default search action
Jan Jürjens
Person information
- affiliation: University of Koblenz-Landau, Germany
- affiliation (former): Dortmund University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j40]Sven Peldszus, Jens Bürger, Jan Jürjens:
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering. IEEE Trans. Software Eng. 50(1): 16-47 (2024) - [c162]Malla Reddy Sama, Eike Lyczkowski, Michael Petry, Wolfgang Kiess, Jan Jürjens:
5G-Enabled Flexible Security Framework for Industrial Applications. ICC 2024: 708-714 - [c161]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
A Comparative Evaluation of Requirement Template Systems (Summary). Software Engineering 2024: 47-48 - [d1]Matthias Lohr, Sven Peldszus, Jan Jürjens, Steffen Staab:
Fast, Favorable, and Fair Blockchain-based Exchange of Digital Goods using State Channels - Replication Package. Zenodo, 2024 - [i13]Anselm von Gladiss, Amir Shayan Ahmadian, Jan Jürjens:
Reconstruction as a service: a data space for off-site image reconstruction in magnetic particle imaging. CoRR abs/2401.05987 (2024) - [i12]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. CoRR abs/2401.09199 (2024) - 2023
- [j39]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
Enhanced abbreviation-expansion pair detection for glossary term extraction. Inf. Softw. Technol. 159: 107203 (2023) - [j38]Zeyd Boukhers, Prantik Goswami, Jan Jürjens:
Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text. Neural Comput. Appl. 35(24): 17633-17644 (2023) - [j37]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [c160]Zeyd Boukhers, Azeddine Bouabdallah, Cong Yang, Jan Jürjens:
Beyond Trading Data: The Hidden Influence of Public Awareness and Interest on Cryptocurrency Volatility. CIKM 2023: 142-151 - [c159]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. ICFNDS 2023: 344-351 - [c158]Katharina Großer, Marina Rukavitsyna, Jan Jürjens:
A Comparative Evaluation of Requirement Template Systems. RE 2023: 41-52 - [c157]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
ILLOD Replication Package: An Open-Source Framework for Abbreviation-Expansion Pair Detection and Term Consolidation in Requirements. RE 2023: 369-370 - [c156]Katharina Großer, Volker Riediger, Jan Jürjens:
Requirements document relations: A reuse perspective on traceability through standards. Software Engineering 2023: 57-58 - [c155]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Evaluation Methods and Replicability of Software Architecture Research Objects. Software Engineering 2023: 75-76 - 2022
- [j36]Joachim Stocker, Nils Herda, Jan Jürjens:
Life cycle and metrics to measure the resilience of business processes by considering resources. Bus. Process. Manag. J. 28(4): 1164-1182 (2022) - [j35]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for Visual Question Answering Interpretation. Sensors 22(6): 2245 (2022) - [j34]Katharina Großer, Volker Riediger, Jan Jürjens:
Requirements document relations. Softw. Syst. Model. 21(6): 1-37 (2022) - [c154]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain. ICBC 2022: 1-5 - [c153]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects". ICSA Companion 2022: 58 - [c152]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Evaluation Methods and Replicability of Software Architecture Research Objects. ICSA 2022: 157-168 - [c151]Kilian Vernickel, Mayank Singh, Marco Konersmann, Jan Jürjens:
Ontology-based Synchronization of Automated Production Systems and Their Simulation Models. IEEM 2022: 660-664 - [c150]Malla Reddy Sama, Wolfgang Kiess, Riccardo Guerzoni, Srisakul Thakolsri, Jan Jürjens:
Redefining the Trust Model for the Internet of Everything in the 6G era. PIMRC 2022: 1400-1406 - [c149]Hussein Hasso, Katharina Großer, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
Abbreviation-Expansion Pair Detection for Glossary Term Extraction. REFSQ 2022: 63-78 - [p8]Jan Jürjens, Simon Scheider, Furkan Yildirim, Michael Henke:
Tokenomics: Decentralized Incentivization in the Context of Data Spaces. Designing Data Spaces 2022: 91-108 - [p7]Santiago Cáceres Elvira, Francisco Valverde, Carlos Enrique Palau, Andreu Belsa Pellicer, Christos A. Gizelis, Dimosthenes Krassas, Hanane Becha, Réda Khouani, Andreas Metzger, Nikos Tzagkarakis, Anthousa Karkoglou, Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, Antonios Litke, Amir Shayan Ahmadian, Jan Jürjens:
Towards Cognitive Ports of the Future. Technologies and Applications for Big Data Value 2022: 453-474 - [i11]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for VQA Interpretation. CoRR abs/2201.03342 (2022) - [i10]Zeyd Boukhers, Azeddine Bouabdallah, Matthias Lohr, Jan Jürjens:
Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price. CoRR abs/2202.08967 (2022) - [i9]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version). CoRR abs/2203.05925 (2022) - 2021
- [j33]Sven Peldszus, Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology-driven evolution of software security. Data Knowl. Eng. 134: 101907 (2021) - [j32]Muhammad Sheikh Sadi, Waseem Ahmed, Jan Jürjens:
Towards Tolerating Soft Errors for Embedded Systems. SN Comput. Sci. 2(2): 101 (2021) - [c148]Malla Reddy Sama, Riccardo Guerzoni, Wolfgang Kiess, Srisakul Thakolsri, Jan Jürjens:
Why is Application Reliability an Issue for an Ultra-Reliable 6G Network? EuCNC/6G Summit 2021: 568-573 - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - [i7]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. IACR Cryptol. ePrint Arch. 2021: 166 (2021) - 2020
- [j31]Sebastian Pape, Federica Paci, Jan Jürjens, Fabio Massacci:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [j30]Qusai Ramadan, Daniel Strüber, Mattia Salnitri, Jan Jürjens, Volker Riediger, Steffen Staab:
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Softw. Syst. Model. 19(5): 1191-1227 (2020) - [c147]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. Blockchain 2020: 428-435 - [c146]Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology Evolution in the Context of Model-Based Secure Software Engineering. RCIS 2020: 437-454 - [c145]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [p6]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p5]Sven Peldszus, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e9]Mattia Salnitri, Jan Jürjens, Haralambos Mouratidis, Loredana Mancini, Paolo Giorgini:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents]
2010 – 2019
- 2019
- [c144]Matthias Lohr, Jonathan Hund, Jan Jürjens, Steffen Staab:
Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring. Blockchain 2019: 477-482 - [c143]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [c142]Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. SAC 2019: 1492-1499 - [c141]Qusai Ramadan, Amir Shayan Ahmadian, Jan Jürjens, Steffen Staab, Daniel Strüber:
Explaining Algorithmic Decisions with respect to Fairness. SE/SWM 2019: 161-162 - [c140]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider:
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary). SE/SWM 2019: 179-180 - [p4]Jan Jürjens, Kurt Schneider, Jens Bürger, Fabien Patrick Viertel, Daniel Strüber, Michael Goedicke, Ralf H. Reussner, Robert Heinrich, Emre Taspolatoglu, Marco Konersmann, Alexander Fay, Winfried Lamersdorf, Jan Ladiges, Christopher Haubeck:
Maintaining Security in Software Evolution. Managed Software Evolution 2019: 207-253 - 2018
- [j29]Harrison Stewart, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. Inf. Comput. Secur. 26(1): 109-128 (2018) - [j28]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider:
A framework for semi-automated co-evolution of security knowledge and system models. J. Syst. Softw. 139: 142-160 (2018) - [j27]Jan Jürjens, Stefan Ruf, Nils Herda:
Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter? Wirtschaftsinformatik Manag. 10(3): 74-79 (2018) - [c139]Qusai Ramadan, Daniel Strüber, Mattia Salnitri, Volker Riediger, Jan Jürjens:
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models. ECMFA 2018: 179-198 - [c138]Daniel Strüber, Sven Peldszus, Jan Jürjens:
Taming Multi-Variability of Software Product Line Transformations. FASE 2018: 337-355 - [c137]Sven Peldszus, Daniel Strüber, Jan Jürjens:
Model-based security analysis of feature-oriented software product lines. GPCE 2018: 93-106 - [c136]Qusai Ramadan, Amir Shayan Ahmadian, Daniel Strüber, Jan Jürjens, Steffen Staab:
Model-based discrimination analysis: a position paper. FairWare@ICSE 2018: 22-28 - [c135]Amir Shayan Ahmadian, Jan Jürjens, Daniel Strüber:
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. SAC 2018: 1142-1149 - [c134]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Supporting privacy impact assessment by model-based privacy analysis. SAC 2018: 1467-1474 - [c133]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
Integrating BPMN- and UML-based Security Engineering via Model Transformation. Software Engineering 2018: 63-64 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j26]Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens:
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method). Comput. Syst. Sci. Eng. 32(1) (2017) - [j25]Harrison Stewart, Jan Jürjens:
Information security management and the human aspect in organizations. Inf. Comput. Secur. 25(5): 494-534 (2017) - [c132]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c131]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Model-Based Privacy Analysis in Industrial Ecosystems. ECMFA 2017: 215-231 - [c130]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
From Secure Business Process Modeling to Design-Level Security Verification. MoDELS 2017: 123-133 - [c129]Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. ESEC/SIGSOFT FSE 2017: 989-993 - [e8]Jan Jürjens, Kurt Schneider:
Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland. LNI P-267, GI 2017, ISBN 978-3-88579-661-9 [contents] - [i6]Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests. CoRR abs/1711.05019 (2017) - 2016
