Alexander Pretschner

Orcid: 0000-0002-5573-1201

Affiliations:
  • Technical University Munich, Germany


According to our database1, Alexander Pretschner authored at least 232 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Reference Architecture of Human Cyber-Physical Systems - Part I: Fundamental Concepts.
ACM Trans. Cyber Phys. Syst., January, 2024

A Reference Architecture of Human Cyber-Physical Systems - Part III: Semantic Foundations.
ACM Trans. Cyber Phys. Syst., January, 2024

A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction.
ACM Trans. Cyber Phys. Syst., January, 2024

2023
Decentralized Inverse Transparency with Blockchain.
Distributed Ledger Technol. Res. Pract., September, 2023

A Toolchain for Synthesizing and Validating Safety Architectures.
SN Comput. Sci., July, 2023

Rethinking People Analytics With Inverse Transparency by Design.
Proc. ACM Hum. Comput. Interact., 2023

Revisiting Inter-Class Maintainability Indicators.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Automatisierte Identifikation von sicherheitsrelevanten Konfigurationseinstellungen mittels NLP.
Proceedings of the Software Engineering 2023, 2023

When to Apply Scenario-Based Testing to a New System Domain?
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Severity-Aware Prioritization of System-Level Regression Tests in Automotive Software.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

DIRTS: Dependency Injection Aware Regression Test Selection.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

BinaryRTS: Cross-language Regression Test Selection for C++ Binaries in CI.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

On Scenario-Based Testing of Cyber-Physical Systems.
Proceedings of the Applicable Formal Methods for Safe Industrial Products, 2023

Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

2022
Defining adaptivity and logical architecture for engineering (smart) self-adaptive cyber-physical systems.
Inf. Softw. Technol., 2022

PR-SZZ: How pull requests can support the tracing of defects in software repositories.
Proceedings of the IEEE International Conference on Software Analysis, 2022

A Preliminary Study on Using Text- and Image-Based Machine Learning to Predict Software Maintainability.
Proceedings of the Software Quality: The Next Big Thing in Software Engineering and Quality, 2022

Exploring a Maximal Number of Relevant Obstacles for Testing UAVs.
Proceedings of the Computer Safety, Reliability, and Security, 2022

Data-Driven Assessment of Parameterized Scenarios for Autonomous Vehicles.
Proceedings of the Computer Safety, Reliability, and Security, 2022

Feature sets in just-in-time defect prediction: an empirical evaluation.
Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering, 2022

A Model-based System Engineering Plugin for Safety Architecture Pattern Synthesis.
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022

Automated Identification of Security-Relevant Configuration Settings Using NLP.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Automatic Evaluation of Automatically Derived Semantic Scenario Instance Descriptions.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

An empirical study on the effectiveness of static C code analyzers for vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

StellaUAV: A Tool for Testing the Safe Behavior of UAVs with Scenario-Based Testing (Tools and Artifact Track).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Why Did the Test Execution Fail? Failure Classification Using Association Rules (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Increasing Employees' Willingness to Share: Introducing Appeal Strategies for People Analytics.
Proceedings of the Software Business - 13th International Conference, 2022

FuzzTastic: A Fine-grained, Fuzzer-agnostic Coverage Analyzer.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Unreliable Test Infrastructures in Automotive Testing Setups.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Build System Aware Multi-language Regression Test Selection in Continuous Integration.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Probe-based Syscall Tracing for Efficient and Practical File-level Test Traces.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022

Challenges in Regression Test Selection for End-to-End Testing of Microservice-based Software Systems.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022

2021
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection.
ACM Trans. Priv. Secur., 2021

Ethik in der agilen Software-Entwicklung.
Inform. Spektrum, 2021

Tests für automatisierte und autonome Fahrsysteme.
Inform. Spektrum, 2021

Empowered and Embedded: Ethics and Agile Processes.
CoRR, 2021

Trustworthy Transparency by Design.
CoRR, 2021

How can manual testing processes be optimized? developer survey, optimization guidelines, and case studies.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Run-time Reasoning from Uncertain Observations with Subjective Logic in Multi-Agent Self-Adaptive Cyber-Physical Systems.
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021

