


Остановите войну!
for scientists:


default search action
Jan Jürjens
Person information

- affiliation: University of Koblenz-Landau, Germany
- affiliation (former): Dortmund University of Technology, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j39]Hussein Hasso, Katharina Großer
, Iliass Aymaz, Hanna Geppert, Jan Jürjens:
Enhanced abbreviation-expansion pair detection for glossary term extraction. Inf. Softw. Technol. 159: 107203 (2023) - [j38]Zeyd Boukhers
, Prantik Goswami, Jan Jürjens:
Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text. Neural Comput. Appl. 35(24): 17633-17644 (2023) - [j37]Katja Tuma, Sven Peldszus
, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [c156]Katharina Großer
, Volker Riediger, Jan Jürjens:
Requirements document relations: A reuse perspective on traceability through standards. Software Engineering 2023: 57-58 - [c155]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß, Katharina Großer
, Sebastian Hahner, Jan Keim, Matthias Lohr, Timur Saglam, Sophie Schulz, Jan-Philipp Töberg:
Evaluation Methods and Replicability of Software Architecture Research Objects. Software Engineering 2023: 75-76 - 2022
- [j36]Joachim Stocker
, Nils Herda
, Jan Jürjens
:
Life cycle and metrics to measure the resilience of business processes by considering resources. Bus. Process. Manag. J. 28(4): 1164-1182 (2022) - [j35]Zeyd Boukhers
, Timo Hartmann, Jan Jürjens
:
COIN: Counterfactual Image Generation for Visual Question Answering Interpretation. Sensors 22(6): 2245 (2022) - [j34]Katharina Großer
, Volker Riediger
, Jan Jürjens
:
Requirements document relations. Softw. Syst. Model. 21(6): 1-37 (2022) - [c154]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain. ICBC 2022: 1-5 - [c153]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß
, Katharina Großer
, Sebastian Hahner
, Jan Keim
, Matthias Lohr, Timur Saglam
, Sophie Schulz
, Jan-Philipp Töberg:
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects". ICSA Companion 2022: 58 - [c152]Marco Konersmann, Angelika Kaplan, Thomas Kühn, Robert Heinrich, Anne Koziolek, Ralf H. Reussner, Jan Jürjens, Mahmood al-Doori, Nicolas Boltz, Marco Ehl, Dominik Fuchß
, Katharina Großer
, Sebastian Hahner
, Jan Keim, Matthias Lohr, Timur Saglam
, Sophie Schulz
, Jan-Philipp Töberg
:
Evaluation Methods and Replicability of Software Architecture Research Objects. ICSA 2022: 157-168 - [c151]Kilian Vernickel, M. Singh, Marco Konersmann, Jan Jürjens:
Ontology-based Synchronization of Automated Production Systems and Their Simulation Models. IEEM 2022: 660-664 - [c150]Malla Reddy Sama, Wolfgang Kiess, Riccardo Guerzoni, Srisakul Thakolsri, Jan Jürjens:
Redefining the Trust Model for the Internet of Everything in the 6G era. PIMRC 2022: 1400-1406 - [c149]Hussein Hasso, Katharina Großer
, Iliass Aymaz, Hanna Geppert, Jan Jürjens
:
Abbreviation-Expansion Pair Detection for Glossary Term Extraction. REFSQ 2022: 63-78 - [p8]Jan Jürjens, Simon Scheider, Furkan Yildirim, Michael Henke:
Tokenomics: Decentralized Incentivization in the Context of Data Spaces. Designing Data Spaces 2022: 91-108 - [p7]Santiago Cáceres, Francisco Valverde, Carlos Enrique Palau, Andreu Belsa Pellicer, Christos A. Gizelis, Dimosthenes Krassas, Hanane Becha, Réda Khouani, Andreas Metzger, Nikos Tzagkarakis, Anthousa Karkoglou, Anastasios Nikolakopoulos
, Achilleas Marinakis
, Vrettos Moulos, Antonios Litke, Amir Shayan Ahmadian, Jan Jürjens:
Towards Cognitive Ports of the Future. Technologies and Applications for Big Data Value 2022: 453-474 - [i11]Zeyd Boukhers, Timo Hartmann, Jan Jürjens:
COIN: Counterfactual Image Generation for VQA Interpretation. CoRR abs/2201.03342 (2022) - [i10]Zeyd Boukhers, Azeddine Bouabdallah, Matthias Lohr, Jan Jürjens:
Ensemble and Multimodal Approach for Forecasting Cryptocurrency Price. CoRR abs/2202.08967 (2022) - [i9]Matthias Lohr, Kenneth Skiba, Marco Konersmann, Jan Jürjens, Steffen Staab:
Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain (Extended Version). CoRR abs/2203.05925 (2022) - 2021
- [j33]Sven Peldszus
, Jens Bürger, Timo Kehrer, Jan Jürjens:
Ontology-driven evolution of software security. Data Knowl. Eng. 134: 101907 (2021) - [j32]Muhammad Sheikh Sadi
, Waseem Ahmed, Jan Jürjens:
Towards Tolerating Soft Errors for Embedded Systems. SN Comput. Sci. 2(2): 101 (2021) - [c148]Malla Reddy Sama, Riccardo Guerzoni, Wolfgang Kiess, Srisakul Thakolsri, Jan Jürjens:
Why is Application Reliability an Issue for an Ultra-Reliable 6G Network? EuCNC/6G Summit 2021: 568-573 - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - [i7]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. IACR Cryptol. ePrint Arch. 2021: 166 (2021) - 2020
- [j31]Sebastian Pape
, Federica Paci
, Jan Jürjens
, Fabio Massacci
:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [j30]Qusai Ramadan
, Daniel Strüber
, Mattia Salnitri, Jan Jürjens, Volker Riediger, Steffen Staab
:
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Softw. Syst. Model. 19(5): 1191-1227 (2020) - [c147]Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. Blockchain 2020: 428-435 - [c146]Jens Bürger
, Timo Kehrer
, Jan Jürjens
:
Ontology Evolution in the Context of Model-Based Secure Software Engineering. RCIS 2020: 437-454 - [c145]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [p6]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini
, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p5]Sven Peldszus, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis
, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e9]Mattia Salnitri
, Jan Jürjens
, Haralambos Mouratidis
, Loredana Mancini
, Paolo Giorgini
:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents]
2010 – 2019
- 2019
- [c144]Matthias Lohr, Jonathan Hund, Jan Jürjens, Steffen Staab:
Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring. Blockchain 2019: 477-482 - [c143]Sven Peldszus
, Katja Tuma
, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [c142]Amir Shayan Ahmadian
, Daniel Strüber, Jan Jürjens:
Privacy-enhanced system design modeling based on privacy features. SAC 2019: 1492-1499 - [c141]Qusai Ramadan
, Amir Shayan Ahmadian
, Jan Jürjens, Steffen Staab, Daniel Strüber:
Explaining Algorithmic Decisions with respect to Fairness. SE/SWM 2019: 161-162 - [c140]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider
:
A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Models (Summary). SE/SWM 2019: 179-180 - [p4]Jan Jürjens, Kurt Schneider, Jens Bürger, Fabien Patrick Viertel, Daniel Strüber, Michael Goedicke, Ralf H. Reussner, Robert Heinrich, Emre Taspolatoglu, Marco Konersmann, Alexander Fay, Winfried Lamersdorf, Jan Ladiges, Christopher Haubeck:
Maintaining Security in Software Evolution. Managed Software Evolution 2019: 207-253 - 2018
- [j29]Harrison Stewart
, Jan Jürjens:
Data security and consumer trust in FinTech innovation in Germany. Inf. Comput. Secur. 26(1): 109-128 (2018) - [j28]Jens Bürger, Daniel Strüber, Stefan Gärtner, Thomas Ruhroth, Jan Jürjens, Kurt Schneider
:
A framework for semi-automated co-evolution of security knowledge and system models. J. Syst. Softw. 139: 142-160 (2018) - [j27]Jan Jürjens, Stefan Ruf, Nils Herda:
Wie transformieren Versicherungsunternehmen ihre IT-Infrastrukturen ins digitale Zeitalter? Wirtschaftsinformatik Manag. 10(3): 74-79 (2018) - [c139]Qusai Ramadan
, Daniel Strüber, Mattia Salnitri, Volker Riediger, Jan Jürjens:
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models. ECMFA 2018: 179-198 - [c138]Daniel Strüber
, Sven Peldszus
, Jan Jürjens
:
Taming Multi-Variability of Software Product Line Transformations. FASE 2018: 337-355 - [c137]Sven Peldszus
, Daniel Strüber, Jan Jürjens:
Model-based security analysis of feature-oriented software product lines. GPCE 2018: 93-106 - [c136]Qusai Ramadan
, Amir Shayan Ahmadian
, Daniel Strüber, Jan Jürjens, Steffen Staab
:
Model-based discrimination analysis: a position paper. FairWare@ICSE 2018: 22-28 - [c135]Amir Shayan Ahmadian
, Jan Jürjens, Daniel Strüber:
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. SAC 2018: 1142-1149 - [c134]Amir Shayan Ahmadian
, Daniel Strüber, Volker Riediger, Jan Jürjens:
Supporting privacy impact assessment by model-based privacy analysis. SAC 2018: 1467-1474 - [c133]Qusai Ramadan, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini:
Integrating BPMN- and UML-based Security Engineering via Model Transformation. Software Engineering 2018: 63-64 - [r2]Jan Jürjens, Eduardo B. Fernández:
Secure Database Development. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j26]Sakib Ahammed, Muhammad Sheikh Sadi, Md Shamimur Rahman, Jan Jürjens:
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method). Comput. Syst. Sci. Eng. 32(1) (2017) - [j25]Harrison Stewart
