[{"year":"2017","page":"827-828","citation":{"mla":"Heindorf, Stefan, et al. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.” <i>WSDM</i>, ACM, 2017, pp. 827–28, doi:<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>.","short":"S. Heindorf, M. Potthast, H. Bast, B. Buchhold, E. Haussmann, in: WSDM, ACM, 2017, pp. 827–828.","bibtex":"@inproceedings{Heindorf_Potthast_Bast_Buchhold_Haussmann_2017, title={WSDM Cup 2017: Vandalism Detection and Triple Scoring}, DOI={<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>}, booktitle={WSDM}, publisher={ACM}, author={Heindorf, Stefan and Potthast, Martin and Bast, Hannah and Buchhold, Björn and Haussmann, Elmar}, year={2017}, pages={827–828} }","apa":"Heindorf, S., Potthast, M., Bast, H., Buchhold, B., &#38; Haussmann, E. (2017). WSDM Cup 2017: Vandalism Detection and Triple Scoring. <i>WSDM</i>, 827–828. <a href=\"https://doi.org/10.1145/3018661.3022762\">https://doi.org/10.1145/3018661.3022762</a>","chicago":"Heindorf, Stefan, Martin Potthast, Hannah Bast, Björn Buchhold, and Elmar Haussmann. “WSDM Cup 2017: Vandalism Detection and Triple Scoring.” In <i>WSDM</i>, 827–28. ACM, 2017. <a href=\"https://doi.org/10.1145/3018661.3022762\">https://doi.org/10.1145/3018661.3022762</a>.","ieee":"S. Heindorf, M. Potthast, H. Bast, B. Buchhold, and E. Haussmann, “WSDM Cup 2017: Vandalism Detection and Triple Scoring,” in <i>WSDM</i>, 2017, pp. 827–828, doi: <a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>.","ama":"Heindorf S, Potthast M, Bast H, Buchhold B, Haussmann E. WSDM Cup 2017: Vandalism Detection and Triple Scoring. In: <i>WSDM</i>. ACM; 2017:827-828. doi:<a href=\"https://doi.org/10.1145/3018661.3022762\">10.1145/3018661.3022762</a>"},"title":"WSDM Cup 2017: Vandalism Detection and Triple Scoring","doi":"10.1145/3018661.3022762","main_file_link":[{"open_access":"1","url":"https://cs.uni-paderborn.de/fileadmin/informatik/fg/dbis/Publikationen/2017/heindorf2017_WSDM.pdf"}],"oa":"1","date_updated":"2024-05-26T19:15:24Z","publisher":"ACM","date_created":"2019-01-15T08:54:23Z","author":[{"id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf","first_name":"Stefan"},{"first_name":"Martin","last_name":"Potthast","full_name":"Potthast, Martin"},{"first_name":"Hannah","full_name":"Bast, Hannah","last_name":"Bast"},{"first_name":"Björn","full_name":"Buchhold, Björn","last_name":"Buchhold"},{"last_name":"Haussmann","full_name":"Haussmann, Elmar","first_name":"Elmar"}],"status":"public","publication":"WSDM","type":"conference","language":[{"iso":"eng"}],"_id":"6721","department":[{"_id":"66"}],"user_id":"11871"},{"publication_status":"published","citation":{"mla":"Hartig, Christine. “„[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen.” <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, edited by Elisabeth Dietrich-Daum et al., 2017, pp. 255–99.","bibtex":"@inbook{Hartig_2017, place={Innsbruck}, title={„[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen}, booktitle={Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge}, author={Hartig, Christine }, editor={Dietrich-Daum, Elisabeth and Ralser, Michaela and Rupnow, Dirk}, year={2017}, pages={255–299} }","short":"C. Hartig, in: E. Dietrich-Daum, M. Ralser, D. Rupnow (Eds.), Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge, Innsbruck, 2017, pp. 255–299.","apa":"Hartig, C. (2017). „[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen. In E. Dietrich-Daum, M. Ralser, &#38; D. Rupnow (Eds.), <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i> (pp. 255–299).","ieee":"C. Hartig, “„[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen,” in <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, E. Dietrich-Daum, M. Ralser, and D. Rupnow, Eds. Innsbruck, 2017, pp. 255–299.","chicago":"Hartig, Christine . “„[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen.” In <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, edited by Elisabeth Dietrich-Daum, Michaela Ralser, and Dirk Rupnow, 255–99. Innsbruck, 2017.","ama":"Hartig C. „[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen. In: Dietrich-Daum E, Ralser M, Rupnow D, eds. <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>. ; 2017:255-299."