[{"status":"public","publication":"Vestnik Mashinostroeniya","type":"journal_article","language":[{"iso":"eng"}],"_id":"27130","department":[{"_id":"241"},{"_id":"153"}],"user_id":"24876","year":"2020","page":"26-29","citation":{"apa":"Poddubnyi, V. I., Trächtler, A., Warkentin, A., &#38; Henke, C. (2020). Mechanical and mathematical model of a caterpillar drive with a triangular contour for solving problems of vertical dynamics of a tracked vehicle. <i>Vestnik Mashinostroeniya</i>, 26–29. <a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">https://doi.org/10.36652/0042-4633-2020-12-26-29</a>","short":"V.I. Poddubnyi, A. Trächtler, A. Warkentin, C. Henke, Vestnik Mashinostroeniya (2020) 26–29.","bibtex":"@article{Poddubnyi_Trächtler_Warkentin_Henke_2020, title={Mechanical and mathematical model of a caterpillar drive with a triangular contour for solving problems of vertical dynamics of a tracked vehicle}, DOI={<a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">10.36652/0042-4633-2020-12-26-29</a>}, journal={Vestnik Mashinostroeniya}, author={Poddubnyi, Vladimir I. and Trächtler, Ansgar and Warkentin, Andreas and Henke, Christian}, year={2020}, pages={26–29} }","mla":"Poddubnyi, Vladimir I., et al. “Mechanical and Mathematical Model of a Caterpillar Drive with a Triangular Contour for Solving Problems of Vertical Dynamics of a Tracked Vehicle.” <i>Vestnik Mashinostroeniya</i>, 2020, pp. 26–29, doi:<a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">10.36652/0042-4633-2020-12-26-29</a>.","ieee":"V. I. Poddubnyi, A. Trächtler, A. Warkentin, and C. Henke, “Mechanical and mathematical model of a caterpillar drive with a triangular contour for solving problems of vertical dynamics of a tracked vehicle,” <i>Vestnik Mashinostroeniya</i>, pp. 26–29, 2020, doi: <a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">10.36652/0042-4633-2020-12-26-29</a>.","chicago":"Poddubnyi, Vladimir I., Ansgar Trächtler, Andreas Warkentin, and Christian Henke. “Mechanical and Mathematical Model of a Caterpillar Drive with a Triangular Contour for Solving Problems of Vertical Dynamics of a Tracked Vehicle.” <i>Vestnik Mashinostroeniya</i>, 2020, 26–29. <a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">https://doi.org/10.36652/0042-4633-2020-12-26-29</a>.","ama":"Poddubnyi VI, Trächtler A, Warkentin A, Henke C. Mechanical and mathematical model of a caterpillar drive with a triangular contour for solving problems of vertical dynamics of a tracked vehicle. <i>Vestnik Mashinostroeniya</i>. Published online 2020:26-29. doi:<a href=\"https://doi.org/10.36652/0042-4633-2020-12-26-29\">10.36652/0042-4633-2020-12-26-29</a>"},"title":"Mechanical and mathematical model of a caterpillar drive with a triangular contour for solving problems of vertical dynamics of a tracked vehicle","doi":"10.36652/0042-4633-2020-12-26-29","date_updated":"2022-01-06T06:57:35Z","date_created":"2021-11-03T14:26:14Z","author":[{"full_name":"Poddubnyi, Vladimir I.","last_name":"Poddubnyi","first_name":"Vladimir I."},{"first_name":"Ansgar","id":"552","full_name":"Trächtler, Ansgar","last_name":"Trächtler"},{"first_name":"Andreas","last_name":"Warkentin","full_name":"Warkentin, Andreas"},{"first_name":"Christian","full_name":"Henke, Christian","last_name":"Henke"}]},{"user_id":"40982","department":[{"_id":"241"},{"_id":"662"}],"_id":"20516","language":[{"iso":"eng"}],"type":"conference","publication":"2020 IEEE 28th International Requirements Engineering Conference (RE)","status":"public","abstract":[{"lang":"eng","text":"Traceability, a classic requirements engineering topic, is increasingly used in the context of model-based engineering. However, researchers and practitioners lack a concise terminology to discuss aspects of requirements traceability in situations in which engineers heavily rely on models and model-based engineering. While others have previously surveyed the domain, no one has so far provided a clear, unambiguous set of terms that can be used to discuss traceability in such a context. We therefore set out to cut a path through the jungle of terminology for model-based traceability, ground it in established terminology from requirements engineering, and derive an unambiguous set of relevant terms. We also map the terminology used in existing primary and secondary studies to our taxonomy to show differences and commonalities. The contribution of this paper is thus a terminology for model-based traceability that allows requirements engineers and engineers working with models to unambiguously discuss their joint traceability efforts."}],"author":[{"id":"3875","full_name":"Holtmann, Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"first_name":"Jan-Philipp","full_name":"Steghofer, Jan-Philipp","last_name":"Steghofer"},{"first_name":"Michael","full_name":"Rath, Michael","last_name":"Rath"},{"last_name":"Schmelter","orcid":"0000-0001-7787-5380","id":"40982","full_name":"Schmelter, David","first_name":"David"}],"date_created":"2020-11-26T10:14:24Z","date_updated":"2022-01-06T06:54:29Z","publisher":"IEEE","doi":"10.1109/re48521.2020.00014","title":"Cutting through the Jungle: Disambiguating Model-based Traceability Terminology","publication_status":"published","publication_identifier":{"isbn":["9781728174389"]},"citation":{"apa":"Holtmann, J., Steghofer, J.-P., Rath, M., &#38; Schmelter, D. (2020). Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE. <a href=\"https://doi.org/10.1109/re48521.2020.00014\">https://doi.org/10.1109/re48521.2020.00014</a>","mla":"Holtmann, Jörg, et al. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>, IEEE, 2020, doi:<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>.","bibtex":"@inproceedings{Holtmann_Steghofer_Rath_Schmelter_2020, title={Cutting through the Jungle: Disambiguating Model-based Traceability Terminology}, DOI={<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>}, booktitle={2020 IEEE 28th International Requirements Engineering Conference (RE)}, publisher={IEEE}, author={Holtmann, Jörg and Steghofer, Jan-Philipp and Rath, Michael and Schmelter, David}, year={2020} }","short":"J. Holtmann, J.