[{"issue":"18","publication_identifier":{"issn":["2076-3417"]},"intvolume":"        12","page":"9094","citation":{"chicago":"Clever, Lena, Janina Susanne Pohl, Jakob Bossek, Pascal Kerschke, and Heike Trautmann. “Process-Oriented Stream Classification Pipeline: A Literature Review.” <i>Applied Sciences</i> 12, no. 18 (2022): 9094. <a href=\"https://doi.org/10.3390/app12189094\">https://doi.org/10.3390/app12189094</a>.","ieee":"L. Clever, J. S. Pohl, J. Bossek, P. Kerschke, and H. Trautmann, “Process-Oriented Stream Classification Pipeline: A Literature Review,” <i>Applied Sciences</i>, vol. 12, no. 18, p. 9094, 2022, doi: <a href=\"https://doi.org/10.3390/app12189094\">10.3390/app12189094</a>.","ama":"Clever L, Pohl JS, Bossek J, Kerschke P, Trautmann H. Process-Oriented Stream Classification Pipeline: A Literature Review. <i>Applied Sciences</i>. 2022;12(18):9094. doi:<a href=\"https://doi.org/10.3390/app12189094\">10.3390/app12189094</a>","mla":"Clever, Lena, et al. “Process-Oriented Stream Classification Pipeline: A Literature Review.” <i>Applied Sciences</i>, vol. 12, no. 18, {Multidisciplinary Digital Publishing Institute}, 2022, p. 9094, doi:<a href=\"https://doi.org/10.3390/app12189094\">10.3390/app12189094</a>.","bibtex":"@article{Clever_Pohl_Bossek_Kerschke_Trautmann_2022, title={Process-Oriented Stream Classification Pipeline: A Literature Review}, volume={12}, DOI={<a href=\"https://doi.org/10.3390/app12189094\">10.3390/app12189094</a>}, number={18}, journal={Applied Sciences}, publisher={{Multidisciplinary Digital Publishing Institute}}, author={Clever, Lena and Pohl, Janina Susanne and Bossek, Jakob and Kerschke, Pascal and Trautmann, Heike}, year={2022}, pages={9094} }","short":"L. Clever, J.S. Pohl, J. Bossek, P. Kerschke, H. Trautmann, Applied Sciences 12 (2022) 9094.","apa":"Clever, L., Pohl, J. S., Bossek, J., Kerschke, P., &#38; Trautmann, H. (2022). Process-Oriented Stream Classification Pipeline: A Literature Review. <i>Applied Sciences</i>, <i>12</i>(18), 9094. <a href=\"https://doi.org/10.3390/app12189094\">https://doi.org/10.3390/app12189094</a>"},"year":"2022","volume":12,"author":[{"first_name":"Lena","last_name":"Clever","full_name":"Clever, Lena"},{"full_name":"Pohl, Janina Susanne","last_name":"Pohl","first_name":"Janina Susanne"},{"full_name":"Bossek, Jakob","id":"102979","orcid":"0000-0002-4121-4668","last_name":"Bossek","first_name":"Jakob"},{"full_name":"Kerschke, Pascal","last_name":"Kerschke","first_name":"Pascal"},{"full_name":"Trautmann, Heike","last_name":"Trautmann","first_name":"Heike"}],"date_created":"2023-11-14T15:58:57Z","publisher":"{Multidisciplinary Digital Publishing Institute}","date_updated":"2023-12-13T10:50:56Z","doi":"10.3390/app12189094","title":"Process-Oriented Stream Classification Pipeline: A Literature Review","publication":"Applied Sciences","type":"journal_article","status":"public","abstract":[{"lang":"eng","text":"Due to the rise of continuous data-generating applications, analyzing data streams has gained increasing attention over the past decades. A core research area in stream data is stream classification, which categorizes or detects data points within an evolving stream of observations. Areas of stream classification are diverse\\textemdash ranging, e.g., from monitoring sensor data to analyzing a wide range of (social) media applications. Research in stream classification is related to developing methods that adapt to the changing and potentially volatile data stream. It focuses on individual aspects of the stream classification pipeline, e.g., designing suitable algorithm architectures, an efficient train and test procedure, or detecting so-called concept drifts. As a result of the many different research questions and strands, the field is challenging to grasp, especially for beginners. This survey explores, summarizes, and categorizes work within the domain of stream classification and identifies core research threads over the past few years. It is structured based on the stream classification process to facilitate coordination within this complex topic, including common application scenarios and benchmarking data sets. Thus, both newcomers to the field and experts who want to widen their scope can gain (additional) insight into this research area and find starting points and pointers to more in-depth literature on specific issues and research directions in the field."}],"department":[{"_id":"819"}],"user_id":"102979","_id":"48878","language":[{"iso":"eng"}],"keyword":["big data","data mining","data stream analysis","machine learning","stream classification","supervised learning"]},{"title":"On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems","doi":"10.1145/3520304.3528998","date_updated":"2023-12-13T10:50:24Z","publisher":"Association for Computing Machinery","author":[{"full_name":"Rook, Jeroen","last_name":"Rook","first_name":"Jeroen"},{"first_name":"Heike","last_name":"Trautmann","full_name":"Trautmann, Heike"},{"first_name":"Jakob","orcid":"0000-0002-4121-4668","last_name":"Bossek","id":"102979","full_name":"Bossek, Jakob"},{"first_name":"Christian","full_name":"Grimme, Christian","last_name":"Grimme"}],"date_created":"2023-11-14T15:59:00Z","year":"2022","place":"New York, NY, USA","citation":{"ieee":"J. Rook, H. Trautmann, J. Bossek, and C. Grimme, “On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 2022, pp. 356–359, doi: <a href=\"https://doi.org/10.1145/3520304.3528998\">10.1145/3520304.3528998</a>.","chicago":"Rook, Jeroen, Heike Trautmann, Jakob Bossek, and Christian Grimme. “On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 356–359. GECCO’22. New York, NY, USA: Association for Computing Machinery, 2022. <a href=\"https://doi.org/10.1145/3520304.3528998\">https://doi.org/10.1145/3520304.3528998</a>.","ama":"Rook J, Trautmann H, Bossek J, Grimme C. On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO’22. Association for Computing Machinery; 2022:356–359. doi:<a href=\"https://doi.org/10.1145/3520304.3528998\">10.1145/3520304.3528998</a>","mla":"Rook, Jeroen, et al. “On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems.” <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery, 2022, pp. 356–359, doi:<a href=\"https://doi.org/10.1145/3520304.3528998\">10.1145/3520304.3528998</a>.","short":"J. Rook, H. Trautmann, J. Bossek, C. Grimme, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, New York, NY, USA, 2022, pp. 356–359.","bibtex":"@inproceedings{Rook_Trautmann_Bossek_Grimme_2022, place={New York, NY, USA}, series={GECCO’22}, title={On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems}, DOI={<a href=\"https://doi.org/10.1145/3520304.3528998\">10.1145/3520304.3528998</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery}, author={Rook, Jeroen and Trautmann, Heike and Bossek, Jakob and Grimme, Christian}, year={2022}, pages={356–359}, collection={GECCO’22} }","apa":"Rook, J., Trautmann, H., Bossek, J., &#38; Grimme, C. (2022). On the Potential of Automated Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 356–359. <a href=\"https://doi.org/10.1145/3520304.3528998\">https://doi.org/10.1145/3520304.3528998</a>"},"page":"356–359","publication_identifier":{"isbn":["978-1-4503-9268-6"]},"keyword":["configuration","multi-modality","multi-objective optimization"],"extern":"1","language":[{"iso":"eng"}],"_id":"48896","user_id":"102979","series_title":"GECCO’22","department":[{"_id":"819"}],"abstract":[{"text":"Hardness of Multi-Objective (MO) continuous optimization problems results from an interplay of various problem characteristics, e. g. the degree of multi-modality. We present a benchmark study of classical and diversity focused optimizers on multi-modal MO problems based on automated algorithm configuration. We show the large effect of the latter and investigate the trade-off between convergence in objective space and diversity in decision space.","lang":"eng"}],"status":"public","type":"conference","publication":"Proceedings of the Genetic and Evolutionary Computation Conference Companion"},{"user_id":"15504","department":[{"_id":"819"}],"_id":"52532","language":[{"iso":"eng"}],"type":"journal_article","publication":"Comput. Stat.","status":"public","date_created":"2024-03-13T09:59:21Z","author":[{"first_name":"Agatha S.","last_name":"Rodrigues","full_name":"Rodrigues, Agatha S."