Automated Implementation of Windows-related Security-Configuration Guides.
Proceedings of the Software Engineering 2021, 2021

IoT Thing To Service Semantic Matching.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Understanding Safety for Unmanned Aerial Vehicles in Urban Environments.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Fitness Function Templates for Testing Automated and Autonomous Driving Systems in Intersection Scenarios.
Proceedings of the 24th IEEE International Intelligent Transportation Systems Conference, 2021

Empirically evaluating readily available information for regression test optimization in continuous integration.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

A Causal Model of Intersection-Related Collisions for Drivers With and Without Visual Field Loss.
Proceedings of the HCI International 2021 - Late Breaking Papers: HCI Applications in Health, Transport, and Industry, 2021

Designing Accountable Systems.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

Human-level Ordinal Maintainability Prediction Based on Static Code Metrics.
Proceedings of the EASE 2021: Evaluation and Assessment in Software Engineering, 2021

Dynamic Taint Analysis versus Obfuscated Self-Checking.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Center for Code Excellence Trends - Eine Plattform für Trends in Softwaretechnologien.
Inform. Spektrum, 2020

Ethics in the Software Development Process: From Codes of Conduct to Ethical Deliberation.
CoRR, 2020

Expressing Accountability Patterns using Structural Causal Models.
CoRR, 2020

Center for Code Excellence.
Proceedings of the Software Engineering 2020, 2020

Automated Anomaly Detection in CPS Log Files - A Time Series Clustering Approach.
Proceedings of the Computer Safety, Reliability, and Security, 2020

Re-Using Concrete Test Scenarios Generally Is a Bad Idea.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2020

Clustering Traffic Scenarios Using Mental Models as Little as Possible.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2020

Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Can We Predict the Quality of Spectrum-based Fault Localization?
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Knowledge aggregation with subjective logic in multi-agent self-adaptive cyber-physical systems.
Proceedings of the SEAMS '20: IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea, 29 June, 2020

Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

How to Conduct Experiments with a Real Car? Experiences and Practical Guidelines.
Proceedings of the Software Architecture - 14th European Conference, 2020

Actual Causality Canvas: A General Framework for Explanation-Based Socio-Technical Constructs.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

From Checking to Inference: Actual Causality Computations as Optimization Problems.
Proceedings of the Automated Technology for Verification and Analysis, 2020

2019
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Guest editorial for the special section on MODELS 2016.
Softw. Syst. Model., 2019

Extending Causal Models from Machines into Humans.
Proceedings of the 4th Workshop on Formal Reasoning about Causation, 2019

Efficiently Checking Actual Causality with SAT Solving.
CoRR, 2019

Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods.
CoRR, 2019

Compositional Fuzzing Aided by Targeted Symbolic Execution.
CoRR, 2019

Chapter Eight - A Taxonomy of Software Integrity Protection Techniques.
Adv. Comput., 2019

Learning Approach for Smart Self-Adaptive Cyber-Physical Systems.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

Fitness Functions for Testing Automated and Autonomous Driving Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2019

A real-time remote IDS testbed for connected vehicles.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Attack graph generation for microservice architecture.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Practical Causal Models for Cyber-Physical Systems.
Proceedings of the NASA Formal Methods - 11th International Symposium, 2019

Learning a classifier for prediction of maintainability based on static analysis tools.
Proceedings of the 27th International Conference on Program Comprehension, 2019

Selecting Flow Optimal System Parameters for Automated Driving Systems.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Did We Test All Scenarios for Automated and Autonomous Driving Systems?
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Failure clustering without coverage.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

VirtSC: Combining Virtualization Obfuscation with Self-Checksumming.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
Data Usage Control for Distributed Systems.
ACM Trans. Priv. Secur., 2018

