM)
- Leakage Resilience against Concurrent Cache Attacks. Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, Springer Science + Business Media, 2014 more… Full text ( DOI ) Full text (mediaTUM)
- Where do we stand in requirements engineering improvement today?: first results from a mapping study. Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ACM New York, 2014, 58 more… Full text ( DOI ) Full text (mediaTUM)
- Where do we stand in requirements engineering improvement today?: first results from a mapping study. Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ACM, 2014, 58 more… Full text (mediaTUM)
- 8Cage: Lightweight Fault-Based Test Generation for Simulink. Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, Association for Computing Machinery (ACM), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- Decentralized Distributed Data Usage Control. 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, Springer Science + Business Media, 2014 more… Full text ( DOI ) Full text (mediaTUM)
- Structure Matters - A New Approach for Data Flow Tracking. Proceedings of the 2014 IEEE Security and Privacy Workshops, Institute of Electrical & Electronics Engineers (IEEE), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- On quantitative dynamic data flow tracking. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- On quantitative dynamic data flow tracking. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android. Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Institute of Electrical & Electronics Engineers (IEEE), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Detection of CSRF. 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, Springer Science + Business Media, 2014 more… Full text ( DOI )
- Malware detection with quantitative data flow graphs. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), 2014 more… Full text ( DOI ) Full text (mediaTUM)
- DAVAST. Proceedings of the Eleventh Workshop on Visualization for Cyber Security, Association for Computing Machinery (ACM), 2014 more… Full text ( DOI )
2013
- Privatheit im Internet.Chancen wahrnehmen, Risiken einschätzen, Vertrauen gestalten. Springer Berlin Heidelberg, 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Internet Privacy – Options for adequate realisation. Springer Science + Business Media, 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Enforcing privacy through usage-controlled video surveillance. Advanced Video and Signal Based Surveillance (AVSS), 2013 10th IEEE International Conference on, Institute of Electrical & Electronics Engineers (IEEE), 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Security Testing with Fault-Models and Properties. Software Testing, Verification and Validation (ICST), 2013 IEEE Sixth International Conference on, Institute of Electrical & Electronics Engineers (IEEE), 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Data Protection in a Cloud-Enabled Smart Grid. First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers, Springer Science + Business Media, 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Data Usage Control for the Cloud. Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on, Institute of Electrical & Electronics Engineers (IEEE), 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Data usage control enforcement in distributed systems. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2013 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Usage Control Policy Derivation. Proceedings of the 5th International Conference on Engineering Secure Software and Systems, Springer Science + Business Media, 2013 more… Full text ( DOI ) Full text (mediaTUM)
- A Trustworthy Usage Control Enforcement Framework. International Journal of Mobile Computing and Multimedia Communications, 2013, 34-49 more… Full text ( DOI )
- Evaluation of ASLan Mutation Operators. 7th International Conference, TAP 2013, Budapest, Hungary, June 16-20, 2013. Proceedings, Springer Science + Business Media, 2013 more… Full text ( DOI )
- A new dichotomic algorithm for the uniform random generation of words in regular languages. Theoretical Computer Science 502:165-176, August 2013, Elsevier BV, 2013, 165-176 more… Full text ( DOI ) Full text (mediaTUM)
