BibTeX records: Jan-Christoph Küster

download as .bib file

@article{DBLP:journals/fmsd/0002KV15,
  author    = {Andreas Bauer and
               Jan{-}Christoph K{\"{u}}ster and
               Gil Vegliach},
  title     = {The ins and outs of first-order runtime verification},
  journal   = {Formal Methods in System Design},
  volume    = {46},
  number    = {3},
  pages     = {286--316},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10703-015-0227-2},
  doi       = {10.1007/s10703-015-0227-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fmsd/0002KV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Kuster015,
  author    = {Jan{-}Christoph K{\"{u}}ster and
               Andreas Bauer},
  title     = {Monitoring Real Android Malware},
  booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
               Austria, September 22-25, 2015. Proceedings},
  pages     = {136--152},
  year      = {2015},
  crossref  = {DBLP:conf/rv/2015},
  url       = {https://doi.org/10.1007/978-3-319-23820-3\_9},
  doi       = {10.1007/978-3-319-23820-3\_9},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rv/Kuster015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KuesterB14,
  author    = {Jan{-}Christoph K{\"{u}}ster and
               Andreas Bauer},
  title     = {Platform-Centric Android Monitoring - Modular and Efficient},
  journal   = {CoRR},
  volume    = {abs/1406.2041},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.2041},
  archivePrefix = {arXiv},
  eprint    = {1406.2041},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KuesterB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/0002KV13,
  author    = {Andreas Bauer and
               Jan{-}Christoph K{\"{u}}ster and
               Gil Vegliach},
  title     = {From Propositional to First-Order Monitoring},
  booktitle = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes,
               France, September 24-27, 2013. Proceedings},
  pages     = {59--75},
  year      = {2013},
  crossref  = {DBLP:conf/rv/2013},
  url       = {https://doi.org/10.1007/978-3-642-40787-1\_4},
  doi       = {10.1007/978-3-642-40787-1\_4},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rv/0002KV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-3645,
  author    = {Andreas Bauer and
               Jan{-}Christoph K{\"{u}}ster and
               Gil Vegliach},
  title     = {From propositional to first-order monitoring},
  journal   = {CoRR},
  volume    = {abs/1303.3645},
  year      = {2013},
  url       = {http://arxiv.org/abs/1303.3645},
  archivePrefix = {arXiv},
  eprint    = {1303.3645},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1303-3645},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BeckersFHKS12,
  author    = {Kristian Beckers and
               Stephan Fa{\ss}bender and
               Maritta Heisel and
               Jan{-}Christoph K{\"{u}}ster and
               Holger Schmidt},
  title     = {Supporting the Development and Documentation of {ISO} 27001 Information
               Security Management Systems through Security Requirements Engineering
               Approaches},
  booktitle = {Engineering Secure Software and Systems - 4th International Symposium,
               ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  pages     = {14--21},
  year      = {2012},
  crossref  = {DBLP:conf/essos/2012},
  url       = {https://doi.org/10.1007/978-3-642-28166-2\_2},
  doi       = {10.1007/978-3-642-28166-2\_2},
  timestamp = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/BeckersFHKS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/BauerKV12,
  author    = {Andreas Bauer and
               Jan{-}Christoph K{\"{u}}ster and
               Gil Vegliach},
  title     = {Runtime Verification Meets Android Security},
  booktitle = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk,
               VA, USA, April 3-5, 2012. Proceedings},
  pages     = {174--180},
  year      = {2012},
  crossref  = {DBLP:conf/nfm/2012},
  url       = {https://doi.org/10.1007/978-3-642-28891-3\_18},
  doi       = {10.1007/978-3-642-28891-3\_18},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nfm/BauerKV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/BeckersFKS12,
  author    = {Kristian Beckers and
               Stephan Fa{\ss}bender and
               Jan{-}Christoph K{\"{u}}ster and
               Holger Schmidt},
  title     = {A Pattern-Based Method for Identifying and Analyzing Laws},
  booktitle = {Requirements Engineering: Foundation for Software Quality - 18th International
               Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012.
               Proceedings},
  pages     = {256--262},
  year      = {2012},
  crossref  = {DBLP:conf/refsq/2012},
  url       = {https://doi.org/10.1007/978-3-642-28714-5\_23},
  doi       = {10.1007/978-3-642-28714-5\_23},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/refsq/BeckersFKS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersSKF11,
  author    = {Kristian Beckers and
               Holger Schmidt and
               Jan{-}Christoph K{\"{u}}ster and
               Stephan Fa{\ss}bender},
  title     = {Pattern-Based Support for Context Establishment and Asset Identification
               of the {ISO} 27000 in the Field of Cloud Computing},
  booktitle = {Sixth International Conference on Availability, Reliability and Security,
               {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages     = {327--333},
  year      = {2011},
  crossref  = {DBLP:conf/IEEEares/2011},
  url       = {https://doi.org/10.1109/ARES.2011.55},
  doi       = {10.1109/ARES.2011.55},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/BeckersSKF11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rv/2015,
  editor    = {Ezio Bartocci and
               Rupak Majumdar},
  title     = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
               Austria, September 22-25, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9333},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23820-3},
  doi       = {10.1007/978-3-319-23820-3},
  isbn      = {978-3-319-23819-7},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rv/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rv/2013,
  editor    = {Axel Legay and
               Saddek Bensalem},
  title     = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes,
               France, September 24-27, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8174},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40787-1},
  doi       = {10.1007/978-3-642-40787-1},
  isbn      = {978-3-642-40786-4},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rv/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2012,
  editor    = {Gilles Barthe and
               Benjamin Livshits and
               Riccardo Scandariato},
  title     = {Engineering Secure Software and Systems - 4th International Symposium,
               ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7159},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28166-2},
  doi       = {10.1007/978-3-642-28166-2},
  isbn      = {978-3-642-28165-5},
  timestamp = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nfm/2012,
  editor    = {Alwyn Goodloe and
               Suzette Person},
  title     = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk,
               VA, USA, April 3-5, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7226},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28891-3},
  doi       = {10.1007/978-3-642-28891-3},
  isbn      = {978-3-642-28890-6},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nfm/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/refsq/2012,
  editor    = {Bj{\"{o}}rn Regnell and
               Daniela E. Damian},
  title     = {Requirements Engineering: Foundation for Software Quality - 18th International
               Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7195},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28714-5},
  doi       = {10.1007/978-3-642-28714-5},
  isbn      = {978-3-642-28713-8},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/refsq/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2011,
  title     = {Sixth International Conference on Availability, Reliability and Security,
               {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6045375/proceeding},
  isbn      = {978-1-4577-0979-1},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics