Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jan-Christoph Küster
@article{DBLP:journals/fmsd/0002KV15, author = {Andreas Bauer and Jan{-}Christoph K{\"{u}}ster and Gil Vegliach}, title = {The ins and outs of first-order runtime verification}, journal = {Formal Methods Syst. Des.}, volume = {46}, number = {3}, pages = {286--316}, year = {2015}, url = {https://doi.org/10.1007/s10703-015-0227-2}, doi = {10.1007/S10703-015-0227-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/0002KV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/Kuster015, author = {Jan{-}Christoph K{\"{u}}ster and Andreas Bauer}, editor = {Ezio Bartocci and Rupak Majumdar}, title = {Monitoring Real Android Malware}, booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna, Austria, September 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9333}, pages = {136--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23820-3\_9}, doi = {10.1007/978-3-319-23820-3\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/Kuster015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KuesterB14, author = {Jan{-}Christoph K{\"{u}}ster and Andreas Bauer}, title = {Platform-Centric Android Monitoring - Modular and Efficient}, journal = {CoRR}, volume = {abs/1406.2041}, year = {2014}, url = {http://arxiv.org/abs/1406.2041}, eprinttype = {arXiv}, eprint = {1406.2041}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KuesterB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/0002KV13, author = {Andreas Bauer and Jan{-}Christoph K{\"{u}}ster and Gil Vegliach}, editor = {Axel Legay and Saddek Bensalem}, title = {From Propositional to First-Order Monitoring}, booktitle = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes, France, September 24-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8174}, pages = {59--75}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40787-1\_4}, doi = {10.1007/978-3-642-40787-1\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/0002KV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-3645, author = {Andreas Bauer and Jan{-}Christoph K{\"{u}}ster and Gil Vegliach}, title = {From propositional to first-order monitoring}, journal = {CoRR}, volume = {abs/1303.3645}, year = {2013}, url = {http://arxiv.org/abs/1303.3645}, eprinttype = {arXiv}, eprint = {1303.3645}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-3645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BeckersFHKS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan{-}Christoph K{\"{u}}ster and Holger Schmidt}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Supporting the Development and Documentation of {ISO} 27001 Information Security Management Systems through Security Requirements Engineering Approaches}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {14--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_2}, doi = {10.1007/978-3-642-28166-2\_2}, timestamp = {Sat, 19 Oct 2019 20:24:21 +0200}, biburl = {https://dblp.org/rec/conf/essos/BeckersFHKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/BauerKV12, author = {Andreas Bauer and Jan{-}Christoph K{\"{u}}ster and Gil Vegliach}, editor = {Alwyn Goodloe and Suzette Person}, title = {Runtime Verification Meets Android Security}, booktitle = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7226}, pages = {174--180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28891-3\_18}, doi = {10.1007/978-3-642-28891-3\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nfm/BauerKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/BeckersFKS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan{-}Christoph K{\"{u}}ster and Holger Schmidt}, editor = {Bj{\"{o}}rn Regnell and Daniela E. Damian}, title = {A Pattern-Based Method for Identifying and Analyzing Laws}, booktitle = {Requirements Engineering: Foundation for Software Quality - 18th International Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7195}, pages = {256--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28714-5\_23}, doi = {10.1007/978-3-642-28714-5\_23}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/refsq/BeckersFKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersSKF11, author = {Kristian Beckers and Holger Schmidt and Jan{-}Christoph K{\"{u}}ster and Stephan Fa{\ss}bender}, title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {327--333}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.55}, doi = {10.1109/ARES.2011.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersSKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.