- A Generic Fault Model for Quality Assurance. In: Model-Driven Engineering Languages and Systems . Springer Berlin Heidelberg (8107. edn.), 2013, 87-103 more… Full text ( DOI )
- A Generic Fault Model for Quality Assurance. In: Model-Driven Engineering Languages and Systems. Springer Berlin Heidelberg, 2013, 87-103 more… Full text ( DOI ) Full text (mediaTUM)
- A Generic Fault Model for Quality Assurance. 16th International Conference, MODELS 2013, Miami, FL, USA, September 29 – October 4, 2013. Proceedings, Springer Science + Business Media, 2013 more… Full text ( DOI ) Full text (mediaTUM)
- The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services. OWASP AppSec Research, Institute of Electrical & Electronics Engineers (IEEE), 2013 more… Full text ( DOI )
- Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control. Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, Institute of Electrical & Electronics Engineers (IEEE), 2013 more… Full text ( DOI ) Full text (mediaTUM)
2012
- Semi-Automatic Security Testing of Web Applications from a Secure Model. Proc. 6th IEEE Intl. Conf. on Software Security and Reliability, Institute of Electrical & Electronics Engineers (IEEE), 2012 more… Full text ( DOI ) Full text (mediaTUM)
- SPaCiTE -- Web Application Testing Engine. Proc. 3rd Intl. Workshop on Security Testing, Montreal, April 2012, Institute of Electrical & Electronics Engineers (IEEE), 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Flexible Data-Driven Security for Android. Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability, Institute of Electrical & Electronics Engineers (IEEE), 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Towards a policy enforcement infrastructure for distributed usage control. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, Association for Computing Machinery (ACM), 2012 more… Full text ( DOI ) Full text (mediaTUM)
- State of Online Privacy: A Technical Perspective. Springer Science + Business Media, 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Deriving implementation-level policies for usage control enforcement. {Proceedings of the Second ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Representation-Independent Data Usage Control. In: Data Privacy Management and Autonomous Spontaneus Security. Springer Berlin Heidelberg, 2012, 122-140 more… Full text ( DOI ) Full text (mediaTUM)
- Representation-Independent Data Usage Control. Proceedings of the 6th International Conference, and 4th International Conference on Data Privacy Management and Autonomous Spontaneus Security, Springer Science + Business Media, 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Data Loss Prevention Based on Data-Driven Usage Control. 23rd IEEE International Symposium on Software Reliability Engineering, ISSRE 2012, Dallas, TX, USA, November 27-30, 2012, IEEE, 2012 more… Full text ( DOI ) Full text (mediaTUM)
- Data Loss Prevention Based on Data-Driven Usage Control. Proceedings of the 2012 IEEE 23rd International Symposium on Software Reliability Engineering, Institute of Electrical & Electronics Engineers (IEEE), 2012 more… Full text ( DOI ) Full text (mediaTUM)
2011
- Software Security in Virtualized Infrastructures: The Smart Meter Example. it - Information Technology, 2011 more… Full text (mediaTUM)
- Security Mutants for Property-Based Testing. 5th International Conference, TAP 2011, Zurich, Switzerland, June 30 – July 1, 2011. Proceedings, Springer Science + Business Media, 2011 more… Full text ( DOI ) Full text (mediaTUM)
- On the number and nature of faults found by random testing. Softw. Test. Verif. Reliab., Wiley-Blackwell, 2011, 3-28 more… Full text ( DOI )
- A virtualized usage control bus system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011 more… Full text (mediaTUM)
- Distributed data usage control for web applications. Proceedings of the First ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2011 more… Full text ( DOI ) Full text (mediaTUM)
- Data-centric multi-layer usage control enforcement. Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, Association for Computing Machinery (ACM), 2011 more… Full text ( DOI ) Full text (mediaTUM)
- A Hypervisor-Based Bus System for Usage Control. Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, Institute of Electrical & Electronics Engineers (IEEE), 2011 more… Full text ( DOI ) Full text (mediaTUM)
