[{"author":[{"full_name":"Needle, AR","last_name":"Needle","first_name":"AR"},{"first_name":"TW","last_name":"Kaminski","full_name":"Kaminski, TW"},{"id":"46","full_name":"Baumeister, Jochen","last_name":"Baumeister","orcid":"0000-0003-2683-5826","first_name":"Jochen"},{"last_name":"Higginson","full_name":"Higginson, JS","first_name":"JS"},{"full_name":"Farquhar, WB","last_name":"Farquhar","first_name":"WB"},{"full_name":"Swanik, CB","last_name":"Swanik","first_name":"CB"}],"volume":26,"date_updated":"2022-01-06T06:54:26Z","doi":"10.1123/jsr.2015-0061","publication_identifier":{"issn":["1056-6716","1543-3072"]},"pmid":"1","citation":{"ama":"Needle A, Kaminski T, Baumeister J, Higginson J, Farquhar W, Swanik C. The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers. <i>J Sport Rehabil</i>. 2017;26(1):15-25. doi:<a href=\"https://doi.org/10.1123/jsr.2015-0061\">10.1123/jsr.2015-0061</a>","ieee":"A. Needle, T. Kaminski, J. Baumeister, J. Higginson, W. Farquhar, and C. Swanik, “The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.,” <i>J Sport Rehabil</i>, vol. 26, no. 1, pp. 15–25, 2017.","chicago":"Needle, AR, TW Kaminski, Jochen Baumeister, JS Higginson, WB Farquhar, and CB Swanik. “The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.” <i>J Sport Rehabil</i> 26, no. 1 (2017): 15–25. <a href=\"https://doi.org/10.1123/jsr.2015-0061\">https://doi.org/10.1123/jsr.2015-0061</a>.","mla":"Needle, AR, et al. “The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.” <i>J Sport Rehabil</i>, vol. 26, no. 1, 2017, pp. 15–25, doi:<a href=\"https://doi.org/10.1123/jsr.2015-0061\">10.1123/jsr.2015-0061</a>.","short":"A. Needle, T. Kaminski, J. Baumeister, J. Higginson, W. Farquhar, C. Swanik, J Sport Rehabil 26 (2017) 15–25.","bibtex":"@article{Needle_Kaminski_Baumeister_Higginson_Farquhar_Swanik_2017, title={The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.}, volume={26}, DOI={<a href=\"https://doi.org/10.1123/jsr.2015-0061\">10.1123/jsr.2015-0061</a>}, number={1}, journal={J Sport Rehabil}, author={Needle, AR and Kaminski, TW and Baumeister, Jochen and Higginson, JS and Farquhar, WB and Swanik, CB}, year={2017}, pages={15–25} }","apa":"Needle, A., Kaminski, T., Baumeister, J., Higginson, J., Farquhar, W., &#38; Swanik, C. (2017). The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers. <i>J Sport Rehabil</i>, <i>26</i>(1), 15–25. <a href=\"https://doi.org/10.1123/jsr.2015-0061\">https://doi.org/10.1123/jsr.2015-0061</a>"},"page":"15-25","intvolume":"        26","user_id":"62406","department":[{"_id":"17"},{"_id":"172"}],"_id":"20400","type":"journal_article","status":"public","date_created":"2020-11-18T13:43:28Z","title":"The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and Copers.","issue":"1","year":"2017","external_id":{"pmid":["27632852"]},"language":[{"iso":"eng"}],"publication":"J Sport Rehabil"},{"status":"public","type":"journal_article","publication":"BMC Musculoskelet Disord","language":[{"iso":"eng"}],"_id":"20460","user_id":"62406","department":[{"_id":"17"},{"_id":"172"}],"year":"2017","citation":{"mla":"Berner, K., et al. “Objective Impairments of Glait and Balance in Adults Living with HIV-1 Infection: A Systematic Review and Meta-Analysis of Observational Studies.” <i>BMC Musculoskelet Disord</i>, vol. 18, no. 1, 2017, p. 325.","bibtex":"@article{Berner_Morris_Baumeister_Louw_2017, title={Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies}, volume={18}, number={1}, journal={BMC Musculoskelet Disord}, author={Berner, K and Morris, L and Baumeister, Jochen and Louw, Q}, year={2017}, pages={325} }","short":"K. Berner, L. Morris, J. Baumeister, Q. Louw, BMC Musculoskelet Disord 18 (2017) 325.","apa":"Berner, K., Morris, L., Baumeister, J., &#38; Louw, Q. (2017). Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies. <i>BMC Musculoskelet Disord</i>, <i>18</i>(1), 325.","chicago":"Berner, K, L Morris, Jochen Baumeister, and Q Louw. “Objective Impairments of Glait and Balance in Adults Living with HIV-1 Infection: A Systematic Review and Meta-Analysis of Observational Studies.” <i>BMC Musculoskelet Disord</i> 18, no. 1 (2017): 325.","ieee":"K. Berner, L. Morris, J. Baumeister, and Q. Louw, “Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies,” <i>BMC Musculoskelet Disord</i>, vol. 18, no. 1, p. 325, 2017.","ama":"Berner K, Morris L, Baumeister J, Louw Q. Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies. <i>BMC Musculoskelet Disord</i>. 2017;18(1):325."},"intvolume":"        18","page":"325","issue":"1","title":"Objective impairments of glait and balance in adults living with HIV-1 infection: a systematic review and meta-analysis of observational studies","date_updated":"2022-01-06T06:54:27Z","date_created":"2020-11-23T14:30:01Z","author":[{"full_name":"Berner, K","last_name":"Berner","first_name":"K"},{"last_name":"Morris","full_name":"Morris, L","first_name":"L"},{"orcid":"0000-0003-2683-5826","last_name":"Baumeister","full_name":"Baumeister, Jochen","id":"46","first_name":"Jochen"},{"full_name":"Louw, Q","last_name":"Louw","first_name":"Q"}],"volume":18},{"language":[{"iso":"eng"}],"user_id":"63338","department":[{"_id":"178"}],"_id":"20493","status":"public","type":"conference","conference":{"name":"Academy of Management Annual Meeting ","start_date":"2017-08-04","end_date":"2017-08-08","location":"Atlanta, USA"},"title":"Talent management and workforce performance: The too-much-potential-talent-effect. ","author":[{"first_name":"Benjamin Philipp","full_name":"Krebs, Benjamin Philipp","last_name":"Krebs"}],"date_created":"2020-11-24T12:03:17Z","date_updated":"2022-01-06T06:54:27Z","citation":{"ieee":"B. P. Krebs, “Talent management and workforce performance: The too-much-potential-talent-effect. ,” presented at the Academy of Management Annual Meeting , Atlanta, USA, 2017.","chicago":"Krebs, Benjamin Philipp. “Talent Management and Workforce Performance: The Too-Much-Potential-Talent-Effect. ,” 2017.","ama":"Krebs BP. Talent management and workforce performance: The too-much-potential-talent-effect. . In: ; 2017.","short":"B.P. Krebs, in: 2017.","bibtex":"@inproceedings{Krebs_2017, title={Talent management and workforce performance: The too-much-potential-talent-effect. }, author={Krebs, Benjamin Philipp}, year={2017} }","mla":"Krebs, Benjamin Philipp. <i>Talent Management and Workforce Performance: The Too-Much-Potential-Talent-Effect. </i>. 