Model-Based Safety and Security Engineering.
CoRR, 2018

Reviewing KLEE's Sonar-Search Strategy in Context of Greybox Fuzzing.
CoRR, 2018

Chapter Five - A Tutorial on Software Obfuscation.
Adv. Comput., 2018

Integrity Protection Against Insiders in Microservice-Based Infrastructures: From Threats to a Security Framework.
Proceedings of the Software Technologies: Applications and Foundations, 2018

Understanding and Formalizing Accountability for Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Improving function coverage with munch: a hybrid fuzzing and directed symbolic execution approach.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Repackman: a tool for automatic repackaging of Android apps.
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, 2018

Poking the bear: lessons learned from probing three Android malware datasets.
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, 2018

Automatically assessing vulnerabilities discovered by compositional analysis.
Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018

Diagnosis of Safety Incidents for Cyber-Physical Systems: A UAV Example.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Pairika: a failure diagnosis benchmark for C++ programs.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Aletheia: a failure diagnosis toolchain.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

Software quality assessment in practice: a hypothesis-driven framework.
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

Practical Integrity Protection with Oblivious Hashing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Defect-Based Testing.
Proceedings of the Dependable Software Systems Engineering, 2017

Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
Inform. Spektrum, 2017

Informatikforschung für digitale Mobilitätsplattformen - Am Beispiel des TUM Living Lab Connected Mobility.
Inform. Spektrum, 2017

ACCBench: A Framework for Comparing Causality Algorithms.
Proceedings of the Proceedings 2nd International Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies, 2017

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.
Proceedings of the 26th USENIX Security Symposium, 2017

Industrial Evaluation of Search-Based Test Generation Techniques for Control Systems.
Proceedings of the 2017 IEEE International Symposium on Software Reliability Engineering Workshops, 2017

Challenges of Operationalizing Spectrum-Based Fault Localization from a Data-Centric Perspective.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Reducing Failure Analysis Time: An Industrial Evaluation.
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Detecting Patching of Executables without System Calls.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
Proceedings of the 50 Jahre Universitäts-Informatik in München, 2017


2016
Model-based security testing: a taxonomy and systematic classification.
Softw. Test. Verification Reliab., 2016

Towards a Unified Model of Accountability Infrastructures.
Proceedings of the Proceedings First Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies, 2016

Security Testing: A Survey.
Adv. Comput., 2016

Enhancing Operation Security using Secret Sharing.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

MalFlow: identification of C&C servers through host-based data flow profiling.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Generating behavior-based malware detection models with genetic programming.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

MACKE: compositional analysis of low-level vulnerabilities with symbolic execution.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Failure Models for Testing Continuous Controllers.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Profiting from Unit Tests for Integration Testing.
Proceedings of the 2016 IEEE International Conference on Software Testing, 2016

Nequivack: Assessing Mutation Score Confidence.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Sound and Precise Cross-Layer Data Flow Tracking.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

VOT4CS: A Virtualization Obfuscation Tool for C#.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Data Accountability in Socio-Technical Systems.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2016

Code obfuscation against symbolic execution attacks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Defect-Based Testing.
Proceedings of the Dependable Software Systems Engineering, 2015

FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation.
CoRR, 2015

SHRIFT System-Wide HybRid Information Flow Tracking.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Field Study on the Elicitation and Classification of Defects for Defect Models.
Proceedings of the Product-Focused Software Process Improvement, 2015

A framework for empirical evaluation of malware detection resilience against behavior obfuscation.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

A Framework for Measuring Software Obfuscation Resilience against Automated Attacks.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Automated Translation of End User Policies for Usage Control Enforcement.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Software-Based Protection against Changeware.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Fully Decentralized Data Usage Control Enforcement Infrastructure.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Integration of Formal Methods and Testing for Model-based Systems Engineering (NII Shonan Meeting 2014-16).
NII Shonan Meet. Rep., 2014

DAVAST: data-centric system level activity visualization.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

8Cage: lightweight fault-based test generation for simulink.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

On quantitative dynamic data flow tracking.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Malware detection with quantitative data flow graphs.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Decentralized Distributed Data Usage Control.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
A Trustworthy Usage Control Enforcement Framework.
Int. J. Mob. Comput. Multim. Commun., 2013

A Generic Fault Model for Quality Assurance.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

Model-Based Usage Control Policy Derivation.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Data usage control enforcement in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Enforcing privacy through usage-controlled video surveillance.
Proceedings of the 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2013

2012
A taxonomy of model-based testing approaches.
Softw. Test. Verification Reliab., 2012

Preface.
J. Comput. Secur., 2012

Flexible Data-Driven Security for Android.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Semi-Automatic Security Testing of Web Applications from a Secure Model.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Data Protection in a Cloud-Enabled Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012

Towards a policy enforcement infrastructure for distributed usage control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Data Loss Prevention Based on Data-Driven Usage Control.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

SPaCiTE - Web Application Testing Engine.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Deriving implementation-level policies for usage control enforcement.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
On the number and nature of faults found by random testing.
Softw. Test. Verification Reliab., 2011

A virtualized usage control bus system.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Software Security in Virtualized Infrastructures - The Smart Meter Example.
it Inf. Technol., 2011

Security Mutants for Property-Based Testing.
Proceedings of the Tests and Proofs - 5th International Conference, 2011

Data-centric multi-layer usage control enforcement: a social network example.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Data protection in heterogeneous distributed systems: A smart meter example.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Representation-Independent Data Usage Control.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Distributed data usage control for web applications: a social network implementation.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Implementing Trust in Cloud Infrastructures.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

A Hypervisor-Based Bus System for Usage Control.
Proceedings of the Sixth International Conference on Availability, 2011

A Model-Based View onto Testing.
Proceedings of the Model-Based Testing for Embedded Systems, 2011

2010
Doktorandensymposium der SE 2010.
Proceedings of the Software Engineering 2010, 2010

10421 Summary - Model-Based Testing in Practice.
Proceedings of the Model-Based Testing in Practice, 17.10. - 22.10.2010, 2010

10421 Abstracts Collection - Model-Based Testing in Practice.
Proceedings of the Model-Based Testing in Practice, 17.10. - 22.10.2010, 2010

10141 Summary - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

10141 Abstracts Collection - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

2009
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition.
Proceedings of the Third International Conference on Network and System Security, 2009

Usage Control Policy Enforcement in OpenOffice.org and Information Flow.
Proceedings of the Information Security South Africa Conference 2009, 2009

On the Effectiveness of Test Extraction without Overhead.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Formal Analyses of Usage Control Policies.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach.
Wirtschaftsinf., 2008

Usage Control Enforcement: Present and Future.
IEEE Secur. Priv., 2008

Policy Evolution in Distributed Usage Control.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Doctoral Symposium at MODELS 2008.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Vorwort zum Doktorandensymposium der Modellierung 2008.
Proceedings of the Modellierung 2008, 12.-14. März 2008, Berlin, 2008

Finding Faults: Manual Testing vs. Random+ Testing vs. User Reports.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Test-Driven Assessment of Access Control in Legacy Applications.
Proceedings of the First International Conference on Software Testing, 2008

Model-Based Tests for Access Control Policies.
Proceedings of the First International Conference on Software Testing, 2008

On the Predictability of Random Tests for Object-Oriented Software.
Proceedings of the First International Conference on Software Testing, 2008

Mechanisms for usage control.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Negotiation of Usage Control Policies - Simply the Best?
Proceedings of the The Third International Conference on Availability, 2008

2007
Computing refactorings of state machines.
Softw. Syst. Model., 2007

4<sup>th</sup> Intl. ICSE workshop on Software Engineering for Automotive Systems.
ACM SIGSOFT Softw. Eng. Notes, 2007