-P. Steghofer, M. Rath, D. Schmelter, in: 2020 IEEE 28th International Requirements Engineering Conference (RE), IEEE, 2020.","chicago":"Holtmann, Jörg, Jan-Philipp Steghofer, Michael Rath, and David Schmelter. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” In <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE, 2020. <a href=\"https://doi.org/10.1109/re48521.2020.00014\">https://doi.org/10.1109/re48521.2020.00014</a>.","ieee":"J. Holtmann, J.-P. Steghofer, M. Rath, and D. Schmelter, “Cutting through the Jungle: Disambiguating Model-based Traceability Terminology,” in <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>, 2020.","ama":"Holtmann J, Steghofer J-P, Rath M, Schmelter D. Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In: <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE; 2020. doi:<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>"},"year":"2020"},{"year":"2020","citation":{"ama":"Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. In: <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>","chicago":"Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” In <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>.","ieee":"T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers,” 2020, doi: <a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","apa":"Koch, T., Dziwok, S., Holtmann, J., &#38; Bodden, E. (2020). Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>","short":"T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM, 2020.","mla":"Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","bibtex":"@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers}, DOI={<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>}, booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }"},"publisher":"ACM","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-26T10:19:54Z","author":[{"first_name":"Thorsten","id":"13616","full_name":"Koch, Thorsten","last_name":"Koch"},{"first_name":"Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan","id":"3901"},{"orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875","full_name":"Holtmann, Jörg","first_name":"Jörg"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"title":"Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers","doi":"10.1145/3365438.3410946","type":"conference","publication":"ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)","status":"public","_id":"20518","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}]},{"citation":{"apa":"Schütz, S., Rüting, A. T., Henke, C., &#38; Trächtler, A. (2020). Echtzeitfähige Planung optimierter Trajektorien für sensorgeführte, kinematisch redundante Mechanismen auf einer Industriesteuerung. In <i>Entwurf komplexer Automatisierungssysteme (EKA)</i>.","mla":"Schütz, Stefan, et al. “Echtzeitfähige Planung Optimierter Trajektorien Für Sensorgeführte, Kinematisch Redundante Mechanismen Auf Einer Industriesteuerung.” <i>Entwurf Komplexer Automatisierungssysteme (EKA)</i>, 2020.","bibtex":"@inproceedings{Schütz_Rüting_Henke_Trächtler_2020, title={Echtzeitfähige Planung optimierter Trajektorien für sensorgeführte, kinematisch redundante Mechanismen auf einer Industriesteuerung}, booktitle={Entwurf komplexer Automatisierungssysteme (EKA)}, author={Schütz, Stefan and Rüting, Arne Thorsten and Henke, Christian and Trächtler, Ansgar}, year={2020} }","short":"S. Schütz, A.T. Rüting, C. Henke, A. Trächtler, in: Entwurf Komplexer Automatisierungssysteme (EKA), 2020.","ieee":"S. Schütz, A. T. Rüting, C. Henke, and A. Trächtler, “Echtzeitfähige Planung optimierter Trajektorien für sensorgeführte, kinematisch redundante Mechanismen auf einer Industriesteuerung,” in <i>Entwurf komplexer Automatisierungssysteme (EKA)</i>, 2020.","chicago":"Schütz, Stefan, Arne Thorsten Rüting, Christian Henke, and Ansgar Trächtler. “Echtzeitfähige Planung Optimierter Trajektorien Für Sensorgeführte, Kinematisch Redundante Mechanismen Auf Einer Industriesteuerung.” In <i>Entwurf Komplexer Automatisierungssysteme (EKA)</i>, 2020.","ama":"Schütz S, Rüting AT, Henke C, Trächtler A. Echtzeitfähige Planung optimierter Trajektorien für sensorgeführte, kinematisch redundante Mechanismen auf einer Industriesteuerung. In: <i>Entwurf Komplexer Automatisierungssysteme (EKA)</i>. ; 2020."},"year":"2020","title":"Echtzeitfähige Planung optimierter Trajektorien für sensorgeführte, kinematisch redundante Mechanismen auf einer Industriesteuerung","author":[{"first_name":"Stefan","full_name":"Schütz, Stefan","last_name":"Schütz"},{"full_name":"Rüting, Arne Thorsten","last_name":"Rüting","first_name":"Arne Thorsten"},{"first_name":"Christian","last_name":"Henke","full_name":"Henke, Christian"},{"last_name":"Trächtler","id":"552","full_name":"Trächtler, Ansgar","first_name":"Ansgar"}],"date_created":"2021-08-09T05:16:55Z","date_updated":"2022-01-06T06:55:44Z","status":"public","publication":"Entwurf komplexer Automatisierungssysteme (EKA)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"153"},{"_id":"241"}],"user_id":"24876","_id":"22969"},{"_id":"23375","user_id":"41936","department":[{"_id":"241"}],"language":[{"iso":"eng"}],"type":"conference","publication":"2020 IEEE Security and Privacy Workshops (SPW)","status":"public","date_updated":"2022-01-06T06:55:50Z","date_created":"2021-08-09T12:02:01Z","author":[{"full_name":"Hermerschmidt, Lars","last_name":"Hermerschmidt","first_name":"Lars"},{"last_name":"Straub","full_name":"Straub, Andreas","first_name":"Andreas"},{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"}],"title":"Language-agnostic Injection Detection","doi":"10.1109/spw50608.2020.00060","publication_status":"published","year":"2020","citation":{"ama":"Hermerschmidt L, Straub A, Piskachev G. Language-agnostic Injection Detection. In: <i>2020 IEEE Security and Privacy Workshops (SPW)</i>. ; 2020. doi:<a href=\"https://doi.org/10.1109/spw50608.2020.00060\">10.1109/spw50608.2020.00060</a>","chicago":"Hermerschmidt, Lars, Andreas Straub, and Goran Piskachev. “Language-Agnostic Injection Detection.” In <i>2020 IEEE Security and Privacy Workshops (SPW)</i>, 2020. <a href=\"https://doi.org/10.1109/spw50608.2020.00060\">https://doi.org/10.1109/spw50608.2020.00060</a>.","ieee":"L. Hermerschmidt, A. Straub, and G. Piskachev, “Language-agnostic Injection Detection,” in <i>2020 IEEE Security and Privacy Workshops (SPW)</i>, 2020.","apa":"Hermerschmidt, L., Straub, A., &#38; Piskachev, G. (2020). Language-agnostic Injection Detection. In <i>2020 IEEE Security and Privacy Workshops (SPW)</i>. <a href=\"https://doi.org/10.1109/spw50608.2020.00060\">https://doi.org/10.1109/spw50608.2020.00060</a>","mla":"Hermerschmidt, Lars, et al. “Language-Agnostic Injection Detection.” <i>2020 IEEE Security and Privacy Workshops (SPW)</i>, 2020, doi:<a href=\"https://doi.org/10.1109/spw50608.2020.00060\">10.1109/spw50608.2020.00060</a>.","bibtex":"@inproceedings{Hermerschmidt_Straub_Piskachev_2020, title={Language-agnostic Injection Detection}, DOI={<a href=\"https://doi.org/10.1109/spw50608.2020.00060\">10.1109/spw50608.2020.00060</a>}, booktitle={2020 IEEE Security and Privacy Workshops (SPW)}, author={Hermerschmidt, Lars and Straub, Andreas and Piskachev, Goran}, year={2020} }","short":"L. Hermerschmidt, A. Straub, G. Piskachev, in: 2020 IEEE Security and Privacy Workshops (SPW), 2020."}},{"publication_status":"published","citation":{"chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 2020. <a href=\"https://doi.org/10.1109/ase.2019.00110\">https://doi.org/10.1109/ase.2019.00110</a>.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2020, doi: <a href=\"https://doi.org/10.1109/ase.2019.00110\">10.1109/ase.2019.00110</a>.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>. ; 2020. doi:<a href=\"https://doi.org/10.1109/ase.2019.00110\">10.1109/ase.2019.00110</a>","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., &#38; Bodden, E. (2020). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>. <a href=\"https://doi.org/10.1109/ase.2019.00110\">https://doi.org/10.1109/ase.2019.00110</a>","mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)</i>, 2020, doi:<a href=\"https://doi.org/10.1109/ase.2019.00110\">10.1109/ase.2019.00110</a>.","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2020, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, DOI={<a href=\"https://doi.org/10.1109/ase.2019.00110\">10.1109/ase.2019.00110</a>}, booktitle={2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2020} }"},"year":"2020","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"last_name":"Johnson","full_name":"Johnson, Oshando","first_name":"Oshando"},{"first_name":"Eric","last_name":"Bodden","full_name":"Bodden, Eric"}],"date_created":"2021-08-09T12:03:30Z","date_updated":"2022-01-06T06:55:50Z","doi":"10.1109/ase.2019.00110","title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","type":"conference","publication":"2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)","status":"public","user_id":"5786","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"_id":"23376","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:55:50Z","date_created":"2021-08-09T12:05:09Z","author":[{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"},{"last_name":"Petrasch","full_name":"Petrasch, Tobias","first_name":"Tobias"},{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"},{"full_name":"Bodden, Eric","last_name":"Bodden","first_name":"Eric"}],"title":"AuthCheck: Program-State Analysis for Access-Control Vulnerabilities","doi":"10.1007/978-3-030-54997-8_34","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Cham","year":"2020","citation":{"apa":"Piskachev, G., Petrasch, T., Späth, J., &#38; Bodden, E. (2020). AuthCheck: Program-State Analysis for Access-Control Vulnerabilities. In <i>Lecture Notes in Computer Science</i>. <a href=\"https://doi.org/10.1007/978-3-030-54997-8_34\">https://doi.org/10.1007/978-3-030-54997-8_34</a>","bibtex":"@inbook{Piskachev_Petrasch_Späth_Bodden_2020, place={Cham}, title={AuthCheck: Program-State Analysis for Access-Control Vulnerabilities}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-54997-8_34\">10.1007/978-3-030-54997-8_34</a>}, booktitle={Lecture Notes in Computer Science}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2020} }","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” <i>Lecture Notes in Computer Science</i>, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-54997-8_34\">10.1007/978-3-030-54997-8_34</a>.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: Lecture Notes in Computer Science, Cham, 2020.","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-State Analysis for Access-Control Vulnerabilities. In: <i>Lecture Notes in Computer Science</i>. ; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-54997-8_34\">10.1007/978-3-030-54997-8_34</a>","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In <i>Lecture Notes in Computer Science</i>. Cham, 2020. <a href=\"https://doi.org/10.1007/978-3-030-54997-8_34\">https://doi.org/10.1007/978-3-030-54997-8_34</a>.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities,” in <i>Lecture Notes in Computer Science</i>, Cham, 2020."},"_id":"23377","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science","type":"book_chapter","status":"public"},{"citation":{"chicago":"Koch, Thorsten, Matthias Meyer, Masud Fazal-Baqaie, and Hubert Runschke. “Softwareentwicklung Wie Am Fliessband.” In <i>Software Engineering 2020 (SE 2020)</i>, edited by Michael Felderer, Wilhelm Hasselbring, Rick Rabiser, and Reiner Jung. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V., 2020. <a href=\"https://doi.org/10.18420/SE2020\\_58\">https://doi.org/10.18420/SE2020\\_58</a>.","ieee":"T. Koch, M. Meyer, M. Fazal-Baqaie, and H. Runschke, “Softwareentwicklung wie am Fliessband,” in <i>Software Engineering 2020 (SE 2020)</i>, 2020.","ama":"Koch T, Meyer M, Fazal-Baqaie M, Runschke H. Softwareentwicklung wie am Fliessband. In: Felderer M, Hasselbring W, Rabiser R, Jung R, eds. <i>Software Engineering 2020 (SE 2020)</i>. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.; 2020. doi:<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>","bibtex":"@inproceedings{Koch_Meyer_Fazal-Baqaie_Runschke_2020, series={Lecture Notes in Informatics (LNI)}, title={Softwareentwicklung wie am Fliessband}, DOI={<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>}, booktitle={Software Engineering 2020 (SE 2020)}, publisher={Gesellschaft für Informatik e.V.}, author={Koch, Thorsten and Meyer, Matthias and Fazal-Baqaie, Masud and Runschke, Hubert}, editor={Felderer, Michael and Hasselbring, Wilhelm and Rabiser, Rick and Jung, ReinerEditors}, year={2020}, collection={Lecture Notes in Informatics (LNI)} }","mla":"Koch, Thorsten, et al. “Softwareentwicklung Wie Am Fliessband.” <i>Software Engineering 2020 (SE 2020)</i>, edited by Michael Felderer et al., Gesellschaft für Informatik e.V., 2020, doi:<a href=\"https://doi.org/10.18420/SE2020\\_58\">10.18420/SE2020\\_58</a>.","short":"T. Koch, M. Meyer, M. Fazal-Baqaie, H. Runschke, in: M. Felderer, W. Hasselbring, R. Rabiser, R. Jung (Eds.), Software Engineering 2020 (SE 2020), Gesellschaft für Informatik e.V., 2020.","apa":"Koch, T., Meyer, M., Fazal-Baqaie, M., &#38; Runschke, H. (2020). Softwareentwicklung wie am Fliessband. In M. Felderer, W. Hasselbring, R. Rabiser, &#38; R. Jung (Eds.), <i>Software Engineering 2020 (SE 2020)</i>. Gesellschaft für Informatik e.V. <a href=\"https://doi.org/10.18420/SE2020\\_58\">https://doi.org/10.18420/SE2020\\_58</a>"},"year":"2020","doi":"10.18420/SE2020\\_58","title":"Softwareentwicklung wie am Fliessband","author":[{"first_name":"Thorsten","last_name":"Koch","full_name":"Koch, Thorsten","id":"13616"},{"first_name":"Matthias","last_name":"Meyer","id":"683","full_name":"Meyer, Matthias"},{"first_name":"Masud","full_name":"Fazal-Baqaie, Masud","last_name":"Fazal-Baqaie"},{"first_name":"Hubert","last_name":"Runschke","full_name":"Runschke, Hubert"}],"date_created":"2021-04-30T11:15:13Z","date_updated":"2022-01-06T06:55:19Z","publisher":"Gesellschaft für Informatik e.V.","status":"public","editor":[{"first_name":"Michael","last_name":"Felderer","full_name":"Felderer, Michael"},{"last_name":"Hasselbring","full_name":"Hasselbring, Wilhelm","first_name":"Wilhelm"},{"first_name":"Rick","full_name":"Rabiser, Rick","last_name":"Rabiser"},{"first_name":"Reiner","last_name":"Jung","full_name":"Jung, Reiner"}],"type":"conference","publication":"Software Engineering 2020 (SE 2020)","language":[{"iso":"eng"}],"user_id":"13616","series_title":"Lecture Notes in Informatics (LNI)","department":[{"_id":"241"},{"_id":"662"}],"_id":"21931"},{"type":"dissertation","status":"public","user_id":"82875","department":[{"_id":"153"},{"_id":"241"}],"_id":"42068","language":[{"iso":"ger"}],"publication_status":"published","citation":{"ama":"Gense A. <i>Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge</i>.; 2020.","ieee":"A. Gense, <i>Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge</i>. 2020.","chicago":"Gense, Alexander. <i>Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge</i>, 2020.","apa":"Gense, A. (2020). <i>Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge</i>.","short":"A. Gense, Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge, 2020.","bibtex":"@book{Gense_2020, title={Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge}, author={Gense, Alexander}, year={2020} }","mla":"Gense, Alexander. <i>Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge</i>. 2020."},"year":"2020","author":[{"first_name":"Alexander","last_name":"Gense","full_name":"Gense, Alexander"}],"supervisor":[{"first_name":"Ansgar","last_name":"Trächtler","full_name":"Trächtler, Ansgar","id":"552"}],"date_created":"2023-02-14T10:53:20Z","oa":"1","date_updated":"2023-02-15T11:14:49Z","main_file_link":[{"url":"https://digital.ub.uni-paderborn.de/urn/urn:nbn:de:hbz:466:2-38177","open_access":"1"}],"title":"Mechatronischer Entwurf eines geregelten Federungssystems für mittelschwere gepanzerte Kettenfahrzeuge"},{"author":[{"full_name":"Bertelsmeier, Fabian","last_name":"Bertelsmeier","first_name":"Fabian"}],"supervisor":[{"first_name":"Ansgar","id":"552","full_name":"Trächtler, Ansgar","last_name":"Trächtler"}],"date_created":"2023-02-14T10:51:40Z","oa":"1","date_updated":"2023-02-15T10:30:24Z","main_file_link":[{"open_access":"1","url":"https://digital.ub.uni-paderborn.de/doi/10.17619/UNIPB/1-890"}],"title":"Produkttolerante Automation zellenbasierter Fertigungssysteme","publication_status":"published","citation":{"ieee":"F. Bertelsmeier, <i>Produkttolerante Automation zellenbasierter Fertigungssysteme</i>. 2020.","chicago":"Bertelsmeier, Fabian. <i>Produkttolerante Automation zellenbasierter Fertigungssysteme</i>, 2020.","ama":"Bertelsmeier F. <i>Produkttolerante Automation zellenbasierter Fertigungssysteme</i>.; 2020.","bibtex":"@book{Bertelsmeier_2020, title={Produkttolerante Automation zellenbasierter Fertigungssysteme}, author={Bertelsmeier, Fabian}, year={2020} }","mla":"Bertelsmeier, Fabian. <i>Produkttolerante Automation zellenbasierter Fertigungssysteme</i>. 2020.","short":"F. Bertelsmeier, Produkttolerante Automation zellenbasierter Fertigungssysteme, 2020.","apa":"Bertelsmeier, F. (2020). <i>Produkttolerante Automation zellenbasierter Fertigungssysteme</i>."},"year":"2020","department":[{"_id":"153"},{"_id":"241"}],"user_id":"82875","_id":"42067","language":[{"iso":"ger"}],"type":"dissertation","status":"public"},{"type":"conference","publication":" 54. Metallographie-Tagung","status":"public","_id":"22965","user_id":"36287","department":[{"_id":"153"},{"_id":"241"},{"_id":"156"}],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2020","citation":{"ama":"Rozo Vasquez J, Arian B, Riepold M, Homberg W, Trächtler A, Walther F. Microstructural investigation on phase transformation during flow forming of the metastable austenite AISI 304 . In: <i> 54. Metallographie-Tagung</i>. ; 2020:75-81.","chicago":"Rozo Vasquez, Julian, Bahman Arian, Markus Riepold, Werner Homberg, Ansgar Trächtler, and Frank Walther. “Microstructural Investigation on Phase Transformation during Flow Forming of the Metastable Austenite AISI 304 .” In <i> 54. Metallographie-Tagung</i>, 75–81, 2020.","ieee":"J. Rozo Vasquez, B. Arian, M. Riepold, W. Homberg, A. Trächtler, and F. Walther, “Microstructural investigation on phase transformation during flow forming of the metastable austenite AISI 304 ,” in <i> 54. Metallographie-Tagung</i>, 2020, pp. 75–81.","apa":"Rozo Vasquez, J., Arian, B., Riepold, M., Homberg, W., Trächtler, A., &#38; Walther, F. (2020). Microstructural investigation on phase transformation during flow forming of the metastable austenite AISI 304 . <i> 54. Metallographie-Tagung</i>, 75–81.","bibtex":"@inproceedings{Rozo Vasquez_Arian_Riepold_Homberg_Trächtler_Walther_2020, title={Microstructural investigation on phase transformation during flow forming of the metastable austenite AISI 304 }, booktitle={ 54. Metallographie-Tagung}, author={Rozo Vasquez, Julian and Arian, Bahman and Riepold, Markus and Homberg, Werner and Trächtler, Ansgar and Walther, Frank}, year={2020}, pages={75–81} }","mla":"Rozo Vasquez, Julian, et al. “Microstructural Investigation on Phase Transformation during Flow Forming of the Metastable Austenite AISI 304 .” <i> 54. Metallographie-Tagung</i>, 2020, pp. 75–81.","short":"J. Rozo Vasquez, B. Arian, M. Riepold, W. Homberg, A. Trächtler, F. Walther, in:  54. Metallographie-Tagung, 2020, pp. 75–81."},"page":"75-81","date_updated":"2023-05-02T08:20:55Z","date_created":"2021-08-09T05:16:50Z","author":[{"first_name":"Julian","full_name":"Rozo Vasquez, Julian","last_name":"Rozo Vasquez"},{"first_name":"Bahman","last_name":"Arian","id":"36287","full_name":"Arian, Bahman"},{"first_name":"Markus","full_name":"Riepold, Markus","last_name":"Riepold"},{"id":"233","full_name":"Homberg, Werner","last_name":"Homberg","first_name":"Werner"},{"first_name":"Ansgar","last_name":"Trächtler","full_name":"Trächtler, Ansgar","id":"552"},{"last_name":"Walther","full_name":"Walther, Frank","first_name":"Frank"}],"title":"Microstructural investigation on phase transformation during flow forming of the metastable austenite AISI 304 "},{"department":[{"_id":"241"}],"user_id":"14931","_id":"20347","language":[{"iso":"eng"}],"publication":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","type":"conference","status":"public","date_created":"2020-11-13T08:34:51Z","author":[{"last_name":"Pasic","full_name":"Pasic, Faruk","id":"49576","first_name":"Faruk"},{"first_name":"Benedict","id":"53786","full_name":"Wohlers, Benedict","last_name":"Wohlers"},{"first_name":"Stefan","id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673"},{"first_name":"Matthias","orcid":"https://orcid.org/0000-0003-2465-9347","last_name":"Becker","id":"4870","full_name":"Becker, Matthias"},{"full_name":"Heinrich, Matthias","last_name":"Heinrich","first_name":"Matthias"}],"date_updated":"2022-01-06T06:54:26Z","title":"A KPI-based Condition Monitoring System for the Beer Brewing Process","page":"1469-1472","citation":{"ama":"Pasic F, Wohlers B, Dziwok S, Becker M, Heinrich M. A KPI-based Condition Monitoring System for the Beer Brewing Process. In: <i>2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>. ; 2019:1469-1472.","chicago":"Pasic, Faruk, Benedict Wohlers, Stefan Dziwok, Matthias Becker, and Matthias Heinrich. “A KPI-Based Condition Monitoring System for the Beer Brewing Process.” In <i>2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 1469–72, 2019.","ieee":"F. Pasic, B. Wohlers, S. Dziwok, M. Becker, and M. Heinrich, “A KPI-based Condition Monitoring System for the Beer Brewing Process,” in <i>2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 2019, pp. 1469–1472.","mla":"Pasic, Faruk, et al. “A KPI-Based Condition Monitoring System for the Beer Brewing Process.” <i>2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 2019, pp. 1469–72.","short":"F. Pasic, B. Wohlers, S. Dziwok, M. Becker, M. Heinrich, in: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, pp. 1469–1472.","bibtex":"@inproceedings{Pasic_Wohlers_Dziwok_Becker_Heinrich_2019, title={A KPI-based Condition Monitoring System for the Beer Brewing Process}, booktitle={2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}, author={Pasic, Faruk and Wohlers, Benedict and Dziwok, Stefan and Becker, Matthias and Heinrich, Matthias}, year={2019}, pages={1469–1472} }","apa":"Pasic, F., Wohlers, B., Dziwok, S., Becker, M., &#38; Heinrich, M. (2019). A KPI-based Condition Monitoring System for the Beer Brewing Process. <i>2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 1469–1472."},"year":"2019"},{"type":"conference","publication":"10th Workshop on Tools for Automatic Program Analysis (TAPAS)","citation":{"apa":"Piskachev, G., Petrasch, T., Späth, J., &#38; Bodden, E. (2019). AuthCheck: Program-state Analysis for Access-control Vulnerabilities. <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019.","bibtex":"@inproceedings{Piskachev_Petrasch_Späth_Bodden_2019, title={AuthCheck: Program-state Analysis for Access-control Vulnerabilities}, booktitle={10th Workshop on Tools for Automatic Program Analysis (TAPAS)}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2019} }","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-state Analysis for Access-control Vulnerabilities. In: <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>. ; 2019.","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-state Analysis for Access-control Vulnerabilities,” 2019."},"status":"public","year":"2019","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"last_name":"Petrasch","full_name":"Petrasch, Tobias","first_name":"Tobias"},{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"}],"user_id":"5786","date_created":"2020-11-27T10:21:19Z","department":[{"_id":"76"},{"_id":"241"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20528","main_file_link":[{"url":"http://www.bodden.de/pubs/piskachev19authcheck.pdf"}],"language":[{"iso":"eng"}],"title":"AuthCheck: Program-state Analysis for Access-control Vulnerabilities"},{"editor":[{"last_name":"Mikusz","full_name":"Mikusz, Martin","first_name":"Martin"}],"status":"public","type":"conference","publication":"Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)","language":[{"iso":"eng"}],"_id":"20757","user_id":"3901","department":[{"_id":"241"},{"_id":"662"}],"year":"2019","citation":{"ieee":"M. Fazal-Baqaie, J.