2017.","apa":"Krebs, B. P. (2017). <i>Talent management and workforce performance: The too-much-potential-talent-effect. </i>. Academy of Management Annual Meeting , Atlanta, USA."},"year":"2017"},{"status":"public","editor":[{"first_name":"Jan","full_name":"Busche, Jan","last_name":"Busche"},{"full_name":"Röhling, Andreas","last_name":"Röhling","first_name":"Andreas"}],"type":"book_chapter","publication":"Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)","user_id":"282","_id":"2050","citation":{"chicago":"Krimphove, Dieter. “Kommentierung § 3 GWB (Mittelstandskartelle).” In <i>Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, edited by Jan Busche and Andreas Röhling, 466 – 538. Köln: Carl Heymanns Verlag KG, 2017.","ieee":"D. Krimphove, “Kommentierung § 3 GWB (Mittelstandskartelle),” in <i>Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, J. Busche and A. Röhling, Eds. Köln: Carl Heymanns Verlag KG, 2017, pp. 466 – 538.","ama":"Krimphove D. Kommentierung § 3 GWB (Mittelstandskartelle). In: Busche J, Röhling A, eds. <i>Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>. Köln: Carl Heymanns Verlag KG; 2017:466 – 538.","short":"D. Krimphove, in: J. Busche, A. Röhling (Eds.), Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB), Carl Heymanns Verlag KG, Köln, 2017, pp. 466 – 538.","bibtex":"@inbook{Krimphove_2017, place={Köln}, title={Kommentierung § 3 GWB (Mittelstandskartelle)}, booktitle={Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)}, publisher={Carl Heymanns Verlag KG}, author={Krimphove, Dieter}, editor={Busche, Jan and Röhling, AndreasEditors}, year={2017}, pages={466 – 538} }","mla":"Krimphove, Dieter. “Kommentierung § 3 GWB (Mittelstandskartelle).” <i>Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, edited by Jan Busche and Andreas Röhling, Carl Heymanns Verlag KG, 2017, pp. 466 – 538.","apa":"Krimphove, D. (2017). Kommentierung § 3 GWB (Mittelstandskartelle). In J. Busche &#38; A. Röhling (Eds.), <i>Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i> (pp. 466 – 538). Köln: Carl Heymanns Verlag KG."},"page":"466 – 538","place":"Köln","year":"2017","title":"Kommentierung § 3 GWB (Mittelstandskartelle)","date_created":"2018-03-29T12:52:52Z","author":[{"first_name":"Dieter","full_name":"Krimphove, Dieter","id":"282","last_name":"Krimphove"}],"publisher":"Carl Heymanns Verlag KG","date_updated":"2022-01-06T06:54:28Z"},{"_id":"2051","user_id":"282","type":"journal_article","publication":"Rechtstheorie","status":"public","publisher":"Dunker und Humblot","date_updated":"2022-01-06T06:54:29Z","author":[{"id":"282","full_name":"Krimphove, Dieter","last_name":"Krimphove","first_name":"Dieter"}],"date_created":"2018-03-29T12:54:40Z","title":"Eigentum – Zum Bedeutungswandel eines Rechtsinstituts","issue":"Jg. 47, Heft 3","year":"2017","citation":{"ama":"Krimphove D. Eigentum – Zum Bedeutungswandel eines Rechtsinstituts. <i>Rechtstheorie</i>. 2017;(Jg. 47, Heft 3):271 – 317.","chicago":"Krimphove, Dieter. “Eigentum – Zum Bedeutungswandel Eines Rechtsinstituts.” <i>Rechtstheorie</i>, no. Jg. 47, Heft 3 (2017): 271 – 317.","ieee":"D. Krimphove, “Eigentum – Zum Bedeutungswandel eines Rechtsinstituts,” <i>Rechtstheorie</i>, no. Jg. 47, Heft 3, pp. 271 – 317, 2017.","short":"D. Krimphove, Rechtstheorie (2017) 271 – 317.","bibtex":"@article{Krimphove_2017, title={Eigentum – Zum Bedeutungswandel eines Rechtsinstituts}, number={Jg. 47, Heft 3}, journal={Rechtstheorie}, publisher={Dunker und Humblot}, author={Krimphove, Dieter}, year={2017}, pages={271 – 317} }","mla":"Krimphove, Dieter. “Eigentum – Zum Bedeutungswandel Eines Rechtsinstituts.” <i>Rechtstheorie</i>, no. Jg. 47, Heft 3, Dunker und Humblot, 2017, pp. 271 – 317.","apa":"Krimphove, D. (2017). Eigentum – Zum Bedeutungswandel eines Rechtsinstituts. <i>Rechtstheorie</i>, (Jg. 47, Heft 3), 271 – 317."},"page":"271 – 317"},{"date_updated":"2022-01-06T06:54:29Z","publisher":"Dunker und Humblot","date_created":"2018-03-29T12:57:20Z","author":[{"first_name":"Dieter","full_name":"Krimphove, Dieter","id":"282","last_name":"Krimphove"}],"title":"A historical Overview of the Development of Legal Logic","place":"Berlin","year":"2017","page":"11 – 53","citation":{"ama":"Krimphove D. A historical Overview of the Development of Legal Logic. In: Krimphove D, Lentner GM, eds. <i>Law and Logic – Contemporary Issues</i>. Berlin: Dunker und Humblot; 2017:11 – 53.","ieee":"D. Krimphove, “A historical Overview of the Development of Legal Logic,” in <i>Law and Logic – Contemporary Issues</i>, D. Krimphove and G. M. Lentner, Eds. Berlin: Dunker und Humblot, 2017, pp. 11 – 53.","chicago":"Krimphove, Dieter. “A Historical Overview of the Development of Legal Logic.” In <i>Law and Logic – Contemporary Issues</i>, edited by Dieter Krimphove and Gabriel M. Lentner, 11 – 53. Berlin: Dunker und Humblot, 2017.","mla":"Krimphove, Dieter. “A Historical Overview of the Development of Legal Logic.” <i>Law and Logic – Contemporary Issues</i>, edited by Dieter Krimphove and Gabriel M. Lentner, Dunker und Humblot, 2017, pp. 11 – 53.","bibtex":"@inbook{Krimphove_2017, place={Berlin}, title={A historical Overview of the Development of Legal Logic}, booktitle={Law and Logic – Contemporary Issues}, publisher={Dunker und Humblot}, author={Krimphove, Dieter}, editor={Krimphove, Dieter and Lentner, Gabriel M.Editors}, year={2017}, pages={11 – 53} }","short":"D. Krimphove, in: D. Krimphove, G.M. Lentner (Eds.), Law and Logic – Contemporary Issues, Dunker und Humblot, Berlin, 2017, pp. 11 – 53.","apa":"Krimphove, D. (2017). A historical Overview of the Development of Legal Logic. In D. Krimphove &#38; G. M. Lentner (Eds.), <i>Law and Logic – Contemporary Issues</i> (pp. 11 – 53). Berlin: Dunker und Humblot."