[{"date_updated":"2022-01-06T06:54:29Z","publisher":"Universität Paderborn","author":[{"first_name":"Philipp","full_name":"Holzinger, Philipp","last_name":"Holzinger"}],"date_created":"2020-11-26T10:44:52Z","supervisor":[{"last_name":"Bodden","full_name":"Bodden, Eric","first_name":"Eric"}],"title":"A Systematic Analysis and Hardening of the Java Security Architecture","main_file_link":[{"url":"http://www.bodden.de/pubs/phdHolzinger.pdf"}],"year":"2019","citation":{"ieee":"P. Holzinger, <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","chicago":"Holzinger, Philipp. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","ama":"Holzinger P. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn; 2019.","apa":"Holzinger, P. (2019). <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn.","mla":"Holzinger, Philipp. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","bibtex":"@book{Holzinger_2019, title={A Systematic Analysis and Hardening of the Java Security Architecture}, publisher={Universität Paderborn}, author={Holzinger, Philipp}, year={2019} }","short":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture, Universität Paderborn, 2019."},"_id":"20522","user_id":"5786","department":[{"_id":"76"}],"language":[{"iso":"eng"}],"type":"dissertation","status":"public"},{"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-26T10:47:51Z","supervisor":[{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"author":[{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"}],"title":"User-Centered Tool Design for Data-Flow Analysis","year":"2019","citation":{"mla":"Nguyen Quang Do, Lisa. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019.","short":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis, Universität Paderborn, 2019.","bibtex":"@book{Nguyen Quang Do_2019, title={User-Centered Tool Design for Data-Flow Analysis}, publisher={Universität Paderborn}, author={Nguyen Quang Do, Lisa}, year={2019} }","apa":"Nguyen Quang Do, L. (2019). <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn.","ieee":"L. Nguyen Quang Do, <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019.","chicago":"Nguyen Quang Do, Lisa. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019.","ama":"Nguyen Quang Do L. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn; 2019."},"_id":"20524","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"type":"dissertation","status":"public"},{"status":"public","type":"conference","publication":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)","language":[{"iso":"eng"}],"user_id":"5786","department":[{"_id":"76"}],"_id":"20525","citation":{"chicago":"Stockmann, Lars, Sven Laux, and Eric Bodden. “Architectural Runtime Verification.” In <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 77–84, 2019. <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">https://doi.org/10.1109/ICSA-C.2019.00021</a>.","ieee":"L. Stockmann, S. Laux, and E. Bodden, “Architectural Runtime Verification,” in <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 2019, pp. 77–84, doi: <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>.","ama":"Stockmann L, Laux S, Bodden E. Architectural Runtime Verification. In: <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>. ; 2019:77-84. doi:<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>","mla":"Stockmann, Lars, et al. “Architectural Runtime Verification.” <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 2019, pp. 77–84, doi:<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>.","bibtex":"@inproceedings{Stockmann_Laux_Bodden_2019, title={Architectural Runtime Verification}, DOI={<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>}, booktitle={2019 IEEE International Conference on Software Architecture Companion (ICSA-C)}, author={Stockmann, Lars and Laux, Sven and Bodden, Eric}, year={2019}, pages={77–84} }","short":"L. Stockmann, S. Laux, E. Bodden, in: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84.","apa":"Stockmann, L., Laux, S., &#38; Bodden, E. (2019). Architectural Runtime Verification. <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 77–84. <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">https://doi.org/10.1109/ICSA-C.2019.00021</a>"},"page":"77-84","year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/stockmann19architectural.pdf"}],"doi":"10.1109/ICSA-C.2019.00021","title":"Architectural Runtime