},{"first_name":"Pascal","full_name":"Kerschke, Pascal","last_name":"Kerschke"},{"full_name":"Pereira, Carlos Alberto De Bragança","last_name":"Pereira","first_name":"Carlos Alberto De Bragança"},{"last_name":"Trautmann","orcid":"0000-0002-9788-8282","id":"100740","full_name":"Trautmann, Heike","first_name":"Heike"},{"full_name":"Wagner, Carolin","last_name":"Wagner","first_name":"Carolin"},{"full_name":"Hellingrath, Bernd","last_name":"Hellingrath","first_name":"Bernd"},{"first_name":"Adriano","full_name":"Polpo, Adriano","last_name":"Polpo"}],"volume":37,"date_updated":"2024-03-13T10:28:01Z","doi":"10.1007/S00180-021-01124-0","title":"Estimation of component reliability from superposed renewal processes by means of latent variables","issue":"1","citation":{"apa":"Rodrigues, A. S., Kerschke, P., Pereira, C. A. D. B., Trautmann, H., Wagner, C., Hellingrath, B., &#38; Polpo, A. (2022). Estimation of component reliability from superposed renewal processes by means of latent variables. <i>Comput. Stat.</i>, <i>37</i>(1), 355–379. <a href=\"https://doi.org/10.1007/S00180-021-01124-0\">https://doi.org/10.1007/S00180-021-01124-0</a>","short":"A.S. Rodrigues, P. Kerschke, C.A.D.B. Pereira, H. Trautmann, C. Wagner, B. Hellingrath, A. Polpo, Comput. Stat. 37 (2022) 355–379.","mla":"Rodrigues, Agatha S., et al. “Estimation of Component Reliability from Superposed Renewal Processes by Means of Latent Variables.” <i>Comput. Stat.</i>, vol. 37, no. 1, 2022, pp. 355–379, doi:<a href=\"https://doi.org/10.1007/S00180-021-01124-0\">10.1007/S00180-021-01124-0</a>.","bibtex":"@article{Rodrigues_Kerschke_Pereira_Trautmann_Wagner_Hellingrath_Polpo_2022, title={Estimation of component reliability from superposed renewal processes by means of latent variables}, volume={37}, DOI={<a href=\"https://doi.org/10.1007/S00180-021-01124-0\">10.1007/S00180-021-01124-0</a>}, number={1}, journal={Comput. Stat.}, author={Rodrigues, Agatha S. and Kerschke, Pascal and Pereira, Carlos Alberto De Bragança and Trautmann, Heike and Wagner, Carolin and Hellingrath, Bernd and Polpo, Adriano}, year={2022}, pages={355–379} }","ama":"Rodrigues AS, Kerschke P, Pereira CADB, et al. Estimation of component reliability from superposed renewal processes by means of latent variables. <i>Comput Stat</i>. 2022;37(1):355–379. doi:<a href=\"https://doi.org/10.1007/S00180-021-01124-0\">10.1007/S00180-021-01124-0</a>","chicago":"Rodrigues, Agatha S., Pascal Kerschke, Carlos Alberto De Bragança Pereira, Heike Trautmann, Carolin Wagner, Bernd Hellingrath, and Adriano Polpo. “Estimation of Component Reliability from Superposed Renewal Processes by Means of Latent Variables.” <i>Comput. Stat.</i> 37, no. 1 (2022): 355–379. <a href=\"https://doi.org/10.1007/S00180-021-01124-0\">https://doi.org/10.1007/S00180-021-01124-0</a>.","ieee":"A. S. Rodrigues <i>et al.</i>, “Estimation of component reliability from superposed renewal processes by means of latent variables,” <i>Comput. Stat.</i>, vol. 37, no. 1, pp. 355–379, 2022, doi: <a href=\"https://doi.org/10.1007/S00180-021-01124-0\">10.1007/S00180-021-01124-0</a>."},"intvolume":"        37","page":"355–379","year":"2022"},{"status":"public","type":"journal_article","publication":"KI - Künstliche Intelligenz","language":[{"iso":"eng"}],"keyword":["Artificial Intelligence"],"user_id":"9503","department":[{"_id":"888"}],"_id":"52862","citation":{"bibtex":"@article{Turhan_2022, title={A Double Take at Conferences: The Hybrid Format}, volume={36}, DOI={<a href=\"https://doi.org/10.1007/s13218-022-00758-6\">10.1007/s13218-022-00758-6</a>}, number={1}, journal={KI - Künstliche Intelligenz}, publisher={Springer Science and Business Media LLC}, author={Turhan, Anni-Yasmin}, year={2022}, pages={1–4} }","short":"A.-Y. Turhan, KI - Künstliche Intelligenz 36 (2022) 1–4.","mla":"Turhan, Anni-Yasmin. “A Double Take at Conferences: The Hybrid Format.” <i>KI - Künstliche Intelligenz</i>, vol. 36, no. 1, Springer Science and Business Media LLC, 2022, pp. 1–4, doi:<a href=\"https://doi.org/10.1007/s13218-022-00758-6\">10.1007/s13218-022-00758-6</a>.","apa":"Turhan, A.-Y. (2022). A Double Take at Conferences: The Hybrid Format. <i>KI - Künstliche Intelligenz</i>, <i>36</i>(1), 1–4. <a href=\"https://doi.org/10.1007/s13218-022-00758-6\">https://doi.org/10.1007/s13218-022-00758-6</a>","ieee":"A.-Y. Turhan, “A Double Take at Conferences: The Hybrid Format,” <i>KI - Künstliche Intelligenz</i>, vol. 36, no. 1, pp. 1–4, 2022, doi: <a href=\"https://doi.org/10.1007/s13218-022-00758-6\">10.1007/s13218-022-00758-6</a>.","chicago":"Turhan, Anni-Yasmin. “A Double Take at Conferences: The Hybrid Format.” <i>KI - Künstliche Intelligenz</i> 36, no. 1 (2022): 1–4. <a href=\"https://doi.org/10.1007/s13218-022-00758-6\">https://doi.org/10.1007/s13218-022-00758-6</a>.","ama":"Turhan A-Y. A Double Take at Conferences: The Hybrid Format. <i>KI - Künstliche Intelligenz</i>. 2022;36(1):1-4. doi:<a href=\"https://doi.org/10.1007/s13218-022-00758-6\">10.1007/s13218-022-00758-6</a>"},"intvolume":"        36","page":"1-4","year":"2022","issue":"1","publication_status":"published","publication_identifier":{"issn":["0933-1875","1610-1987"]},"doi":"10.1007/s13218-022-00758-6","title":"A Double Take at Conferences: The Hybrid Format","author":[{"first_name":"Anni-Yasmin","id":"104470","full_name":"Turhan, Anni-Yasmin","last_name":"Turhan"}],"date_created":"2024-03-25T14:00:30Z","volume":36,"date_updated":"2024-03-26T10:52:36Z","publisher":"Springer Science and Business Media LLC"},{"editor":[{"first_name":"Ofer","last_name":"Arieli","full_name":"Arieli, Ofer"},{"first_name":"Giovanni","last_name":"Casini","full_name":"Casini, Giovanni"},{"first_name":"Laura","last_name":"Giordano","full_name":"Giordano, Laura"}],"status":"public","type":"conference","publication":"Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022","language":[{"iso":"eng"}],"_id":"52923","series_title":"CEUR Workshop Proceedings","user_id":"9503","department":[{"_id":"888"}],"year":"2022","citation":{"chicago":"Camargo e Souza Câmara, Igor de, and Anni-Yasmin Turhan. “Rational Defeasible Subsumption in DLs with Nested Quantifiers: The Case of ELI\\(\\perp\\).” In <i>Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022</i>, edited by Ofer Arieli, Giovanni Casini, and Laura Giordano, 3197:159–162. CEUR Workshop Proceedings. CEUR-WS.org, 2022.","ieee":"I. de Camargo e Souza Câmara and A.-Y. Turhan, “Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI\\(\\perp\\),” in <i>Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022</i>, 2022, vol. 3197, pp. 159–162.","ama":"de Camargo e Souza Câmara I, Turhan A-Y. Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI\\(\\perp\\). In: Arieli O, Casini G, Giordano L, eds. <i>Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022</i>. Vol 3197. CEUR Workshop Proceedings. CEUR-WS.org; 2022:159–162.","apa":"de Camargo e Souza Câmara, I., &#38; Turhan, A.-Y. (2022). Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI\\(\\perp\\). In O. Arieli, G. Casini, &#38; L. Giordano (Eds.), <i>Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022</i> (Vol. 3197, pp. 159–162). CEUR-WS.org.","short":"I. de Camargo e Souza Câmara, A.