-N. Strüwer, D. Schmelter, and S. Dziwok, “Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen,” in <i>Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)</i>, 2019.","chicago":"Fazal-Baqaie, Masud, Jan-Niclas Strüwer, David Schmelter, and Stefan Dziwok. “Coaching on the Job Bei Unternehmen Des Maschinen- Und Anlagenbaus - Wissenslücken Schließen Zur Weiterpflege Modernisierter IT-Anwendungen.” In <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz. Lecture Notes in Informatics (LNI), 2019.","ama":"Fazal-Baqaie M, Strüwer J-N, Schmelter D, Dziwok S. Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen. In: Mikusz M, ed. <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>. Lecture Notes in Informatics (LNI); 2019.","apa":"Fazal-Baqaie, M., Strüwer, J.-N., Schmelter, D., &#38; Dziwok, S. (2019). Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen. In M. Mikusz (Ed.), <i>Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)</i>. Lecture Notes in Informatics (LNI).","bibtex":"@inproceedings{Fazal-Baqaie_Strüwer_Schmelter_Dziwok_2019, title={Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen}, booktitle={Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)}, publisher={Lecture Notes in Informatics (LNI)}, author={Fazal-Baqaie, Masud and Strüwer, Jan-Niclas and Schmelter, David and Dziwok, Stefan}, editor={Mikusz, Martin}, year={2019} }","mla":"Fazal-Baqaie, Masud, et al. “Coaching on the Job Bei Unternehmen Des Maschinen- Und Anlagenbaus - Wissenslücken Schließen Zur Weiterpflege Modernisierter IT-Anwendungen.” <i>Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz, Lecture Notes in Informatics (LNI), 2019.","short":"M. Fazal-Baqaie, J.-N. Strüwer, D. Schmelter, S. Dziwok, in: M. Mikusz (Ed.), Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), Lecture Notes in Informatics (LNI), 2019."},"title":"Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus - Wissenslücken schließen zur Weiterpflege modernisierter IT-Anwendungen","date_updated":"2022-01-06T06:54:36Z","publisher":"Lecture Notes in Informatics (LNI)","author":[{"first_name":"Masud","last_name":"Fazal-Baqaie","full_name":"Fazal-Baqaie, Masud"},{"full_name":"Strüwer, Jan-Niclas","last_name":"Strüwer","first_name":"Jan-Niclas"},{"last_name":"Schmelter","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","id":"40982","first_name":"David"},{"last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan","id":"3901","first_name":"Stefan"}],"date_created":"2020-12-16T13:51:04Z"},{"citation":{"chicago":"Holtmann, Jörg. <i>Improvement of Software Requirements Quality Based on Systems Engineering</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2019.","ieee":"J. Holtmann, <i>Improvement of Software Requirements Quality based on Systems Engineering</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2019.","ama":"Holtmann J. <i>Improvement of Software Requirements Quality Based on Systems Engineering</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn; 2019.","bibtex":"@book{Holtmann_2019, title={Improvement of Software Requirements Quality based on Systems Engineering}, publisher={Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn}, author={Holtmann, Jörg}, year={2019} }","short":"J. Holtmann, Improvement of Software Requirements Quality Based on Systems Engineering, Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2019.","mla":"Holtmann, Jörg. <i>Improvement of Software Requirements Quality Based on Systems Engineering</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 2019.","apa":"Holtmann, J. (2019). <i>Improvement of Software Requirements Quality based on Systems Engineering</i>. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn."},"year":"2019","date_created":"2020-12-16T14:02:11Z","author":[{"last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875","first_name":"Jörg"}],"publisher":"Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn","date_updated":"2022-01-06T06:54:36Z","title":"Improvement of Software Requirements Quality based on Systems Engineering","type":"dissertation","status":"public","department":[{"_id":"241"}],"user_id":"15249","_id":"20758","language":[{"iso":"eng"}]},{"_id":"20759","user_id":"5786","department":[{"_id":"76"},{"_id":"241"}],"language":[{"iso":"eng"}],"type":"conference","publication":"International Conference on Software Architecture (ICSA 2019)","status":"public","date_updated":"2022-01-06T06:54:36Z","date_created":"2020-12-16T14:03:44Z","author":[{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"},{"id":"9106","full_name":"Schubert, David","last_name":"Schubert","first_name":"David"}],"title":"Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures","year":"2019","citation":{"chicago":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” In <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019.","ieee":"C. Gerking and D. Schubert, “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures,” 2019.","ama":"Gerking C, Schubert D. Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. In: <i>International Conference on Software Architecture (ICSA 2019)</i>. ; 2019.","apa":"Gerking, C., &#38; Schubert, D. (2019). Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. <i>International Conference on Software Architecture (ICSA 2019)</i>.","bibtex":"@inproceedings{Gerking_Schubert_2019, title={Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures}, booktitle={International Conference on Software Architecture (ICSA 2019)}, author={Gerking, Christopher and Schubert, David}, year={2019} }","short":"C. Gerking, D. Schubert, in: International Conference on Software Architecture (ICSA 2019), 2019.","mla":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019."}},{"year":"2019","citation":{"ama":"Schubert D, Eikerling H, Holtmann J. Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems. In: <i>17th Escar Europe : Embedded Security in Cars</i>. Ruhr-University Bochum, University Library; 2019.","ieee":"D. Schubert, H. Eikerling, and J. Holtmann, “Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems,” in <i>17th escar Europe : embedded security in cars</i>, Ruhr-University Bochum, University Library, 2019.","chicago":"Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems.” In <i>17th Escar Europe : Embedded Security in Cars</i>. Ruhr-University Bochum, University Library, 2019.","apa":"Schubert, D., Eikerling, H., &#38; Holtmann, J. (2019). Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems. In <i>17th escar Europe : embedded security in cars</i>. Ruhr-University Bochum, University Library.","mla":"Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems.” <i>17th Escar Europe : Embedded Security in Cars</i>, Ruhr-University Bochum, University Library, 2019.","bibtex":"@inbook{Schubert_Eikerling_Holtmann_2019, title={Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems}, booktitle={17th escar Europe : embedded security in cars}, publisher={Ruhr-University Bochum, University Library}, author={Schubert, David and Eikerling, Hendrik and Holtmann, Jörg}, year={2019} }","short":"D. Schubert, H. Eikerling, J. Holtmann, in: 17th Escar Europe : Embedded Security in Cars, Ruhr-University Bochum, University Library, 2019."},"title":"Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems","publisher":"Ruhr-University Bochum, University Library","date_updated":"2022-01-06T06:54:36Z","author":[{"last_name":"Schubert","id":"9106","full_name":"Schubert, David","first_name":"David"},{"id":"29279","full_name":"Eikerling, Hendrik","last_name":"Eikerling","first_name":"Hendrik"},{"first_name":"Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875"}],"date_created":"2020-12-16T14:05:10Z","status":"public","type":"book_chapter","publication":"17th escar Europe : embedded security in cars","language":[{"iso":"eng"}],"_id":"20760","user_id":"9106","department":[{"_id":"241"}]},{"year":"2019","citation":{"ieee":"B. Wohlers, S. Dziwok, F. Pasic, A. Lipsmeier, and M. Becker, “Monitoring and Control of Production Processes based on Key Performance Indicators for Mechatronic Systems,” <i>International Journal of Production Economics</i>, 2019.","chicago":"Wohlers, Benedict, Stefan Dziwok, Faruk Pasic, Andre Lipsmeier, and Matthias Becker. “Monitoring and Control of Production Processes Based on Key Performance Indicators for Mechatronic Systems.” <i>International Journal of Production Economics</i>, 2019.","ama":"Wohlers B, Dziwok S, Pasic F, Lipsmeier A, Becker M. Monitoring and Control of Production Processes based on Key Performance Indicators for Mechatronic Systems. <i>International Journal of Production Economics</i>. 2019.","apa":"Wohlers, B., Dziwok, S., Pasic, F., Lipsmeier, A., &#38; Becker, M. (2019). Monitoring and Control of Production Processes based on Key Performance Indicators for Mechatronic Systems. <i>International Journal of Production Economics</i>.","bibtex":"@article{Wohlers_Dziwok_Pasic_Lipsmeier_Becker_2019, title={Monitoring and Control of Production Processes based on Key Performance Indicators for Mechatronic Systems}, journal={International Journal of Production Economics}, author={Wohlers, Benedict and Dziwok, Stefan and Pasic, Faruk and Lipsmeier, Andre and Becker, Matthias}, year={2019} }","mla":"Wohlers, Benedict, et al. “Monitoring and Control of Production Processes Based on Key Performance Indicators for Mechatronic Systems.” <i>International Journal of Production Economics</i>, 2019.","short":"B. Wohlers, S. Dziwok, F. Pasic, A. Lipsmeier, M. Becker, International Journal of Production Economics (2019)."},"date_updated":"2022-01-06T06:54:36Z","author":[{"id":"53786","full_name":"Wohlers, Benedict","last_name":"Wohlers","first_name":"Benedict"},{"first_name":"Stefan","full_name":"Dziwok, Stefan","id":"3901","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673"},{"id":"49576","full_name":"Pasic, Faruk","last_name":"Pasic","first_name":"Faruk"},{"first_name":"Andre","full_name":"Lipsmeier, Andre","last_name":"Lipsmeier"},{"first_name":"Matthias","full_name":"Becker, Matthias","id":"4870","orcid":"https://orcid.org/0000-0003-2465-9347","last_name":"Becker"}],"date_created":"2020-12-16T14:06:20Z","title":"Monitoring and Control of Production Processes based on Key Performance Indicators for Mechatronic Systems","type":"journal_article","publication":"International Journal of Production Economics","abstract":[{"text":"The processes for manufacturing and operating modern technical products require expertise in multiple disciplines like mechanical engineer-ing, electrical engineering, and software engineering. Assessing the current condition and quality of these processes and the machines in-volved is challenging due to the inherent complexity of the products and the required expertise in multiple engineering domains. Globaliza-tion and increasing competition make it necessary to reduce production costs while at the same time ensuring high throughput and product quality. Without the ability to precisely assess the condition and quality of production processes and involved machines, taking action to steer these metrics is nearly impossible and results in unnecessary high production costs. In our previous publications, we introduced the concept of Key Performance Indicators (KPIs) for mechatronic systems as a concept to assess the condition and quality of products and production processes in a graspable yet substantial and efficient way. In this paper, we further refine our KPI concepts und evaluate them for two different use cases: we apply our KPI concept to a manufacturing process in the mechatronic system domain and an operation process in the food production domain. We provide detailed insights in how we applied our concepts within these domains and report about lessons learned. In addition, we provide a business case estimation for our