[{"user_id":"14931","department":[{"_id":"858"}],"_id":"47842","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2023 IEEE Symposium on Security and Privacy (SP)","status":"public","author":[{"last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"date_created":"2023-10-06T16:11:54Z","date_updated":"2024-06-05T12:44:03Z","publisher":"IEEE","doi":"10.1109/sp46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","publication_status":"published","citation":{"short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>"},"year":"2023"},{"volume":21,"author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-04-09T07:14:43Z","publisher":"IEEE","date_updated":"2024-06-05T13:53:18Z","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","issue":"6","intvolume":"        21","page":"59–63","citation":{"mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63.","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023."},"year":"2023","department":[{"_id":"858"}],"user_id":"14931","_id":"53368","language":[{"iso":"eng"}],"publication":"IEEE Security & Privacy","type":"journal_article","status":"public"},{"status":"public","publication":"IEEE Secur. Priv.","type":"journal_article","language":[{"iso":"eng"}],"_id":"53348","department":[{"_id":"858"}],"user_id":"14931","year":"2023","page":"59–63","intvolume":"        21","citation":{"chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>."},"issue":"6","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","doi":"10.1109/MSEC.2023.3316569","date_updated":"2024-06-05T13:51:52Z","volume":21,"author":[{"last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_created":"2024-04-08T09:02:04Z"},{"type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","status":"public","_id":"47844","user_id":"14931","department":[{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}],"publication_status":"published","year":"2022","citation":{"apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>.","ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>."},"date_updated":"2024-06-05T12:55:00Z","publisher":"IEEE","date_created":"2023-10-06T16:12:30Z","author":[{"full_name":"Jancar, Jan","last_name":"Jancar","first_name":"Jan"},{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Daniel De Almeida","last_name":"Braga","full_name":"Braga, Daniel De Almeida"},{"full_name":"Sabt, Mohamed","last_name":"Sabt","first_name":"Mohamed"},{"first_name":"Peter","last_name":"Schwabe","full_name":"Schwabe, Peter"},{"first_name":"Gilles","last_name":"Barthe","full_name":"Barthe, Gilles"},{"first_name":"Pierre-Alain","last_name":"Fouque","full_name":"Fouque, Pierre-Alain"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks","doi":"10.1109/sp46214.2022.9833713"},{"title":"Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source Software Projects","doi":"10.1109/sp46214.2022.9833686","date_updated":"2024-06-05T12:55:32Z","publisher":"IEEE","date_created":"2023-10-06T16:12:18Z","author":[{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"full_name":"Wohler, Noah","last_name":"Wohler","first_name":"Noah"},{"last_name":"Klemmer","full_name":"Klemmer, Jan H.","first_name":"Jan H."},{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"year":"2022","citation":{"chicago":"Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>.","ieee":"D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","short":"D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","bibtex":"@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}, year={2022} }","apa":"Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>","ama":"Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>"},"publication_status":"published","language":[{"iso":"eng"}],"extern":"1","_id":"47843","department":[{"_id":"858"}],"user_id":"14931","status":"public","publication":"2022 IEEE Symposium on Security and Privacy (SP)","type":"conference"},{"status":"public","type":"book_chapter","publication":"Information and Communication Technology","extern":"1","language":[{"iso":"eng"}],"user_id":"99291","_id":"47839","citation":{"apa":"Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In <i>Information and Communication Technology</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>","bibtex":"@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg}, title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>}, booktitle={Information and Communication Technology}, publisher={Springer Berlin Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique and Pohlmann, Norbert}, year={2014} }","short":"M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.","mla":"Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.” <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>.","chicago":"Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann. “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>.","ieee":"M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.","ama":"Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer Berlin Heidelberg; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>"},"place":"Berlin, Heidelberg","year":"2014","publication_status":"published","publication_identifier":{"isbn":["9783642550317","9783642550324"],"issn":["0302-9743","1611-3349"]},"doi":"10.1007/978-3-642-55032-4_49","title":"Aggregation of Network Protocol Data Near Its Source","date_created":"2023-10-06T16:08:23Z","author":[{"first_name":"Marcel","last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel"},{"first_name":"Kevin","full_name":"Stegemann, Kevin","last_name":"Stegemann"},{"first_name":"Dominique","full_name":"Petersen, Dominique","last_name":"Petersen"},{"first_name":"Norbert","full_name":"Pohlmann, Norbert","last_name":"Pohlmann"}],"date_updated":"2023-10-06T16:22:35Z","publisher":"Springer Berlin Heidelberg"},{"language":[{"iso":"eng"}],"extern":"1","user_id":"99291","_id":"47841","status":"public","publication":"INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt","type":"book_chapter","title":"Attack-test and verification systems, steps towards verifiable anomaly detection","date_created":"2023-10-06T16:10:13Z","author":[{"last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel","first_name":"Marcel"},{"full_name":"Petersen, Dominique","last_name":"Petersen","first_name":"Dominique"},{"full_name":"Pohlmann, Norbert","last_name":"Pohlmann","first_name":"Norbert"}],"date_updated":"2023-10-06T16:22:52Z","publisher":"Gesellschaft für Informatik e.V.","page":"2213–2224","citation":{"apa":"Fourné, M., Petersen, D., &#38; Pohlmann, N. (2013). Attack-test and verification systems, steps towards verifiable anomaly detection. In <i>INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt</i> (pp. 2213–2224). Gesellschaft für Informatik e.V.","short":"M. Fourné, D. Petersen, N. Pohlmann, in: INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt, Gesellschaft für Informatik e.V., Bonn, 2013, pp. 2213–2224.","mla":"Fourné, Marcel, et al. “Attack-Test and Verification Systems, Steps towards Verifiable Anomaly Detection.” <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>, Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.","bibtex":"@inbook{Fourné_Petersen_Pohlmann_2013, place={Bonn}, title={Attack-test and verification systems, steps towards verifiable anomaly detection}, booktitle={INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt}, publisher={Gesellschaft für Informatik e.V.}, author={Fourné, Marcel and Petersen, Dominique and Pohlmann, Norbert}, year={2013}, pages={2213–2224} }","ama":"Fourné M, Petersen D, Pohlmann N. Attack-test and verification systems, steps towards verifiable anomaly detection. In: <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>. Gesellschaft für Informatik e.V.; 2013:2213–2224.","ieee":"M. Fourné, D. Petersen, and N. Pohlmann, “Attack-test and verification systems, steps towards verifiable anomaly detection,” in <i>INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt</i>, Bonn: Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.","chicago":"Fourné, Marcel, Dominique Petersen, and Norbert Pohlmann. “Attack-Test and Verification Systems, Steps towards Verifiable Anomaly Detection.” In <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>, 2213–2224. Bonn: Gesellschaft für Informatik e.V., 2013."},"year":"2013","place":"Bonn","publication_identifier":{"isbn":["978-3-88579-614-5"]}}]