-Y. Turhan, in: O. Arieli, G. Casini, L. Giordano (Eds.), Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022, CEUR-WS.org, 2022, pp. 159–162.","bibtex":"@inproceedings{de Camargo e Souza Câmara_Turhan_2022, series={CEUR Workshop Proceedings}, title={Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI\\(\\perp\\)}, volume={3197}, booktitle={Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022}, publisher={CEUR-WS.org}, author={de Camargo e Souza Câmara, Igor and Turhan, Anni-Yasmin}, editor={Arieli, Ofer and Casini, Giovanni and Giordano, Laura}, year={2022}, pages={159–162}, collection={CEUR Workshop Proceedings} }","mla":"de Camargo e Souza Câmara, Igor, and Anni-Yasmin Turhan. “Rational Defeasible Subsumption in DLs with Nested Quantifiers: The Case of ELI\\(\\perp\\).” <i>Proceedings of the 20th International Workshop on Non-Monotonic Reasoning, NMR 2022, Part of the Federated Logic Conference (FLoC 2022), Haifa, Israel, August 7-9, 2022</i>, edited by Ofer Arieli et al., vol. 3197, CEUR-WS.org, 2022, pp. 159–162."},"intvolume":"      3197","page":"159–162","title":"Rational Defeasible Subsumption in DLs with Nested Quantifiers: the Case of ELI\\(\\perp\\)","date_updated":"2024-03-26T10:56:19Z","publisher":"CEUR-WS.org","date_created":"2024-03-26T10:54:06Z","author":[{"last_name":"de Camargo e Souza Câmara","full_name":"de Camargo e Souza Câmara, Igor","first_name":"Igor"},{"first_name":"Anni-Yasmin","last_name":"Turhan","full_name":"Turhan, Anni-Yasmin","id":"104470"}],"volume":3197},{"status":"public","editor":[{"first_name":"Guido","last_name":"Governatori","full_name":"Governatori, Guido"},{"last_name":"Turhan","id":"104470","full_name":"Turhan, Anni-Yasmin","first_name":"Anni-Yasmin"}],"type":"conference_editor","language":[{"iso":"eng"}],"department":[{"_id":"888"}],"user_id":"9503","series_title":"Lecture Notes in Computer Science","_id":"52925","intvolume":"     13752","citation":{"apa":"Governatori, G., &#38; Turhan, A.-Y. (Eds.). (2022). <i>Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings</i> (Vol. 13752). Springer. <a href=\"https://doi.org/10.1007/978-3-031-21541-4\">https://doi.org/10.1007/978-3-031-21541-4</a>","short":"G. Governatori, A.-Y. Turhan, eds., Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings, Springer, 2022.","bibtex":"@book{Governatori_Turhan_2022, series={Lecture Notes in Computer Science}, title={Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings}, volume={13752}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-21541-4\">10.1007/978-3-031-21541-4</a>}, publisher={Springer}, year={2022}, collection={Lecture Notes in Computer Science} }","mla":"Governatori, Guido, and Anni-Yasmin Turhan, editors. <i>Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings</i>. Springer, 2022, doi:<a href=\"https://doi.org/10.1007/978-3-031-21541-4\">10.1007/978-3-031-21541-4</a>.","ama":"Governatori G, Turhan A-Y, eds. <i>Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings</i>. Vol 13752. Springer; 2022. doi:<a href=\"https://doi.org/10.1007/978-3-031-21541-4\">10.1007/978-3-031-21541-4</a>","chicago":"Governatori, Guido, and Anni-Yasmin Turhan, eds. <i>Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings</i>. Vol. 13752. Lecture Notes in Computer Science. Springer, 2022. <a href=\"https://doi.org/10.1007/978-3-031-21541-4\">https://doi.org/10.1007/978-3-031-21541-4</a>.","ieee":"G. Governatori and A.-Y. Turhan, Eds., <i>Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings</i>, vol. 13752. Springer, 2022."},"year":"2022","publication_identifier":{"isbn":["978-3-031-21540-7"]},"doi":"10.1007/978-3-031-21541-4","title":"Rules and Reasoning - 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26-28, 2022, Proceedings","volume":13752,"date_created":"2024-03-26T10:54:33Z","date_updated":"2024-03-26T10:56:14Z","publisher":"Springer"},{"title":"\"I don' know why I check this...\" - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks","author":[{"last_name":"Mayer","full_name":"Mayer, Peter","first_name":"Peter"},{"last_name":"Poddebniak","full_name":"Poddebniak, Damian","first_name":"Damian"},{"first_name":"Konstantin","last_name":"Fischer","full_name":"Fischer, Konstantin"},{"first_name":"Marcus","last_name":"Brinkmann","full_name":"Brinkmann, Marcus"},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"},{"full_name":"Sasse, Angela","last_name":"Sasse","first_name":"Angela"},{"last_name":"Schinzel","full_name":"Schinzel, Sebastian","first_name":"Sebastian"},{"last_name":"Volkamer","full_name":"Volkamer, Melanie","first_name":"Melanie"}],"date_created":"2022-08-03T11:02:10Z","date_updated":"2024-04-02T12:19:28Z","publisher":"USENIX Association","citation":{"chicago":"Mayer, Peter, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, Angela Sasse, Sebastian Schinzel, and Melanie Volkamer. “‘I Don’ Know Why I Check This...’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks.” In <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>, 77–96. Boston, MA: USENIX Association, 2022.","ieee":"P. Mayer <i>et al.</i>, “‘I don’ know why I check this...’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks,” in <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>, 2022, pp. 77–96.","ama":"Mayer P, Poddebniak D, Fischer K, et al. “I don’ know why I check this...” - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks. In: <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>. USENIX Association; 2022:77–96.","bibtex":"@inproceedings{Mayer_Poddebniak_Fischer_Brinkmann_Somorovsky_Sasse_Schinzel_Volkamer_2022, place={Boston, MA}, title={“I don’ know why I check this...” - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks}, booktitle={Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)}, publisher={USENIX Association}, author={Mayer, Peter and Poddebniak, Damian and Fischer, Konstantin and Brinkmann, Marcus and Somorovsky, Juraj and Sasse, Angela and Schinzel, Sebastian and Volkamer, Melanie}, year={2022}, pages={77–96} }","short":"P. Mayer, D. Poddebniak, K. Fischer, M. Brinkmann, J. Somorovsky, A. Sasse, S. Schinzel, M. Volkamer, in: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), USENIX Association, Boston, MA, 2022, pp. 77–96.","mla":"Mayer, Peter, et al. “‘I Don’ Know Why I Check This...’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks.” <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>, USENIX Association, 2022, pp. 77–96.","apa":"Mayer, P., Poddebniak, D., Fischer, K., Brinkmann, M., Somorovsky, J., Sasse, A., Schinzel, S., &#38; Volkamer, M. (2022). “I don’ know why I check this...” - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks. <i>Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</i>, 77–96."},"page":"77–96","year":"2022","place":"Boston, MA","publication_identifier":{"isbn":["978-1-939133-30-4"]},"language":[{"iso":"eng"}],"user_id":"83504","department":[{"_id":"632"}],"_id":"32572","status":"public","type":"conference","publication":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)"},{"language":[{"iso":"eng"}],"user_id":"83504","department":[{"_id":"632"}],"_id":"32573","status":"public","type":"conference","publication":"31st USENIX Security Symposium (USENIX Security 22)","title":"TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries","author":[{"last_name":"Maehren","full_name":"Maehren, Marcel","first_name":"Marcel"},{"full_name":"Nieting, Philipp","last_name":"Nieting","first_name":"Philipp"},{"orcid":"0009-0006-1172-1665","last_name":"Hebrok","full_name":"Hebrok, Sven Niclas","id":"55616","first_name":"Sven Niclas"},{"first_name":"Robert","full_name":"Merget, Robert","last_name":"Merget"},{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2022-08-03T11:03:30Z","publisher":"USENIX Association","date_updated":"2024-04-02T12:19:45Z","citation":{"ama":"Maehren M, Nieting P, Hebrok SN, Merget R, Somorovsky J, Schwenk J. TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. In: <i>31st USENIX Security Symposium (USENIX Security 22)</i>. USENIX Association; 2022.","ieee":"M. Maehren, P. Nieting, S. N. Hebrok, R. Merget, J. Somorovsky, and J. Schwenk, “TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries,” 2022.","chicago":"Maehren, Marcel, Philipp Nieting, Sven Niclas Hebrok, Robert Merget, Juraj Somorovsky, and Jörg Schwenk. “TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.” In <i>31st USENIX Security Symposium (USENIX Security 22)</i>. Boston, MA: USENIX Association, 2022.","mla":"Maehren, Marcel, et al. “TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.” <i>31st USENIX Security Symposium (USENIX Security 22)</i>, USENIX Association, 2022.","short":"M. Maehren, P. Nieting, S.N. Hebrok, R. Merget, J. Somorovsky, J. Schwenk, in: 31st USENIX Security Symposium (USENIX Security 22), USENIX Association, Boston, MA, 2022.","bibtex":"@inproceedings{Maehren_Nieting_Hebrok_Merget_Somorovsky_Schwenk_2022, place={Boston, MA}, title={TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries}, booktitle={31st USENIX Security Symposium (USENIX Security 22)}, publisher={USENIX Association}, author={Maehren, Marcel and Nieting, Philipp and Hebrok, Sven Niclas and Merget, Robert and Somorovsky, Juraj and Schwenk, Jörg}, year={2022} }","apa":"Maehren, M., Nieting, P., Hebrok, S. N., Merget, R., Somorovsky, J., &#38; Schwenk, J. (2022). TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. <i>31st USENIX Security Symposium (USENIX Security 22)</i>."},"year":"2022","place":"Boston, MA"},{"publication_status":"published","publication_identifier":{"isbn":["9783031069802","9783031069819"],"issn":["0302-9743","1611-3349"]},"related_material":{"link":[{"relation":"confirmation","url":"https://link.springer.com/chapter/10.1007/978-3-031-06981-9_14"}]},"place":"Cham","year":"2022","citation":{"bibtex":"@inbook{KOUAGOU_Heindorf_Demir_Ngonga Ngomo_2022, place={Cham}, title={Learning Concept Lengths Accelerates Concept Learning in ALC}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-06981-9_14\">10.1007/978-3-031-06981-9_14</a>}, booktitle={The Semantic Web}, publisher={Springer International Publishing}, author={KOUAGOU, N’Dah Jean and Heindorf, Stefan and Demir, Caglar and Ngonga Ngomo, Axel-Cyrille}, year={2022} }","mla":"KOUAGOU, N’Dah Jean, et al. “Learning Concept Lengths Accelerates Concept Learning in ALC.” <i>The Semantic Web</i>, Springer International Publishing, 2022, doi:<a href=\"https://doi.org/10.1007/978-3-031-06981-9_14\">10.1007/978-3-031-06981-9_14</a>.","short":"N.J. KOUAGOU, S. Heindorf, C. Demir, A.-C. Ngonga Ngomo, in: The Semantic Web, Springer International Publishing, Cham, 2022.","apa":"KOUAGOU, N. J., Heindorf, S., Demir, C., &#38; Ngonga Ngomo, A.-C. (2022). Learning Concept Lengths Accelerates Concept Learning in ALC. In <i>The Semantic Web</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-031-06981-9_14\">https://doi.org/10.1007/978-3-031-06981-9_14</a>","ama":"KOUAGOU NJ, Heindorf S, Demir C, Ngonga Ngomo A-C. Learning Concept Lengths Accelerates Concept Learning in ALC. In: <i>The Semantic Web</i>. Springer International Publishing; 2022. doi:<a href=\"https://doi.org/10.1007/978-3-031-06981-9_14\">10.1007/978-3-031-06981-9_14</a>","ieee":"N. J. KOUAGOU, S. Heindorf, C. Demir, and A.-C. Ngonga Ngomo, “Learning Concept Lengths Accelerates Concept Learning in ALC,” in <i>The Semantic Web</i>, Cham: Springer International Publishing, 2022.","chicago":"KOUAGOU, N’Dah Jean, Stefan Heindorf, Caglar Demir, and Axel-Cyrille Ngonga Ngomo. “Learning Concept Lengths Accelerates Concept Learning in ALC.” In <i>The Semantic Web</i>. Cham: Springer International Publishing, 2022. <a href=\"https://doi.org/10.1007/978-3-031-06981-9_14\">https://doi.org/10.1007/978-3-031-06981-9_14</a>."},"oa":"1","publisher":"Springer International Publishing","date_updated":"2024-04-03T13:26:10Z","author":[{"last_name":"KOUAGOU","full_name":"KOUAGOU, N'Dah Jean","id":"87189","first_name":"N'Dah Jean"},{"id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf","first_name":"Stefan"},{"last_name":"Demir","full_name":"Demir, Caglar","id":"43817","first_name":"Caglar"},{"first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille"}],"date_created":"2022-10-15T19:34:41Z","title":"Learning Concept Lengths Accelerates Concept Learning in ALC","main_file_link":[{"url":"https://arxiv.org/abs/2107.04911","open_access":"1"}],"doi":"10.1007/978-3-031-06981-9_14","type":"book_chapter","publication":"The Semantic Web","status":"public","_id":"33740","user_id":"11871","department":[{"_id":"574"},{"_id":"760"}],"language":[{"iso":"eng"}]},{"year":"2022","citation":{"apa":"Ködding, P., &#38; Dumitrescu, R. (2022). Szenario-Technik mit digitalen Technologien. In E. A. Hartmann (Ed.), <i>Digitalisierung souverän gestalten II</i>.","bibtex":"@inproceedings{Ködding_Dumitrescu_2022, title={Szenario-Technik mit digitalen Technologien}, booktitle={Digitalisierung souverän gestalten II}, author={Ködding, Patrick and Dumitrescu, Roman}, editor={Hartmann, Ernst A.}, year={2022} }","mla":"Ködding, Patrick, and Roman Dumitrescu. “Szenario-Technik Mit Digitalen Technologien.” <i>Digitalisierung Souverän Gestalten II</i>, edited by Ernst A. Hartmann, 2022.","short":"P. Ködding, R. Dumitrescu, in: E.A. Hartmann (Ed.), Digitalisierung Souverän Gestalten II, 2022.","chicago":"Ködding, Patrick, and Roman Dumitrescu. “Szenario-Technik Mit Digitalen Technologien.” In <i>Digitalisierung Souverän Gestalten II</i>, edited by Ernst A. Hartmann, 2022.","ieee":"P. Ködding and R. Dumitrescu, “Szenario-Technik mit digitalen Technologien,” in <i>Digitalisierung souverän gestalten II</i>, 2022.","ama":"Ködding P, Dumitrescu R. Szenario-Technik mit digitalen Technologien. In: Hartmann EA, ed. <i>Digitalisierung Souverän Gestalten II</i>. ; 2022."},"date_updated":"2024-04-17T16:16:19Z","author":[{"last_name":"Ködding","full_name":"Ködding, Patrick","id":"45402","first_name":"Patrick"},{"first_name":"Roman","last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman"}],"date_created":"2023-10-06T12:36:26Z","title":"Szenario-Technik mit digitalen Technologien","type":"conference","publication":"Digitalisierung souverän gestalten II","editor":[{"first_name":"Ernst A.","full_name":"Hartmann, Ernst A.","last_name":"Hartmann"}],"status":"public","_id":"47831","user_id":"45402","department":[{"_id":"563"}],"language":[{"iso":"eng"}]},{"date_updated":"2024-05-06T11:33:14Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","volume":20,"date_created":"2024-05-06T11:32:59Z","author":[{"first_name":"Fabio","last_name":"Massacci","full_name":"Massacci, Fabio"},{"first_name":"Antonino","full_name":"Sabetta, Antonino","last_name":"Sabetta"},{"first_name":"Jelena","full_name":"Mirkovic, Jelena","last_name":"Mirkovic"},{"last_name":"Murray","full_name":"Murray, Toby","first_name":"Toby"},{"full_name":"Okhravi, Hamed","last_name":"Okhravi","first_name":"Hamed"},{"full_name":"Mannan, Mohammad","last_name":"Mannan","first_name":"Mohammad"},{"first_name":"Anderson","full_name":"Rocha, Anderson","last_name":"Rocha"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Daniel E.","last_name":"Geer","full_name":"Geer, Daniel E."}],"title":"“Free” as in Freedom to Protest?","doi":"10.1109/msec.2022.3185845","publication_identifier":{"issn":["1540-7993","1558-4046"]},"publication_status":"published","issue":"5","year":"2022","intvolume":"        20","page":"16-21","citation":{"short":"F. Massacci, A. Sabetta, J. Mirkovic, T. Murray, H. Okhravi, M. Mannan, A. Rocha, E. Bodden, D.E. Geer, IEEE Security &#38;amp; Privacy 20 (2022) 16–21.","mla":"Massacci, Fabio, et al. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, Institute of Electrical and Electronics Engineers (IEEE), 2022, pp. 16–21, doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>.","bibtex":"@article{Massacci_Sabetta_Mirkovic_Murray_Okhravi_Mannan_Rocha_Bodden_Geer_2022, title={“Free” as in Freedom to Protest?}, volume={20}, DOI={<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>}, number={5}, journal={IEEE Security &#38;amp; Privacy}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Massacci, Fabio and Sabetta, Antonino and Mirkovic, Jelena and Murray, Toby and Okhravi, Hamed and Mannan, Mohammad and Rocha, Anderson and Bodden, Eric and Geer, Daniel E.}, year={2022}, pages={16–21} }","apa":"Massacci, F., Sabetta, A., Mirkovic, J., Murray, T., Okhravi, H., Mannan, M., Rocha, A., Bodden, E., &#38; Geer, D. E. (2022). “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>, <i>20</i>(5), 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>","ama":"Massacci F, Sabetta A, Mirkovic J, et al. “Free” as in Freedom to Protest? <i>IEEE Security &#38;amp; Privacy</i>. 2022;20(5):16-21. doi:<a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>","chicago":"Massacci, Fabio, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, and Daniel E. Geer. “‘Free’ as in Freedom to Protest?” <i>IEEE Security &#38;amp; Privacy</i> 20, no. 5 (2022): 16–21. <a href=\"https://doi.org/10.1109/msec.2022.3185845\">https://doi.org/10.1109/msec.2022.3185845</a>.","ieee":"F. Massacci <i>et al.</i>, “‘Free’ as in Freedom to Protest?,” <i>IEEE Security &#38;amp; Privacy</i>, vol. 20, no. 5, pp. 16–21, 2022, doi: <a href=\"https://doi.org/10.1109/msec.2022.3185845\">10.1109/msec.2022.3185845</a>."},"_id":"53952","department":[{"_id":"76"}],"user_id":"15249","language":[{"iso":"eng"}],"publication":"IEEE Security &amp; Privacy","type":"journal_article","status":"public"},{"language":[{"iso":"eng"}],"_id":"54435","department":[{"_id":"632"}],"user_id":"74619","abstract":[{"text":"Web browsers are among the most important but also complex software solutions to access the web. It is therefore not surprising that web browsers are an attractive target for attackers. Especially in the last decade, security researchers and browser vendors have developed sandboxing mechanisms like security-relevant HTTP headers to tackle the problem of getting a more secure browser. Although the security community is aware of the importance of security-relevant HTTP headers, legacy applications and individual requests from different parties have led to possible insecure configurations of these headers. Even if specific security headers are configured correctly, conflicts in their functionalities may lead to unforeseen browser behaviors and vulnerabilities. Recently, the first work which analyzed duplicated headers and conflicts in headers was published by Calzavara et al. at USENIX Security [1]. The authors focused on inconsistent protections by using both, the HTTP header X-Frame-Options and the framing protection of the Content-Security-Policy. We extend their work by analyzing browser behaviors when parsing duplicated headers, conflicting directives, and values that do not conform to the defined ABNF metalanguage specification. We created an open-source testbed running over 19,800 test cases, at which nearly 300 test cases are executed in the set of 66 different browsers. Our work shows that browsers conform to the specification and behave securely. However, all tested browsers behave differently when it comes, for example, to parsing the Strict-Transport-Security header. Moreover, Chrome, Safari, and Firefox behave differently if the header contains a character, which is not allowed by the defined ABNF. This results in the protection mechanism being fully enforced, partially enforced, or not enforced and thus completely bypassable.","lang":"eng"}],"status":"public","publication":"2022 IEEE Security and Privacy Workshops (SPW)","type":"conference","title":"On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers","doi":"10.1109/spw54247.2022.9833880","date_updated":"2024-05-23T11:01:43Z","publisher":"IEEE","date_created":"2024-05-23T10:49:19Z","author":[{"first_name":"Hendrik","last_name":"Siewert","full_name":"Siewert, Hendrik"},{"last_name":"Kretschmer","full_name":"Kretschmer, Martin","first_name":"Martin"},{"last_name":"Niemietz","full_name":"Niemietz, Marcus","first_name":"Marcus"},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"}],"year":"2022","citation":{"ama":"Siewert H, Kretschmer M, Niemietz M, Somorovsky J. On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. In: <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>","ieee":"H. Siewert, M. Kretschmer, M. Niemietz, and J. Somorovsky, “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers,” 2022, doi: <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>.","chicago":"Siewert, Hendrik, Martin Kretschmer, Marcus Niemietz, and Juraj Somorovsky. “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.” In <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">https://doi.org/10.1109/spw54247.2022.9833880</a>.","mla":"Siewert, Hendrik, et al. “On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers.” <i>2022 IEEE Security and Privacy Workshops (SPW)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>.","bibtex":"@inproceedings{Siewert_Kretschmer_Niemietz_Somorovsky_2022, title={On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers}, DOI={<a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">10.1109/spw54247.2022.9833880</a>}, booktitle={2022 IEEE Security and Privacy Workshops (SPW)}, publisher={IEEE}, author={Siewert, Hendrik and Kretschmer, Martin and Niemietz, Marcus and Somorovsky, Juraj}, year={2022} }","short":"H. Siewert, M. Kretschmer, M. Niemietz, J. Somorovsky, in: 2022 IEEE Security and Privacy Workshops (SPW), IEEE, 2022.","apa":"Siewert, H., Kretschmer, M., Niemietz, M., &#38; Somorovsky, J. (2022). On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. <i>2022 IEEE Security and Privacy Workshops (SPW)</i>. <a href=\"https://doi.org/10.1109/spw54247.2022.9833880\">https://doi.org/10.1109/spw54247.2022.9833880</a>"},"publication_status":"published"},{"year":"2022","page":"818-828","citation":{"apa":"Heindorf, S., Blübaum, L., Düsterhus, N., Werner, T., Golani, V. N., Demir, C., &#38; Ngonga Ngomo, A.-C. (2022). EvoLearner: Learning Description Logics with Evolutionary Algorithms. <i>WWW</i>, 818–828. <a href=\"https://doi.org/10.1145/3485447.3511925\">https://doi.org/10.1145/3485447.3511925</a>","short":"S. Heindorf, L. Blübaum, N. Düsterhus, T. Werner, V.N. Golani, C. Demir, A.-C. Ngonga Ngomo, in: WWW, ACM, 2022, pp. 818–828.","bibtex":"@inproceedings{Heindorf_Blübaum_Düsterhus_Werner_Golani_Demir_Ngonga Ngomo_2022, title={EvoLearner: Learning Description Logics with Evolutionary Algorithms}, DOI={<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>}, booktitle={WWW}, publisher={ACM}, author={Heindorf, Stefan and Blübaum, Lukas and Düsterhus, Nick and Werner, Till and Golani, Varun Nandkumar and Demir, Caglar and Ngonga Ngomo, Axel-Cyrille}, year={2022}, pages={818–828} }","mla":"Heindorf, Stefan, et al. “EvoLearner: Learning Description Logics with Evolutionary Algorithms.” <i>WWW</i>, ACM, 2022, pp. 818–28, doi:<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>.","ama":"Heindorf S, Blübaum L, Düsterhus N, et al. EvoLearner: Learning Description Logics with Evolutionary Algorithms. In: <i>WWW</i>. ACM; 2022:818-828. doi:<a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>","chicago":"Heindorf, Stefan, Lukas Blübaum, Nick Düsterhus, Till Werner, Varun Nandkumar Golani, Caglar Demir, and Axel-Cyrille Ngonga Ngomo. “EvoLearner: Learning Description Logics with Evolutionary Algorithms.” In <i>WWW</i>, 818–28. ACM, 2022. <a href=\"https://doi.org/10.1145/3485447.3511925\">https://doi.org/10.1145/3485447.3511925</a>.","ieee":"S. Heindorf <i>et al.</i>, “EvoLearner: Learning Description Logics with Evolutionary Algorithms,” in <i>WWW</i>, 2022, pp. 818–828, doi: <a href=\"https://doi.org/10.1145/3485447.3511925\">10.1145/3485447.3511925</a>."