- [c128]Amir Shayan Ahmadian, Jan Jürjens:
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. CloudCom 2016: 360-365 - [c127]Sebastian Pape, Julian Flake, Andreas Beckmann, Jan Jürjens:
STAGE: a software tool for automatic grading of testing exercises: case study paper. ICSE (Companion Volume) 2016: 491-500 - [c126]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - 2015
- [j24]David Garcia Rosado, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. Comput. J. 58(10): 2193-2194 (2015) - [j23]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider, Barbara Paech, Jan Jürjens:
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1715-1720 (2015) - [j22]Jens Bürger, Jan Jürjens, Sven Wenzel:
Restoring security of evolving software models using graph transformation. Int. J. Softw. Tools Technol. Transf. 17(3): 267-289 (2015) - [c125]Amir Shayan Ahmadian, Fabian Coerschulte, Jan Jürjens:
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds. BMSD 2015: 80-95 - [c124]Jens Bürger, Stefan Gärtner, Thomas Ruhroth, Johannes Zweihoff, Jan Jürjens, Kurt Schneider:
Restoring Security of Long-Living Systems by Co-evolution. COMPSAC 2015: 153-158 - [c123]Chris Apfelbeck, Martin Fritz, Jan Jürjens, Johannes Zweihoff:
Preserving Validity of Batch-Job Nets under Change at Run-Time. COMPSAC 2015: 169-178 - [c122]Jan Jürjens, Amir Shayan Ahmadian:
Model-based Security Analysis and Applications to Security Economics. MODELSWARD 2015: 674-677 - [c121]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge. Software Engineering & Management 2015: 83-84 - [c120]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider, Barbara Paech, Jan Jürjens:
A Platform for Empirical Research on Information System Evolution. SEKE 2015: 415-420 - 2014
- [j21]Carlos Blanco, David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens:
Security in information systems: Advances and new challenges. Comput. Stand. Interfaces 36(4): 687-688 (2014) - [j20]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j19]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j18]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [j17]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Versioning and Evolution Requirements for Model-Based System Development. Softwaretechnik-Trends 34(2) (2014) - [c119]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems. PROFES 2014: 239-253 - [c118]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. RE 2014: 103-112 - [c117]Stefan Gärtner, Jens Bürger, Kurt Schneider, Jan Jürjens:
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. Software Engineering (Workshops) 2014: 6-7 - [c116]Jan Jürjens, Kurt Schneider:
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution. Software Engineering 2014: 89-90 - [e7]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - [e6]David Garcia Rosado, Carlos Blanco, Daniel Mellado, Jan Jürjens, Luis Enrique Sánchez:
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014. SciTePress 2014, ISBN 978-989-758-031-4 [contents] - [i5]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j16]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [c115]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. CLOSER (Selected Papers) 2013: 36-51 - [c114]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes. CLOSER 2013: 553-561 - [c113]Jens Bürger, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner, Kurt Schneider:
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. FOSAD 2013: 34-53 - [e5]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - [i4]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [j15]David Garcia Rosado, Luis Enrique Sánchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j14]Kurt Schneider, Eric Knauss, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - [c112]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. CCS 2012: 712-723 - [c111]Sven Wenzel, Christian Wessel, Thorsten Humberg, Jan Jürjens:
Securing Processes for Outsourcing into the Cloud. CLOSER 2012: 675-680 - [c110]Martín Ochoa, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS 2012: 97-105 - [c109]Thomas Ruhroth, Jan Jürjens:
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. HASE 2012: 177-184 - [c108]Christian Wessel, Thorsten Humberg, Sven Wenzel, Jan Jürjens:
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. Software Engineering (Workshops) 2012: 175-181 - [c107]Martín Ochoa, Jan Jürjens, Jorge Cuéllar:
Non-interference on UML State-Charts. TOOLS (50) 2012: 219-235 - 2011
- [j13]Andreas Bauer, Jan Jürjens, Yijun Yu:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - [j12]Shareeful Islam, Haralambos Mouratidis, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c106]Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. ARES 2011: 272-279 - [c105]Holger Schmidt, Jan Jürjens:
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE 2011: 367-382 - [c104]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS 2011: 331-340 - [c103]