},"page":"255-299","place":"Innsbruck","year":"2017","date_created":"2024-05-20T00:19:08Z","author":[{"last_name":"Hartig","full_name":"Hartig, Christine ","first_name":"Christine "}],"date_updated":"2024-05-27T21:51:59Z","main_file_link":[{"url":"https://www.uibk.ac.at/iezw/forschungen-zur-kinderbeobachtungsstation/dokumente/studie-kinderbeobachtungsstation-nowak-vogl-2017.pdf"}],"title":"„[A]ls Kind musst du einfach damit umgehen. Weil friss oder stirb, gell“ – Die Innsbrucker Kinderbeobachtungsstation der Maria Nowak-Vogl (1954-1987) im Spiegel von Interviews ehemaliger PatientInnen","type":"book_chapter","publication":"Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge","status":"public","editor":[{"first_name":"Elisabeth","full_name":"Dietrich-Daum, Elisabeth","last_name":"Dietrich-Daum"},{"first_name":"Michaela","full_name":"Ralser, Michaela","last_name":"Ralser"},{"first_name":"Dirk","last_name":"Rupnow","full_name":"Rupnow, Dirk"}],"user_id":"49063","department":[{"_id":"125"}],"_id":"54367","language":[{"iso":"ger"}],"extern":"1"},{"title":"Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich","main_file_link":[{"url":"https://www.uibk.ac.at/iezw/forschungen-zur-kinderbeobachtungsstation/dokumente/studie-kinderbeobachtungsstation-nowak-vogl-2017.pdf"}],"date_updated":"2024-05-27T21:52:15Z","author":[{"first_name":"Christine ","last_name":"Hartig","full_name":"Hartig, Christine "}],"date_created":"2024-05-20T00:14:38Z","year":"2017","place":"Innsbruck","citation":{"apa":"Hartig, C. (2017). Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich. In E. Dietrich-Daum, M.  Ralser, &#38; D. Rupnow (Eds.), <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i> (pp. 58–73).","short":"C. Hartig, in: E. Dietrich-Daum, M.  Ralser, D. Rupnow (Eds.), Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge, Innsbruck, 2017, pp. 58–73.","mla":"Hartig, Christine. “Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich.” <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, edited by Elisabeth Dietrich-Daum et al., 2017, pp. 58–73.","bibtex":"@inbook{Hartig_2017, place={Innsbruck}, title={Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich}, booktitle={Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge}, author={Hartig, Christine }, editor={Dietrich-Daum, Elisabeth and  Ralser, Michaela and Rupnow, Dirk}, year={2017}, pages={58–73} }","ama":"Hartig C. Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich. In: Dietrich-Daum E,  Ralser M, Rupnow D, eds. <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>. ; 2017:58-73.","ieee":"C. Hartig, “Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich,” in <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, E. Dietrich-Daum, M.  Ralser, and D. Rupnow, Eds. Innsbruck, 2017, pp. 58–73.","chicago":"Hartig, Christine . “Die Professionalisierung der Heilpädagogik im Feld der frühen Kinderpsychiatrie und Kinderheilkunde in Österreich.” In <i>Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge</i>, edited by Elisabeth Dietrich-Daum, Michaela  Ralser, and Dirk Rupnow, 58–73. Innsbruck, 2017."},"page":"58-73","publication_status":"published","extern":"1","language":[{"iso":"ger"}],"_id":"54366","user_id":"49063","department":[{"_id":"125"}],"editor":[{"last_name":"Dietrich-Daum","full_name":"Dietrich-Daum, Elisabeth","first_name":"Elisabeth"},{"last_name":" Ralser","full_name":" Ralser, Michaela","first_name":"Michaela"},{"last_name":"Rupnow","full_name":"Rupnow, Dirk","first_name":"Dirk"}],"status":"public","type":"book_chapter","publication":"Studie betreffend die Kinderbeobachtungsstation der Maria Nowak-Vogl. Interdisziplinäre Zugänge"},{"page":"34-36","citation":{"ama":"Mombeck MM, Fischer B, Bartonitschek A. Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020. In: Kleinert J, Wolf  J, eds. <i>Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung</i>. ; 2017:34-36.","ieee":"M. M. Mombeck, B. Fischer, and A. Bartonitschek, “Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020,” in <i>Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung</i>, J. Kleinert and J. Wolf , Eds. 2017, pp. 34–36.","chicago":"Mombeck, Mona Maria, Britta Fischer, and Anke Bartonitschek. “Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020.” In <i>Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung</i>, edited by Jens Kleinert and Julia  Wolf , 34–36, 2017.","apa":"Mombeck, M. M., Fischer, B., &#38; Bartonitschek, A. (2017). Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020. In J. Kleinert &#38; J. Wolf  (Eds.), <i>Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung</i> (pp. 34–36).","mla":"Mombeck, Mona Maria, et al. “Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020.” <i>Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung</i>, edited by Jens Kleinert and Julia  Wolf , 2017, pp. 34–36.","bibtex":"@inbook{Mombeck_Fischer_Bartonitschek_2017, title={Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020}, booktitle={Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung}, author={Mombeck, Mona Maria and Fischer, Britta and Bartonitschek, Anke}, editor={Kleinert, Jens and Wolf , Julia }, year={2017}, pages={34–36} }","short":"M.M. Mombeck, B. Fischer, A. Bartonitschek, in: J. Kleinert, J. Wolf  (Eds.), Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung, 2017, pp. 34–36."},"year":"2017","publication_status":"published","title":"Eine Brücke zur Praxis - Schnittstellenmanagement in Schulsport2020","date_created":"2024-05-28T08:23:59Z","author":[{"last_name":"Mombeck","full_name":"Mombeck, Mona Maria","id":"29268","first_name":"Mona Maria"},{"last_name":"Fischer","full_name":"Fischer, Britta","first_name":"Britta"},{"first_name":"Anke","last_name":"Bartonitschek","full_name":"Bartonitschek, Anke"}],"date_updated":"2024-05-28T09:12:37Z","status":"public","editor":[{"last_name":"Kleinert","full_name":"Kleinert, Jens","first_name":"Jens"},{"first_name":"Julia ","last_name":"Wolf ","full_name":"Wolf , Julia "}],"publication":"Schulsport2020: Erste Ergebnisse des Projekts und Ausblicke auf eine Weiterentwicklung der Sportlehrer/innenbildung","type":"book_chapter","language":[{"iso":"ger"}],"user_id":"29268","_id":"54475"},{"type":"book_chapter","publication":"Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag","editor":[{"full_name":"Bernhard, Roland","last_name":"Bernhard","first_name":"Roland"},{"last_name":"Grindel","full_name":"Grindel, Susanne","first_name":"Susanne"},{"last_name":"Hinz","full_name":"Hinz, Felix","first_name":"Felix"},{"last_name":"Kühberger","full_name":"Kühberger, Christoph","first_name":"Christoph"}],"status":"public","_id":"54499","user_id":"79742","department":[{"_id":"6"},{"_id":"444"}],"language":[{"iso":"ger"}],"publication_identifier":{"isbn":["978-3847106869"]},"place":"Göttingen","year":"2017","citation":{"ama":"Bernhard R, Grindel S, Hinz F, Kühberger C, Meyer-Hamme J. Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive. In: Bernhard R, Grindel S, Hinz F, Kühberger C, eds. <i>Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag</i>. ; 2017:11-31.","chicago":"Bernhard, Roland, Susanne Grindel, Felix Hinz, Christoph Kühberger, and Johannes Meyer-Hamme. “Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive.” In <i>Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag</i>, edited by Roland Bernhard, Susanne Grindel, Felix Hinz, and Christoph Kühberger, 11–31. Göttingen, 2017.","ieee":"R. Bernhard, S. Grindel, F. Hinz, C. Kühberger, and J. Meyer-Hamme, “Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive,” in <i>Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag</i>, R. Bernhard, S. Grindel, F. Hinz, and C. Kühberger, Eds. Göttingen, 2017, pp. 11–31.","apa":"Bernhard, R., Grindel, S., Hinz, F., Kühberger, C., &#38; Meyer-Hamme, J. (2017). Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive. In R. Bernhard, S. Grindel, F. Hinz, &#38; C. Kühberger (Eds.), <i>Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag</i> (pp. 11–31).","bibtex":"@inbook{Bernhard_Grindel_Hinz_Kühberger_Meyer-Hamme_2017, place={Göttingen}, title={Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive}, booktitle={Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag}, author={Bernhard, Roland and Grindel, Susanne and Hinz, Felix and Kühberger, Christoph and Meyer-Hamme, Johannes}, editor={Bernhard, Roland and Grindel, Susanne and Hinz, Felix and Kühberger, Christoph}, year={2017}, pages={11–31} }","mla":"Bernhard, Roland, et al. “Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive.” <i>Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag</i>, edited by Roland Bernhard et al., 2017, pp. 11–31.","short":"R. Bernhard, S. Grindel, F. Hinz, C. Kühberger, J. Meyer-Hamme, in: R. Bernhard, S. Grindel, F. Hinz, C. Kühberger (Eds.), Mythen in deutschsprachigen Geschichtsschulbüchern – von Marathon bis zum Élysée-Vertrag, Göttingen, 2017, pp. 11–31."