},"title":"EvoLearner: Learning Description Logics with Evolutionary Algorithms","doi":"10.1145/3485447.3511925","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/2111.04879"}],"date_updated":"2024-05-26T19:13:09Z","oa":"1","publisher":"ACM","date_created":"2022-01-12T10:22:53Z","author":[{"id":"11871","full_name":"Heindorf, Stefan","last_name":"Heindorf","orcid":"0000-0002-4525-6865","first_name":"Stefan"},{"first_name":"Lukas","full_name":"Blübaum, Lukas","last_name":"Blübaum"},{"first_name":"Nick","full_name":"Düsterhus, Nick","last_name":"Düsterhus"},{"first_name":"Till","full_name":"Werner, Till","last_name":"Werner"},{"first_name":"Varun Nandkumar","last_name":"Golani","full_name":"Golani, Varun Nandkumar"},{"first_name":"Caglar","id":"43817","full_name":"Demir, Caglar","last_name":"Demir"},{"first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo","full_name":"Ngonga Ngomo, Axel-Cyrille","id":"65716"}],"abstract":[{"lang":"eng","text":"Classifying nodes in knowledge graphs is an important task, e.g., predicting\r\nmissing types of entities, predicting which molecules cause cancer, or\r\npredicting which drugs are promising treatment candidates. While black-box\r\nmodels often achieve high predictive performance, they are only post-hoc and\r\nlocally explainable and do not allow the learned model to be easily enriched\r\nwith domain knowledge. Towards this end, learning description logic concepts\r\nfrom positive and negative examples has been proposed. However, learning such\r\nconcepts often takes a long time and state-of-the-art approaches provide\r\nlimited support for literal data values, although they are crucial for many\r\napplications. In this paper, we propose EvoLearner - an evolutionary approach\r\nto learn ALCQ(D), which is the attributive language with complement (ALC)\r\npaired with qualified cardinality restrictions (Q) and data properties (D). We\r\ncontribute a novel initialization method for the initial population: starting\r\nfrom positive examples (nodes in the knowledge graph), we perform biased random\r\nwalks and translate them to description logic concepts. Moreover, we improve\r\nsupport for data properties by maximizing information gain when deciding where\r\nto split the data. We show that our approach significantly outperforms the\r\nstate of the art on the benchmarking framework SML-Bench for structured machine\r\nlearning. Our ablation study confirms that this is due to our novel\r\ninitialization method and support for data properties."}],"status":"public","publication":"WWW","type":"conference","language":[{"iso":"eng"}],"_id":"29290","department":[{"_id":"574"}],"user_id":"11871"},{"language":[{"iso":"eng"}],"_id":"29851","department":[{"_id":"574"}],"user_id":"11871","status":"public","publication":"Scientific Data","type":"journal_article","title":"CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications","doi":"10.1038/s41597-022-01298-2","main_file_link":[{"url":"https://papers.dice-research.org/2022/NSDJ_CovidPubGraph/public.pdf","open_access":"1"}],"date_updated":"2024-05-26T19:14:21Z","oa":"1","date_created":"2022-02-15T16:59:29Z","author":[{"full_name":"Pestryakova, Svetlana ","last_name":"Pestryakova","first_name":"Svetlana "},{"last_name":"Vollmers","full_name":"Vollmers, Daniel","first_name":"Daniel"},{"orcid":"https://orcid.org/0000-0002-9927-2203","last_name":"Sherif","id":"67234","full_name":"Sherif, Mohamed","first_name":"Mohamed"},{"first_name":"Stefan","id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf"},{"full_name":"Saleem, Muhammad ","last_name":"Saleem","first_name":"Muhammad "},{"first_name":"Diego","last_name":"Moussallem","id":"71635","full_name":"Moussallem, Diego"},{"first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille"}],"year":"2022","citation":{"ama":"Pestryakova S, Vollmers D, Sherif M, et al. CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications. <i>Scientific Data</i>. Published online 2022. doi:<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>","chicago":"Pestryakova, Svetlana , Daniel Vollmers, Mohamed Sherif, Stefan Heindorf, Muhammad  Saleem, Diego Moussallem, and Axel-Cyrille Ngonga Ngomo. “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications.” <i>Scientific Data</i>, 2022. <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">https://doi.org/10.1038/s41597-022-01298-2</a>.","ieee":"S. Pestryakova <i>et al.</i>, “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications,” <i>Scientific Data</i>, 2022, doi: <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>.","apa":"Pestryakova, S., Vollmers, D., Sherif, M., Heindorf, S., Saleem, M., Moussallem, D., &#38; Ngonga Ngomo, A.-C. (2022). CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications. <i>Scientific Data</i>. <a href=\"https://doi.org/10.1038/s41597-022-01298-2\">https://doi.org/10.1038/s41597-022-01298-2</a>","short":"S. Pestryakova, D. Vollmers, M. Sherif, S. Heindorf, M. Saleem, D. Moussallem, A.-C. Ngonga Ngomo, Scientific Data (2022).","mla":"Pestryakova, Svetlana, et al. “CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications.” <i>Scientific Data</i>, 2022, doi:<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>.","bibtex":"@article{Pestryakova_Vollmers_Sherif_Heindorf_Saleem_Moussallem_Ngonga Ngomo_2022, title={CovidPubGraph: A FAIR Knowledge Graph of COVID-19 Publications}, DOI={<a href=\"https://doi.org/10.1038/s41597-022-01298-2\">10.1038/s41597-022-01298-2</a>}, journal={Scientific Data}, author={Pestryakova, Svetlana  and Vollmers, Daniel and Sherif, Mohamed and Heindorf, Stefan and Saleem, Muhammad  and Moussallem, Diego and Ngonga Ngomo, Axel-Cyrille}, year={2022} }"}},{"date_created":"2022-12-21T09:48:43Z","publisher":"ACM","title":"User Involvement in Training Smart Home Agents","quality_controlled":"1","year":"2022","language":[{"iso":"eng"}],"keyword":["human-agent interaction","smart homes","supervised learning","participation"],"ddc":["000"],"publication":"International Conference on Human-Agent Interaction","file":[{"file_name":"User_Involvement_in_Training_Smart_Home_Agents_public.pdf","file_id":"54524","access_level":"closed","file_size":1151728,"creator":"heindorf","date_created":"2024-05-30T18:04:31Z","date_updated":"2024-05-30T18:04:31Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Smart home systems contain plenty of features that enhance wellbeing in everyday life through artificial intelligence (AI). However, many users feel insecure because they do not understand the AI’s functionality and do not feel they are in control of it. Combining technical, psychological and philosophical views on AI, we rethink smart homes as interactive systems where users can partake in an intelligent agent’s learning. Parallel to the goals of explainable AI (XAI), we explored the possibility of user involvement in supervised learning of the smart home to have a first approach to improve acceptance, support subjective understanding and increase perceived control. In this work, we conducted two studies: In an online pre-study, we asked participants about their attitude towards teaching AI via a questionnaire. In the main study, we performed a Wizard of Oz laboratory experiment with human participants, where participants spent time in a prototypical smart home and taught activity recognition to the intelligent agent through supervised learning based on the user’s behaviour. We found that involvement in the AI’s learning phase enhanced the users’ feeling of control, perceived understanding and perceived usefulness of AI in general. The participants reported positive attitudes towards training a smart home AI and found the process understandable and controllable. We suggest that involving the user in the learning phase could lead to better personalisation and increased understanding and control by users of intelligent agents for smart home automation."