---
_id: '61237'
abstract:
- lang: ger
  text: In diesem Beitrag wird zunächst die historische Entstehung von Open Science
    kurz skizziert und definiert, was unter diesem Begriff zu verstehen ist. Daran
    anschließend werden die Open-Science-Praktiken Open Data, Open Access, Open Source,
    Open Methodology und Open Peer Review dargestellt und diskutiert, welche Forschungserkenntnisse
    zu Open Science vorhanden sind. Im Schluss werden Forschungsdesiderate aufgegriffen
    und die Implikationen von Open Science für die Wissenschaft erläutert.
author:
- first_name: Isabel
  full_name: Steinhardt, Isabel
  id: '90339'
  last_name: Steinhardt
  orcid: https://orcid.org/0000-0002-2590-6189
- first_name: Ronny
  full_name: Röwert, Ronny
  last_name: Röwert
citation:
  ama: 'Steinhardt I, Röwert R. Open Science. In: Pasternack P, Reinmann G, Schneijderberg
    C, eds. <i>Hochschulforschung</i>. Nomos; 2025:487-496. doi:<a href="https://doi.org/10.5771/9783748943334-487">10.5771/9783748943334-487</a>'
  apa: Steinhardt, I., &#38; Röwert, R. (2025). Open Science. In P. Pasternack, G.
    Reinmann, &#38; C. Schneijderberg (Eds.), <i>Hochschulforschung</i> (pp. 487–496).
    Nomos. <a href="https://doi.org/10.5771/9783748943334-487">https://doi.org/10.5771/9783748943334-487</a>
  bibtex: '@inbook{Steinhardt_Röwert_2025, place={Baden-Baden}, title={Open Science},
    DOI={<a href="https://doi.org/10.5771/9783748943334-487">10.5771/9783748943334-487</a>},
    booktitle={Hochschulforschung}, publisher={Nomos}, author={Steinhardt, Isabel
    and Röwert, Ronny}, editor={Pasternack, Peer and Reinmann, Gabi and Schneijderberg,
    Christian }, year={2025}, pages={487–496} }'
  chicago: 'Steinhardt, Isabel, and Ronny Röwert. “Open Science.” In <i>Hochschulforschung</i>,
    edited by Peer Pasternack, Gabi Reinmann, and Christian  Schneijderberg, 487–96.
    Baden-Baden: Nomos, 2025. <a href="https://doi.org/10.5771/9783748943334-487">https://doi.org/10.5771/9783748943334-487</a>.'
  ieee: 'I. Steinhardt and R. Röwert, “Open Science,” in <i>Hochschulforschung</i>,
    P. Pasternack, G. Reinmann, and C. Schneijderberg, Eds. Baden-Baden: Nomos, 2025,
    pp. 487–496.'
  mla: Steinhardt, Isabel, and Ronny Röwert. “Open Science.” <i>Hochschulforschung</i>,
    edited by Peer Pasternack et al., Nomos, 2025, pp. 487–96, doi:<a href="https://doi.org/10.5771/9783748943334-487">10.5771/9783748943334-487</a>.
  short: 'I. Steinhardt, R. Röwert, in: P. Pasternack, G. Reinmann, C. Schneijderberg
    (Eds.), Hochschulforschung, Nomos, Baden-Baden, 2025, pp. 487–496.'
date_created: 2025-09-12T06:35:25Z
date_updated: 2025-12-17T09:05:53Z
ddc:
- '300'
department:
- _id: '121'
doi: 10.5771/9783748943334-487
editor:
- first_name: Peer
  full_name: Pasternack, Peer
  last_name: Pasternack
- first_name: Gabi
  full_name: Reinmann, Gabi
  last_name: Reinmann
- first_name: 'Christian '
  full_name: 'Schneijderberg, Christian '
  last_name: Schneijderberg
file:
- access_level: closed
  content_type: application/pdf
  creator: isste
  date_created: 2025-09-12T06:37:04Z
  date_updated: 2025-09-12T06:37:04Z
  file_id: '61238'
  file_name: 2025 Steinhardt & Röwert Open Science.pdf
  file_size: 268261
  relation: main_file
  success: 1
file_date_updated: 2025-09-12T06:37:04Z
has_accepted_license: '1'
keyword:
- Open Data
- Open Access
- Open Source
- Open Methodology
- Open Peer Review
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.nomos-elibrary.de/de/document/view/detail/uuid/cc4f88b8-f9a8-32ef-a706-a9134f224090
oa: '1'
page: 487-496
place: Baden-Baden
publication: Hochschulforschung
publication_identifier:
  isbn:
  - '9783748943334'
publication_status: published
publisher: Nomos
quality_controlled: '1'
status: public
title: Open Science
type: book_chapter
user_id: '90339'
year: '2025'
...
---
_id: '30236'
abstract:
- lang: eng
  text: "Recent reinforcement learning approaches for continuous control in wireless
    mobile networks have shown impressive\r\nresults. But due to the lack of open
    and compatible simulators, authors typically create their own simulation environments
    for training and evaluation. This is cumbersome and time-consuming for authors
    and limits reproducibility and comparability, ultimately impeding progress in
    the field.\r\n\r\nTo this end, we propose mobile-env, a simple and open platform
    for training, evaluating, and comparing reinforcement learning and conventional
    approaches for continuous control in mobile wireless networks. mobile-env is lightweight
    and implements the common OpenAI Gym interface and additional wrappers, which
    allows connecting virtually any single-agent or multi-agent reinforcement learning
    framework to the environment. While mobile-env provides sensible default values
    and can be used out of the box, it also has many configuration options and is
    easy to extend. We therefore believe mobile-env to be a valuable platform for
    driving meaningful progress in autonomous coordination of\r\nwireless mobile networks."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Stefan
  full_name: Werner, Stefan
  last_name: Werner
- first_name: Ramin
  full_name: Khalili, Ramin
  last_name: Khalili
- first_name: Artur
  full_name: Hecker, Artur
  last_name: Hecker
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schneider SB, Werner S, Khalili R, Hecker A, Karl H. mobile-env: An Open Platform
    for Reinforcement Learning in Wireless Mobile Networks. In: <i>IEEE/IFIP Network
    Operations and Management Symposium (NOMS)</i>. IEEE; 2022.'
  apa: 'Schneider, S. B., Werner, S., Khalili, R., Hecker, A., &#38; Karl, H. (2022).
    mobile-env: An Open Platform for Reinforcement Learning in Wireless Mobile Networks.
    <i>IEEE/IFIP Network Operations and Management Symposium (NOMS)</i>. IEEE/IFIP
    Network Operations and Management Symposium (NOMS), Budapest.'
  bibtex: '@inproceedings{Schneider_Werner_Khalili_Hecker_Karl_2022, title={mobile-env:
    An Open Platform for Reinforcement Learning in Wireless Mobile Networks}, booktitle={IEEE/IFIP
    Network Operations and Management Symposium (NOMS)}, publisher={IEEE}, author={Schneider,
    Stefan Balthasar and Werner, Stefan and Khalili, Ramin and Hecker, Artur and Karl,
    Holger}, year={2022} }'
  chicago: 'Schneider, Stefan Balthasar, Stefan Werner, Ramin Khalili, Artur Hecker,
    and Holger Karl. “Mobile-Env: An Open Platform for Reinforcement Learning in Wireless
    Mobile Networks.” In <i>IEEE/IFIP Network Operations and Management Symposium
    (NOMS)</i>. IEEE, 2022.'
  ieee: 'S. B. Schneider, S. Werner, R. Khalili, A. Hecker, and H. Karl, “mobile-env:
    An Open Platform for Reinforcement Learning in Wireless Mobile Networks,” presented
    at the IEEE/IFIP Network Operations and Management Symposium (NOMS), Budapest,
    2022.'
  mla: 'Schneider, Stefan Balthasar, et al. “Mobile-Env: An Open Platform for Reinforcement
    Learning in Wireless Mobile Networks.” <i>IEEE/IFIP Network Operations and Management
    Symposium (NOMS)</i>, IEEE, 2022.'
  short: 'S.B. Schneider, S. Werner, R. Khalili, A. Hecker, H. Karl, in: IEEE/IFIP
    Network Operations and Management Symposium (NOMS), IEEE, 2022.'
conference:
  end_date: 2022-04-29
  location: Budapest
  name: IEEE/IFIP Network Operations and Management Symposium (NOMS)
  start_date: 2022-04-25
date_created: 2022-03-10T18:28:14Z
date_updated: 2022-03-10T18:28:19Z
ddc:
- '004'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2022-03-10T18:25:41Z
  date_updated: 2022-03-10T18:25:41Z
  file_id: '30237'
  file_name: author_version.pdf
  file_size: 223412
  relation: main_file
file_date_updated: 2022-03-10T18:25:41Z
has_accepted_license: '1'
keyword:
- wireless mobile networks
- network management
- continuous control
- cognitive networks
- autonomous coordination
- reinforcement learning
- gym environment
- simulation
- open source
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
publication: IEEE/IFIP Network Operations and Management Symposium (NOMS)
publisher: IEEE
quality_controlled: '1'
status: public
title: 'mobile-env: An Open Platform for Reinforcement Learning in Wireless Mobile
  Networks'
type: conference
user_id: '35343'
year: '2022'
...
---
_id: '5625'
abstract:
- lang: eng
  text: The increasing availability and deployment of open source software in personal
    and commercial environments makes open source software highly appealing for hackers,
    and others who are interested in exploiting software vulnerabilities. This deployment
    has resulted in a debate ?full of religion? on the security of open source software
    compared to that of closed source software. However, beyond such arguments, only
    little quantitative analysis on this research issue has taken place. We discuss
    the state-of-the-art of the security debate and identify shortcomings. Based on
    these, we propose new metrics, which allows to answer the question to what extent
    the review process of open source and closed source development has helped to
    fix vulnerabilities. We illustrate the application of some of these metrics in
    a case study on OpenOffice (open source software) vs. Microsoft Office (closed
    source software).
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Rouven
  full_name: Kadura, Rouven
  last_name: Kadura
citation:
  ama: 'Schryen G, Kadura R. Open Source vs. Closed Source Software: Towards Measuring
    Security. In: <i>24th Annual ACM Symposium on Applied Computing</i>. ; 2009.'
  apa: 'Schryen, G., &#38; Kadura, R. (2009). Open Source vs. Closed Source Software:
    Towards Measuring Security. In <i>24th Annual ACM Symposium on Applied Computing</i>.'
  bibtex: '@inproceedings{Schryen_Kadura_2009, title={Open Source vs. Closed Source
    Software: Towards Measuring Security}, booktitle={24th Annual ACM Symposium on
    Applied Computing}, author={Schryen, Guido and Kadura, Rouven}, year={2009} }'
  chicago: 'Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software:
    Towards Measuring Security.” In <i>24th Annual ACM Symposium on Applied Computing</i>,
    2009.'
  ieee: 'G. Schryen and R. Kadura, “Open Source vs. Closed Source Software: Towards
    Measuring Security,” in <i>24th Annual ACM Symposium on Applied Computing</i>,
    2009.'
  mla: 'Schryen, Guido, and Rouven Kadura. “Open Source vs. Closed Source Software:
    Towards Measuring Security.” <i>24th Annual ACM Symposium on Applied Computing</i>,
    2009.'
  short: 'G. Schryen, R. Kadura, in: 24th Annual ACM Symposium on Applied Computing,
    2009.'
date_created: 2018-11-14T14:12:27Z
date_updated: 2022-01-06T07:02:13Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:14:09Z
  date_updated: 2018-12-18T13:14:09Z
  file_id: '6310'
  file_name: ACM VERSION.pdf
  file_size: 456497
  relation: main_file
file_date_updated: 2018-12-18T13:14:09Z
has_accepted_license: '1'
keyword:
- Open source software
- Closed source software
- Security
- Metrics
language:
- iso: eng
oa: '1'
publication: 24th Annual ACM Symposium on Applied Computing
status: public
title: 'Open Source vs. Closed Source Software: Towards Measuring Security'
type: conference
user_id: '61579'
year: '2009'
...
---
_id: '5647'
abstract:
- lang: eng
  text: Reviewing literature on open source and closed source security reveals that
    the discussion is often determined by biased attitudes toward one of these development
    styles. The discussion specifically lacks appropriate metrics, methodology and
    hard data. This paper contributes to solving this problem by analyzing and comparing
    published vulnerabilities of eight open source software and nine closed source
    software packages, all of which are widely deployed. Thereby, it provides an extensive
    empirical analysis of vulnerabilities in terms of mean time between vulnerability
    disclosures, the development of disclosure over time, and the severity of vulnerabilities,
    and allows for validating models provided in the literature. The investigation
    reveals that (a) the mean time between vulnerability disclosures was lower for
    open source software in half of the cases, while the other cases show no differences,
    (b) in contrast to literature assumption, 14 out of 17 software packages showed
    a significant linear or piecewise linear correlation between time and the number
    of published vulnerabilities, and (c) regarding the severity of vulnerabilities,
    no significant differences were found between open source and closed source.
author:
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Schryen G. Security of open source and closed source software: An empirical
    comparison of published vulnerabilities. In: <i>15th Americas Conference on Information
    Systems</i>. ; 2009.'
  apa: 'Schryen, G. (2009). Security of open source and closed source software: An
    empirical comparison of published vulnerabilities. In <i>15th Americas Conference
    on Information Systems</i>.'
  bibtex: '@inproceedings{Schryen_2009, title={Security of open source and closed
    source software: An empirical comparison of published vulnerabilities}, booktitle={15th
    Americas Conference on Information Systems}, author={Schryen, Guido}, year={2009}
    }'
  chicago: 'Schryen, Guido. “Security of Open Source and Closed Source Software: An
    Empirical Comparison of Published Vulnerabilities.” In <i>15th Americas Conference
    on Information Systems</i>, 2009.'
  ieee: 'G. Schryen, “Security of open source and closed source software: An empirical
    comparison of published vulnerabilities,” in <i>15th Americas Conference on Information
    Systems</i>, 2009.'
  mla: 'Schryen, Guido. “Security of Open Source and Closed Source Software: An Empirical
    Comparison of Published Vulnerabilities.” <i>15th Americas Conference on Information
    Systems</i>, 2009.'
  short: 'G. Schryen, in: 15th Americas Conference on Information Systems, 2009.'
date_created: 2018-11-14T14:41:24Z
date_updated: 2022-01-06T07:02:19Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-18T13:16:39Z
  date_updated: 2018-12-18T13:16:39Z
  file_id: '6317'
  file_name: Security of Open Source and Closed Source Software An Empirical - AMCIS
    Version.pdf
  file_size: 483690
  relation: main_file
file_date_updated: 2018-12-18T13:16:39Z
has_accepted_license: '1'
keyword:
- Vulnerabilities
- security
- open source software
- closed source software
- empirical comparison
language:
- iso: eng
oa: '1'
publication: 15th Americas Conference on Information Systems
status: public
title: 'Security of open source and closed source software: An empirical comparison
  of published vulnerabilities'
type: conference
user_id: '61579'
year: '2009'
...