},"_id":"2052","user_id":"282","publication":"Law and Logic – Contemporary Issues","type":"book_chapter","editor":[{"last_name":"Krimphove","full_name":"Krimphove, Dieter","first_name":"Dieter"},{"full_name":"Lentner, Gabriel M.","last_name":"Lentner","first_name":"Gabriel M."}],"status":"public"},{"year":"2017","place":"Groningen","page":"205 – 233","citation":{"apa":"Krimphove, D., &#38; Lüke, C. (2017). The Transformation of the Mortgage Credit Directive in German Law. In M. Anderson &#38; E. Arroyo Amayuelas (Eds.), <i>The Impact of the Mortgage Credit Directive in Europe</i> (pp. 205 – 233). Groningen: Europa Law Publishing .","short":"D. Krimphove, C. Lüke, in: M. Anderson, E. Arroyo Amayuelas (Eds.), The Impact of the Mortgage Credit Directive in Europe, Europa Law Publishing , Groningen, 2017, pp. 205 – 233.","bibtex":"@inbook{Krimphove_Lüke_2017, place={Groningen}, title={The Transformation of the Mortgage Credit Directive in German Law}, booktitle={The Impact of the Mortgage Credit Directive in Europe}, publisher={Europa Law Publishing }, author={Krimphove, Dieter and Lüke, Christoph}, editor={Anderson, Miriam and Arroyo Amayuelas, EstherEditors}, year={2017}, pages={205 – 233} }","mla":"Krimphove, Dieter, and Christoph Lüke. “The Transformation of the Mortgage Credit Directive in German Law.” <i>The Impact of the Mortgage Credit Directive in Europe</i>, edited by Miriam Anderson and Esther Arroyo Amayuelas, Europa Law Publishing , 2017, pp. 205 – 233.","chicago":"Krimphove, Dieter, and Christoph Lüke. “The Transformation of the Mortgage Credit Directive in German Law.” In <i>The Impact of the Mortgage Credit Directive in Europe</i>, edited by Miriam Anderson and Esther Arroyo Amayuelas, 205 – 233. Groningen: Europa Law Publishing , 2017.","ieee":"D. Krimphove and C. Lüke, “The Transformation of the Mortgage Credit Directive in German Law,” in <i>The Impact of the Mortgage Credit Directive in Europe</i>, M. Anderson and E. Arroyo Amayuelas, Eds. Groningen: Europa Law Publishing , 2017, pp. 205 – 233.","ama":"Krimphove D, Lüke C. The Transformation of the Mortgage Credit Directive in German Law. In: Anderson M, Arroyo Amayuelas E, eds. <i>The Impact of the Mortgage Credit Directive in Europe</i>. Groningen: Europa Law Publishing ; 2017:205 – 233."},"date_updated":"2022-01-06T06:54:29Z","publisher":"Europa Law Publishing ","author":[{"first_name":"Dieter","last_name":"Krimphove","id":"282","full_name":"Krimphove, Dieter"},{"last_name":"Lüke","full_name":"Lüke, Christoph","first_name":"Christoph"}],"date_created":"2018-03-29T13:01:47Z","title":"The Transformation of the Mortgage Credit Directive in German Law","publication":"The Impact of the Mortgage Credit Directive in Europe","type":"book_chapter","editor":[{"first_name":"Miriam","last_name":"Anderson","full_name":"Anderson, Miriam"},{"full_name":"Arroyo Amayuelas, Esther","last_name":"Arroyo Amayuelas","first_name":"Esther"}],"status":"public","_id":"2054","user_id":"282"},{"status":"public","editor":[{"last_name":"Maier","full_name":"Maier, Günter W.","first_name":"Günter W."},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"},{"full_name":"Steffen, Eckhard","last_name":"Steffen","first_name":"Eckhard"}],"abstract":[{"lang":"eng","text":"Das Zukunftsszenario der Industrie 4.0 ist gepr{\\\"a}gt durch einen massiven Anstieg der unternehmens{\\\"u}bergreifenden Vernetzung. Um einer Bedrohung durch unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken, muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme ein hoher Stellenwert einger{\\\"a}umt werden. Dieses Paradigma wird als Security by Design bezeichnet. {\\\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt werden k{\\\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit erf{\\\"u}llen und damit die Eigenschaft der Industrial Security gew{\\\"a}hrleisten. Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering eine Entwicklung nach dem Paradigma Security by Design erm{\\\"o}glicht."}],"publication":"Handbuch Gestaltung digitaler und vernetzter Arbeitswelten","type":"book_chapter","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE"],"department":[{"_id":"76"}],"user_id":"5786","_id":"20552","page":"1-24","citation":{"apa":"Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design. In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>","short":"C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.","bibtex":"@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial Security by Design}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>}, booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer, Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017}, pages={1–24} }","mla":"Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al., Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>.","chicago":"Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.","ieee":"C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier, G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017, pp. 1–24.","ama":"Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>. Springer Berlin Heidelberg; 2017:1-24. doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>"},"place":"Berlin, Heidelberg","year":"2017","publication_identifier":{"isbn":["978-3-662-52903-4"]},"doi":"10.1007/978-3-662-52903-4_8-1","title":"Industrial Security by Design","author":[{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"}],"date_created":"2020-11-30T09:56:23Z","date_updated":"2022-01-06T06:54:29Z","publisher":"Springer Berlin Heidelberg"},{"doi":"https://doi.org/10.1007/s41019-016-0019-8","title":"Time for Addressing Software Security Issues: Prediction Models and Impacting Factors","author":[{"first_name":"Lotfi","full_name":"Ben Othmane, Lotfi","last_name":"Ben Othmane"},{"full_name":"Chehrazi, Golriz","last_name":"Chehrazi","first_name":"Golriz"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"},{"first_name":"Petar","last_name":"Tsalovski","full_name":"Tsalovski, Petar"},{"first_name":"Achim D.","last_name":"Brucker","full_name":"Brucker, Achim D."}],"date_created":"2020-11-30T10:24:50Z","volume":2,"date_updated":"2022-01-06T06:54:29Z","citation":{"short":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A.D. Brucker, Data Science and Engineering 2 (2017) 107–124.","bibtex":"@article{Ben Othmane_Chehrazi_Bodden_Tsalovski_Brucker_2017, title={Time for Addressing Software Security Issues: Prediction Models and Impacting Factors}, volume={2}, DOI={<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>}, number={2}, journal={Data Science and Engineering}, author={Ben Othmane, Lotfi and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim D.}, year={2017}, pages={107–124} }","mla":"Ben Othmane, Lotfi, et al. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i>, vol. 2, no. 2, 2017, pp. 107–24, doi:<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>.","apa":"Ben Othmane, L., Chehrazi, G., Bodden, E., Tsalovski, P., &#38; Brucker, A. D. (2017). Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science and Engineering</i>, <i>2</i>(2), 107–124. <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>","ama":"Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science and Engineering</i>. 2017;2(2):107-124. doi:<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>","chicago":"Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i> 2, no. 2 (2017): 107–24. <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>.","ieee":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors,” <i>Data Science and Engineering</i>, vol. 2, no. 2, pp. 107–124, 2017, doi: <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>."},"intvolume":"         2","page":"107-124","year":"2017","issue":"2","related_material":{"link":[{"relation":"confirmation","url":"http://bodden.de/pubs/bcb17time.pdf"}]},"publication_identifier":{"issn":["2364-1541"]},"language":[{"iso":"eng"}],"user_id":"5786","department":[{"_id":"76"}],"_id":"20553","status":"public","abstract":[{"lang":"eng","text":"Finding and fixing software vulnerabilities have become a major struggle for most software development companies. While generally without alternative, such fixing efforts are a major cost factor, which is why companies have a vital interest in focusing their secure software development activities such that they obtain an optimal return on this investment. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP's secure development process, and we show how the issue fix time could be used to monitor the fixing process. We use three machine learning methods and evaluate their predictive power in predicting the time to fix issues. Interestingly, the models indicate that vulnerability type has less dominant impact on issue fix time than previously believed. The time it takes to fix an issue instead seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. SAP can use the models to implement a continuous improvement of its secure software development process and to measure the impact of individual improvements. The development teams at SAP develop different types of software, adopt different internal development processes, use different programming languages and platforms, and are located in different cities and countries. Other organizations, may use the results---with precaution---and be learning organizations."}],"type":"journal_article","publication":"Data Science and Engineering"},{"year":"2017","citation":{"ama":"Bodden E. <i>Self-Adaptive Static Analysis</i>.; 2017.","chicago":"Bodden, Eric. <i>Self-Adaptive Static Analysis</i>, 2017.","ieee":"E. Bodden, <i>Self-adaptive static analysis</i>. 2017.","apa":"Bodden, E. (2017). <i>Self-adaptive static analysis</i>.","bibtex":"@book{Bodden_2017, title={Self-adaptive static analysis}, author={Bodden, Eric}, year={2017} }","mla":"Bodden, Eric. <i>Self-Adaptive Static Analysis</i>. 2017.","short":"E. Bodden, Self-Adaptive Static Analysis, 2017."},"title":"Self-adaptive static analysis","main_file_link":[{"url":"https://arxiv.org/abs/1710.07430"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-30T10:27:21Z","status":"public","type":"report","report_number":"arXiv:1710.07430","language":[{"iso":"eng"}],"_id":"20554","department":[{"_id":"76"}],"user_id":"5786"},{"publication_identifier":{"issn":["0098-5589"]},"issue":"99","year":"2017","page":"1-1","citation":{"ama":"Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>","ieee":"M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp. 1–1, 2017, doi: <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","chicago":"Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no. 99 (2017): 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>.","mla":"Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","bibtex":"@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration Options}, volume={PP}, DOI={<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>}, number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack, Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }","short":"M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering PP (2017) 1–1.","apa":"Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>"},"date_updated":"2022-01-06T06:54:30Z","volume":"PP","author":[{"first_name":"Max","full_name":"Lillack, Max","last_name":"Lillack"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-11-30T11:06:43Z","title":"Tracking Load-time Configuration Options","doi":"10.1109/TSE.2017.2756048","main_file_link":[{"url":"http://bodden.de/pubs/lkb17lotrack.pdf"}],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","_id":"20557","department":[{"_id":"76"}],"user_id":"5786","keyword":["Androids","Bluetooth","Humanoid robots","Java","Software","Tools","Configuration options","Static analysis","Variability mining"],"language":[{"iso":"eng"}]},{"_id":"20558","user_id":"5786","department":[{"_id":"76"}],"keyword":["ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"type":"conference","publication":"International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track","status":"public","date_updated":"2022-01-06T06:54:30Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"first_name":"Sarah","last_name":"Nadi","full_name":"Nadi, Sarah"},{"full_name":"Reif, Michael","last_name":"Reif","first_name":"Michael"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Florian","last_name":"Göpfert","full_name":"Göpfert, Florian"},{"first_name":"Felix","last_name":"Günther","full_name":"Günther, Felix"},{"last_name":"Weinert","full_name":"Weinert, Christian","first_name":"Christian"},{"full_name":"Demmler, Daniel","last_name":"Demmler","first_name":"Daniel"},{"last_name":"Kamath","full_name":"Kamath, Ram","first_name":"Ram"}],"date_created":"2020-11-30T11:08:26Z","title":"CogniCrypt: Supporting Developers in using Cryptography","main_file_link":[{"url":"http://bodden.de/pubs/knr+17cognicrypt.pdf"}],"year":"2017","citation":{"chicago":"Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","ieee":"S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,” 2017.","ama":"Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>. ; 2017.","apa":"Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert, F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt: Supporting Developers in using Cryptography. <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>.","bibtex":"@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and et al.}, year={2017} }","mla":"Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","short":"S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F. Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017."}},{"date_created":"2020-11-30T11:10:01Z","author":[{"full_name":"Do, Lisa Nguyen Quang","last_name":"Do","first_name":"Lisa Nguyen Quang"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Benjamin","full_name":"Livshits, Benjamin","last_name":"Livshits"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"},{"first_name":"Justin","last_name":"Smith","full_name":"Smith, Justin"},{"first_name":"Emerson","last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson"}],"date_updated":"2022-01-06T06:54:30Z","publisher":"ACM","doi":"10.1145/3092703.3092705","main_file_link":[{"url":"http://bodden.de/pubs/nal+17jit.pdf"}],"title":"Just-in-time Static Analysis","publication_identifier":{"isbn":["978-1-4503-5076-1"]},"page":"307-317","citation":{"ama":"Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time Static Analysis. In: <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>. ISSTA 2017. ACM; 2017:307-317. doi:<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>","chicago":"Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. <a href=\"https://doi.org/10.1145/3092703.3092705\">https://doi.org/10.1145/3092703.3092705</a>.","ieee":"L. N. Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Just-in-time Static Analysis,” in <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 2017, pp. 307–317, doi: <a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>.","short":"L.N.Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, New York, NY, USA, 2017, pp. 307–317.","mla":"Do, Lisa Nguyen Quang, et al. “Just-in-Time Static Analysis.” <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, ACM, 2017, pp. 307–17, doi:<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>.","bibtex":"@inproceedings{Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, place={New York, NY, USA}, series={ISSTA 2017}, title={Just-in-time Static Analysis}, DOI={<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>}, booktitle={Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis}, publisher={ACM}, author={Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017}, pages={307–317}, collection={ISSTA 2017} }","apa":"Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Just-in-time Static Analysis. <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 307–317. <a href=\"https://doi.org/10.1145/3092703.3092705\">https://doi.org/10.1145/3092703.3092705</a>"},"year":"2017","place":"New York, NY, USA","department":[{"_id":"76"}],"series_title":"ISSTA 2017","user_id":"5786","_id":"20559","language":[{"iso":"eng"}],"keyword":["Just-in-Time","Layered analysis","Static analysis"],"publication":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","type":"conference","status":"public"},{"issue":"5S","intvolume":"        49","page":"360","citation":{"ama":"An Y, DiTrani Lobacz A, Lehmann T, Baumeister J, Swanik C. Altered brain activity during joint loading after anterior cruciate ligament reconstruction. 