}],"author":[{"last_name":"Sieger","id":"93402","full_name":"Sieger, Leonie Nora","first_name":"Leonie Nora"},{"first_name":"Julia","full_name":"Hermann, Julia","last_name":"Hermann"},{"first_name":"Astrid","last_name":"Schomäcker","full_name":"Schomäcker, Astrid"},{"first_name":"Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf","id":"11871","full_name":"Heindorf, Stefan"},{"first_name":"Christian","last_name":"Meske","full_name":"Meske, Christian"},{"first_name":"Celine-Chiara","last_name":"Hey","full_name":"Hey, Celine-Chiara"},{"first_name":"Ayşegül","full_name":"Doğangün, Ayşegül","last_name":"Doğangün"}],"date_updated":"2024-05-30T18:04:45Z","oa":"1","conference":{"start_date":"2022-12-05","name":"HAI '22: International Conference on Human-Agent Interaction","location":"Christchurch, New Zealand","end_date":"2022-12-08"},"doi":"10.1145/3527188.3561914","main_file_link":[{"open_access":"1","url":"https://papers.dice-research.org/2022/HAI_SmartHome/User_Involvement_in_Training_Smart_Home_Agents_public.pdf"}],"has_accepted_license":"1","publication_status":"published","citation":{"chicago":"Sieger, Leonie Nora, Julia Hermann, Astrid Schomäcker, Stefan Heindorf, Christian Meske, Celine-Chiara Hey, and Ayşegül Doğangün. “User Involvement in Training Smart Home Agents.” In <i>International Conference on Human-Agent Interaction</i>. ACM, 2022. <a href=\"https://doi.org/10.1145/3527188.3561914\">https://doi.org/10.1145/3527188.3561914</a>.","ieee":"L. N. Sieger <i>et al.</i>, “User Involvement in Training Smart Home Agents,” presented at the HAI ’22: International Conference on Human-Agent Interaction, Christchurch, New Zealand, 2022, doi: <a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>.","ama":"Sieger LN, Hermann J, Schomäcker A, et al. User Involvement in Training Smart Home Agents. In: <i>International Conference on Human-Agent Interaction</i>. ACM; 2022. doi:<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>","apa":"Sieger, L. N., Hermann, J., Schomäcker, A., Heindorf, S., Meske, C., Hey, C.-C., &#38; Doğangün, A. (2022). User Involvement in Training Smart Home Agents. <i>International Conference on Human-Agent Interaction</i>. HAI ’22: International Conference on Human-Agent Interaction, Christchurch, New Zealand. <a href=\"https://doi.org/10.1145/3527188.3561914\">https://doi.org/10.1145/3527188.3561914</a>","short":"L.N. Sieger, J. Hermann, A. Schomäcker, S. Heindorf, C. Meske, C.-C. Hey, A. Doğangün, in: International Conference on Human-Agent Interaction, ACM, 2022.","bibtex":"@inproceedings{Sieger_Hermann_Schomäcker_Heindorf_Meske_Hey_Doğangün_2022, title={User Involvement in Training Smart Home Agents}, DOI={<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>}, booktitle={International Conference on Human-Agent Interaction}, publisher={ACM}, author={Sieger, Leonie Nora and Hermann, Julia and Schomäcker, Astrid and Heindorf, Stefan and Meske, Christian and Hey, Celine-Chiara and Doğangün, Ayşegül}, year={2022} }","mla":"Sieger, Leonie Nora, et al. “User Involvement in Training Smart Home Agents.” <i>International Conference on Human-Agent Interaction</i>, ACM, 2022, doi:<a href=\"https://doi.org/10.1145/3527188.3561914\">10.1145/3527188.3561914</a>."},"department":[{"_id":"574"},{"_id":"760"}],"user_id":"11871","_id":"34674","project":[{"grant_number":"438445824","name":"TRR 318 - B1: TRR 318 - Subproject B1","_id":"121"}],"file_date_updated":"2024-05-30T18:04:31Z","alternative_title":["Increasing Perceived Control and Understanding"],"type":"conference","status":"public"},{"user_id":"9503","department":[{"_id":"888"}],"_id":"52924","language":[{"iso":"eng"}],"type":"conference","publication":"SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022","status":"public","editor":[{"first_name":"Jiman","full_name":"Hong, Jiman","last_name":"Hong"},{"first_name":"Miroslav","full_name":"Bures, Miroslav","last_name":"Bures"},{"first_name":"Juw Won","last_name":"Park","full_name":"Park, Juw Won"},{"full_name":"Cerný, Tomás","last_name":"Cerný","first_name":"Tomás"}],"author":[{"last_name":"Tirtarasa","full_name":"Tirtarasa, Satyadharma","first_name":"Satyadharma"},{"id":"104470","full_name":"Turhan, Anni-Yasmin","last_name":"Turhan","first_name":"Anni-Yasmin"}],"date_created":"2024-03-26T10:54:20Z","date_updated":"2024-06-03T08:07:35Z","publisher":"ACM","doi":"10.1145/3477314.3507136","title":"Computing generalizations of temporal ϵL concepts with next and global","citation":{"chicago":"Tirtarasa, Satyadharma, and Anni-Yasmin Turhan. “Computing Generalizations of Temporal ΕL Concepts with next and Global.” In <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, edited by Jiman Hong, Miroslav Bures, Juw Won Park, and Tomás Cerný, 903–910. ACM, 2022. <a href=\"https://doi.org/10.1145/3477314.3507136\">https://doi.org/10.1145/3477314.3507136</a>.","ieee":"S. Tirtarasa and A.-Y. Turhan, “Computing generalizations of temporal ϵL concepts with next and global,” in <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, 2022, pp. 903–910, doi: <a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>.","ama":"Tirtarasa S, Turhan A-Y. Computing generalizations of temporal ϵL concepts with next and global. In: Hong J, Bures M, Park JW, Cerný T, eds. <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>. ACM; 2022:903–910. doi:<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>","apa":"Tirtarasa, S., &#38; Turhan, A.-Y. (2022). Computing generalizations of temporal ϵL concepts with next and global. In J. Hong, M. Bures, J. W. Park, &#38; T. Cerný (Eds.), <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i> (pp. 903–910). ACM. <a href=\"https://doi.org/10.1145/3477314.3507136\">https://doi.org/10.1145/3477314.3507136</a>","bibtex":"@inproceedings{Tirtarasa_Turhan_2022, title={Computing generalizations of temporal ϵL concepts with next and global}, DOI={<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>}, booktitle={SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, publisher={ACM}, author={Tirtarasa, Satyadharma and Turhan, Anni-Yasmin}, editor={Hong, Jiman and Bures, Miroslav and Park, Juw Won and Cerný, Tomás}, year={2022}, pages={903–910} }","mla":"Tirtarasa, Satyadharma, and Anni-Yasmin Turhan. “Computing Generalizations of Temporal ΕL Concepts with next and Global.” <i>SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022</i>, edited by Jiman Hong et al., ACM, 2022, pp. 903–910, doi:<a href=\"https://doi.org/10.1145/3477314.3507136\">10.1145/3477314.3507136</a>.","short":"S. Tirtarasa, A.-Y. Turhan, in: J. Hong, M. Bures, J.W. Park, T. Cerný (Eds.), SAC ’22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022, ACM, 2022, pp. 903–910."},"page":"903–910","year":"2022"},{"title":"Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner","doi":"10.1017/S1471068421000466","date_updated":"2024-06-03T08:25:12Z","author":[{"first_name":"Franz","full_name":"Baader, Franz","last_name":"Baader"},{"last_name":"Koopmann","full_name":"Koopmann, Patrick","first_name":"Patrick"},{"first_name":"Friedrich","last_name":"Michel","full_name":"Michel, Friedrich"},{"full_name":"Turhan, Anni-Yasmin","id":"104470","last_name":"Turhan","first_name":"Anni-Yasmin"},{"first_name":"Benjamin","last_name":"Zarrieß","full_name":"Zarrieß, Benjamin"}],"date_created":"2024-03-26T10:53:00Z","volume":22,"year":"2022","citation":{"apa":"Baader, F., Koopmann, P., Michel, F., Turhan, A.-Y., &#38; Zarrieß, B. (2022). Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner. <i>Theory Pract. Log. Program.</i>, <i>22</i>(2), 162–192. <a href=\"https://doi.org/10.1017/S1471068421000466\">https://doi.org/10.1017/S1471068421000466</a>","bibtex":"@article{Baader_Koopmann_Michel_Turhan_Zarrieß_2022, title={Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner}, volume={22}, DOI={<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>}, number={2}, journal={Theory Pract. Log. Program.