
Stefan Krüger
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [b1]Stefan Krüger:
CogniCrypt - the secure integration of cryptographic software. University of Paderborn, Germany, 2020 - [j3]Lisa Nguyen Quang Do
, Stefan Krüger, Patrick Hill, Karim Ali
, Eric Bodden
:
Debugging Static Analysis. IEEE Trans. Software Eng. 46(7): 697-709 (2020) - [c19]Stefan Krüger, Karim Ali, Eric Bodden:
CogniCryptGEN: generating code for the secure usage of crypto APIs. CGO 2020: 185-198 - [p1]Alexander Knüppel, Stefan Krüger, Thomas Thüm, Richard Bubel, Sebastian Krieter, Eric Bodden, Ina Schaefer:
Using Abstract Contracts for Verifying Evolving Features and Their Interactions. 20 Years of KeY 2020: 122-148
2010 – 2019
- 2019
- [j2]Thomas Thüm
, Alexander Knüppel, Stefan Krüger, Stefanie Bolle, Ina Schaefer:
Feature-oriented contract composition. J. Syst. Softw. 152: 83-107 (2019) - [c18]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. ESEM 2019: 1-6 - [c17]Stefan Krüger, Ben Hermann:
Can an online service predict gender?: on the state-of-the-art in gender identification from texts. GE@ICSE 2019: 13-16 - [c16]Thomas Thüm, Alexander Knüppel, Stefan Krüger, Stefanie Bolle, Ina Schaefer:
Feature-oriented contract composition. SPLC (A) 2019: 5:1 - [i3]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. CoRR abs/1908.01489 (2019) - 2018
- [d1]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact). Dagstuhl Artifacts Ser. 4(3): 06:1-06:4 (2018) - [c15]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. ECOOP 2018: 10:1-10:27 - [c14]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
VISUFLOW: a debugging environment for static analyses. ICSE (Companion Volume) 2018: 89-92 - [i2]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
Debugging Static Analysis. CoRR abs/1801.04894 (2018) - 2017
- [c13]Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, Ram Kamath:
CogniCrypt: supporting developers in using cryptography. ASE 2017: 931-936 - [c12]Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden:
"Jumping Through Hoops": Why do Java Developers Struggle With Cryptography APIs? Software Engineering 2017: 57 - [i1]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: Validating Correct Usage of Cryptographic APIs. CoRR abs/1710.00564 (2017) - 2016
- [c11]Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden
:
Jumping through hoops: why do Java developers struggle with cryptography APIs? ICSE 2016: 935-946 - [c10]Thomas Thüm, Tim Winkelmann, Reimar Schröter, Martin Hentschel, Stefan Krüger:
Variability Hiding in Contracts for Dependent Software Product Lines. VaMoS 2016: 97-104 - [c9]Sarah Nadi, Stefan Krüger:
Variability Modeling of Cryptographic Components: Clafer Experience Report. VaMoS 2016: 105-112 - 2013
- [c8]Peter Geibel, Hebun Erdur, Lothar Zimmermann, Stefan Krüger, Kati Jegzentis, Josef Schepers, Anne Becker, Frank Müller, Christian Hans Nolte, Jan Friedrich Scheitz, Serdar Tütüncü, Tatiana Usnich, Markus Frick, Martin Trautwein, Thorsten Schaaf, Alfred Holzgreve, Thomas Tolxdorff:
Patient Identification for Clinical Trials with Ontology-based Information Extraction from Documents. KEOD 2013: 230-236 - [c7]Peter Geibel, Martin Trautwein, Hebun Erdur, Lothar Zimmermann, Stefan Krüger, Josef Schepers, Kati Jegzentis, Frank Müller, Christian Hans Nolte, Anne Becker, Markus Frick, Jochen Setz, Jan Friedrich Scheitz, Serdar Tütüncü, Tatiana Usnich, Alfred Holzgreve, Thorsten Schaaf, Thomas Tolxdorff:
Ontology-Based Semantic Annotation of Documents in the Context of Patient Identification for Clinical Trials. OTM Conferences 2013: 719-736 - 2011
- [c6]Claudia Nick, Alexander Mertens, Stefan Krüger:
"Da ham se mich aber reingelegt, dat muss man sich ja zuerst ganz durchlesen (...)". Usability Professionals 2011: 128-132 - [c5]Claudia Nick, Alexander Mertens, Stefan Krüger, Christopher M. Schlick:
Empirical Study on the Relevance of Factors Influencing Readability of Instruction Manuals for Elderly. USAB 2011: 681-689
2000 – 2009
- 2006
- [j1]Pavel Laskov, Christian Gehl, Stefan Krüger, Klaus-Robert Müller:
Incremental Support Vector Learning: Analysis, Implementation and Applications. J. Mach. Learn. Res. 7: 1909-1936 (2006)
1990 – 1999
- 1998
- [c4]Stefan Krüger, Andrew Calway:
Image Registration using Multiresolution Frequency Domain Correlation. BMVC 1998: 1-10 - [c3]Roland G. Wilson, Peter R. Meulemans, Andrew Calway, Stefan Krüger:
Image Sequence Analysis and Segmentation using G-blobs. ICIP (2) 1998: 483-487 - [c2]Andrew Calway, Stefan Krüger, David Tweed:
Motion Estimation using Adaptive Correlation and Local Directional Smoothing. ICIP (3) 1998: 614-618 - 1996
- [c1]Stefan Krüger, Andrew D. Calway:
A multiresolution frequency domain method for estimating affine motion parameters. ICIP (1) 1996: 113-116
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-04 23:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint