[{"_id":"47842","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2023 IEEE Symposium on Security and Privacy (SP)","status":"public","publisher":"IEEE","date_updated":"2024-06-05T12:44:03Z","date_created":"2023-10-06T16:11:54Z","author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","doi":"10.1109/sp46215.2023.10179320","publication_status":"published","year":"2023","citation":{"mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>"}},{"title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","author":[{"first_name":"Marcel","last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-04-09T07:14:43Z","volume":21,"publisher":"IEEE","date_updated":"2024-06-05T13:53:18Z","citation":{"apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63.","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023."},"intvolume":"        21","page":"59–63","year":"2023","issue":"6","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"53368","status":"public","type":"journal_article","publication":"IEEE Security & Privacy"},{"status":"public","publication":"IEEE Secur. Priv.","type":"journal_article","language":[{"iso":"eng"}],"_id":"53348","department":[{"_id":"858"}],"user_id":"14931","year":"2023","page":"59–63","intvolume":"        21","citation":{"ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }"},"issue":"6","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","doi":"10.1109/MSEC.2023.3316569","date_updated":"2024-06-05T13:51:52Z","volume":21,"date_created":"2024-04-08T09:02:04Z","author":[{"first_name":"Marcel","full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}]},{"publication":"2022 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public","department":[{"_id":"858"}],"user_id":"14931","_id":"47844","extern":"1","language":[{"iso":"eng"}],"publication_status":"published","citation":{"ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>.","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }","apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>"},"year":"2022","date_created":"2023-10-06T16:12:30Z","author":[{"full_name":"Jancar, Jan","last_name":"Jancar","first_name":"Jan"},{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Daniel De Almeida","full_name":"Braga, Daniel De Almeida","last_name":"Braga"},{"first_name":"Mohamed","last_name":"Sabt","full_name":"Sabt, Mohamed"},{"last_name":"Schwabe","full_name":"Schwabe, Peter","first_name":"Peter"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"first_name":"Pierre-Alain","last_name":"Fouque","full_name":"Fouque, Pierre-Alain"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_updated":"2024-06-05T12:55:00Z","publisher":"IEEE","doi":"10.1109/sp46214.2022.9833713","title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks"},{"author":[{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Noah","last_name":"Wohler","full_name":"Wohler, Noah"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Marcel","full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-10-06T16:12:18Z","publisher":"IEEE","date_updated":"2024-06-05T12:55:32Z","doi":"10.1109/sp46214.2022.9833686","title":"Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source Software Projects","publication_status":"published","citation":{"chicago":"Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>.","ieee":"D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","apa":"Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>","ama":"Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>","mla":"Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","short":"D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","bibtex":"@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}, year={2022} }"},"year":"2022","user_id":"14931","department":[{"_id":"858"}],"_id":"47843","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","status":"public"},{"publisher":"Springer Berlin Heidelberg","date_updated":"2023-10-06T16:22:35Z","author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Kevin","last_name":"Stegemann","full_name":"Stegemann, Kevin"},{"full_name":"Petersen, Dominique","last_name":"Petersen","first_name":"Dominique"},{"full_name":"Pohlmann, Norbert","last_name":"Pohlmann","first_name":"Norbert"}],"date_created":"2023-10-06T16:08:23Z","title":"Aggregation of Network Protocol Data Near Its Source","doi":"10.1007/978-3-642-55032-4_49","publication_identifier":{"isbn":["9783642550317","9783642550324"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2014","citation":{"chicago":"Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann. “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>.","ieee":"M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.","ama":"Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer Berlin Heidelberg; 2014. doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>","bibtex":"@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg}, title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>}, booktitle={Information and Communication Technology}, publisher={Springer Berlin Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique and Pohlmann, Norbert}, year={2014} }","short":"M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.","mla":"Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.” <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014, doi:<a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">10.1007/978-3-642-55032-4_49</a>.","apa":"Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In <i>Information and Communication Technology</i>. Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-55032-4_49\">https://doi.org/10.1007/978-3-642-55032-4_49</a>"},"_id":"47839","user_id":"99291","extern":"1","language":[{"iso":"eng"}],"publication":"Information and Communication Technology","type":"book_chapter","status":"public"},{"publication_identifier":{"isbn":["978-3-88579-614-5"]},"citation":{"short":"M. Fourné, D. Petersen, N. Pohlmann, in: INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt, Gesellschaft für Informatik e.V., Bonn, 2013, pp. 2213–2224.","mla":"Fourné, Marcel, et al. “Attack-Test and Verification Systems, Steps towards Verifiable Anomaly Detection.” <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>, Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.","bibtex":"@inbook{Fourné_Petersen_Pohlmann_2013, place={Bonn}, title={Attack-test and verification systems, steps towards verifiable anomaly detection}, booktitle={INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt}, publisher={Gesellschaft für Informatik e.V.}, author={Fourné, Marcel and Petersen, Dominique and Pohlmann, Norbert}, year={2013}, pages={2213–2224} }","apa":"Fourné, M., Petersen, D., &#38; Pohlmann, N. (2013). Attack-test and verification systems, steps towards verifiable anomaly detection. In <i>INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt</i> (pp. 2213–2224). Gesellschaft für Informatik e.V.","ama":"Fourné M, Petersen D, Pohlmann N. Attack-test and verification systems, steps towards verifiable anomaly detection. In: <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>. Gesellschaft für Informatik e.V.; 2013:2213–2224.","chicago":"Fourné, Marcel, Dominique Petersen, and Norbert Pohlmann. “Attack-Test and Verification Systems, Steps towards Verifiable Anomaly Detection.” In <i>INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>, 2213–2224. Bonn: Gesellschaft für Informatik e.V., 2013.","ieee":"M. Fourné, D. Petersen, and N. Pohlmann, “Attack-test and verification systems, steps towards verifiable anomaly detection,” in <i>INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt</i>, Bonn: Gesellschaft für Informatik e.V., 2013, pp. 2213–2224."},"page":"2213–2224","place":"Bonn","year":"2013","author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"full_name":"Petersen, Dominique","last_name":"Petersen","first_name":"Dominique"},{"last_name":"Pohlmann","full_name":"Pohlmann, Norbert","first_name":"Norbert"}],"date_created":"2023-10-06T16:10:13Z","publisher":"Gesellschaft für Informatik e.V.","date_updated":"2023-10-06T16:22:52Z","title":"Attack-test and verification systems, steps towards verifiable anomaly detection","type":"book_chapter","publication":"INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt","status":"public","user_id":"99291","_id":"47841","language":[{"iso":"eng"}],"extern":"1"}]