2017;49(5S):360.","ieee":"Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, and C. Swanik, “Altered brain activity during joint loading after anterior cruciate ligament reconstruction,” vol. 49, no. 5S. p. 360, 2017.","chicago":"An, YW, A DiTrani Lobacz, T Lehmann, Jochen Baumeister, and CB Swanik. “Altered Brain Activity during Joint Loading after Anterior Cruciate Ligament Reconstruction.” Med Sci Sports Exerx, 2017.","bibtex":"@article{An_DiTrani Lobacz_Lehmann_Baumeister_Swanik_2017, series={Med Sci Sports Exerx}, title={Altered brain activity during joint loading after anterior cruciate ligament reconstruction}, volume={49}, number={5S}, author={An, YW and DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB}, year={2017}, pages={360}, collection={Med Sci Sports Exerx} }","short":"Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, C. Swanik, 49 (2017) 360.","mla":"An, YW, et al. <i>Altered Brain Activity during Joint Loading after Anterior Cruciate Ligament Reconstruction</i>. Vol. 49, no. 5S, 2017, p. 360.","apa":"An, Y., DiTrani Lobacz, A., Lehmann, T., Baumeister, J., &#38; Swanik, C. (2017). Altered brain activity during joint loading after anterior cruciate ligament reconstruction."},"year":"2017","volume":49,"date_created":"2020-12-02T13:43:21Z","author":[{"full_name":"An, YW","last_name":"An","first_name":"YW"},{"first_name":"A","full_name":"DiTrani Lobacz, A","last_name":"DiTrani Lobacz"},{"first_name":"T","last_name":"Lehmann","full_name":"Lehmann, T"},{"first_name":"Jochen","id":"46","full_name":"Baumeister, Jochen","last_name":"Baumeister","orcid":"0000-0003-2683-5826"},{"first_name":"CB","full_name":"Swanik, CB","last_name":"Swanik"}],"date_updated":"2022-01-06T06:54:31Z","title":"Altered brain activity during joint loading after anterior cruciate ligament reconstruction","type":"conference_abstract","status":"public","department":[{"_id":"17"},{"_id":"172"}],"user_id":"62406","series_title":"Med Sci Sports Exerx","_id":"20659","language":[{"iso":"eng"}]},{"issue":"6","citation":{"ama":"An Y, DiTrani Lobacz A, Lehmann T, Baumeister J, Swanik C. Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading. 2017;52(6):136.","ieee":"Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, and C. Swanik, “Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading,” vol. 52, no. 6. p. 136, 2017.","chicago":"An, YW, A DiTrani Lobacz, T Lehmann, Jochen Baumeister, and CB Swanik. “Altered Cortical Activation Patterns Following Anterior Cruciate Ligament Reconstruction during Joint Loading.” J Athl Train, 2017.","bibtex":"@article{An_DiTrani Lobacz_Lehmann_Baumeister_Swanik_2017, series={J Athl Train}, title={Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading}, volume={52}, number={6}, author={An, YW and DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB}, year={2017}, pages={136}, collection={J Athl Train} }","mla":"An, YW, et al. <i>Altered Cortical Activation Patterns Following Anterior Cruciate Ligament Reconstruction during Joint Loading</i>. Vol. 52, no. 6, 2017, p. 136.","short":"Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, C. Swanik, 52 (2017) 136.","apa":"An, Y., DiTrani Lobacz, A., Lehmann, T., Baumeister, J., &#38; Swanik, C. (2017). Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading."},"page":"136","intvolume":"        52","year":"2017","author":[{"first_name":"YW","full_name":"An, YW","last_name":"An"},{"first_name":"A","full_name":"DiTrani Lobacz, A","last_name":"DiTrani Lobacz"},{"full_name":"Lehmann, T","last_name":"Lehmann","first_name":"T"},{"first_name":"Jochen","id":"46","full_name":"Baumeister, Jochen","last_name":"Baumeister","orcid":"0000-0003-2683-5826"},{"full_name":"Swanik, CB","last_name":"Swanik","first_name":"CB"}],"date_created":"2020-12-02T13:45:25Z","volume":52,"date_updated":"2022-01-06T06:54:31Z","title":"Altered cortical activation patterns following anterior cruciate ligament reconstruction during joint loading","type":"conference_abstract","status":"public","series_title":"J Athl Train","user_id":"62406","department":[{"_id":"17"},{"_id":"172"}],"_id":"20660","language":[{"iso":"eng"}]},{"citation":{"chicago":"Anders, P, T Lehmann, H Müller, I Molde, KB  Gronvik, N SkaeretMaroni, B Vereijken, and Jochen Baumeister. “Balance Exergames Increase Cortical Activity in Frontal Areas of the Brain.” Gait &#38; Posture, 2017.","ieee":"P. Anders <i>et al.</i>, “Balance exergames increase cortical activity in frontal areas of the brain,” vol. 57, no. 1. p. 351, 2017.","ama":"Anders P, Lehmann T, Müller H, et al. Balance exergames increase cortical activity in frontal areas of the brain. 2017;57(1):351.","apa":"Anders, P., Lehmann, T., Müller, H., Molde, I., Gronvik, K., SkaeretMaroni, N., … Baumeister, J. (2017). Balance exergames increase cortical activity in frontal areas of the brain.","short":"P. Anders, T. Lehmann, H. Müller, I. Molde, K. Gronvik, N. SkaeretMaroni, B. Vereijken, J. Baumeister, 57 (2017) 351.","bibtex":"@article{Anders_Lehmann_Müller_Molde_Gronvik_SkaeretMaroni_Vereijken_Baumeister_2017, series={Gait &#38; Posture}, title={Balance exergames increase cortical activity in frontal areas of the brain}, volume={57}, number={1}, author={Anders, P and Lehmann, T and Müller, H and Molde, I and Gronvik, KB  and SkaeretMaroni, N and Vereijken, B and Baumeister, Jochen}, year={2017}, pages={351}, collection={Gait &#38; Posture} }","mla":"Anders, P., et al. <i>Balance Exergames Increase Cortical Activity in Frontal Areas of the Brain</i>. Vol. 57, no. 1, 2017, p. 351."},"page":"351","intvolume":"        57","year":"2017","issue":"1","title":"Balance exergames increase cortical activity in frontal areas of the brain","author":[{"full_name":"Anders, P","last_name":"Anders","first_name":"P"},{"last_name":"Lehmann","full_name":"Lehmann, T","first_name":"T"},{"first_name":"H","full_name":"Müller, H","last_name":"Müller"},{"full_name":"Molde, I","last_name":"Molde","first_name":"I"},{"first_name":"KB ","last_name":"Gronvik","full_name":"Gronvik, KB "},{"first_name":"N","last_name":"SkaeretMaroni","full_name":"SkaeretMaroni, N"},{"full_name":"Vereijken, B","last_name":"Vereijken","first_name":"B"},{"first_name":"Jochen","last_name":"Baumeister","orcid":"0000-0003-2683-5826","id":"46","full_name":"Baumeister, Jochen"}],"date_created":"2020-12-02T13:48:59Z","volume":57,"date_updated":"2022-01-06T06:54:31Z","status":"public","type":"conference_abstract","language":[{"iso":"eng"}],"series_title":"Gait & Posture","user_id":"62406","department":[{"_id":"17"},{"_id":"172"}],"_id":"20661"},{"date_updated":"2022-01-06T06:54:34Z","author":[{"full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do","first_name":"Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"full_name":"Smith, Justin","last_name":"Smith","first_name":"Justin"},{"full_name":"Murphy-Hill, Emerson","last_name":"Murphy-Hill","first_name":"Emerson"}],"date_created":"2020-12-14T11:51:44Z","title":"Cheetah: Just-in-Time Taint Analysis for Android Apps","main_file_link":[{"url":"http://bodden.de/pubs/dal17cheetah.pdf"}],"year":"2017","citation":{"mla":"Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","bibtex":"@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017} }","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017."},"_id":"20715","department":[{"_id":"76"}],"user_id":"5786","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","type":"conference","status":"public"},{"author":[{"full_name":"Schmitz, Joachim","last_name":"Schmitz","first_name":"Joachim"},{"first_name":"Markus","full_name":"Fockel, Markus","id":"8472","orcid":"0000-0002-1269-0702","last_name":"Fockel"}],"date_created":"2020-12-17T13:29:01Z","date_updated":"2022-01-06T06:54:38Z","publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","title":"Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien","citation":{"apa":"Schmitz, J., &#38; Fockel, M. (2017). Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In <i> Tag des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.","mla":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” <i> Tag Des Systems Engineering 2017</i>, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","short":"J. Schmitz, M. Fockel, in:  Tag Des Systems Engineering 2017, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","bibtex":"@inproceedings{Schmitz_Fockel_2017, title={Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien}, booktitle={ Tag des Systems Engineering 2017}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Schmitz, Joachim and Fockel, Markus}, year={2017} }","chicago":"Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen XIL-Testszenarien.” In <i> Tag Des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2017.","ieee":"J. Schmitz and M. Fockel, “Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien,” in <i> Tag des Systems Engineering 2017</i>, 2017.","ama":"Schmitz J, Fockel M. Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien. In: <i> Tag Des Systems Engineering 2017</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2017."},"year":"2017","department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","_id":"20791","language":[{"iso":"eng"}],"publication":" Tag des Systems Engineering 2017","type":"conference","status":"public","abstract":[{"text":"Intelligente technische Systeme, wie autonom fahrende Fahrzeuge, werden in einem hohen Maß durch Software realisiert. Der Weg zum autonomen Fahren führt unweigerlich über eine steigende Vernetzung von Steuergeräten im Fahrzeug und über Fahrzeuggrenzen hinweg. Damit einher geht eine stetig steigende Komplexität der Software. Deshalb liegt es auf der Hand, dass die systematische Qualitätssicherung für derartige technische Systeme sehr früh, also bereits entwicklungsbegleitend, erfolgen muss. Dazu lässt sich das Software-in-the-Loop-Verfahren einsetzen, das auf etablierte Techniken des Hardware-in-the-Loop-Verfahrens zurückgreift. Eine besondere Herausforderung besteht darin, Simulationsmodelle und Testbibliotheken sowie die zugehörigen Visualisierungs- und Testwerkzeuge in beiden Welten synergetisch zu nutzen. Das Ziel ist eine einheitliche X-in-the-Loop (XIL) Basis für beide Verfahren. Der Schlüssel zu einer einheitlichen Basis für durchgängige XIL-Testszenarien ist der Einsatz eines übergeordneten Systemmodells. Es definiert die Systemgrenze und umliegenden Systeme in der Umwelt. Zudem dient das Systemmodell als Ordnungsschema für die Ablage der Artefakte wie Verhaltensmodelle, Testskripte, Parametersätze oder Workflows. Ein zentrales Datenmanagementwerkzeug, welches sämtliche Strukturinformationen, Verhaltensmodelle und Variantenbezüge verknüpft, ermöglicht ein teilautomatisches Umschalten zwischen den Testszenarien. In diesem Beitrag stellen wir eine solche Lösung vor.","lang":"eng"}]},{"year":"2017","place":"Changsha","page":"319-336","citation":{"ama":"Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds. <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>. Lecture Notes in Computer Science. Springer; 2017:319-336. doi:<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>","chicago":"Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science. Changsha: Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">https://doi.org/10.1007/978-3-319-69483-2_19</a>.","ieee":"S. Schivo <i>et al.