---
_id: '43395'
author:
- first_name: Roman
  full_name: Trentinaglia, Roman
  id: '49934'
  last_name: Trentinaglia
  orcid: 0000-0001-9728-4991
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
citation:
  ama: 'Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security
    Requirements – An Experience Report. In: <i>REFSQ 2023: Requirements Engineering:
    Foundation for Software Quality</i>. Springer Nature Switzerland; 2023. doi:<a
    href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>'
  apa: 'Trentinaglia, R., Merschjohann, S., Fockel, M., &#38; Eikerling, H. (2023).
    Eliciting Security Requirements – An Experience Report. <i>REFSQ 2023: Requirements
    Engineering: Foundation for Software Quality</i>. <a href="https://doi.org/10.1007/978-3-031-29786-1_25">https://doi.org/10.1007/978-3-031-29786-1_25</a>'
  bibtex: '@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham},
    title={Eliciting Security Requirements – An Experience Report}, DOI={<a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>},
    booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality},
    publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann,
    Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }'
  chicago: 'Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling.
    “Eliciting Security Requirements – An Experience Report.” In <i>REFSQ 2023: Requirements
    Engineering: Foundation for Software Quality</i>. Cham: Springer Nature Switzerland,
    2023. <a href="https://doi.org/10.1007/978-3-031-29786-1_25">https://doi.org/10.1007/978-3-031-29786-1_25</a>.'
  ieee: 'R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting
    Security Requirements – An Experience Report,” 2023, doi: <a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>.'
  mla: 'Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience
    Report.” <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>,
    Springer Nature Switzerland, 2023, doi:<a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>.'
  short: 'R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023:
    Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland,
    Cham, 2023.'
date_created: 2023-04-04T12:47:31Z
date_updated: 2023-04-04T12:51:41Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-031-29786-1_25
language:
- iso: eng
place: Cham
publication: 'REFSQ 2023: Requirements Engineering: Foundation for Software Quality'
publication_identifier:
  isbn:
  - '9783031297854'
  - '9783031297861'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Nature Switzerland
status: public
title: Eliciting Security Requirements – An Experience Report
type: conference
user_id: '8472'
year: '2023'
...
---
_id: '23526'
abstract:
- lang: eng
  text: <jats:p>Modern and flexible application-level software platforms increase
    the attack surface of connected vehicles and thereby require automotive engineers
    to adopt additional security control techniques. These techniques encompass host-based
    intrusion detection systems (HIDSs) that detect suspicious activities in application
    contexts. Such application-aware HIDSs originate in information and communications
    technology systems and have a great potential to deal with the flexible nature
    of application-level software platforms. However, the elementary characteristics
    of known application-aware HIDS approaches and thereby the implications for their
    transfer to the automotive sector are unclear. In previous work, we presented
    a systematic literature review (SLR) covering the state of the art of application-aware
    HIDS approaches. We synthesized our findings by means of a fine-grained classification
    for each approach specified through a feature model and corresponding variant
    models. These models represent the approaches’ elementary characteristics. Furthermore,
    we summarized key findings and inferred implications for the transfer of application-aware
    HIDSs to the automotive sector. In this article, we extend the previous work by
    several aspects. We adjust the quality evaluation process within the SLR to be
    able to consider high quality conference publications, which results in an extended
    final pool of publications. For supporting HIDS developers on the task of configuring
    HIDS analysis techniques based on machine learning, we report on initial results
    on the applicability of AutoML. Furthermore, we present lessons learned regarding
    the application of the feature and variant model approach for SLRs. Finally, we
    more thoroughly describe the SLR study design.</jats:p>
author:
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
citation:
  ama: 'Schubert D, Eikerling H, Holtmann J. Application-Aware Intrusion Detection:
    A Systematic Literature Review, Implications for Automotive Systems, and Applicability
    of AutoML. <i>Frontiers in Computer Science</i>. 2021;3. doi:<a href="https://doi.org/10.3389/fcomp.2021.567873">10.3389/fcomp.2021.567873</a>'
  apa: 'Schubert, D., Eikerling, H., &#38; Holtmann, J. (2021). Application-Aware
    Intrusion Detection: A Systematic Literature Review, Implications for Automotive
    Systems, and Applicability of AutoML. <i>Frontiers in Computer Science</i>, <i>3</i>.
    <a href="https://doi.org/10.3389/fcomp.2021.567873">https://doi.org/10.3389/fcomp.2021.567873</a>'
  bibtex: '@article{Schubert_Eikerling_Holtmann_2021, title={Application-Aware Intrusion
    Detection: A Systematic Literature Review, Implications for Automotive Systems,
    and Applicability of AutoML}, volume={3}, DOI={<a href="https://doi.org/10.3389/fcomp.2021.567873">10.3389/fcomp.2021.567873</a>},
    journal={Frontiers in Computer Science}, publisher={Frontiers Media}, author={Schubert,
    David and Eikerling, Hendrik and Holtmann, Jörg}, year={2021} }'
  chicago: 'Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware
    Intrusion Detection: A Systematic Literature Review, Implications for Automotive
    Systems, and Applicability of AutoML.” <i>Frontiers in Computer Science</i> 3
    (2021). <a href="https://doi.org/10.3389/fcomp.2021.567873">https://doi.org/10.3389/fcomp.2021.567873</a>.'
  ieee: 'D. Schubert, H. Eikerling, and J. Holtmann, “Application-Aware Intrusion
    Detection: A Systematic Literature Review, Implications for Automotive Systems,
    and Applicability of AutoML,” <i>Frontiers in Computer Science</i>, vol. 3, 2021.'
  mla: 'Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic
    Literature Review, Implications for Automotive Systems, and Applicability of AutoML.”
    <i>Frontiers in Computer Science</i>, vol. 3, Frontiers Media, 2021, doi:<a href="https://doi.org/10.3389/fcomp.2021.567873">10.3389/fcomp.2021.567873</a>.'
  short: D. Schubert, H. Eikerling, J. Holtmann, Frontiers in Computer Science 3 (2021).
date_created: 2021-08-26T09:53:54Z
date_updated: 2022-01-06T06:55:56Z
department:
- _id: '241'
- _id: '662'
doi: 10.3389/fcomp.2021.567873
intvolume: '         3'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.frontiersin.org/articles/10.3389/fcomp.2021.567873/full
oa: '1'
publication: Frontiers in Computer Science
publication_identifier:
  issn:
  - 2624-9898
publication_status: published
publisher: Frontiers Media
status: public
title: 'Application-Aware Intrusion Detection: A Systematic Literature Review, Implications
  for Automotive Systems, and Applicability of AutoML'
type: journal_article
user_id: '29279'
volume: 3
year: '2021'
...
---
_id: '20760'
author:
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
citation:
  ama: 'Schubert D, Eikerling H, Holtmann J. Application-aware Intrusion Detection:
    A Systematic Literature Review and Implications for Automotive Systems. In: <i>17th
    Escar Europe : Embedded Security in Cars</i>. Ruhr-University Bochum, University
    Library; 2019.'
  apa: 'Schubert, D., Eikerling, H., &#38; Holtmann, J. (2019). Application-aware
    Intrusion Detection: A Systematic Literature Review and Implications for Automotive
    Systems. In <i>17th escar Europe : embedded security in cars</i>. Ruhr-University
    Bochum, University Library.'
  bibtex: '@inbook{Schubert_Eikerling_Holtmann_2019, title={Application-aware Intrusion
    Detection: A Systematic Literature Review and Implications for Automotive Systems},
    booktitle={17th escar Europe : embedded security in cars}, publisher={Ruhr-University
    Bochum, University Library}, author={Schubert, David and Eikerling, Hendrik and
    Holtmann, Jörg}, year={2019} }'
  chicago: 'Schubert, David, Hendrik Eikerling, and Jörg Holtmann. “Application-Aware
    Intrusion Detection: A Systematic Literature Review and Implications for Automotive
    Systems.” In <i>17th Escar Europe : Embedded Security in Cars</i>. Ruhr-University
    Bochum, University Library, 2019.'
  ieee: 'D. Schubert, H. Eikerling, and J. Holtmann, “Application-aware Intrusion
    Detection: A Systematic Literature Review and Implications for Automotive Systems,”
    in <i>17th escar Europe : embedded security in cars</i>, Ruhr-University Bochum,
    University Library, 2019.'
  mla: 'Schubert, David, et al. “Application-Aware Intrusion Detection: A Systematic
    Literature Review and Implications for Automotive Systems.” <i>17th Escar Europe :
    Embedded Security in Cars</i>, Ruhr-University Bochum, University Library, 2019.'
  short: 'D. Schubert, H. Eikerling, J. Holtmann, in: 17th Escar Europe : Embedded
    Security in Cars, Ruhr-University Bochum, University Library, 2019.'
date_created: 2020-12-16T14:05:10Z
date_updated: 2022-01-06T06:54:36Z
department:
- _id: '241'
language:
- iso: eng
publication: '17th escar Europe : embedded security in cars'
publisher: Ruhr-University Bochum, University Library
status: public
title: 'Application-aware Intrusion Detection: A Systematic Literature Review and
  Implications for Automotive Systems'
type: book_chapter
user_id: '9106'
year: '2019'
...
---
_id: '21072'
author:
- first_name: Sebastian
  full_name: Lehrig, Sebastian
  last_name: Lehrig
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
citation:
  ama: 'Lehrig S, Eikerling H, Becker S. Scalability, Elasticity, and Efficiency in
    Cloud Computing. In: <i>Proceedings of the 11th International ACM SIGSOFT Conference
    on Quality of Software Architectures</i>. ; 2015. doi:<a href="https://doi.org/10.1145/2737182.2737185">10.1145/2737182.2737185</a>'
  apa: Lehrig, S., Eikerling, H., &#38; Becker, S. (2015). Scalability, Elasticity,
    and Efficiency in Cloud Computing. In <i>Proceedings of the 11th International
    ACM SIGSOFT Conference on Quality of Software Architectures</i>. <a href="https://doi.org/10.1145/2737182.2737185">https://doi.org/10.1145/2737182.2737185</a>
  bibtex: '@inproceedings{Lehrig_Eikerling_Becker_2015, title={Scalability, Elasticity,
    and Efficiency in Cloud Computing}, DOI={<a href="https://doi.org/10.1145/2737182.2737185">10.1145/2737182.2737185</a>},
    booktitle={Proceedings of the 11th International ACM SIGSOFT Conference on Quality
    of Software Architectures}, author={Lehrig, Sebastian and Eikerling, Hendrik and
    Becker, Steffen}, year={2015} }'
  chicago: Lehrig, Sebastian, Hendrik Eikerling, and Steffen Becker. “Scalability,
    Elasticity, and Efficiency in Cloud Computing.” In <i>Proceedings of the 11th
    International ACM SIGSOFT Conference on Quality of Software Architectures</i>,
    2015. <a href="https://doi.org/10.1145/2737182.2737185">https://doi.org/10.1145/2737182.2737185</a>.
  ieee: S. Lehrig, H. Eikerling, and S. Becker, “Scalability, Elasticity, and Efficiency
    in Cloud Computing,” in <i>Proceedings of the 11th International ACM SIGSOFT Conference
    on Quality of Software Architectures</i>, 2015.
  mla: Lehrig, Sebastian, et al. “Scalability, Elasticity, and Efficiency in Cloud
    Computing.” <i>Proceedings of the 11th International ACM SIGSOFT Conference on
    Quality of Software Architectures</i>, 2015, doi:<a href="https://doi.org/10.1145/2737182.2737185">10.1145/2737182.2737185</a>.
  short: 'S. Lehrig, H. Eikerling, S. Becker, in: Proceedings of the 11th International
    ACM SIGSOFT Conference on Quality of Software Architectures, 2015.'
date_created: 2021-01-25T14:34:58Z
date_updated: 2022-01-06T06:54:44Z
doi: 10.1145/2737182.2737185
language:
- iso: eng
publication: Proceedings of the 11th International ACM SIGSOFT Conference on Quality
  of Software Architectures
publication_identifier:
  isbn:
  - '9781450334709'
publication_status: published
status: public
title: Scalability, Elasticity, and Efficiency in Cloud Computing
type: conference
user_id: '29279'
year: '2015'
...
---
_id: '21075'
author:
- first_name: Sebastian
  full_name: Lehrig, Sebastian
  last_name: Lehrig
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
citation:
  ama: 'Lehrig S, Eikerling H. Analyzing Cost-Efficiency of Cloud Computing Applications
    with SimuLizar. In: ; 2015. doi:<a href="https://doi.org/10.13140/RG.2.1.4036.9041">10.13140/RG.2.1.4036.9041</a>'
  apa: Lehrig, S., &#38; Eikerling, H. (2015). Analyzing Cost-Efficiency of Cloud
    Computing Applications with SimuLizar. Presented at the Symposium on Software
    Performance 2015, Munich. <a href="https://doi.org/10.13140/RG.2.1.4036.9041">https://doi.org/10.13140/RG.2.1.4036.9041</a>
  bibtex: '@inproceedings{Lehrig_Eikerling_2015, title={Analyzing Cost-Efficiency
    of Cloud Computing Applications with SimuLizar}, DOI={<a href="https://doi.org/10.13140/RG.2.1.4036.9041">10.13140/RG.2.1.4036.9041</a>},
    author={Lehrig, Sebastian and Eikerling, Hendrik}, year={2015} }'
  chicago: Lehrig, Sebastian, and Hendrik Eikerling. “Analyzing Cost-Efficiency of
    Cloud Computing Applications with SimuLizar,” 2015. <a href="https://doi.org/10.13140/RG.2.1.4036.9041">https://doi.org/10.13140/RG.2.1.4036.9041</a>.
  ieee: S. Lehrig and H. Eikerling, “Analyzing Cost-Efficiency of Cloud Computing
    Applications with SimuLizar,” presented at the Symposium on Software Performance
    2015, Munich, 2015.
  mla: Lehrig, Sebastian, and Hendrik Eikerling. <i>Analyzing Cost-Efficiency of Cloud
    Computing Applications with SimuLizar</i>. 2015, doi:<a href="https://doi.org/10.13140/RG.2.1.4036.9041">10.13140/RG.2.1.4036.9041</a>.
  short: 'S. Lehrig, H. Eikerling, in: 2015.'
conference:
  location: Munich
  name: Symposium on Software Performance 2015
date_created: 2021-01-25T14:38:01Z
date_updated: 2022-01-06T06:54:44Z
doi: 10.13140/RG.2.1.4036.9041
language:
- iso: eng
status: public
title: Analyzing Cost-Efficiency of Cloud Computing Applications with SimuLizar
type: conference
user_id: '29279'
year: '2015'
...
