Publikationen

Viertel FP, Brunotte W, Evers Y, Schneider K. Community Knowledge about Security: Identification and Classification of User Contributions. in Garcia-Alfaro J, Leneutre J, Cuppens N, Yaich R, Hrsg., Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. Springer, Cham. 2021. S. 181-197. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi.org/10.1007/978-3-030-68887-5_11

Johannsen JO, Viertel FP, Bruegge B, Schneider K. Tacit Knowledge in Software Evolution. in Managed Software Evolution. Springer Open. 2019. S. 77-105

Jürjens J, Schneider K, Bürger J, Viertel FP, Strüber D, Goedicke M et al. Maintaining Security in Software Evolution. in Managed Software Evolution. Springer Open. 2019

Viertel FP, Kortum F, Wagner L, Schneider K. Are Third-Party Libraries Secure? A Software Library Checker for Java. in Zemmari A, Mosbah M, Cuppens-Boulahia N, Cuppens F, Hrsg., Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers. Springer Verlag. 2019. S. 18-34. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi.org/10.1007/978-3-030-12143-3_2

Viertel FP, Brunotte W, Strüber D, Schneider K. Detecting Security Vulnerabilities using Clone Detection and Community Knowledge. 2019. Beitrag in 31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019, Lisbon, Portugal. doi.org/10.18293/SEKE2019-183

Vargas C, Bürger J, Viertel FP, Vogel-Häuser B, Jürjens J. System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2).. 2018. Beitrag in IFAC PapersOnLine , . doi.org/10.1016/j.ifacol.2018.06.238

Viertel FP, Karras O, Schneider K. Vulnerability Recognition by Execution Trace Differentiation. 2017. Beitrag in ACM/IEEE International Symposium on Software Performance, Karlsruhe, Deutschland.