---
_id: '47842'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: William
  full_name: Enck, William
  last_name: Enck
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth:
    On the Importance and Challenges of Reproducible Builds for Software Supply Chain
    Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023.
    doi:<a href="https://doi.org/10.1109/sp46215.2023.10179320">10.1109/sp46215.2023.10179320</a>'
  apa: 'Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like
    flossing your teeth: On the Importance and Challenges of Reproducible Builds for
    Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy
    (SP)</i>. <a href="https://doi.org/10.1109/sp46215.2023.10179320">https://doi.org/10.1109/sp46215.2023.10179320</a>'
  bibtex: '@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing
    your teeth: On the Importance and Challenges of Reproducible Builds for Software
    Supply Chain Security}, DOI={<a href="https://doi.org/10.1109/sp46215.2023.10179320">10.1109/sp46215.2023.10179320</a>},
    booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha
    and Acar, Yasemin}, year={2023} }'
  chicago: 'Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin
    Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible
    Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security
    and Privacy (SP)</i>. IEEE, 2023. <a href="https://doi.org/10.1109/sp46215.2023.10179320">https://doi.org/10.1109/sp46215.2023.10179320</a>.'
  ieee: 'M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing
    your teeth: On the Importance and Challenges of Reproducible Builds for Software
    Supply Chain Security,” 2023, doi: <a href="https://doi.org/10.1109/sp46215.2023.10179320">10.1109/sp46215.2023.10179320</a>.'
  mla: 'Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and
    Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023
    IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href="https://doi.org/10.1109/sp46215.2023.10179320">10.1109/sp46215.2023.10179320</a>.'
  short: 'M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium
    on Security and Privacy (SP), IEEE, 2023.'
date_created: 2023-10-06T16:11:54Z
date_updated: 2024-06-05T12:44:03Z
department:
- _id: '858'
doi: 10.1109/sp46215.2023.10179320
extern: '1'
language:
- iso: eng
publication: 2023 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'It’s like flossing your teeth: On the Importance and Challenges of Reproducible
  Builds for Software Supply Chain Security'
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '53368'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software
    Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>.
    2023;21(6):59–63.'
  apa: 'Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human
    Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security
    &#38; Privacy</i>, <i>21</i>(6), 59–63.'
  bibtex: '@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors
    in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6},
    journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel
    and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63}
    }'
  chicago: 'Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint
    on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE
    Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.'
  ieee: 'M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors
    in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38;
    Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.'
  mla: 'Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain
    Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no.
    6, IEEE, 2023, pp. 59–63.'
  short: M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023)
    59–63.
date_created: 2024-04-09T07:14:43Z
date_updated: 2024-06-05T13:53:18Z
department:
- _id: '858'
intvolume: '        21'
issue: '6'
language:
- iso: eng
page: 59–63
publication: IEEE Security & Privacy
publisher: IEEE
status: public
title: 'A Viewpoint on Human Factors in Software Supply Chain Security: A Research
  Agenda'
type: journal_article
user_id: '14931'
volume: 21
year: '2023'
...
---
_id: '53348'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software
    Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63.
    doi:<a href="https://doi.org/10.1109/MSEC.2023.3316569">10.1109/MSEC.2023.3316569</a>'
  apa: 'Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human
    Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>,
    <i>21</i>(6), 59–63. <a href="https://doi.org/10.1109/MSEC.2023.3316569">https://doi.org/10.1109/MSEC.2023.3316569</a>'
  bibtex: '@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors
    in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href="https://doi.org/10.1109/MSEC.2023.3316569">10.1109/MSEC.2023.3316569</a>},
    number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik
    and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }'
  chicago: 'Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint
    on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE
    Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href="https://doi.org/10.1109/MSEC.2023.3316569">https://doi.org/10.1109/MSEC.2023.3316569</a>.'
  ieee: 'M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors
    in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>,
    vol. 21, no. 6, pp. 59–63, 2023, doi: <a href="https://doi.org/10.1109/MSEC.2023.3316569">10.1109/MSEC.2023.3316569</a>.'