Verification","author":[{"first_name":"Lars","last_name":"Stockmann","id":"48144","full_name":"Stockmann, Lars"},{"first_name":"Sven","last_name":"Laux","full_name":"Laux, Sven"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-27T10:16:59Z","date_updated":"2022-01-06T06:54:29Z"},{"status":"public","publication":"2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","type":"conference","language":[{"iso":"eng"}],"_id":"20527","department":[{"_id":"76"}],"user_id":"5786","year":"2019","page":"1-6","citation":{"ieee":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, and O. Nierstrasz, “The Impact of Developer Experience in Using Java Cryptography,” in <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 2019, pp. 1–6, doi: <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>.","chicago":"Hazhirpasand, Mohammadreza, Mohammad Ghafari, Stefan Krüger, Eric Bodden, and Oskar Nierstrasz. “The Impact of Developer Experience in Using Java Cryptography.” In <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 1–6, 2019. <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">https://doi.org/10.1109/ESEM.2019.8870184</a>.","ama":"Hazhirpasand M, Ghafari M, Krüger S, Bodden E, Nierstrasz O. The Impact of Developer Experience in Using Java Cryptography. In: <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>. ; 2019:1-6. doi:<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>","apa":"Hazhirpasand, M., Ghafari, M., Krüger, S., Bodden, E., &#38; Nierstrasz, O. (2019). The Impact of Developer Experience in Using Java Cryptography. <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 1–6. <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">https://doi.org/10.1109/ESEM.2019.8870184</a>","mla":"Hazhirpasand, Mohammadreza, et al. “The Impact of Developer Experience in Using Java Cryptography.” <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 2019, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>.","bibtex":"@inproceedings{Hazhirpasand_Ghafari_Krüger_Bodden_Nierstrasz_2019, title={The Impact of Developer Experience in Using Java Cryptography}, DOI={<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>}, booktitle={2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)}, author={Hazhirpasand, Mohammadreza and Ghafari, Mohammad and Krüger, Stefan and Bodden, Eric and Nierstrasz, Oskar}, year={2019}, pages={1–6} }","short":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, O. Nierstrasz, in: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6."},"publication_identifier":{"issn":["1949-3770"]},"title":"The Impact of Developer Experience in Using Java Cryptography","doi":"10.1109/ESEM.2019.8870184","main_file_link":[{"url":"http://www.bodden.de/pubs/hazhirpasand19impact.pdf"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"full_name":"Hazhirpasand, Mohammadreza","last_name":"Hazhirpasand","first_name":"Mohammadreza"},{"first_name":"Mohammad","full_name":"Ghafari, Mohammad","last_name":"Ghafari"},{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"full_name":"Nierstrasz, Oskar","last_name":"Nierstrasz","first_name":"Oskar"}],"date_created":"2020-11-27T10:20:37Z"},{"language":[{"iso":"eng"}],"main_file_link":[{"url":"http://www.bodden.de/pubs/piskachev19authcheck.pdf"}],"title":"AuthCheck: Program-state Analysis for Access-control Vulnerabilities","department":[{"_id":"76"},{"_id":"241"}],"author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"first_name":"Tobias","full_name":"Petrasch, Tobias","last_name":"Petrasch"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"user_id":"5786","date_created":"2020-11-27T10:21:19Z","_id":"20528","date_updated":"2022-01-06T06:54:29Z","status":"public","citation":{"ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-state Analysis for Access-control Vulnerabilities. In: <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>. ; 2019.","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-state Analysis for Access-control Vulnerabilities,” 2019.","bibtex":"@inproceedings{Piskachev_Petrasch_Späth_Bodden_2019, title={AuthCheck: Program-state Analysis for Access-control Vulnerabilities}, booktitle={10th Workshop on Tools for Automatic Program Analysis (TAPAS)}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","apa":"Piskachev, G., Petrasch, T., Späth, J., &#38; Bodden, E. (2019). AuthCheck: Program-state Analysis for Access-control Vulnerabilities. <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>."