},"page":"11-31","date_updated":"2024-05-29T08:11:59Z","author":[{"full_name":"Bernhard, Roland","last_name":"Bernhard","first_name":"Roland"},{"first_name":"Susanne","last_name":"Grindel","full_name":"Grindel, Susanne"},{"last_name":"Hinz","full_name":"Hinz, Felix","first_name":"Felix"},{"full_name":"Kühberger, Christoph","last_name":"Kühberger","first_name":"Christoph"},{"first_name":"Johannes","id":"49623","full_name":"Meyer-Hamme, Johannes","last_name":"Meyer-Hamme"}],"date_created":"2024-05-29T08:11:56Z","title":"Was ist ein historischer Mythos? Versuch einer Definition aus kulturwissenschaftlicher und geschichtsdidaktischer Perspektive"},{"_id":"54500","user_id":"79742","department":[{"_id":"6"},{"_id":"444"}],"language":[{"iso":"ger"}],"type":"book_chapter","publication":"Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“","editor":[{"first_name":"Monika","full_name":"Waldis, Monika","last_name":"Waldis"},{"first_name":"Beatrice","last_name":"Ziegler","full_name":"Ziegler, Beatrice"}],"status":"public","date_updated":"2024-05-29T08:16:12Z","date_created":"2024-05-29T08:16:09Z","author":[{"last_name":"Körber","full_name":"Körber, Andreas","first_name":"Andreas"},{"first_name":"Johannes","last_name":"Meyer-Hamme","id":"49623","full_name":"Meyer-Hamme, Johannes"}],"title":"Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen","publication_identifier":{"isbn":["978-3035506716"]},"year":"2017","citation":{"apa":"Körber, A., &#38; Meyer-Hamme, J. (2017). Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen. In M. Waldis &#38; B. Ziegler (Eds.), <i>Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“</i> (pp. 248–264).","mla":"Körber, Andreas, and Johannes Meyer-Hamme. “Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen.” <i>Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“</i>, edited by Monika Waldis and Beatrice Ziegler, 2017, pp. 248–64.","bibtex":"@inbook{Körber_Meyer-Hamme_2017, title={Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen}, booktitle={Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“}, author={Körber, Andreas and Meyer-Hamme, Johannes}, editor={Waldis, Monika and Ziegler, Beatrice}, year={2017}, pages={248–264} }","short":"A. Körber, J. Meyer-Hamme, in: M. Waldis, B. Ziegler (Eds.), Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“, 2017, pp. 248–264.","chicago":"Körber, Andreas, and Johannes Meyer-Hamme. “Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen.” In <i>Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“</i>, edited by Monika Waldis and Beatrice Ziegler, 248–64, 2017.","ieee":"A. Körber and J. Meyer-Hamme, “Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen,” in <i>Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“</i>, M. Waldis and B. Ziegler, Eds. 2017, pp. 248–264.","ama":"Körber A, Meyer-Hamme J. Kompetenzen historischen Denkens messen?! Herausforderungen – Lösungsansätze – fachdidaktische Implikationen. In: Waldis M, Ziegler B, eds. <i>Forschungswerkstatt Geschichtsdidaktik 15. Beiträge zur Tagung „geschichtsdidaktik empirisch 15“</i>. ; 2017:248-264."},"page":"248-264"},{"author":[{"id":"49623","full_name":"Meyer-Hamme, Johannes","last_name":"Meyer-Hamme","first_name":"Johannes"}],"date_created":"2024-05-29T08:22:16Z","date_updated":"2024-05-29T08:22:20Z","title":"\"Geschichte\"","publication_identifier":{"isbn":["978-3825286972"]},"page":"499-504","citation":{"mla":"Meyer-Hamme, Johannes. “‘Geschichte.’” <i>Handbuch Interkulturelle Pädagogik</i>, edited by Ingrid Gogolin et al., 2017, pp. 499–504.","short":"J. Meyer-Hamme, in: I. Gogolin, V. Georgi, M. Krüger-Potratz, D. Lengyel, U. Sandfuchs (Eds.), Handbuch Interkulturelle Pädagogik, Bielefeld, 2017, pp. 499–504.","bibtex":"@inbook{Meyer-Hamme_2017, place={Bielefeld}, title={“Geschichte”}, booktitle={Handbuch Interkulturelle Pädagogik}, author={Meyer-Hamme, Johannes}, editor={Gogolin, Ingrid and Georgi, Viola and Krüger-Potratz, Marianne and Lengyel, Drorit and Sandfuchs, Uwe}, year={2017}, pages={499–504} }","apa":"Meyer-Hamme, J. (2017). “Geschichte.” In I. Gogolin, V. Georgi, M. Krüger-Potratz, D. Lengyel, &#38; U. Sandfuchs (Eds.), <i>Handbuch Interkulturelle Pädagogik</i> (pp. 499–504).","ama":"Meyer-Hamme J. “Geschichte.” In: Gogolin I, Georgi V, Krüger-Potratz M, Lengyel D, Sandfuchs U, eds. <i>Handbuch Interkulturelle Pädagogik</i>. ; 2017:499-504.","chicago":"Meyer-Hamme, Johannes. “‘Geschichte.’” In <i>Handbuch Interkulturelle Pädagogik</i>, edited by Ingrid Gogolin, Viola Georgi, Marianne Krüger-Potratz, Drorit Lengyel, and Uwe Sandfuchs, 499–504. Bielefeld, 2017.","ieee":"J. Meyer-Hamme, “‘Geschichte,’” in <i>Handbuch Interkulturelle Pädagogik</i>, I. Gogolin, V. Georgi, M. Krüger-Potratz, D. Lengyel, and U. Sandfuchs, Eds. Bielefeld, 2017, pp. 499–504."},"place":"Bielefeld","year":"2017","department":[{"_id":"6"},{"_id":"444"}],"user_id":"79742","_id":"54501","language":[{"iso":"ger"}],"publication":"Handbuch Interkulturelle Pädagogik","type":"book_chapter","status":"public","editor":[{"last_name":"Gogolin","full_name":"Gogolin, Ingrid","first_name":"Ingrid"},{"last_name":"Georgi","full_name":"Georgi, Viola","first_name":"Viola"},{"first_name":"Marianne","full_name":"Krüger-Potratz, Marianne","last_name":"Krüger-Potratz"},{"first_name":"Drorit","full_name":"Lengyel, Drorit","last_name":"Lengyel"},{"last_name":"Sandfuchs","full_name":"Sandfuchs, Uwe","first_name":"Uwe"}]},{"_id":"47249","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","status":"public","publisher":"ACM","date_updated":"2024-06-05T13:09:19Z","author":[{"first_name":"Erik","last_name":"Derr","full_name":"Derr, Erik"},{"first_name":"Sven","last_name":"Bugiel","full_name":"Bugiel, Sven"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"}],"date_created":"2023-09-22T12:50:32Z","title":"Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android","doi":"10.1145/3133956.3134059","publication_status":"published","year":"2017","citation":{"apa":"Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>","mla":"Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","short":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","bibtex":"@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}, year={2017} }","chicago":"Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>.","ieee":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","ama":"Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>"}},{"year":"2017","citation":{"bibtex":"@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet Resources Might Be Helping You Develop Faster but Less Securely}, volume={15}, DOI={<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}, pages={50–60} }","mla":"Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp. 50–60, doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur. Priv. 15 (2017) 50–60.","apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>.","ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>. 2017;15(2):50–60. doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>"},"intvolume":"        15","page":"50–60","issue":"2","title":"How Internet Resources Might Be Helping You Develop Faster but Less Securely","doi":"10.1109/MSP.2017.24","date_updated":"2024-06-05T13:09:42Z","author":[{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"last_name":"Kim","full_name":"Kim, Doowon","first_name":"Doowon"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"}],"date_created":"2023-09-22T13:39:01Z","volume":15,"status":"public","type":"journal_article","publication":"IEEE Secur. Priv.","extern":"1","language":[{"iso":"eng"}],"_id":"47309","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}]},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47245","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017","status":"public","editor":[{"full_name":"Fernandez, José M.","last_name":"Fernandez","first_name":"José M."},{"first_name":"Mathias","full_name":"Payer, Mathias","last_name":"Payer"}],"author":[{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Nguyen","full_name":"Nguyen, Duc Cuong","first_name":"Duc Cuong"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"full_name":"Redmiles, Elissa M.","last_name":"Redmiles","first_name":"Elissa M."},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Simson L.","last_name":"Garfinkel","full_name":"Garfinkel, Simson L."},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T12:47:30Z","date_updated":"2024-06-05T13:12:04Z","publisher":"USENIX Association","title":"Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers","citation":{"ama":"Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association; 2017.","chicago":"Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX Association, 2017.","ieee":"C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,” in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, 2017.","bibtex":"@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017, title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}, booktitle={10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias}, year={2017} }","mla":"Stransky, Christian, et al. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer, USENIX Association, 2017.","short":"C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M. Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.), 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017, USENIX Association, 2017.","apa":"Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.), <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association."},"year":"2017"},{"extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47243","status":"public","type":"conference","publication":"2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017","doi":"10.1109/SP.2017.31","title":"Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security","date_created":"2023-09-22T12:43:27Z","author":[{"last_name":"Fischer","full_name":"Fischer, Felix","first_name":"Felix"},{"last_name":"Böttinger","full_name":"Böttinger, Konstantin","first_name":"Konstantin"},{"last_name":"Xiao","full_name":"Xiao, Huang","first_name":"Huang"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"publisher":"IEEE Computer Society","date_updated":"2024-06-05T13:12:27Z","citation":{"apa":"Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38; Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>","bibtex":"@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security}, DOI={<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>}, booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }","short":"F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl, in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.","mla":"Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017, pp. 121–136, doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","ama":"Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>. IEEE Computer Society; 2017:121–136. doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>","ieee":"F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017, pp. 121–136, doi: <a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","chicago":"Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. IEEE Computer Society, 2017. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>."},"page":"121–136","year":"2017"},{"_id":"47250","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","status":"public","date_updated":"2024-06-05T13:12:56Z","publisher":"ACM","author":[{"first_name":"Duc Cuong","last_name":"Nguyen","full_name":"Nguyen, Duc Cuong"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Charles","last_name":"Weir","full_name":"Weir, Charles"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:50:51Z","title":"A Stitch in Time: Supporting Android Developers in Writing Secure Code","doi":"10.1145/3133956.3133977","publication_status":"published","year":"2017","citation":{"apa":"Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S. (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>","short":"D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","bibtex":"@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017} }","mla":"Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","chicago":"Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>.","ieee":"D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","ama":"Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>"}},{"_id":"47248","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2017 IEEE Cybersecurity Development (SecDev)","status":"public","publisher":"IEEE","date_updated":"2024-06-05T13:11:41Z","author":[{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Weir, Charles","last_name":"Weir","first_name":"Charles"},{"last_name":"Mazurek","full_name":"Mazurek, Michelle L.","first_name":"Michelle L."},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T12:50:12Z","title":"Developers Need Support, Too: A Survey of Security Advice for Software Developers","doi":"10.1109/secdev.2017.17","publication_status":"published","year":"2017","citation":{"apa":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl, S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>","short":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017 IEEE Cybersecurity Development (SecDev), IEEE, 2017.","mla":"Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>}, booktitle={2017 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}, year={2017} }","ama":"Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>","ieee":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers Need Support, Too: A Survey of Security Advice for Software Developers,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>."}},{"doi":"10.1109/secdev.2016.013","title":"You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users","date_created":"2023-09-22T12:42:23Z","author":[{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."}],"publisher":"IEEE","date_updated":"2024-06-05T13:13:34Z","citation":{"chicago":"Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>.","ieee":"Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","ama":"Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>","apa":"Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>","bibtex":"@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}, DOI={<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>}, booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","mla":"Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","short":"Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development (SecDev), IEEE, 2017."