- Implementing Trust in Cloud Infrastructures. Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Institute of Electrical & Electronics Engineers (IEEE), 2011 more… Full text ( DOI ) Full text (mediaTUM)
- A Trustworthy Usage Control Enforcement Framework. Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, Institute of Electrical & Electronics Engineers (IEEE), 2011 more… Full text ( DOI ) Full text (mediaTUM)
- Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. Dependable Software for Critical Infrastructures, 2011 more… Full text (mediaTUM)
- A taxonomy of model-based testing approaches. Software Testing, Verification & Reliability, Wiley-Blackwell, 2011, 297-312 more… Full text ( DOI ) Full text (mediaTUM)
2010
- Early functional size estimation with IFPUG unit modified. International Conference on Computer and Information Science, IEEE, 2010, 729--733 more… Full text (mediaTUM)
- Early functional size estimation with IFPUG unit modified. International Conference on Computer and Information Science, IEEE, 2010, 729--733 more… Full text ( DOI ) Full text (mediaTUM)
- Requirements Analysis for Privacy in Social Networks. 8th Intl. Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (VG), 2010 more… Full text (mediaTUM)
2009
- GoCoMM: A Governance and Compliance Maturity Model. Proceedings of the First ACM Workshop on Information Security Governance, Association for Computing Machinery (ACM), 2009 more… Full text ( DOI )
- State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. Proceedings of the 2009 Third International Conference on Network and System Security, Institute of Electrical & Electronics Engineers (IEEE), 2009 more… Full text ( DOI ) Full text (mediaTUM)
- On the Effectiveness of Test Extraction without Overhead. Proc. 2nd Intl. Conf. on Software Testing, Verication, and Validation (ICST, Institute of Electrical & Electronics Engineers (IEEE), 2009 more… Full text ( DOI ) Full text (mediaTUM)
- Usage Control Enforcement with Data Flow Tracking for X11. 5th Intl. Workshop on Security and Trust Management (STM), 2009 more… Full text (mediaTUM)
- Policy Evolution in Distributed Usage Control. 4th Intl. Workshop on Security and Trust Management (STM'08), Elsevier BV, 2009, 109-123 more… Full text ( DOI ) Full text (mediaTUM)
- Policy Evolution in Distributed Usage Control. 4th Intl. Workshop on Security and Trust Management (STM'08), Elsevier BV, 2009, 109-123 more… Full text ( DOI ) Full text (mediaTUM)
- An Overview of Distributed Usage Control. 2nd Conf. Knowledge Engineering: Principles and Techniques, 2009 more… Full text (mediaTUM)
- Formal Analyses of Usage Control Policies. Availability, Reliability and Security, 2009. ARES '09. International Conference on, Institute of Electrical & Electronics Engineers (IEEE), 2009 more… Full text ( DOI ) Full text (mediaTUM)
2008
- Finding Faults: Manual Testing vs. Random+ Testing vs. User Reports. Proc. 19th Intl. Symp. on Software Reliability Engineering (ISSRE), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- On the Predictability of Random Tests for Object-Oriented Software. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. J. Wirtschaftsinformatik, Springer Science + Business Media, 2008, 383-391 more… Full text ( DOI )
- Mechanisms for usage control. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Usage Control Enforcement: Present and Future. Security Privacy, IEEE, Institute of Electrical & Electronics Engineers (IEEE), 2008, 44-53 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Tests for Access Control Policies. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Tests for Access Control Policies. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Tests for Access Control Policies. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Negotiation of Usage Control Policies - Simply the Best? Availability, Reliability and Security, 2008. ARES 08. Third International Conference on Availability, Reliability and Security , Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Doctoral Symposium at MODELS 2008. 11th Intl. Conf on Model Driven Engineering Languages and Systems (MODELS), Springer LNCS 5301, pp. 908-909, Springer Science + Business Media, 2008 more… Full text ( DOI )