},"year":"2019","publication":"10th Workshop on Tools for Automatic Program Analysis (TAPAS)","type":"conference"},{"citation":{"ama":"Nachtigall M, Nguyen Quang Do L, Bodden E. Explaining Static Analysis -- A Perspective. In: <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>. ; 2019.","ieee":"M. Nachtigall, L. Nguyen Quang Do, and E. Bodden, “Explaining Static Analysis -- A Perspective,” 2019.","chicago":"Nachtigall, Marcus, Lisa Nguyen Quang Do, and Eric Bodden. “Explaining Static Analysis -- A Perspective.” In <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>, 2019.","bibtex":"@inproceedings{Nachtigall_Nguyen Quang Do_Bodden_2019, title={Explaining Static Analysis -- A Perspective}, booktitle={1st International Workshop on Explainable Software (EXPLAIN) at ASE}, author={Nachtigall, Marcus and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","mla":"Nachtigall, Marcus, et al. “Explaining Static Analysis -- A Perspective.” <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>, 2019.","short":"M. Nachtigall, L. Nguyen Quang Do, E. Bodden, in: 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","apa":"Nachtigall, M., Nguyen Quang Do, L., &#38; Bodden, E. (2019). Explaining Static Analysis -- A Perspective. <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/nachtigall19explaining.pdf"}],"title":"Explaining Static Analysis -- A Perspective","author":[{"id":"41213","full_name":"Nachtigall, Marcus","last_name":"Nachtigall","first_name":"Marcus"},{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-11-27T10:22:38Z","date_updated":"2022-01-06T06:54:29Z","status":"public","publication":"1st International Workshop on Explainable Software (EXPLAIN) at ASE","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20529"},{"status":"public","publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)","type":"conference","language":[{"iso":"eng"}],"_id":"20531","department":[{"_id":"76"}],"user_id":"5786","year":"2019","citation":{"ieee":"L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” 2019.","chicago":"Luo, Linghui, Eric Bodden, and Johannes Späth. “A Qualitative Analysis of Android Taint-Analysis Results.” In <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>, 2019.","ama":"Luo L, Bodden E, Späth J. A Qualitative Analysis of Android Taint-Analysis Results. In: <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>. ; 2019.","mla":"Luo, Linghui, et al. “A Qualitative Analysis of Android Taint-Analysis Results.” <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>, 2019.","short":"L. Luo, E. Bodden, J. Späth, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","bibtex":"@inproceedings{Luo_Bodden_Späth_2019, title={A Qualitative Analysis of Android Taint-Analysis Results}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)}, author={Luo, Linghui and Bodden, Eric and Späth, Johannes}, year={2019} }","apa":"Luo, L., Bodden, E., &#38; Späth, J. (2019). A Qualitative Analysis of Android Taint-Analysis Results. <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>."},"title":"A Qualitative Analysis of Android Taint-Analysis Results","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19qualitative.pdf"}],"date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:25:40Z","author":[{"first_name":"Linghui","last_name":"Luo","full_name":"Luo, Linghui"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"}]},{"title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19swanAssist.pdf"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Goran","last_name":"Piskachev","full_name":"Piskachev, Goran"},{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"first_name":"Oshando","last_name":"Johnson","full_name":"Johnson, Oshando"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-27T10:37:17Z","year":"2019","citation":{"bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2019, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>, 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., &#38; Bodden, E. (2019). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>. ; 2019.","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>, 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2019."},"language":[{"iso":"eng"}],"_id":"20532","user_id":"5786","department":[{"_id":"76"}],"status":"public","type":"conference","publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track"},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20533","language":[{"iso":"eng"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"}],"date_created":"2020-11-27T10:48:38Z","date_updated":"2022-01-06T06:54:29Z","doi":"10.1109/TSE.2019.2948910","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","publication_identifier":{"issn":["2326-3881"]},"page":"1-1","citation":{"mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>"},"year":"2019"},{"citation":{"mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>, 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L. Nguyen Quang Do, E. Bodden, in: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., &#38; Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods. <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>.","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>, 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, and E. Bodden, “Codebase-Adaptive Detection of Security-Relevant Methods,” 2019.","ama":"Piskachev G, Nguyen Quang Do L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods. In: <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>. ; 2019."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/issta19swan.pdf"}],"title":"Codebase-Adaptive Detection of Security-Relevant Methods","author":[{"first_name":"Goran","last_name":"Piskachev","full_name":"Piskachev, Goran"},{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-27T10:49:33Z","date_updated":"2022-01-06T06:54:29Z","status":"public","publication":"ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20534"},{"date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:50:07Z","author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"},{"full_name":"Dolby, Julian","last_name":"Dolby","first_name":"Julian"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"title":"MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors","main_file_link":[{"url":"http://www.bodden.de/pubs/ldb19magpiebridge.pdf"}],"year":"2019","citation":{"ieee":"L. Luo, J. Dolby, and E. Bodden, “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors,” 2019.","chicago":"Luo, Linghui, Julian Dolby, and Eric Bodden. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2019.","ama":"Luo L, Dolby J, Bodden E. MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2019.","apa":"Luo, L., Dolby, J., &#38; Bodden, E. (2019). MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. <i>European Conference on Object-Oriented Programming (ECOOP)</i>.","bibtex":"@inproceedings{Luo_Dolby_Bodden_2019, title={MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Luo, Linghui and Dolby, Julian and Bodden, Eric}, year={2019} }","short":"L. Luo, J. Dolby, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2019.","mla":"Luo, Linghui, et al. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2019."},"_id":"20535","user_id":"5786","department":[{"_id":"76"}],"language":[{"iso":"eng"}],"type":"conference","publication":"European Conference on Object-Oriented Programming (ECOOP)","status":"public"},{"status":"public","type":"dissertation","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20536","citation":{"chicago":"Späth, Johannes. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","ieee":"J. Späth, <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","ama":"Späth J. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn; 2019.","short":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis, Universität Paderborn, 2019.","mla":"Späth, Johannes. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","bibtex":"@book{Späth_2019, title={Synchronized Pushdown Systems for Pointer and Data-Flow Analysis}, publisher={Universität Paderborn}, author={Späth, Johannes}, year={2019} }","apa":"Späth, J. (2019). <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/phdSpaeth.pdf"}],"title":"Synchronized Pushdown Systems for Pointer and Data-Flow Analysis","author":[{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"}],"date_created":"2020-11-27T10:50:55Z","supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:29Z"},{"status":"public","citation":{"bibtex":"@book{Piskachev_Nguyen_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, author={Piskachev, Goran and Nguyen, Lisa and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L. Nguyen, E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods, 2019.","mla":"Piskachev, Goran, et al. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>. 2019.","apa":"Piskachev, G., Nguyen, L., &#38; Bodden, E. (2019). <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>.","chicago":"Piskachev, Goran, Lisa Nguyen, and Eric Bodden. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>, 2019.","ieee":"G. Piskachev, L. Nguyen, and E. Bodden, <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>. 2019.","ama":"Piskachev G, Nguyen L, Bodden E. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>.; 2019."},"year":"2019","type":"report","language":[{"iso":"eng"}],"title":"Codebase-Adaptive Detection of Security-Relevant Methods","department":[{"_id":"76"}],"user_id":"5786","author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"last_name":"Nguyen","full_name":"Nguyen, Lisa","first_name":"Lisa"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-11-27T10:51:53Z","_id":"20537","date_updated":"2022-01-06T06:54:29Z"},{"type":"conference","publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","status":"public","user_id":"5786","department":[{"_id":"76"}],"_id":"20538","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"],"citation":{"ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>. ; 2019.","chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","ieee":"S. Albert Gorski Iii <i>et al.</i>, “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., &#38; Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>."},"year":"2019","author":[{"last_name":"Albert Gorski Iii","full_name":"Albert Gorski Iii, Sigmund","first_name":"Sigmund"},{"first_name":"Benjamin","full_name":"Andow, Benjamin","last_name":"Andow"},{"first_name":"Adwait","full_name":"Nadkarni, Adwait","last_name":"Nadkarni"},{"first_name":"Sunil","full_name":"Manandhar, Sunil","last_name":"Manandhar"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Bartel, Alexandre","last_name":"Bartel","first_name":"Alexandre"}],"date_created":"2020-11-27T10:52:59Z","date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware"},{"title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"doi":"10.1145/3290361","date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","date_created":"2020-11-27T10:53:57Z","author":[{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"volume":3,"year":"2019","citation":{"apa":"Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL), 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: <a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019): 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>."},"intvolume":"         3","page":"48:1-48:29","publication_identifier":{"issn":["2475-1421"]},"issue":"POPL","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"_id":"20539","user_id":"5786","department":[{"_id":"76"}],"status":"public","type":"journal_article","publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages"},{"type":"conference","publication":"International Conference on Software Architecture (ICSA 2019)","status":"public","_id":"20759","user_id":"5786","department":[{"_id":"76"},{"_id":"241"}],"language":[{"iso":"eng"}],"year":"2019","citation":{"apa":"Gerking, C., &#38; Schubert, D. (2019). Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. <i>International Conference on Software Architecture (ICSA 2019)</i>.","short":"C. Gerking, D. Schubert, in: International Conference on Software Architecture (ICSA 2019), 2019.","bibtex":"@inproceedings{Gerking_Schubert_2019, title={Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures}, booktitle={International Conference on Software Architecture (ICSA 2019)}, author={Gerking, Christopher and Schubert, David}, year={2019} }","mla":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019.","ama":"Gerking C, Schubert D. Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. In: <i>International Conference on Software Architecture (ICSA 2019)</i>. ; 2019.","ieee":"C. Gerking and D. Schubert, “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures,” 2019.","chicago":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” In <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019."},"date_updated":"2022-01-06T06:54:36Z","date_created":"2020-12-16T14:03:44Z","author":[{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"first_name":"David","full_name":"Schubert, David","id":"9106","last_name":"Schubert"}],"title":"Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures"},{"type":"preprint","publication":"arXiv:1903.09864","status":"public","abstract":[{"text":"A common statistical task lies in showing asymptotic normality of certain\nstatistics. In many of these situations, classical textbook results on weak\nconvergence theory suffice for the problem at hand. However, there are quite\nsome scenarios where stronger results are needed in order to establish an\nasymptotic normal approximation uniformly over a family of probability\nmeasures. In this note we collect some results in this direction. We restrict\nourselves to weak convergence in $\\mathbb R^d$ with continuous limit measures.","lang":"eng"}],"user_id":"76599","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"_id":"18018","citation":{"apa":"Bengs, V., &#38; Holzmann, H. (2019). Uniform approximation in classical weak convergence theory. <i>ArXiv:1903.09864</i>.","mla":"Bengs, Viktor, and Hajo Holzmann. “Uniform Approximation in Classical Weak Convergence Theory.” <i>ArXiv:1903.09864</i>, 2019.","bibtex":"@article{Bengs_Holzmann_2019, title={Uniform approximation in classical weak convergence theory}, journal={arXiv:1903.09864}, author={Bengs, Viktor and Holzmann, Hajo}, year={2019} }","short":"V. Bengs, H. Holzmann, ArXiv:1903.09864 (2019).","chicago":"Bengs, Viktor, and Hajo Holzmann. “Uniform Approximation in Classical Weak Convergence Theory.” <i>ArXiv:1903.09864</i>, 2019.","ieee":"V. Bengs and H. Holzmann, “Uniform approximation in classical weak convergence theory,” <i>arXiv:1903.09864</i>. 2019.","ama":"Bengs V, Holzmann H. Uniform approximation in classical weak convergence theory. <i>arXiv:190309864</i>. 2019."},"year":"2019","date_created":"2020-08-17T12:10:55Z","author":[{"first_name":"Viktor","last_name":"Bengs","full_name":"Bengs, Viktor"},{"first_name":"Hajo","full_name":"Holzmann, Hajo","last_name":"Holzmann"}],"date_updated":"2022-01-06T06:53:25Z","title":"Uniform approximation in classical weak convergence theory"},{"type":"conference","publication":"Vorausschau und Technologieplanung","status":"public","editor":[{"full_name":"Gausemeier, Jürgen","last_name":"Gausemeier","first_name":"Jürgen"},{"first_name":"Wilhelm","last_name":"Bauer","full_name":"Bauer, Wilhelm"},{"full_name":"Dumitrescu, Roman","last_name":"Dumitrescu","first_name":"Roman"}],"user_id":"21240","series_title":"Heinz Nixdorf Institut","department":[{"_id":"563"}],"_id":"22708","language":[{"iso":"ger"}],"citation":{"apa":"Eckelt, D., Bismark, R., Dumitrescu, R., Frank, M., Gausemeier, J., &#38; Reinhold, J. (2019). Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen. In J. Gausemeier, W. Bauer, R. Dumitrescu, &#38; Heinz Nixdorf Institut (Eds.), <i>Vorausschau und Technologieplanung</i> (Vol. 390, pp. 535–555).","short":"D. Eckelt, R. Bismark, R. Dumitrescu, M. Frank, J. Gausemeier, J. Reinhold, in: J. Gausemeier, W. Bauer, R. Dumitrescu, Heinz Nixdorf Institut (Eds.), Vorausschau und Technologieplanung, 2019, pp. 535–555.","bibtex":"@inproceedings{Eckelt_Bismark_Dumitrescu_Frank_Gausemeier_Reinhold_2019, series={Heinz Nixdorf Institut}, title={Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen}, volume={390}, booktitle={Vorausschau und Technologieplanung}, author={Eckelt, Daniel and Bismark, Ronny and Dumitrescu, Roman and Frank, Maximilian and Gausemeier, Jürgen and Reinhold, Jannik}, editor={Gausemeier, Jürgen and Bauer, Wilhelm and Dumitrescu, Roman and Heinz Nixdorf InstitutEditors}, year={2019}, pages={535–555}, collection={Heinz Nixdorf Institut} }","mla":"Eckelt, Daniel, et al. “Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen.” <i>Vorausschau und Technologieplanung</i>, edited by Jürgen Gausemeier et al., vol. 390, 2019, pp. 535–55.","ieee":"D. Eckelt, R. Bismark, R. Dumitrescu, M. Frank, J. Gausemeier, and J. Reinhold, “Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen,” in <i>Vorausschau und Technologieplanung</i>, 2019, vol. 390, pp. 535–555.","chicago":"Eckelt, Daniel, Ronny Bismark, Roman Dumitrescu, Maximilian Frank, Jürgen Gausemeier, and Jannik Reinhold. “Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen.” In <i>Vorausschau und Technologieplanung</i>, edited by Jürgen Gausemeier, Wilhelm Bauer, Roman Dumitrescu, and Heinz Nixdorf Institut, 390:535–55. Heinz Nixdorf Institut, 2019.","ama":"Eckelt D, Bismark R, Dumitrescu R, Frank M, Gausemeier J, Reinhold J. Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen. In: Gausemeier J, Bauer W, Dumitrescu R, Heinz Nixdorf Institut, eds. <i>Vorausschau und Technologieplanung</i>. Vol 390. Heinz Nixdorf Institut. ; 2019:535-555."},"page":"535-555","intvolume":"       390","corporate_editor":["Heinz Nixdorf Institut"],"year":"2019","date_created":"2021-07-12T12:36:07Z","author":[{"full_name":"Eckelt, Daniel","last_name":"Eckelt","first_name":"Daniel"},{"full_name":"Bismark, Ronny","last_name":"Bismark","first_name":"Ronny"},{"last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman","first_name":"Roman"},{"full_name":"Frank, Maximilian","last_name":"Frank","first_name":"Maximilian"},{"first_name":"Jürgen","full_name":"Gausemeier, Jürgen","last_name":"Gausemeier"},{"id":"33669","full_name":"Reinhold, Jannik","last_name":"Reinhold","first_name":"Jannik"}],"volume":390,"date_updated":"2022-01-06T06:55:39Z","title":"Strategische Planung des Wertschöpfungsbeitrags von HELLA für automatisiertes Fahren von morgen"},{"citation":{"short":"R. Dumitrescu, S. Japs, L. Kaiser, R. Rasor, in: TdSE 2019, Garching, 2019.","bibtex":"@inproceedings{Dumitrescu_Japs_Kaiser_Rasor_2019, place={Garching}, title={Model Checking of Integratively Designed Product and Production Systems}, booktitle={TdSE 2019}, author={Dumitrescu, Roman and Japs, Sergej and Kaiser, Lydia and Rasor, Rik}, year={2019} }","mla":"Dumitrescu, Roman, et al. “Model Checking of Integratively Designed Product and Production Systems.” <i>TdSE 2019</i>, 2019.","apa":"Dumitrescu, R., Japs, S., Kaiser, L., &#38; Rasor, R. (2019). Model Checking of Integratively Designed Product and Production Systems. In <i>TdSE 2019</i>. Garching.","ama":"Dumitrescu R, Japs S, Kaiser L, Rasor R. Model Checking of Integratively Designed Product and Production Systems. In: <i>TdSE 2019</i>. Garching; 2019.","ieee":"R. Dumitrescu, S. Japs, L. Kaiser, and R. Rasor, “Model Checking of Integratively Designed Product and Production Systems,” in <i>TdSE 2019</i>, 2019.","chicago":"Dumitrescu, Roman, Sergej Japs, Lydia Kaiser, and Rik Rasor. “Model Checking of Integratively Designed Product and Production Systems.” In <i>TdSE 2019</i>. Garching, 2019."