[{"type":"conference","publication":"REFSQ 2023: Requirements Engineering: Foundation for Software Quality","status":"public","_id":"43395","user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783031297854","9783031297861"]},"year":"2023","place":"Cham","citation":{"ama":"Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security Requirements – An Experience Report. In: <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Springer Nature Switzerland; 2023. doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>","ieee":"R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting Security Requirements – An Experience Report,” 2023, doi: <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","chicago":"Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling. “Eliciting Security Requirements – An Experience Report.” In <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Cham: Springer Nature Switzerland, 2023. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>.","bibtex":"@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham}, title={Eliciting Security Requirements – An Experience Report}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>}, booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality}, publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann, Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }","mla":"Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience Report.” <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>, Springer Nature Switzerland, 2023, doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","short":"R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023: Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland, Cham, 2023.","apa":"Trentinaglia, R., Merschjohann, S., Fockel, M., &#38; Eikerling, H. (2023). Eliciting Security Requirements – An Experience Report. <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>"},"date_updated":"2023-04-04T12:51:41Z","publisher":"Springer Nature Switzerland","date_created":"2023-04-04T12:47:31Z","author":[{"id":"49934","full_name":"Trentinaglia, Roman","last_name":"Trentinaglia","orcid":"0000-0001-9728-4991","first_name":"Roman"},{"last_name":"Merschjohann","id":"11394","full_name":"Merschjohann, Sven","first_name":"Sven"},{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus"},{"first_name":"Hendrik","last_name":"Eikerling","full_name":"Eikerling, Hendrik","id":"29279"}],"title":"Eliciting Security Requirements – An Experience Report","doi":"10.1007/978-3-031-29786-1_25"},{"status":"public","abstract":[{"lang":"eng","text":"<jats:p>Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection systems (HIDSs) that detect suspicious activities in application contexts. Such application-aware HIDSs originate in information and communications technology systems and have a great potential to deal with the flexible nature of application-level software platforms. However, the elementary characteristics of known application-aware HIDS approaches and thereby the implications for their transfer to the automotive sector are unclear. In previous work, we presented a systematic literature review (SLR) covering the state of the art of application-aware HIDS approaches. We synthesized our findings by means of a fine-grained classification for each approach specified through a feature model and corresponding variant models. These models represent the approaches’ elementary characteristics. Furthermore, we summarized key findings and inferred implications for the transfer of application-aware HIDSs to the automotive sector. In this article, we extend the previous work by several aspects. We adjust the quality evaluation process within the SLR to be able to consider high quality conference publications, which results in an extended final pool of publications. For supporting HIDS developers on the task of configuring HIDS analysis techniques based on machine learning, we report on initial results on the applicability of AutoML. Furthermore, we present lessons learned regarding the application of the feature and variant model approach for SLRs. Finally, we more thoroughly describe the SLR study design.</jats:p>"}],"type":"journal_article","publication":"Frontiers in Computer Science","language":[{"iso":"eng"}],"user_id":"29279","department":[{"_id":"241"},{"_id":"662"}],"_id":"23526","citation":{"apa":"Schubert, D., Eikerling, H., &#38; Holtmann, J. (2021). Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML. <i>Frontiers in Computer Science</i>, <i>3</i>. <a href=\"https://doi.org/10.3389/fcomp.2021.567873\">https://doi.org/10.3389/fcomp.2021.567873</a>","bibtex":"@article{Schubert_Eikerling_Holtmann_2021, title={Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML}, volume={3}, DOI={<a href=\"https://doi.org/10.3389/fcomp.2021.567873\">10.3389/fcomp.2021.567873</a>}, journal={Frontiers in Computer Science}, publisher={Frontiers Media}, author={Schubert, David and Eikerling, Hendrik and Holtmann, Jörg}, year={2021} }","mla":"Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML.” <i>Frontiers in Computer Science</i>, vol. 3, Frontiers Media, 2021, doi:<a href=\"https://doi.org/10.3389/fcomp.2021.567873\">10.3389/fcomp.2021.567873</a>.","short":"D. Schubert, H. Eikerling, J. Holtmann, Frontiers in Computer Science 3 (2021).","chicago":"Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML.” <i>Frontiers in Computer Science</i> 3 (2021). <a href=\"https://doi.org/10.3389/fcomp.2021.567873\">https://doi.org/10.3389/fcomp.2021.567873</a>.","ieee":"D. Schubert, H. Eikerling, and J. Holtmann, “Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML,” <i>Frontiers in Computer Science</i>, vol. 3, 2021.","ama":"Schubert D, Eikerling H, Holtmann J. Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML. <i>Frontiers in Computer Science</i>. 2021;3. doi:<a href=\"https://doi.org/10.3389/fcomp.2021.567873\">10.3389/fcomp.2021.567873</a>"},"intvolume":"         3","year":"2021","publication_status":"published","publication_identifier":{"issn":["2624-9898"]},"main_file_link":[{"url":"https://www.frontiersin.org/articles/10.3389/fcomp.2021.567873/full","open_access":"1"}],"doi":"10.3389/fcomp.2021.567873","title":"Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML","date_created":"2021-08-26T09:53:54Z","author":[{"first_name":"David","last_name":"Schubert","id":"9106","full_name":"Schubert, David"},{"first_name":"Hendrik","full_name":"Eikerling, Hendrik","id":"29279","last_name":"Eikerling"},{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875"}],"volume":3,"oa":"1","publisher":"Frontiers Media","date_updated":"2022-01-06T06:55:56Z"},{"language":[{"iso":"eng"}],"_id":"20760","user_id":"9106","department":[{"_id":"241"}],"status":"public","type":"book_chapter","publication":"17th escar Europe : embedded security in cars","title":"Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems","publisher":"Ruhr-University Bochum, University Library","date_updated":"2022-01-06T06:54:36Z","author":[{"last_name":"Schubert","id":"9106","full_name":"Schubert, David","first_name":"David"},{"id":"29279","full_name":"Eikerling, Hendrik","last_name":"Eikerling","first_name":"Hendrik"},{"orcid":"0000-0001-6141-4571","last_name":"Holtmann","full_name":"Holtmann, Jörg","id":"3875","first_name":"Jörg"}],"date_created":"2020-12-16T14:05:10Z","year":"2019","citation":{"apa":"Schubert, D., Eikerling, H., &#38; Holtmann, J. (2019). Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems. In <i>17th escar Europe : embedded security in cars</i>. Ruhr-University Bochum, University Library.","short":"D. Schubert, H. Eikerling, J. Holtmann, in: 17th Escar Europe : Embedded Security in Cars, Ruhr-University Bochum, University Library, 2019.","bibtex":"@inbook{Schubert_Eikerling_Holtmann_2019, title={Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems}, booktitle={17th escar Europe : embedded security in cars}, publisher={Ruhr-University Bochum, University Library}, author={Schubert, David and Eikerling, Hendrik and Holtmann, Jörg}, year={2019} }","mla":"Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems.” <i>17th Escar Europe : Embedded Security in Cars</i>, Ruhr-University Bochum, University Library, 2019.","ama":"Schubert D, Eikerling H, Holtmann J. Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems. In: <i>17th Escar Europe : Embedded Security in Cars</i>. Ruhr-University Bochum, University Library; 2019.","chicago":"Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems.” In <i>17th Escar Europe : Embedded Security in Cars</i>. Ruhr-University Bochum, University Library, 2019.","ieee":"D. Schubert, H. Eikerling, and J. Holtmann, “Application-aware Intrusion Detection: A Systematic Literature Review and Implications for Automotive Systems,” in <i>17th escar Europe : embedded security in cars</i>, Ruhr-University Bochum, University Library, 2019."}},{"user_id":"29279","_id":"21072","language":[{"iso":"eng"}],"publication":"Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures","type":"conference","status":"public","date_created":"2021-01-25T14:34:58Z","author":[{"first_name":"Sebastian","full_name":"Lehrig, Sebastian","last_name":"Lehrig"},{"first_name":"Hendrik","last_name":"Eikerling","id":"29279","full_name":"Eikerling, Hendrik"},{"first_name":"Steffen","full_name":"Becker, Steffen","last_name":"Becker"}],"date_updated":"2022-01-06T06:54:44Z","doi":"10.1145/2737182.2737185","title":"Scalability, Elasticity, and Efficiency in Cloud Computing","publication_identifier":{"isbn":["9781450334709"]},"publication_status":"published","citation":{"apa":"Lehrig, S., Eikerling, H., &#38; Becker, S. (2015). Scalability, Elasticity, and Efficiency in Cloud Computing. In <i>Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures</i>. <a href=\"https://doi.org/10.1145/2737182.2737185\">https://doi.org/10.1145/2737182.2737185</a>","bibtex":"@inproceedings{Lehrig_Eikerling_Becker_2015, title={Scalability, Elasticity, and Efficiency in Cloud Computing}, DOI={<a href=\"https://doi.org/10.1145/2737182.2737185\">10.1145/2737182.2737185</a>}, booktitle={Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures}, author={Lehrig, Sebastian and Eikerling, Hendrik and Becker, Steffen}, year={2015} }","short":"S. Lehrig, H. Eikerling, S. Becker, in: Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, 2015.","mla":"Lehrig, Sebastian, et al. “Scalability, Elasticity, and Efficiency in Cloud Computing.” <i>Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures</i>, 2015, doi:<a href=\"https://doi.org/10.1145/2737182.2737185\">10.1145/2737182.2737185</a>.","ama":"Lehrig S, Eikerling H, Becker S. Scalability, Elasticity, and Efficiency in Cloud Computing. In: <i>Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures</i>. ; 2015. doi:<a href=\"https://doi.org/10.1145/2737182.2737185\">10.1145/2737182.2737185</a>","chicago":"Lehrig, Sebastian, Hendrik Eikerling, and Steffen Becker. “Scalability, Elasticity, and Efficiency in Cloud Computing.” In <i>Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures</i>, 2015. <a href=\"https://doi.org/10.1145/2737182.2737185\">https://doi.org/10.1145/2737182.2737185</a>.","ieee":"S. Lehrig, H. Eikerling, and S. Becker, “Scalability, Elasticity, and Efficiency in Cloud Computing,” in <i>Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures</i>, 2015."},"year":"2015"},{"date_updated":"2022-01-06T06:54:44Z","author":[{"full_name":"Lehrig, Sebastian","last_name":"Lehrig","first_name":"Sebastian"},{"first_name":"Hendrik","last_name":"Eikerling","full_name":"Eikerling, Hendrik","id":"29279"}],"date_created":"2021-01-25T14:38:01Z","title":"Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar","conference":{"name":"Symposium on Software Performance 2015","location":"Munich"},"doi":"10.13140/RG.2.1.4036.9041","year":"2015","citation":{"chicago":"Lehrig, Sebastian, and Hendrik Eikerling. “Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar,” 2015. <a href=\"https://doi.org/10.13140/RG.2.1.4036.9041\">https://doi.org/10.13140/RG.2.1.4036.9041</a>.","ieee":"S. Lehrig and H. Eikerling, “Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar,” presented at the Symposium on Software Performance 2015, Munich, 2015.","ama":"Lehrig S, Eikerling H. Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar. In: ; 2015. doi:<a href=\"https://doi.org/10.13140/RG.2.1.4036.9041\">10.13140/RG.2.1.4036.9041</a>","bibtex":"@inproceedings{Lehrig_Eikerling_2015, title={Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar}, DOI={<a href=\"https://doi.org/10.13140/RG.2.1.4036.9041\">10.13140/RG.2.1.4036.9041</a>}, author={Lehrig, Sebastian and Eikerling, Hendrik}, year={2015} }","mla":"Lehrig, Sebastian, and Hendrik Eikerling. <i>Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar</i>. 2015, doi:<a href=\"https://doi.org/10.13140/RG.2.1.4036.9041\">10.13140/RG.2.1.4036.9041</a>.","short":"S. Lehrig, H. Eikerling, in: 2015.","apa":"Lehrig, S., &#38; Eikerling, H. (2015). Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar. Presented at the Symposium on Software Performance 2015, Munich. <a href=\"https://doi.org/10.13140/RG.2.1.4036.9041\">https://doi.org/10.13140/RG.2.1.4036.9041</a>"},"_id":"21075","user_id":"29279","language":[{"iso":"eng"}],"type":"conference","status":"public"}]