- Structural Testing of Component-Based Systems. 11th International Symposium, CBSE 2008, Karlsruhe, Germany, October 14-17, 2008. Proceedings, Springer Science + Business Media, 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Test-Driven Assessment of Access Control in Legacy Applications. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
- Test-Driven Assessment of Access Control in Legacy Applications. Proc. 1st International Conference on Software Testing, Verification, and Validation (ICST), Institute of Electrical & Electronics Engineers (IEEE), 2008 more… Full text ( DOI ) Full text (mediaTUM)
2007
- A technical architecture for enforcing usage control requirements in service-oriented architectures. Proceedings of the 2007 ACM Workshop on Secure Web Services, Association for Computing Machinery (ACM), 2007 more… Full text ( DOI ) Full text (mediaTUM)
- Engineering Automotive Software. Proceedings of the IEEE 95(2), 2007 more… Full text ( DOI ) Full text (mediaTUM)
- Ontology-Based User Profiles for Personalized Search. In: Ontologies: A Handbook of Principles, Concepts and Applications in Information Systems. Springer, 2007 more… Full text ( DOI )
- Verteilte Nutzungskontrolle. digma , 2007 more… Full text (mediaTUM)
- Monitors for Usage Control. Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security,, Springer Science + Business Media, 2007 more… Full text ( DOI ) Full text (mediaTUM)
- A Policy Language for Distributed Usage Control. Proceedings of the 12th European Conference on Research in Computer Security, Springer Science + Business Media, 2007 more… Full text ( DOI ) Full text (mediaTUM)
- DUKE--Distributed Usage Control Enforcement. 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Institute of Electrical & Electronics Engineers (IEEE), 2007 more… Full text ( DOI )
- Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics. 15th IEEE International Requirements Engineering Conference, IEEE , 2007New Delhi, India, 15.10.2007-19.10.2007, 121-130 more… Full text ( DOI )
- Software Engineering for Automotive Systems: A Roadmap. Future of Software Engineering, IEEE-CS Press, 2007 more… Full text ( DOI ) Full text (mediaTUM)
- 4th International ICSE Workshop on Software Engineering for Automotive Systems. ICSE Companion 2007, 2007 more… Full text ( DOI ) Full text (mediaTUM)
- Proceedings of the 4th Intl. ICSE Workshop on Software Engineering for Automotive Systems. ACM Press, 2007 more…
- Usage Control in Service-Oriented Architectures. 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings, Springer Science + Business Media, 2007 more… Full text ( DOI ) Full text (mediaTUM)
- Computing refactorings of state machines. J. Software Systems Modeling 6(4):381-399, December 2007 , Springer Science + Business Media, 2007, 381-399 more… Full text ( DOI ) Full text (mediaTUM)
2006
- Software intensive systems in the automotive domain: challenges for research and education. SAE world congress, 2006SAE special publication SP-2028 "In-vehicle software and hardware systems" more…
- Usage Control Requirements in Mobile and Ubiquitous Computing Applications. Systems and Networks Communications, 2006. ICSNC '06. International Conference, Institute of Electrical & Electronics Engineers (IEEE), 2006 more… Full text ( DOI ) Full text (mediaTUM)
- Zur Kosteneffektivität des modellbasierten Testens. Proc. Dagstuhl-Workshop MBEES 2006: Modellbasierte Entwicklung eingebetteter Systeme, 2006 more… Full text (mediaTUM)
- Distributed usage control. Communications of the ACM, Association for Computing Machinery (ACM), 2006, 39 more… Full text ( DOI ) Full text (mediaTUM)
- 3rd International Workshop on Software Engineering for Automotive Systems - SEAS 2006. SEAS, 2006 more… Full text ( DOI ) Full text (mediaTUM)
- Proceedings of the 2006 international workshop on Software engineering for automotive systems. ICSE '06 International Conference on Software Engineering , ACM, 2006 more…
- A taxonomy of model-based testing. Technical report 04/2006, Department of Computer Science, The University of Waikato (New Zealand), 2006 more… Full text (mediaTUM)
2005
- Model-Based Testing of Reactive Systems. Volume 3472 of Springer LNCS, Springer Berlin Heidelberg, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- On Obligations. 10th European Symp. on Research in Computer Security (ESORICS'05), Springer LNCS , 2005 more… Full text (mediaTUM)