},"year":"2019","place":"Garching","title":"Model Checking of Integratively Designed Product and Production Systems","date_created":"2021-07-12T12:44:13Z","author":[{"first_name":"Roman","last_name":"Dumitrescu","full_name":"Dumitrescu, Roman","id":"16190"},{"full_name":"Japs, Sergej","last_name":"Japs","first_name":"Sergej"},{"full_name":"Kaiser, Lydia","last_name":"Kaiser","first_name":"Lydia"},{"last_name":"Rasor","full_name":"Rasor, Rik","first_name":"Rik"}],"date_updated":"2022-01-06T06:55:39Z","status":"public","type":"conference","publication":"TdSE 2019","language":[{"iso":"eng"}],"user_id":"21240","department":[{"_id":"563"}],"_id":"22709"},{"_id":"22710","user_id":"21240","department":[{"_id":"563"}],"language":[{"iso":"eng"}],"type":"conference","publication":"15. Symposium für Vorausschau und Technologieplanung","editor":[{"full_name":"Gausemeier, Jürgen","last_name":"Gausemeier","first_name":"Jürgen"},{"first_name":"Wilhelm","last_name":"Bauer","full_name":"Bauer, Wilhelm"},{"last_name":"Dumitrescu","full_name":"Dumitrescu, Roman","first_name":"Roman"}],"status":"public","date_updated":"2022-01-06T06:55:39Z","date_created":"2021-07-12T12:50:33Z","author":[{"last_name":"Albers","full_name":"Albers, Alexander","first_name":"Alexander"},{"first_name":"Kai Fabian","last_name":"Ellermann","full_name":"Ellermann, Kai Fabian"},{"first_name":"Arno","full_name":"Kühn, Arno","last_name":"Kühn"},{"first_name":"Roman","last_name":"Dumitrescu","full_name":"Dumitrescu, Roman","id":"16190"}],"volume":390,"title":"Entwicklung einer Suchstrategie für ein medienbasiertes Technologiesanning am Beispiel der Antriebstechnik","year":"2019","place":"Berlin","citation":{"chicago":"Albers, Alexander, Kai Fabian Ellermann, Arno Kühn, and Roman Dumitrescu. “Entwicklung Einer Suchstrategie Für Ein Medienbasiertes Technologiesanning Am Beispiel Der Antriebstechnik.” In <i>15. Symposium Für Vorausschau Und Technologieplanung</i>, edited by Jürgen Gausemeier, Wilhelm Bauer, Roman Dumitrescu, and Heinz Nixdorf Institut, 390:277–91. Berlin, 2019.","ieee":"A. Albers, K. F. Ellermann, A. Kühn, and R. Dumitrescu, “Entwicklung einer Suchstrategie für ein medienbasiertes Technologiesanning am Beispiel der Antriebstechnik,” in <i>15. Symposium für Vorausschau und Technologieplanung</i>, 2019, vol. 390, pp. 277–291.","ama":"Albers A, Ellermann KF, Kühn A, Dumitrescu R. Entwicklung einer Suchstrategie für ein medienbasiertes Technologiesanning am Beispiel der Antriebstechnik. In: Gausemeier J, Bauer W, Dumitrescu R, Heinz Nixdorf Institut, eds. <i>15. Symposium Für Vorausschau Und Technologieplanung</i>. Vol 390. Berlin; 2019:277-291.","mla":"Albers, Alexander, et al. “Entwicklung Einer Suchstrategie Für Ein Medienbasiertes Technologiesanning Am Beispiel Der Antriebstechnik.” <i>15. Symposium Für Vorausschau Und Technologieplanung</i>, edited by Jürgen Gausemeier et al., vol. 390, 2019, pp. 277–91.","bibtex":"@inproceedings{Albers_Ellermann_Kühn_Dumitrescu_2019, place={Berlin}, title={Entwicklung einer Suchstrategie für ein medienbasiertes Technologiesanning am Beispiel der Antriebstechnik}, volume={390}, booktitle={15. Symposium für Vorausschau und Technologieplanung}, author={Albers, Alexander and Ellermann, Kai Fabian and Kühn, Arno and Dumitrescu, Roman}, editor={Gausemeier, Jürgen and Bauer, Wilhelm and Dumitrescu, Roman and Heinz Nixdorf InstitutEditors}, year={2019}, pages={277–291} }","short":"A. Albers, K.F. Ellermann, A. Kühn, R. Dumitrescu, in: J. Gausemeier, W. Bauer, R. Dumitrescu, Heinz Nixdorf Institut (Eds.), 15. Symposium Für Vorausschau Und Technologieplanung, Berlin, 2019, pp. 277–291.","apa":"Albers, A., Ellermann, K. F., Kühn, A., &#38; Dumitrescu, R. (2019). Entwicklung einer Suchstrategie für ein medienbasiertes Technologiesanning am Beispiel der Antriebstechnik. In J. Gausemeier, W. Bauer, R. Dumitrescu, &#38; Heinz Nixdorf Institut (Eds.), <i>15. Symposium für Vorausschau und Technologieplanung</i> (Vol. 390, pp. 277–291). Berlin."},"page":"277-291","corporate_editor":["Heinz Nixdorf Institut"],"intvolume":"       390"}]
