Publikationen

Zeige Ergebnisse 1 - 8 von 8

Viertel FP, Brunotte W, Evers Y, Schneider K. Community Knowledge about Security: Identification and Classification of User Contributions. in Garcia-Alfaro J, Leneutre J, Cuppens N, Yaich R, Hrsg., Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers. Springer, Cham. 2021. S. 181-197. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-030-68887-5_11
Viertel FP. Heuristic and Knowledge-Based Security Checks of Source Code Artifacts Using Community Knowledge. Berlin: Logos Verlag Berlin GmbH, 2021. 228 S.
Johannsen JO, Viertel FP, Bruegge B, Schneider K. Tacit Knowledge in Software Evolution. in Reussner R, Goedicke M, Hasselbring W, Vogel-Heuser B, Keim J, Märtin L, Hrsg., Managed Software Evolution. 1. Aufl. Springer Open. 2019. S. 77-105 Epub 2019 Jun 26. doi: 10.1007/978-3-030-13499-0_5
Jürjens J, Schneider K, Bürger J, Viertel FP, Strüber D, Goedicke M et al. Maintaining Security in Software Evolution. in Reussner R, Goedicke M, Hasselbring W, Vogel-Heuser B, Keim J, Märtin L, Hrsg., Managed Software Evolution. 1. Aufl. Springer Open. 2019. S. 207-253 doi: https://doi.org/10.1007/978-3-030-13499-0_9
Viertel FP, Kortum F, Wagner L, Schneider K. Are Third-Party Libraries Secure? A Software Library Checker for Java. in Zemmari A, Mosbah M, Cuppens-Boulahia N, Cuppens F, Hrsg., Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Revised Selected Papers: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers. 1. Aufl. Springer, Cham. 2019. S. 18-34. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-030-12143-3_2
Viertel FP, Brunotte W, Strüber D, Schneider K. Detecting Security Vulnerabilities using Clone Detection and Community Knowledge. 2019. Beitrag in 31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019, Lisbon, Portugal. doi: 10.18293/SEKE2019-183
Vargas C, Bürger J, Viertel FP, Vogel-Häuser B, Jürjens J. System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2).. 2018. Beitrag in IFAC PapersOnLine . doi: 10.1016/j.ifacol.2018.06.238
Viertel FP, Karras O, Schneider K. Vulnerability Recognition by Execution Trace Differentiation. 2017. Beitrag in ACM/IEEE International Symposium on Software Performance, Karlsruhe, Deutschland.