- Abstractions for Model-Based Testing. 2nd Intl. Workshop on Test and Analysis of Component Based Systems (TACoS'04), Elsevier BV, 2005, 59-71 more… Full text ( DOI ) Full text (mediaTUM)
- One Evaluation of Model-Based Testing and its Automation. Proc. 27th Intl. Conf. on Software Engineering (ICSE'05), ACM, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- 2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems. The ACM SIGSOFT Software Engineering Notes 30(4):79, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- Proceedings of the 2nd International ICSE Workshop on Software Engineering for Automotive Systems. ACM Press, 2005 more…
- One evaluation of model-based testing and its automation. Tutorial, Proc. 27th Intl. Conf. on Software Engineering (ICSE'05), Institute of Electrical & Electronics Engineers (IEEE), 2005 more… Full text ( DOI ) Full text (mediaTUM)
- One evaluation of model-based testing and its automation. Proceedings of the 27th International Conference on Software Engineering, Association for Computing Machinery (ACM), 2005 more… Full text ( DOI ) Full text (mediaTUM)
- Methodological Issues in Model-Based Testing. Model-Based Testing of Reactive Systems, Springer Science + Business Media, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- Computing Refactorings of Behavior Models. ACM/IEEE 8th Intl. Conf. on Model Driven Engineering Languages and Systems (MoDELS'05, formely UML conferences), Springer LNCS 3717, pp.126-141, Montego Bay, , Springer Science + Business Media, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Testing in Practice. FM 2005: Formal Methods, Springer Science + Business Media, 2005 more… Full text ( DOI ) Full text (mediaTUM)
- Modellbasierte Qualitätssicherung. Workshopzusammenfassung QUAM 05, Proc. Jahrestagung Informatik der GI, Bonn, 2005 more… Full text (mediaTUM)
2004
- Coverage Metrics for Continuous Function Charts. Proc. 15th IEEE Intl. Symp. on Software Reliability Engineering (ISSRE'04), Institute of Electrical & Electronics Engineers (IEEE), 2004 more… Full text ( DOI ) Full text (mediaTUM)
- Model Based Software and Systems Development. A White Paper, 2004 more… Full text (mediaTUM)
- Software engineering for automotive systems at ICSE 2004 workshop summary. ACM SIGSOFT Software Engineering Notes 29(5), 2004 more… Full text ( DOI ) Full text (mediaTUM)
- Proceedings of the ICSE 2004 workshop on Software Engineering for Automotive Systems. The Institution of Electrical Engineers, 2004 more…
- Model-based testing for real. International Journal on Software Tools for Technology Transfer (STTT) (2-3), 2004, 140-157 more… Full text ( DOI ) Full text (mediaTUM)
- Model-based testing for real. J. Software Tools for Technology Transfer, Springer Science + Business Media, 2004, 140-157 more… Full text ( DOI ) Full text (mediaTUM)
- Model-based testing for real. Int. J. Softw. Tools Technol. Transf., Springer Science + Business Media, 2004, 140-157 more… Full text ( DOI ) Full text (mediaTUM)
- Modellbasiertes Testen. Tutorial, Proc. Modellierung 2004, p. 274, Marburg, March 2004, 2004 more…
- Model based testing in incremental system development. Journal of Systems and Software 70(3), Elsevier BV, 2004, 315-329 more… Full text ( DOI )
- ICSE Workshop: Software Engineering for Automotive Systems. ICSE '04 Proceedings of the 26th International Conference on Software Engineering , 2004 more… Full text (mediaTUM)
- Model Based Software and Systems Development - A White Paper. A White Paper, 2004 more… Full text (mediaTUM)
2003
- Modellbasiertes Testen. Tutorial, Entwurf komplexer Automatisierungssysteme, Braunschweig, 2003 more…
- The Automotive CASE. Modelle, Werkzeuge, Infrastrukturen zur Unterstützung von Entwicklungsprozessen, Wiley-VCH, 2003 more… Full text (mediaTUM)
- Ontology-Based Personalized Search and Browsing. Web Intelligence and Agent Systems: An International Journal - Volume 12, issue 4, 2003 more… Full text (mediaTUM)
- Tests for mixed discrete-continuous systems. Technical Report TUM-I0301, 2003 more… Full text (mediaTUM)
- Prototype-based tests for hybrid reactive systems. 14th IEEE Intl. workshop on Rapid System Prototyping, Institute of Electrical & Electronics Engineers (IEEE), 2003 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Test Case Generation for Smart Cards1 1Support by the BMBF (project EMPRESS) is gratefully acknowledged. Electronic Notes in Theoretical Computer Science, Elsevier BV, 2003, 170-184 more… Full text ( DOI ) Full text (mediaTUM)