},"year":"2017","publication_status":"published","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47242","status":"public","type":"conference","publication":"2016 IEEE Cybersecurity Development (SecDev)"},{"extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47246","status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","doi":"10.1109/sp.2017.52","title":"Comparing the Usability of Cryptographic APIs","date_created":"2023-09-22T12:48:37Z","author":[{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"full_name":"Garfinkel, Simson","last_name":"Garfinkel","first_name":"Simson"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"}],"date_updated":"2024-06-05T13:14:03Z","publisher":"IEEE","citation":{"ieee":"Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017, doi: <a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>.","ama":"Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>","apa":"Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>","bibtex":"@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing the Usability of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017} }","short":"Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","mla":"Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>."},"year":"2017","publication_status":"published"},{"page":"81–95","citation":{"ieee":"Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 2017, pp. 81–95.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.","ama":"Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>. USENIX Association; 2017:81–95.","short":"Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017, USENIX Association, 2017, pp. 81–95.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017}, pages={81–95} }","mla":"Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017, pp. 81–95.","apa":"Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017). Security Developer Studies with GitHub Users: Exploring a Convenience Sample. <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95."},"year":"2017","title":"Security Developer Studies with GitHub Users: Exploring a Convenience Sample","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T12:45:33Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:14:32Z","status":"public","publication":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017","type":"conference","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47244"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47873","language":[{"iso":"eng"}],"extern":"1","type":"report","status":"public","author":[{"first_name":"Elissa M.","last_name":"Redmiles","full_name":"Redmiles, Elissa M."},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."}],"date_created":"2023-10-09T13:16:14Z","publisher":"University of Maryland Computer Science Department","date_updated":"2024-06-05T13:10:02Z","doi":"10.13016/M22K2W","title":"A Summary of Survey Methodology Best Practices for Security and Privacy Researchers","citation":{"chicago":"Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>.","ieee":"E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017.","ama":"Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department; 2017. doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>","apa":"Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>","short":"E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology Best Practices for Security and Privacy Researchers, University of Maryland Computer Science Department, 2017.","mla":"Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017, doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>.","bibtex":"@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}, DOI={<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>}, publisher={University of Maryland Computer Science Department}, author={Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }"},"year":"2017"},{"language":[{"iso":"ger"}],"_id":"54762","user_id":"100257","status":"public","type":"book","title":"Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.","doi":"10.1515/9783110536591","date_updated":"2024-06-14T15:54:22Z","publisher":"De Gruyter","date_created":"2024-06-14T11:23:51Z","author":[{"last_name":"Varga","full_name":"Varga, Eva","id":"100257","first_name":"Eva"}],"year":"2017","place":"Berlin, New York","citation":{"bibtex":"@book{Varga_2017, place={Berlin, New York}, title={Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.