</i>, “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach,” in <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, 2017, no. 10606, pp. 319–336, doi: <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>.","apa":"Schivo, S., Yildiz., B. M., Ruijters, E., Gerking, C., Kumar, R., Dziwok, S., Rensink, A., &#38; Stoelinga, M. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. G. Larsen, O. Sokolsky, &#38; J. Wang (Eds.), <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i> (Issue 10606, pp. 319–336). Springer. <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">https://doi.org/10.1007/978-3-319-69483-2_19</a>","bibtex":"@inproceedings{Schivo_Yildiz._Ruijters_Gerking_Kumar_Dziwok_Rensink_Stoelinga_2017, place={Changsha}, series={Lecture Notes in Computer Science}, title={How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>}, number={10606}, booktitle={Dependable Software Engineering, 3rd International Symposium (SETTA 2017)}, publisher={Springer}, author={Schivo, Stefano and Yildiz., Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok, Stefan and Rensink, Arend and Stoelinga, Mariëlle}, editor={Larsen, Kim G. and Sokolsky, Oleg and Wang, Ji}, year={2017}, pages={319–336}, collection={Lecture Notes in Computer Science} }","mla":"Schivo, Stefano, et al. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by Kim G. Larsen et al., no. 10606, Springer, 2017, pp. 319–36, doi:<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>.","short":"S. Schivo, B.M. Yildiz., E. Ruijters, C. Gerking, R. Kumar, S. Dziwok, A. Rensink, M. Stoelinga, in: K.G. Larsen, O. Sokolsky, J. Wang (Eds.), Dependable Software Engineering, 3rd International Symposium (SETTA 2017), Springer, Changsha, 2017, pp. 319–336."},"issue":"10606","title":"How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach","doi":"10.1007/978-3-319-69483-2_19","publisher":"Springer","date_updated":"2022-01-06T06:54:38Z","date_created":"2020-12-17T13:30:15Z","author":[{"first_name":"Stefano","full_name":"Schivo, Stefano","last_name":"Schivo"},{"full_name":"Yildiz., Bugra M.","last_name":"Yildiz.","first_name":"Bugra M."},{"first_name":"Enno","full_name":"Ruijters, Enno","last_name":"Ruijters"},{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"first_name":"Rajesh","last_name":"Kumar","full_name":"Kumar, Rajesh"},{"first_name":"Stefan","id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673"},{"full_name":"Rensink, Arend","last_name":"Rensink","first_name":"Arend"},{"last_name":"Stoelinga","full_name":"Stoelinga, Mariëlle","first_name":"Mariëlle"}],"editor":[{"last_name":"Larsen","full_name":"Larsen, Kim G.","first_name":"Kim G."},{"first_name":"Oleg","last_name":"Sokolsky","full_name":"Sokolsky, Oleg"},{"last_name":"Wang","full_name":"Wang, Ji","first_name":"Ji"}],"status":"public","publication":"Dependable Software Engineering, 3rd International Symposium (SETTA 2017)","type":"conference","language":[{"iso":"eng"}],"_id":"20792","department":[{"_id":"76"},{"_id":"241"}],"user_id":"5786","series_title":"Lecture Notes in Computer Science"},{"user_id":"8472","department":[{"_id":"241"},{"_id":"662"}],"_id":"20793","language":[{"iso":"eng"}],"type":"report","report_number":"tr-ri-17-354","status":"public","abstract":[{"text":"Scenario-based requirements engineering addresses the message-based coordination of software-intensive systems and enables, if underpinned with formal languages, automatic requirements validation techniques for improving the quality of a requirements specification. One of such requirements engineering approaches bases on a recent visual Live Sequence Chart variant compliant to the Unified Modeling Language, so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be constructive thanks to assembling solutions by means of reusable building blocks that are proven in practice, so that recurring problems do not need to be solved over and over again. Thus, patterns also gained momentum in the area of requirements documentation. In this technical report, we introduce a model- and scenario-based pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates and unifies 86 requirement patterns from three well-known, practice-oriented requirement pattern catalogs, each covering different aspects.","lang":"eng"}],"author":[{"first_name":"Markus","full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702"},{"orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875","full_name":"Holtmann, Jörg","first_name":"Jörg"},{"full_name":"Koch, Thorsten","id":"13616","last_name":"Koch","first_name":"Thorsten"},{"first_name":"David","orcid":"0000-0001-7787-5380","last_name":"Schmelter","id":"40982","full_name":"Schmelter, David"}],"date_created":"2020-12-17T13:31:36Z","date_updated":"2022-01-06T06:54:38Z","title":"Model-based Requirement Pattern Catalog","citation":{"short":"M. Fockel, J. Holtmann, T. Koch, D. Schmelter, Model-Based Requirement Pattern Catalog, Paderborn, Germany, 2017.","bibtex":"@book{Fockel_Holtmann_Koch_Schmelter_2017, place={Paderborn, Germany}, title={Model-based Requirement Pattern Catalog}, author={Fockel, Markus and Holtmann, Jörg and Koch, Thorsten and Schmelter, David}, year={2017} }","mla":"Fockel, Markus, et al. <i>Model-Based Requirement Pattern Catalog</i>. 2017.","apa":"Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2017). <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany.","chicago":"Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","ieee":"M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, <i>Model-based Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.","ama":"Fockel M, Holtmann J, Koch T, Schmelter D. <i>Model-Based Requirement Pattern Catalog</i>. Paderborn, Germany; 2017."},"year":"2017","place":"Paderborn, Germany"}]