2002
- Model based development of hybrid systems: specification, simulation, test case generation. Modelling, Analysis, and Design of Hybrid Systems, Lecture Notes in Control and Information Sciences, Vol. 279, Springer, 2002 more… Full text ( DOI ) Full text (mediaTUM)
- Model Based Development of Hybrid Systems: Specification, Simulation, Test Case Generation. Modelling, Analysis, and Design of Hybrid Systems, Springer Science + Business Media, 2002 more… Full text ( DOI ) Full text (mediaTUM)
- Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems. Proc. Ada Deutschland Tagung, 2002 more… Full text (mediaTUM)
- Szenarien modellbasierten Testens. Technical Report TUM-I0205, 2002 more… Full text (mediaTUM)
- Model-Based Development of Embedded Systems. Workshop Model-Driven Approaches to Software Development, Montpellier, September 2002, 2002 more… Full text (mediaTUM)
2001
- Classical search strategies for test case generation with Constraint Logic Programming. Proc. Formal Approaches to Testing of Software (FATES'01), 2001 more… Full text (mediaTUM)
- Model Based Testing with Constraint Logic Programming: First Results and Challenges. 2nd ICSE Intl. Workshop on Automated Program Analysis, 2001 more… Full text (mediaTUM)
- Heuristische Suche in der Testfallgenerierung. Softwaretechnik-Trends 21(3):11-12, 2001 more… Full text (mediaTUM)
- Modellbasiertes Testen mit AutoFocus/Quest. Softwaretechnik-Trends 21(1):20-23, 2001 more… Full text (mediaTUM)
- Model Based Testing for Real: The Inhouse Card Case Study. 6th Intl. Workshop on Formal Methods for Industrial Critical Systems, 2001 more… Full text (mediaTUM)
- Model based testing in evolutionary software development. 12th IEEE Intl. Workshop on Rapid System Prototyping (RSP’01), Institute of Electrical & Electronics Engineers (IEEE), 2001 more… Full text ( DOI ) Full text (mediaTUM)
- Ein CASE-Werkzeug zur hybriden Modellierung und Simulation intelligenter Maschinen. Proc. Engineering komplexer Automatisierungssysteme (EKA'01), 2001 more… Full text (mediaTUM)
- Approaching a Discrete-Continuous UML: Tool Support and Formalization. Proc. UML'2001 workshop on Practical UML-Based Rigorous Development Methods -- Countering or Integrating the eXtremists, 2001 more… Full text (mediaTUM)
2000
- AutoFocus on Constraint Logic Programming. Proc. (Constraint) Logic Programming and Software Engineering (LPSE'2000), 2000 more… Full text (mediaTUM)
- Testing Concurrent Reactive Systems with Constraint Logic Programming. 2nd workshop on Rule-Based Constraint Reasoning and Programming,, 2000 more… Full text (mediaTUM)
- Developing Correct Safety Critical, Hybrid, Embedded Systems. Proc. New Information Processing Techniques for Military Systems, NATO Research and Technology Organization, 2000 more… Full text (mediaTUM)
- Heterogeneous Development of Hybrid Systems. Proc. GI workshop Rigorose Entwicklung software-intensiver Systeme, 2000 more… Full text (mediaTUM)
- Specification based test sequence generation with propositional logic. Journal on Software Testing, Validation, and Reliability 10(4):229-248, December 2000, Wiley-Blackwell, 2000, 229-248 more… Full text (mediaTUM)
1999
- Ontology Based Personalized Search. , 1999 more… Full text (mediaTUM)
- Personalization on the Web – Technical Report ITTC-FY2000-TR-13591-01. Information and Telecommunication Technology Center (ITTC), The University of Kansas, Lawrence, KS, 1999, more… Full text (mediaTUM)
- Ontology Based Personalized Search. Proc. 11th IEEE Intl. Conf. on Tools with Artificial Intelligence (ICTAI'99), 1999 more… Full text ( DOI ) Full text (mediaTUM)
- Ontology-Based Web Site Mapping for Information Exploration. Proc. 8th Intl. Conf. on Information and Knowledge Management (CIKM'99), 1999 more… Full text (mediaTUM)
1998
- TasteCurry's User Manual. 1998 more…
- Vergleich von Narrowing-Verfahren erster und höherer Ordnung. , 1998 more… Full text (mediaTUM)
1995
- Neue computergestützte Leistungserfassung und -auswertung in der Herzchirurgie. Dokumentationsverfahren in der Herzchirurgie, 1995 more…
1994
- Symbolisches Differenzieren mit prozeduralen Programmiersprachen. ST-Computer 5/94, pp.80-87, May 1994, 1994 more…