soft-ware solution that assesses the KPIs of our food production domain example.","lang":"eng"}],"status":"public","_id":"20761","user_id":"3901","department":[{"_id":"241"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"22805","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","series_title":"Communications in Computer and Information Science","status":"public","publication":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)","type":"conference","title":"Designing and Integrating IEC 62443 Compliant Threat Analysis","doi":"10.1007/978-3-030-28005-5_5","conference":{"name":"European System, Software & Service Process Improvement & Innovation Conference (EuroSPI 2019)","location":"Edinburgh, UK"},"date_updated":"2022-01-06T06:55:41Z","volume":1060,"author":[{"first_name":"Markus","full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702"},{"first_name":"Sven","last_name":"Merschjohann","full_name":"Merschjohann, Sven","id":"11394"},{"first_name":"Masud","full_name":"Fazal-Baqaie, Masud","last_name":"Fazal-Baqaie"},{"last_name":"Förder","full_name":"Förder, Torsten","first_name":"Torsten"},{"full_name":"Hausmann, Stefan","last_name":"Hausmann","first_name":"Stefan"},{"last_name":"Waldeck","full_name":"Waldeck, Boris","first_name":"Boris"}],"date_created":"2021-07-23T14:09:56Z","year":"2019","intvolume":"      1060","citation":{"ieee":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, and B. Waldeck, “Designing and Integrating IEC 62443 Compliant Threat Analysis,” in <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, Edinburgh, UK, 2019, vol. 1060.","chicago":"Fockel, Markus, Sven Merschjohann, Masud Fazal-Baqaie, Torsten Förder, Stefan Hausmann, and Boris Waldeck. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” In <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, Vol. 1060. Communications in Computer and Information Science, 2019. <a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">https://doi.org/10.1007/978-3-030-28005-5_5</a>.","ama":"Fockel M, Merschjohann S, Fazal-Baqaie M, Förder T, Hausmann S, Waldeck B. Designing and Integrating IEC 62443 Compliant Threat Analysis. In: <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>. Vol 1060. Communications in Computer and Information Science. ; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>","apa":"Fockel, M., Merschjohann, S., Fazal-Baqaie, M., Förder, T., Hausmann, S., &#38; Waldeck, B. (2019). Designing and Integrating IEC 62443 Compliant Threat Analysis. In <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i> (Vol. 1060). Edinburgh, UK. <a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">https://doi.org/10.1007/978-3-030-28005-5_5</a>","short":"M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, B. Waldeck, in: European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019), 2019.","mla":"Fockel, Markus, et al. “Designing and Integrating IEC 62443 Compliant Threat Analysis.” <i>European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)</i>, vol. 1060, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>.","bibtex":"@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_Förder_Hausmann_Waldeck_2019, series={Communications in Computer and Information Science}, title={Designing and Integrating IEC 62443 Compliant Threat Analysis}, volume={1060}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-28005-5_5\">10.1007/978-3-030-28005-5_5</a>}, booktitle={European System, Software &#38; Service Process Improvement &#38; Innovation Conference (EuroSPI 2019)}, author={Fockel, Markus and Merschjohann, Sven and Fazal-Baqaie, Masud and Förder, Torsten and Hausmann, Stefan and Waldeck, Boris}, year={2019}, collection={Communications in Computer and Information Science} }"},"publication_identifier":{"issn":["1865-0929","1865-0937"]},"publication_status":"published"},{"date_created":"2021-08-09T05:21:47Z","author":[{"last_name":"Gräler","full_name":"Gräler, Manuel","first_name":"Manuel"},{"full_name":"Wallow, Astrid","last_name":"Wallow","first_name":"Astrid"},{"first_name":"Christian","full_name":"Henke, Christian","last_name":"Henke"},{"last_name":"Trächtler","full_name":"Trächtler, Ansgar","id":"552","first_name":"Ansgar"}],"volume":81,"date_updated":"2022-01-06T06:55:44Z","title":"Assisted setup of forming processes: architecture for the integration of non-adjustable disturbances","citation":{"apa":"Gräler, M., Wallow, A., Henke, C., &#38; Trächtler, A. (2019). Assisted setup of forming processes: architecture for the integration of non-adjustable disturbances. <i>Procedia CIRP</i>, <i>81</i>, 1348–1353.","bibtex":"@article{Gräler_Wallow_Henke_Trächtler_2019, title={Assisted setup of forming processes: architecture for the integration of non-adjustable disturbances}, volume={81}, journal={Procedia CIRP}, author={Gräler, Manuel and Wallow, Astrid and Henke, Christian and Trächtler, Ansgar}, year={2019}, pages={1348–1353} }","short":"M. Gräler, A. Wallow, C. Henke, A. Trächtler, Procedia CIRP 81 (2019) 1348–1353.","mla":"Gräler, Manuel, et al. “Assisted Setup of Forming Processes: Architecture for the Integration of Non-Adjustable Disturbances.” <i>Procedia CIRP</i>, vol. 81, 2019, pp. 1348–1353.","ama":"Gräler M, Wallow A, Henke C, Trächtler A. Assisted setup of forming processes: architecture for the integration of non-adjustable disturbances. <i>Procedia CIRP</i>. 2019;81:1348–1353.","ieee":"M. Gräler, A. Wallow, C. Henke, and A. Trächtler, “Assisted setup of forming processes: architecture for the integration of non-adjustable disturbances,” <i>Procedia CIRP</i>, vol. 81, pp. 1348–1353, 2019.","chicago":"Gräler, Manuel, Astrid Wallow, Christian Henke, and Ansgar Trächtler. “Assisted Setup of Forming Processes: Architecture for the Integration of Non-Adjustable Disturbances.” <i>Procedia CIRP</i> 81 (2019): 1348–1353."},"page":"1348–1353","intvolume":"        81","year":"2019","user_id":"24876","department":[{"_id":"153"},{"_id":"241"}],"_id":"22975","language":[{"iso":"eng"}],"type":"journal_article","publication":"Procedia CIRP","status":"public"}]