}, DOI={<a href=\"https://doi.org/10.1515/9783110536591\">10.1515/9783110536591</a>}, publisher={De Gruyter}, author={Varga, Eva}, year={2017} }","mla":"Varga, Eva. <i>Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.</i> De Gruyter, 2017, doi:<a href=\"https://doi.org/10.1515/9783110536591\">10.1515/9783110536591</a>.","short":"E. Varga, Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive., De Gruyter, Berlin, New York, 2017.","apa":"Varga, E. (2017). <i>Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.</i> De Gruyter. <a href=\"https://doi.org/10.1515/9783110536591\">https://doi.org/10.1515/9783110536591</a>","chicago":"Varga, Eva. <i>Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.</i> Berlin, New York: De Gruyter, 2017. <a href=\"https://doi.org/10.1515/9783110536591\">https://doi.org/10.1515/9783110536591</a>.","ieee":"E. Varga, <i>Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.</i> Berlin, New York: De Gruyter, 2017.","ama":"Varga E. <i>Verbstellungsmuster im Altfranzösischen. Ein Beitrag zur historischen Syntaxforschung aus diskurstraditioneller Perspektive.</i> De Gruyter; 2017. doi:<a href=\"https://doi.org/10.1515/9783110536591\">10.1515/9783110536591</a>"},"publication_identifier":{"isbn":["9783110536591"]},"publication_status":"published"},{"status":"public","type":"review","publication":"zbMATH Open, Zbl. 1372.01004","article_number":"Zbl. 1372.01004","language":[{"iso":"ger"}],"publication_date":"2017-08-11","_id":"18727","user_id":"391","department":[{"_id":"520"}],"year":"2017","citation":{"ieee":"V. Peckhaus, “Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37),” <i>zbMATH Open, Zbl. 1372.01004</i>. 2017.","chicago":"Peckhaus, Volker. “Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37).” <i>zbMATH Open, Zbl. 1372.01004</i>, 2017.","ama":"Peckhaus V. Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37). <i>zbMATH Open, Zbl 137201004</i>. Published online 2017.","bibtex":"@article{Peckhaus_2017, title={Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37)}, number={Zbl. 1372.01004}, journal={zbMATH Open, Zbl. 1372.01004}, author={Peckhaus, Volker}, year={2017} }","short":"V. Peckhaus, zbMATH Open, Zbl. 1372.01004 (2017).","mla":"Peckhaus, Volker. “Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37).” <i>zbMATH Open, Zbl. 1372.01004</i>, Zbl. 1372.01004, 2017.","apa":"Peckhaus, V. (2017). Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37). In <i>zbMATH Open, Zbl. 1372.01004</i> (Zbl. 1372.01004)."},"title":"Morscher, Edgar, Bernard Bolzanos Lehre von Grund und Folge. Eine axiomatische Rekonstruktion, Academia Verlag: Sankt Augustin 2016 (Beiträge zur Bolzano-Forschung; 37)","main_file_link":[{"url":"https://zbmath.org/1372.01004","open_access":"1"}],"oa":"1","date_updated":"2024-06-15T16:39:53Z","date_created":"2020-09-01T06:59:16Z","author":[{"id":"391","full_name":"Peckhaus, Volker","last_name":"Peckhaus","first_name":"Volker"}]},{"status":"public","publication":"zbMATH Open, Zbl. 1379.01004","type":"review","article_number":"Zbl. 1379.01004","language":[{"iso":"ger"}],"_id":"18728","publication_date":"2017-12-21","department":[{"_id":"520"}],"user_id":"391","year":"2017","citation":{"chicago":"Peckhaus, Volker. “Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46).” <i>zbMATH Open, Zbl. 1379.01004</i>, 2017.","ieee":"V. Peckhaus, “Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46),” <i>zbMATH Open, Zbl. 1379.01004</i>. 2017.","ama":"Peckhaus V. Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46). <i>zbMATH Open, Zbl 137901004</i>. Published online 2017.","apa":"Peckhaus, V. (2017). Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46). In <i>zbMATH Open, Zbl. 1379.01004</i> (Zbl. 1379.01004).","short":"V. Peckhaus, zbMATH Open, Zbl. 1379.01004 (2017).","bibtex":"@article{Peckhaus_2017, title={Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46)}, number={Zbl. 1379.01004}, journal={zbMATH Open, Zbl. 1379.01004}, author={Peckhaus, Volker}, year={2017} }","mla":"Peckhaus, Volker. “Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46).” <i>zbMATH Open, Zbl. 1379.01004</i>, Zbl. 1379.01004, 2017."},"title":"Tho, Tzuchien, Vis vim vi: Declinations of Force in Leibniz’s Dynamics, Springer: Cham 2017 (Studies in History and Philosophy of Science; 46)","main_file_link":[{"open_access":"1","url":"https://zbmath.org/1379.01004"}],"oa":"1","date_updated":"2024-06-15T16:42:34Z","author":[{"first_name":"Volker","last_name":"Peckhaus","id":"391","full_name":"Peckhaus, Volker"}],"date_created":"2020-09-01T07:03:19Z"}]