  mla: 'Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain
    Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023,
    pp. 59–63, doi:<a href="https://doi.org/10.1109/MSEC.2023.3316569">10.1109/MSEC.2023.3316569</a>.'
  short: M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.
date_created: 2024-04-08T09:02:04Z
date_updated: 2024-06-05T13:51:52Z
department:
- _id: '858'
doi: 10.1109/MSEC.2023.3316569
intvolume: '        21'
issue: '6'
language:
- iso: eng
page: 59–63
publication: IEEE Secur. Priv.
status: public
title: 'A Viewpoint on Human Factors in Software Supply Chain Security: A Research
  Agenda'
type: journal_article
user_id: '14931'
volume: 21
year: '2023'
...
---
_id: '47844'
author:
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”:
    What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022
    IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>'
  apa: 'Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What
    Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium
    on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>'
  bibtex: '@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022,
    title={“They’re not that hard to mitigate”: What Cryptographic Library Developers
    Think About Timing Attacks}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt,
    Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar,
    Yasemin}, year={2022} }'
  chicago: 'Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That
    Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.”
    In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>.'
  ieee: 'J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  mla: 'Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  short: 'J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2023-10-06T16:12:30Z
date_updated: 2024-06-05T12:55:00Z
department:
- _id: '858'
doi: 10.1109/sp46214.2022.9833713
extern: '1'
language:
- iso: eng
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: '“They’re not that hard to mitigate”: What Cryptographic Library Developers
  Think About Timing Attacks'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47843'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Noah
  full_name: Wohler, Noah
  last_name: Wohler
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust:
    A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.
    In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a
    href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>'
  apa: 'Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl,
    S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust
    in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy
    (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>'
  bibtex: '@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel
    and Acar, Yasemin and Fahl, Sascha}, year={2022} }'
  chicago: 'Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar,
    and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp;
    Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>.'
  ieee: 'D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  mla: 'Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security
    &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  short: 'D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022
    IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2023-10-06T16:12:18Z
date_updated: 2024-06-05T12:55:32Z
department:
- _id: '858'
doi: 10.1109/sp46214.2022.9833686
extern: '1'
language:
- iso: eng
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source
  Software Projects'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47839'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Kevin
  full_name: Stegemann, Kevin
  last_name: Stegemann
- first_name: Dominique
  full_name: Petersen, Dominique
  last_name: Petersen
- first_name: Norbert
  full_name: Pohlmann, Norbert
  last_name: Pohlmann
citation:
  ama: 'Fourné M, Stegemann K, Petersen D, Pohlmann N. Aggregation of Network Protocol
    Data Near Its Source. In: <i>Information and Communication Technology</i>. Springer
    Berlin Heidelberg; 2014. doi:<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>'
  apa: Fourné, M., Stegemann, K., Petersen, D., &#38; Pohlmann, N. (2014). Aggregation
    of Network Protocol Data Near Its Source. In <i>Information and Communication
    Technology</i>. Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-642-55032-4_49">https://doi.org/10.1007/978-3-642-55032-4_49</a>
  bibtex: '@inbook{Fourné_Stegemann_Petersen_Pohlmann_2014, place={Berlin, Heidelberg},
    title={Aggregation of Network Protocol Data Near Its Source}, DOI={<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>},
    booktitle={Information and Communication Technology}, publisher={Springer Berlin
    Heidelberg}, author={Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique
    and Pohlmann, Norbert}, year={2014} }'
  chicago: 'Fourné, Marcel, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann.
    “Aggregation of Network Protocol Data Near Its Source.” In <i>Information and
    Communication Technology</i>. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2014. <a href="https://doi.org/10.1007/978-3-642-55032-4_49">https://doi.org/10.1007/978-3-642-55032-4_49</a>.'
  ieee: 'M. Fourné, K. Stegemann, D. Petersen, and N. Pohlmann, “Aggregation of Network
    Protocol Data Near Its Source,” in <i>Information and Communication Technology</i>,
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.'
  mla: Fourné, Marcel, et al. “Aggregation of Network Protocol Data Near Its Source.”
    <i>Information and Communication Technology</i>, Springer Berlin Heidelberg, 2014,
    doi:<a href="https://doi.org/10.1007/978-3-642-55032-4_49">10.1007/978-3-642-55032-4_49</a>.
  short: 'M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication
    Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.'
date_created: 2023-10-06T16:08:23Z
date_updated: 2023-10-06T16:22:35Z
doi: 10.1007/978-3-642-55032-4_49
extern: '1'
language:
- iso: eng
place: Berlin, Heidelberg
publication: Information and Communication Technology
publication_identifier:
  isbn:
  - '9783642550317'
  - '9783642550324'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Aggregation of Network Protocol Data Near Its Source
type: book_chapter
user_id: '99291'
year: '2014'
...
---
_id: '47841'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Dominique
  full_name: Petersen, Dominique
  last_name: Petersen
- first_name: Norbert
  full_name: Pohlmann, Norbert
  last_name: Pohlmann
citation:
  ama: 'Fourné M, Petersen D, Pohlmann N. Attack-test and verification systems, steps
    towards verifiable anomaly detection. In: <i>INFORMATIK 2013 – Informatik Angepasst
    an Mensch, Organisation Und Umwelt</i>. Gesellschaft für Informatik e.V.; 2013:2213–2224.'
  apa: Fourné, M., Petersen, D., &#38; Pohlmann, N. (2013). Attack-test and verification
    systems, steps towards verifiable anomaly detection. In <i>INFORMATIK 2013 – Informatik
    angepasst an Mensch, Organisation und Umwelt</i> (pp. 2213–2224). Gesellschaft
    für Informatik e.V.
  bibtex: '@inbook{Fourné_Petersen_Pohlmann_2013, place={Bonn}, title={Attack-test
    and verification systems, steps towards verifiable anomaly detection}, booktitle={INFORMATIK
    2013 – Informatik angepasst an Mensch, Organisation und Umwelt}, publisher={Gesellschaft
    für Informatik e.V.}, author={Fourné, Marcel and Petersen, Dominique and Pohlmann,
    Norbert}, year={2013}, pages={2213–2224} }'
  chicago: 'Fourné, Marcel, Dominique Petersen, and Norbert Pohlmann. “Attack-Test
    and Verification Systems, Steps towards Verifiable Anomaly Detection.” In <i>INFORMATIK
    2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt</i>, 2213–2224.
    Bonn: Gesellschaft für Informatik e.V., 2013.'
  ieee: 'M. Fourné, D. Petersen, and N. Pohlmann, “Attack-test and verification systems,
    steps towards verifiable anomaly detection,” in <i>INFORMATIK 2013 – Informatik
    angepasst an Mensch, Organisation und Umwelt</i>, Bonn: Gesellschaft für Informatik
    e.V., 2013, pp. 2213–2224.'
  mla: Fourné, Marcel, et al. “Attack-Test and Verification Systems, Steps towards
    Verifiable Anomaly Detection.” <i>INFORMATIK 2013 – Informatik Angepasst an Mensch,
    Organisation Und Umwelt</i>, Gesellschaft für Informatik e.V., 2013, pp. 2213–2224.
  short: 'M. Fourné, D. Petersen, N. Pohlmann, in: INFORMATIK 2013 – Informatik Angepasst
    an Mensch, Organisation Und Umwelt, Gesellschaft für Informatik e.V., Bonn, 2013,
    pp. 2213–2224.'
date_created: 2023-10-06T16:10:13Z
date_updated: 2023-10-06T16:22:52Z
extern: '1'
language:
- iso: eng
page: 2213–2224
place: Bonn
publication: INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt
publication_identifier:
  isbn:
  - 978-3-88579-614-5
publisher: Gesellschaft für Informatik e.V.
status: public
title: Attack-test and verification systems, steps towards verifiable anomaly detection
type: book_chapter
user_id: '99291'
year: '2013'
...
