Christian Jung

Orcid: 0000-0002-2397-6917

According to our database1, Christian Jung authored at least 27 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Contribution of information about acute and geriatric characteristics to decisions about life-sustaining treatment for old patients in intensive care.
BMC Medical Informatics Decis. Mak., December, 2023

Formal Specification and Verification of JDK's Identity Hash Map Implementation.
Formal Aspects Comput., September, 2023

An Analytical Representation of the 2d Generalized Balanced Power Diagram.
CoRR, 2023

2022
Methods for segmenting cracks in 3d images of concrete: A comparison based on semi-synthetic images.
Pattern Recognit., 2022

Crack Modeling via Minimum-Weight Surfaces in 3d Voronoi Diagrams.
CoRR, 2022

Data Usage Control.
Proceedings of the Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, 2022

2021
Machine learning predicts mortality based on analysis of ventilation parameters of critically ill patients: multi-centre validation.
BMC Medical Informatics Decis. Mak., 2021

Machine learning predicts mortality in septic patients using only routinely available ABG variables: a multi-centre evaluation.
Int. J. Medical Informatics, 2021

2020
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Context-aware Security.
PhD thesis, 2019

Data-driven optimization of hot rolling processes
PhD thesis, 2019

Usage control architecture options for data sovereignty in business ecosystems.
J. Enterp. Inf. Manag., 2019

2016
Datenschutz und Datenanalyse.
Datenschutz und Datensicherheit, 2016

2015
Automatic derivation of context descriptions.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2015

2014
Security policy specification templates for critical infrastructure services in the cloud.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Enhancing Cloud Security with Context-aware Usage Control Policies.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Context-Aware Policy Enforcement for Android.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2012
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

2011
Security Evaluation of Service-Oriented Systems Using the SiSOA Method.
Int. J. Secur. Softw. Eng., 2011

Efficient Error-Correcting Geocoding
CoRR, 2011

Engineering efficient error-correcting geocoding.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Indicator-based architecture-level security evaluation in a service-oriented environment.
Proceedings of the Software Architecture, 4th European Conference, 2010

Low-cost, customized and flexible SRAM MBIST engine.
Proceedings of the 13th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2010

Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project.
Proceedings of the ARES 2010, 2010

2009
Progress report on the experimental evaluation of security inspection guidance.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

2007
Phishing in the Wireless: Implementation and Analysis.
Proceedings of the New Approaches for Security, 2007


  Loading...