}, author={Baader, Franz and Koopmann, Patrick and Michel, Friedrich and Turhan, Anni-Yasmin and Zarrieß, Benjamin}, year={2022}, pages={162–192} }","mla":"Baader, Franz, et al. “Efficient TBox Reasoning with Value Restrictions Using the Flower Reasoner.” <i>Theory Pract. Log. Program.</i>, vol. 22, no. 2, 2022, pp. 162–192, doi:<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>.","short":"F. Baader, P. Koopmann, F. Michel, A.-Y. Turhan, B. Zarrieß, Theory Pract. Log. Program. 22 (2022) 162–192.","ieee":"F. Baader, P. Koopmann, F. Michel, A.-Y. Turhan, and B. Zarrieß, “Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner,” <i>Theory Pract. Log. Program.</i>, vol. 22, no. 2, pp. 162–192, 2022, doi: <a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>.","chicago":"Baader, Franz, Patrick Koopmann, Friedrich Michel, Anni-Yasmin Turhan, and Benjamin Zarrieß. “Efficient TBox Reasoning with Value Restrictions Using the Flower Reasoner.” <i>Theory Pract. Log. Program.</i> 22, no. 2 (2022): 162–192. <a href=\"https://doi.org/10.1017/S1471068421000466\">https://doi.org/10.1017/S1471068421000466</a>.","ama":"Baader F, Koopmann P, Michel F, Turhan A-Y, Zarrieß B. Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner. <i>Theory Pract Log Program</i>. 2022;22(2):162–192. doi:<a href=\"https://doi.org/10.1017/S1471068421000466\">10.1017/S1471068421000466</a>"},"page":"162–192","intvolume":"        22","issue":"2","language":[{"iso":"eng"}],"_id":"52918","user_id":"9503","department":[{"_id":"888"}],"status":"public","type":"journal_article","publication":"Theory Pract. Log. Program."},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783031194320","9783031194337"]},"year":"2022","place":"Cham","citation":{"chicago":"Manzoor, Ali, Muhammad Saleem, and Axel-Cyrille Ngonga Ngomo. “REBench: Microbenchmarking Framework for Relation Extraction Systems.” In <i>The Semantic Web – ISWC 2022</i>. Cham: Springer International Publishing, 2022. <a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">https://doi.org/10.1007/978-3-031-19433-7_37</a>.","ieee":"A. Manzoor, M. Saleem, and A.-C. Ngonga Ngomo, “REBench: Microbenchmarking Framework for Relation Extraction Systems,” in <i>The Semantic Web – ISWC 2022</i>, Cham: Springer International Publishing, 2022.","ama":"Manzoor A, Saleem M, Ngonga Ngomo A-C. REBench: Microbenchmarking Framework for Relation Extraction Systems. In: <i>The Semantic Web – ISWC 2022</i>. Springer International Publishing; 2022. doi:<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>","apa":"Manzoor, A., Saleem, M., &#38; Ngonga Ngomo, A.-C. (2022). REBench: Microbenchmarking Framework for Relation Extraction Systems. In <i>The Semantic Web – ISWC 2022</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">https://doi.org/10.1007/978-3-031-19433-7_37</a>","bibtex":"@inbook{Manzoor_Saleem_Ngonga Ngomo_2022, place={Cham}, title={REBench: Microbenchmarking Framework for Relation Extraction Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>}, booktitle={The Semantic Web – ISWC 2022}, publisher={Springer International Publishing}, author={Manzoor, Ali and Saleem, Muhammad and Ngonga Ngomo, Axel-Cyrille}, year={2022} }","short":"A. Manzoor, M. Saleem, A.-C. Ngonga Ngomo, in: The Semantic Web – ISWC 2022, Springer International Publishing, Cham, 2022.","mla":"Manzoor, Ali, et al. “REBench: Microbenchmarking Framework for Relation Extraction Systems.” <i>The Semantic Web – ISWC 2022</i>, Springer International Publishing, 2022, doi:<a href=\"https://doi.org/10.1007/978-3-031-19433-7_37\">10.1007/978-3-031-19433-7_37</a>."},"publisher":"Springer International Publishing","date_updated":"2024-06-04T12:24:49Z","date_created":"2024-06-04T12:21:30Z","author":[{"first_name":"Ali","last_name":"Manzoor","full_name":"Manzoor, Ali","id":"77309"},{"first_name":"Muhammad","last_name":"Saleem","full_name":"Saleem, Muhammad"},{"last_name":"Ngonga Ngomo","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille","first_name":"Axel-Cyrille"}],"title":"REBench: Microbenchmarking Framework for Relation Extraction Systems","doi":"10.1007/978-3-031-19433-7_37","type":"book_chapter","publication":"The Semantic Web – ISWC 2022","status":"public","_id":"54585","user_id":"77309","department":[{"_id":"574"}],"language":[{"iso":"eng"}]},{"page":"313–330","citation":{"bibtex":"@inproceedings{Huaman_Krause_Wermke_Klemmer_Stransky_Acar_Fahl_2022, title={If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers}, booktitle={Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022}, publisher={USENIX Association}, author={Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha}, editor={Chiasson, Sonia and Kapadia, Apu}, year={2022}, pages={313–330} }","short":"N. Huaman, A. Krause, D. Wermke, J.H. Klemmer, C. Stransky, Y. Acar, S. Fahl, in: S. Chiasson, A. Kapadia (Eds.), Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022, USENIX Association, 2022, pp. 313–330.","mla":"Huaman, Nicolas, et al. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, USENIX Association, 2022, pp. 313–330.","apa":"Huaman, N., Krause, A., Wermke, D., Klemmer, J. H., Stransky, C., Acar, Y., &#38; Fahl, S. (2022). If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In S. Chiasson &#38; A. Kapadia (Eds.), <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i> (pp. 313–330). USENIX Association.","ama":"Huaman N, Krause A, Wermke D, et al. If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In: Chiasson S, Kapadia A, eds. <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>. USENIX Association; 2022:313–330.","ieee":"N. Huaman <i>et al.</i>, “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers,” in <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, 2022, pp. 313–330.","chicago":"Huaman, Nicolas, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, and Sascha Fahl. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” In <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, 313–330. USENIX Association, 2022."},"year":"2022","title":"If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers","author":[{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Jan H.","last_name":"Klemmer","full_name":"Klemmer, Jan H."},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:21:22Z","publisher":"USENIX Association","date_updated":"2024-06-05T12:52:28Z","status":"public","editor":[{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"},{"last_name":"Kapadia","full_name":"Kapadia, Apu","first_name":"Apu"}],"publication":"Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022","type":"conference","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47289"},{"status":"public","type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"47844","citation":{"ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>.","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>","apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }"},"year":"2022","publication_status":"published","doi":"10.1109/sp46214.2022.9833713","title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks","date_created":"2023-10-06T16:12:30Z","author":[{"first_name":"Jan","last_name":"Jancar","full_name":"Jancar, Jan"},{"last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291","first_name":"Marcel"},{"first_name":"Daniel De Almeida","full_name":"Braga, Daniel De Almeida","last_name":"Braga"},{"first_name":"Mohamed","full_name":"Sabt, Mohamed","last_name":"Sabt"},{"last_name":"Schwabe","full_name":"Schwabe, Peter","first_name":"Peter"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"last_name":"Fouque","full_name":"Fouque, Pierre-Alain","first_name":"Pierre-Alain"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"date_updated":"2024-06-05T12:55:00Z","publisher":"IEEE"}]