Engineering Automotive Software.
Proc. IEEE, 2007

Usage Control in Service-Oriented Architectures.
Proceedings of the Trust, 2007

A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

DUKE - Distributed Usage Control Enforcement.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

4th International Workshop on Model Driven Engineering, Verification, and Validation: Integrating Verification and Validation in MDE.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30, 2007

Monitors for Usage Control.
Proceedings of the Trust Management, 2007

4th International ICSE Workshop on Software Engineering for Automotive Systems.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Software Engineering for Automotive Systems: A Roadmap.
Proceedings of the International Conference on Software Engineering, 2007

A Policy Language for Distributed Usage Control.
Proceedings of the Computer Security, 2007

Ontology-Based User Profiles for Personalized Search.
Proceedings of the Ontologies: A Handbook of Principles, 2007

2006
3<sup>rd</sup> Intl. ICSE workshop on software engineering for automotive systems.
ACM SIGSOFT Softw. Eng. Notes, 2006

Distributed usage control.
Commun. ACM, 2006

Zur Kosteneffektivität des modellbasierten Testens.
Proceedings of the Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme II, 2006

Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

3rd international workshop on software engineering for automotive systems - SEAS 2006.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems.
ACM SIGSOFT Softw. Eng. Notes, 2005

Computing Refactorings of Behavior Models.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

2nd international workshop on software engineering for automotive systems.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

One evaluation of model-based testing and its automation.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Model-based testing.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Model-Based Testing in Practice.
Proceedings of the FM 2005: Formal Methods, 2005

On Obligations.
Proceedings of the Computer Security, 2005

2004
Model-based testing for real.
Int. J. Softw. Tools Technol. Transf., 2004

Software engineering for automotive systems at ICSE 2004 workshop summary.
ACM SIGSOFT Softw. Eng. Notes, 2004

Model based testing in incremental system development.
J. Syst. Softw., 2004

Abstractions for Model-Based Testing.
Proceedings of the International Workshop on Test and Analysis of Component Based Systems, 2004

Modellbasiertes Testen.
Proceedings of the Modellierung 2004, Proceedings zur Tagung, 23.-26. März 2004, 2004

Coverage Metrics for Continuous Function Charts.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

ICSE Workshop: Software Engineering for Automotive Systems.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

Methodological Issues in Model-Based Testing.
Proceedings of the Model-Based Testing of Reactive Systems, 2004

Model-Based Testing - A Glossary.
Proceedings of the Model-Based Testing of Reactive Systems, 2004

2003
Zum modellbasierten funktionalen Test reaktiver Systeme.
PhD thesis, 2003

Ontology-based personalized search and browsing.
Web Intell. Agent Syst., 2003

Compositional Generation of MC/DC Integration Test Suites.
Proceedings of the International Workshop on Test and Analysis of Component-Based Systems, 2003

Model-Based Test Case Generation for Smart Cards.
Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems, 2003

Prototype-Based Tests for Hybrid Reactive Systems.
Proceedings of the 14th IEEE International Workshop on Rapid System Prototyping (RSP 2003), 2003

2002
Model-Based Development of Embedded Systems.
Proceedings of the Advances in Object-Oriented Information Systems, 2002

Model-Based Software Engineering and Ada: Synergy for the Development of Safety-Critical Systems.
Proceedings of the Ada Deutschland Tagung 2002: Software für sicherheitskritische Systeme, 2002

2001
Approaching a Discrete-Continuous UML: Tool Support and Formalization.
Proceedings of the Practical UML-Based Rigorous Development Methods, 2001

Model Based Testing in Evolutionary Software Development.
Proceedings of the 12th IEEE International Workshop on Rapid System Prototyping (RSP 2001), 2001

2000
Specification based test sequence generation with propositional logic.
Softw. Test. Verification Reliab., 2000

1999
Ontology Based Personalized Search.
Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, 1999

Ontology-Based Web Site Mapping for Information Exploration.
Proceedings of the 1999 ACM CIKM International Conference on Information and Knowledge Management, 1999


  Loading...