, Jan Jürjens:
Information security management and the human aspect in organizations. Inf. Comput. Secur. 25(5): 494-534 (2017) - [c132]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis
, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi
:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c131]Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, Jan Jürjens:
Model-Based Privacy Analysis in Industrial Ecosystems. ECMFA 2017: 215-231 - [c130]Qusai Ramadan
, Mattia Salnitri, Daniel Strüber, Jan Jürjens, Paolo Giorgini
:
From Secure Business Process Modeling to Design-Level Security Verification. MoDELS 2017: 123-133 - [c129]Amir Shayan Ahmadian
, Sven Peldszus
, Qusai Ramadan
, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. ESEC/SIGSOFT FSE 2017: 989-993 - [e8]Jan Jürjens, Kurt Schneider:
Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland. LNI P-267, GI 2017, ISBN 978-3-88579-661-9 [contents] - [i6]Stefan Wagner, Jan Jürjens, Claudia Koller, Peter Trischberger:
Comparing Bug Finding Tools with Reviews and Tests. CoRR abs/1711.05019 (2017) - 2016
- [c128]Amir Shayan Ahmadian
, Jan Jürjens:
Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. CloudCom 2016: 360-365 - [c127]Sebastian Pape
, Julian Flake, Andreas Beckmann, Jan Jürjens:
STAGE: a software tool for automatic grading of testing exercises: case study paper. ICSE (Companion Volume) 2016: 491-500 - [c126]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - 2015
- [j24]David G. Rosado
, Nadira Lammari, Jan Jürjens:
Special Issue on Secure Information Systems Engineering. Comput. J. 58(10): 2193-2194 (2015) - [j23]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner
, Kurt Schneider
, Barbara Paech, Jan Jürjens:
The CoCoME Platform: A Research Note on Empirical Studies in Information System Evolution. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1715-1720 (2015) - [j22]Jens Bürger, Jan Jürjens, Sven Wenzel:
Restoring security of evolving software models using graph transformation. Int. J. Softw. Tools Technol. Transf. 17(3): 267-289 (2015) - [c125]Amir Shayan Ahmadian, Fabian Coerschulte, Jan Jürjens:
Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds. BMSD 2015: 80-95 - [c124]Jens Bürger, Stefan Gärtner, Thomas Ruhroth, Johannes Zweihoff, Jan Jürjens, Kurt Schneider
:
Restoring Security of Long-Living Systems by Co-evolution. COMPSAC 2015: 153-158 - [c123]Chris Apfelbeck, Martin Fritz, Jan Jürjens, Johannes Zweihoff:
Preserving Validity of Batch-Job Nets under Change at Run-Time. COMPSAC 2015: 169-178 - [c122]Jan Jürjens, Amir Shayan Ahmadian:
Model-based Security Analysis and Applications to Security Economics. MODELSWARD 2015: 674-677 - [c121]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider, Jan Jürjens:
Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge. Software Engineering & Management 2015: 83-84 - [c120]Robert Heinrich, Stefan Gärtner, Tom-Michael Hesse, Thomas Ruhroth, Ralf H. Reussner, Kurt Schneider
, Barbara Paech, Jan Jürjens:
A Platform for Empirical Research on Information System Evolution. SEKE 2015: 415-420 - 2014
- [j21]Carlos Blanco
, David G. Rosado
, Luís Enrique Sanchez, Jan Jürjens:
Security in information systems: Advances and new challenges. Comput. Stand. Interfaces 36(4): 687-688 (2014) - [j20]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa
:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j19]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout
, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j18]François Dupressoir
, Andrew D. Gordon, Jan Jürjens, David A. Naumann
:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [j17]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Versioning and Evolution Requirements for Model-Based System Development. Softwaretechnik-Trends 34(2) (2014) - [c119]Thomas Ruhroth, Stefan Gärtner, Jens Bürger, Jan Jürjens, Kurt Schneider:
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems. PROFES 2014: 239-253 - [c118]Stefan Gärtner, Thomas Ruhroth, Jens Bürger, Kurt Schneider
, Jan Jürjens:
Maintaining requirements for long-living software systems by incorporating security knowledge. RE 2014: 103-112 - [c117]Stefan Gärtner, Jens Bürger, Kurt Schneider
, Jan Jürjens:
Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. Software Engineering (Workshops) 2014: 6-7 - [c116]Jan Jürjens, Kurt Schneider
:
The SecReq approach: From Security Requirements to Secure Design while Managing Software Evolution. Software Engineering 2014: 89-90 - [e7]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - [e6]David G. Rosado, Carlos Blanco, Daniel Mellado, Jan Jürjens, Luís Enrique Sanchez:
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014. SciTePress 2014, ISBN 978-989-758-031-4 [contents] - [i5]Jan Jürjens, Eduardo B. Fernández, Robert B. France, Bernhard Rumpe, Constance L. Heitmeyer:
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop). CoRR abs/1409.6608 (2014) - 2013
- [j16]Stefan Taubenberger, Jan Jürjens, Yijun Yu
, Bashar Nuseibeh
:
Resolving vulnerability identification errors using security requirements on business process models. Inf. Manag. Comput. Secur. 21(3): 202-223 (2013) - [c115]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. CLOSER (Selected Papers) 2013: 36-51 - [c114]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes. CLOSER 2013: 553-561 - [c113]Jens Bürger, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner, Kurt Schneider:
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. FOSAD 2013: 34-53 - [e5]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - [i4]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [j15]David G. Rosado, Luís Enrique Sanchez, Eduardo Fernández-Medina, Jan Jürjens:
Security in Information Systems: New Challenges and Opportunities. J. Univers. Comput. Sci. 18(6): 728-731 (2012) - [j14]Kurt Schneider
, Eric Knauss
, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens:
Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012) - [c112]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. CCS 2012: 712-723 - [c111]Sven Wenzel, Christian Wessel, Thorsten Humberg, Jan Jürjens:
Securing Processes for Outsourcing into the Cloud. CLOSER 2012: 675-680 - [c110]Martín Ochoa
, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS 2012: 97-105 - [c109]Thomas Ruhroth, Jan Jürjens:
Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. HASE 2012: 177-184 - [c108]Christian Wessel, Thorsten Humberg, Sven Wenzel, Jan Jürjens:
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. Software Engineering (Workshops) 2012: 175-181 - [c107]Martín Ochoa
, Jan Jürjens, Jorge Cuéllar:
Non-interference on UML State-Charts. TOOLS (50) 2012: 219-235 - 2011
- [j13]Andreas Bauer, Jan Jürjens, Yijun Yu
:
Run-Time Security Traceability for Evolving Systems. Comput. J. 54(1): 58-87 (2011) - [j12]Shareeful Islam, Haralambos Mouratidis
, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c106]Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet
, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. ARES 2011: 272-279 - [c105]Holger Schmidt, Jan Jürjens:
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE 2011: 367-382 - [c104]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS 2011: 331-340 - [c103]François Dupressoir
, Andrew D. Gordon, Jan Jürjens, David A. Naumann
:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CSF 2011: 3-17 - [c102]Jan Jürjens, Loïc Marchal, Martín Ochoa
, Holger Schmidt:
Incremental Security Verification for Evolving UMLsec models. ECMFA 2011: 52-68 - [c101]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c100]Jan Jürjens:
Automated security hardening for evolving UML models. ICSE 2011: 986-988 - [c99]Seok-Won Lee, Mattia Monga
, Jan Jürjens:
Seventh international workshop on software engineering for secure systems: (SESS 2011). ICSE 2011: 1200-1201 - [c98]Mihhail Aizatulin, François Dupressoir
, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. Formal Aspects in Security and Trust 2011: 1-20 - [c97]Eric Knauss
, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens:
Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18 - [c96]Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. SEC 2011: 259-270 - [c95]Fabio Massacci
, Fabrice Bouquet
, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg
, Federica Paci
, Stéphane Paul
, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c94]Jan Jürjens, Martín Ochoa
, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - [e4]Jan Jürjens, Seok-Won Lee, Mattia Monga:
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011. ACM 2011, ISBN 978-1-4503-0581-5 [contents] - [e3]David G. Rosado, Luís Enrique Sanchez, Jan Jürjens:
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4 [contents] - [i3]