10 results
[10]Are Third-Party Libraries Secure? A Software Library Checker for Java (, , and ), In The 13th International Conference on Risks and Security of Internet and Systems, CRISIS 2018., Springer, LNCS, . [bibtex]
[9]Model-based Security Analysis of Feature-oriented Software Product Lines (, and ), In 17th International Conference on Generative Programming, GPCE 2018., Springer, LNCS, . [bibtex]
[8]System evolution through semi-automatic elicitation of security requirements: A Position Paper (, , , and ), In IFAC-PapersOnLine, volume 51, . [bibtex] [pdf] [doi]
[7]A framework for semi-automated co-evolution of security knowledge and system models (), In Journal of Systems and Software, volume 139, . [bibtex] [pdf] [doi]
[6]Taming Multi-Variability of Software Product Line Transformations (), In Fundamental Approaches to Software Engineering, 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings., . [bibtex] [pdf] [doi]
[5]Vulnerability Recognition by Execution Trace Differentiation (), In Softwaretechnik-Trends, volume 37, . [bibtex] [pdf]
[4]Model-based privacy and security analysis with CARiSMA (), In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017, . [bibtex] [pdf] [doi]
[3]What Works Better? A Study of Classifying Requirements (), In 25th IEEE International Requirements Engineering Conference, RE 2017, Lisbon, Portugal, September 4-8, 2017, . [bibtex] [pdf] [doi]
[2]The Choice of Code Review Process: A Survey on the State of the Practice (), In Product-Focused Software Process Improvement - 18th International Conference, PROFES 2017, Innsbruck, Austria, November 29 - December 1, 2017, Proceedings, . [bibtex] [pdf] [doi]
[1]From Secure Business Process Modeling to Design-Level Security Verification (), In 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2017, Austin, TX, USA, September 17-22, 2017, . [bibtex] [pdf] [doi]

Previous Project-related Publications

10 results
[10]Restoring Security of Long-Living Systems by Co-evolution (, , , , and ), In Proceedings - International Computer Software and Applications Conference, volume 2, . [bibtex] [doi]
[9]Preserving Validity of Batch-Job Nets under Change at Run-Time (, , and ), In Proceedings - International Computer Software and Applications Conference, volume 2, . [bibtex] [doi]
[8]A Platform for Empirical Research on Information System Evolution (, , , , , and ), In Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering (SEKE'15), KSI Research Inc., . [bibtex] [pdf] [doi]
[7]Restoring security of evolving software models using graph transformation (, and ), In International Journal on Software Tools for Technology Transfer, volume 17, . [bibtex] [doi]
[6]Knowledge from document annotations as by-product in distributed software engineering (, , , , , , and ), In Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, volume 27, . [bibtex] [pdf]
[5]Specifying model changes with UMLchange to support security verification of potential evolution (, , and ), In Computer Standards and Interfaces, Elsevier BV, volume 36, . [bibtex] [pdf] [doi]
[4]Maintaining requirements for long-living software systems by incorporating security knowledge (, , and ), In 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014 - Proceedings, . [bibtex] [doi]
[3]Tailoring video recording to support efficient GUI testing and debugging (, and ), In Software Quality Journal, volume 22, . [bibtex] [pdf] [doi]
[2]Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems (, , , and ), In 15th Int. Conf. of Product Focused Software Development and Process Improvement (Profes'14), Springer, volume 8892, . [bibtex] [pdf] [doi]
[1]Model-based Security Engineering : Managed Co-Evolution of Security Knowledge and Software Models (, , , and ), In Foundations of Security Analysis and Design VII, volume 8604, . [bibtex] [doi]