@article{20400,
  author       = {{Needle, AR and Kaminski, TW and Baumeister, Jochen and Higginson, JS and Farquhar, WB and Swanik, CB}},
  issn         = {{1056-6716}},
  journal      = {{J Sport Rehabil}},
  number       = {{1}},
  pages        = {{15--25}},
  title        = {{{The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.}}},
  doi          = {{10.1123/jsr.2015-0061}},
  volume       = {{26}},
  year         = {{2017}},
}

@article{20460,
  author       = {{Berner, K and Morris, L and Baumeister, Jochen and Louw, Q}},
  journal      = {{BMC Musculoskelet Disord}},
  number       = {{1}},
  pages        = {{325}},
  title        = {{{Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies}}},
  volume       = {{18}},
  year         = {{2017}},
}

@inproceedings{20493,
  author       = {{Krebs, Benjamin Philipp}},
  location     = {{Atlanta, USA}},
  title        = {{{Talent management and workforce performance: The too-much-potential-talent-effect. }}},
  year         = {{2017}},
}

@inbook{2050,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)}},
  editor       = {{Busche, Jan and Röhling, Andreas}},
  pages        = {{466 – 538}},
  publisher    = {{Carl Heymanns Verlag KG}},
  title        = {{{Kommentierung § 3 GWB (Mittelstandskartelle)}}},
  year         = {{2017}},
}

@article{2051,
  author       = {{Krimphove, Dieter}},
  journal      = {{Rechtstheorie}},
  number       = {{Jg. 47, Heft 3}},
  pages        = {{271 – 317}},
  publisher    = {{Dunker und Humblot}},
  title        = {{{Eigentum – Zum Bedeutungswandel eines Rechtsinstituts}}},
  year         = {{2017}},
}

@inbook{2052,
  author       = {{Krimphove, Dieter}},
  booktitle    = {{Law and Logic – Contemporary Issues}},
  editor       = {{Krimphove, Dieter and Lentner, Gabriel M.}},
  pages        = {{11 – 53}},
  publisher    = {{Dunker und Humblot}},
  title        = {{{A historical Overview of the Development of Legal Logic}}},
  year         = {{2017}},
}

@inbook{2054,
  author       = {{Krimphove, Dieter and Lüke, Christoph}},
  booktitle    = {{The Impact of the Mortgage Credit Directive in Europe}},
  editor       = {{Anderson, Miriam and Arroyo Amayuelas, Esther}},
  pages        = {{205 – 233}},
  publisher    = {{Europa Law Publishing }},
  title        = {{{The Transformation of the Mortgage Credit Directive in German Law}}},
  year         = {{2017}},
}

@inbook{20552,
  abstract     = {{Das Zukunftsszenario der Industrie 4.0 ist gepr{\"a}gt durch einen massiven Anstieg der unternehmens{\"u}bergreifenden Vernetzung. Um einer Bedrohung durch unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken, muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme ein hoher Stellenwert einger{\"a}umt werden. Dieses Paradigma wird als Security by Design bezeichnet. {\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt werden k{\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit erf{\"u}llen und damit die Eigenschaft der Industrial Security gew{\"a}hrleisten. Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering eine Entwicklung nach dem Paradigma Security by Design erm{\"o}glicht.}},
  author       = {{Gerking, Christopher and Bodden, Eric and Schäfer, Wilhelm}},
  booktitle    = {{Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}},
  editor       = {{Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}},
  isbn         = {{978-3-662-52903-4}},
  keywords     = {{ITSECWEBSITE}},
  pages        = {{1--24}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Industrial Security by Design}}},
  doi          = {{10.1007/978-3-662-52903-4_8-1}},
  year         = {{2017}},
}

@article{20553,
  abstract     = {{Finding and fixing software vulnerabilities have become a major struggle for most software development companies. While generally without alternative, such fixing efforts are a major cost factor, which is why companies have a vital interest in focusing their secure software development activities such that they obtain an optimal return on this investment. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP's secure development process, and we show how the issue fix time could be used to monitor the fixing process. We use three machine learning methods and evaluate their predictive power in predicting the time to fix issues. Interestingly, the models indicate that vulnerability type has less dominant impact on issue fix time than previously believed. The time it takes to fix an issue instead seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. SAP can use the models to implement a continuous improvement of its secure software development process and to measure the impact of individual improvements. The development teams at SAP develop different types of software, adopt different internal development processes, use different programming languages and platforms, and are located in different cities and countries. Other organizations, may use the results---with precaution---and be learning organizations.}},
  author       = {{Ben Othmane, Lotfi and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim D.}},
  issn         = {{2364-1541}},
  journal      = {{Data Science and Engineering}},
  number       = {{2}},
  pages        = {{107--124}},
  title        = {{{Time for Addressing Software Security Issues: Prediction Models and Impacting Factors}}},
  doi          = {{https://doi.org/10.1007/s41019-016-0019-8}},
  volume       = {{2}},
  year         = {{2017}},
}

@techreport{20554,
  author       = {{Bodden, Eric}},
  title        = {{{Self-adaptive static analysis}}},
  year         = {{2017}},
}

@article{20557,
  author       = {{Lillack, Max and Kästner, Christian and Bodden, Eric}},
  issn         = {{0098-5589}},
  journal      = {{IEEE Transactions on Software Engineering}},
  keywords     = {{Androids, Bluetooth, Humanoid robots, Java, Software, Tools, Configuration options, Static analysis, Variability mining}},
  number       = {{99}},
  pages        = {{1--1}},
  title        = {{{Tracking Load-time Configuration Options}}},
  doi          = {{10.1109/TSE.2017.2756048}},
  volume       = {{PP}},
  year         = {{2017}},
}

@inproceedings{20558,
  author       = {{Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram}},
  booktitle    = {{International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}},
  keywords     = {{ITSECWEBSITE, CROSSING}},
  title        = {{{CogniCrypt: Supporting Developers in using Cryptography}}},
  year         = {{2017}},
}

@inproceedings{20559,
  author       = {{Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}},
  booktitle    = {{Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis}},
  isbn         = {{978-1-4503-5076-1}},
  keywords     = {{Just-in-Time, Layered analysis, Static analysis}},
  pages        = {{307--317}},
  publisher    = {{ACM}},
  title        = {{{Just-in-time Static Analysis}}},
  doi          = {{10.1145/3092703.3092705}},
  year         = {{2017}},
}

@inproceedings{20659,
  author       = {{An, YW and DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB}},
  number       = {{5S}},
  pages        = {{360}},
  title        = {{{Altered brain activity during joint loading after anterior cruciate ligament reconstruction}}},
  volume       = {{49}},
  year         = {{2017}},
}

@inproceedings{20660,
  author       = {{An, YW and DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB}},
  number       = {{6}},
  pages        = {{136}},
  title        = {{{Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading}}},
  volume       = {{52}},
  year         = {{2017}},
}

@inproceedings{20661,
  author       = {{Anders, P and Lehmann, T and Müller, H and Molde, I and Gronvik, KB  and SkaeretMaroni, N and Vereijken, B and Baumeister, Jochen}},
  number       = {{1}},
  pages        = {{351}},
  title        = {{{Balance exergames increase cortical activity in frontal areas of the brain}}},
  volume       = {{57}},
  year         = {{2017}},
}

@inproceedings{20715,
  author       = {{Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}},
  booktitle    = {{International Conference for Software Engineering (ICSE), Tool Demonstrations Track}},
  keywords     = {{ATTRACT, ITSECWEBSITE}},
  title        = {{{Cheetah: Just-in-Time Taint Analysis for Android Apps}}},
  year         = {{2017}},
}

@inproceedings{20791,
  abstract     = {{Intelligente technische Systeme, wie autonom fahrende Fahrzeuge, werden in einem hohen Maß durch Software realisiert. Der Weg zum autonomen Fahren führt unweigerlich über eine steigende Vernetzung von Steuergeräten im Fahrzeug und über Fahrzeuggrenzen hinweg. Damit einher geht eine stetig steigende Komplexität der Software. Deshalb liegt es auf der Hand, dass die systematische Qualitätssicherung für derartige technische Systeme sehr früh, also bereits entwicklungsbegleitend, erfolgen muss. Dazu lässt sich das Software-in-the-Loop-Verfahren einsetzen, das auf etablierte Techniken des Hardware-in-the-Loop-Verfahrens zurückgreift. Eine besondere Herausforderung besteht darin, Simulationsmodelle und Testbibliotheken sowie die zugehörigen Visualisierungs- und Testwerkzeuge in beiden Welten synergetisch zu nutzen. Das Ziel ist eine einheitliche X-in-the-Loop (XIL) Basis für beide Verfahren. Der Schlüssel zu einer einheitlichen Basis für durchgängige XIL-Testszenarien ist der Einsatz eines übergeordneten Systemmodells. Es definiert die Systemgrenze und umliegenden Systeme in der Umwelt. Zudem dient das Systemmodell als Ordnungsschema für die Ablage der Artefakte wie Verhaltensmodelle, Testskripte, Parametersätze oder Workflows. Ein zentrales Datenmanagementwerkzeug, welches sämtliche Strukturinformationen, Verhaltensmodelle und Variantenbezüge verknüpft, ermöglicht ein teilautomatisches Umschalten zwischen den Testszenarien. In diesem Beitrag stellen wir eine solche Lösung vor.}},
  author       = {{Schmitz, Joachim and Fockel, Markus}},
  booktitle    = {{ Tag des Systems Engineering 2017}},
  publisher    = {{Gesellschaft f{\"u}r Systems Engineering e.V.}},
  title        = {{{Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien}}},
  year         = {{2017}},
}

@inproceedings{20792,
  author       = {{Schivo, Stefano and Yildiz., Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok, Stefan and Rensink, Arend and Stoelinga, Mariëlle}},
  booktitle    = {{Dependable Software Engineering, 3rd International Symposium (SETTA 2017)}},
  editor       = {{Larsen, Kim G. and Sokolsky, Oleg and Wang, Ji}},
  number       = {{10606}},
  pages        = {{319--336}},
  publisher    = {{Springer}},
  title        = {{{How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach}}},
  doi          = {{10.1007/978-3-319-69483-2_19}},
  year         = {{2017}},
}

@techreport{20793,
  abstract     = {{Scenario-based requirements engineering addresses the message-based coordination of software-intensive systems and enables, if underpinned with formal languages, automatic requirements validation techniques for improving the quality of a requirements specification. One of such requirements engineering approaches bases on a recent visual Live Sequence Chart variant compliant to the Unified Modeling Language, so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be constructive thanks to assembling solutions by means of reusable building blocks that are proven in practice, so that recurring problems do not need to be solved over and over again. Thus, patterns also gained momentum in the area of requirements documentation. In this technical report, we introduce a model- and scenario-based pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates and unifies 86 requirement patterns from three well-known, practice-oriented requirement pattern catalogs, each covering different aspects.}},
  author       = {{Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}},
  title        = {{{Model-based Requirement Pattern Catalog}}},
  year         = {{2017}},
}

