---
_id: '20400'
author:
- first_name: AR
  full_name: Needle, AR
  last_name: Needle
- first_name: TW
  full_name: Kaminski, TW
  last_name: Kaminski
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
- first_name: JS
  full_name: Higginson, JS
  last_name: Higginson
- first_name: WB
  full_name: Farquhar, WB
  last_name: Farquhar
- first_name: CB
  full_name: Swanik, CB
  last_name: Swanik
citation:
  ama: Needle A, Kaminski T, Baumeister J, Higginson J, Farquhar W, Swanik C. The
    Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and
    Copers. <i>J Sport Rehabil</i>. 2017;26(1):15-25. doi:<a href="https://doi.org/10.1123/jsr.2015-0061">10.1123/jsr.2015-0061</a>
  apa: Needle, A., Kaminski, T., Baumeister, J., Higginson, J., Farquhar, W., &#38;
    Swanik, C. (2017). The Relationship Between Joint Stiffness and Muscle Activity
    in Unstable Ankles and Copers. <i>J Sport Rehabil</i>, <i>26</i>(1), 15–25. <a
    href="https://doi.org/10.1123/jsr.2015-0061">https://doi.org/10.1123/jsr.2015-0061</a>
  bibtex: '@article{Needle_Kaminski_Baumeister_Higginson_Farquhar_Swanik_2017, title={The
    Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles and
    Copers.}, volume={26}, DOI={<a href="https://doi.org/10.1123/jsr.2015-0061">10.1123/jsr.2015-0061</a>},
    number={1}, journal={J Sport Rehabil}, author={Needle, AR and Kaminski, TW and
    Baumeister, Jochen and Higginson, JS and Farquhar, WB and Swanik, CB}, year={2017},
    pages={15–25} }'
  chicago: 'Needle, AR, TW Kaminski, Jochen Baumeister, JS Higginson, WB Farquhar,
    and CB Swanik. “The Relationship Between Joint Stiffness and Muscle Activity in
    Unstable Ankles and Copers.” <i>J Sport Rehabil</i> 26, no. 1 (2017): 15–25. <a
    href="https://doi.org/10.1123/jsr.2015-0061">https://doi.org/10.1123/jsr.2015-0061</a>.'
  ieee: A. Needle, T. Kaminski, J. Baumeister, J. Higginson, W. Farquhar, and C. Swanik,
    “The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles
    and Copers.,” <i>J Sport Rehabil</i>, vol. 26, no. 1, pp. 15–25, 2017.
  mla: Needle, AR, et al. “The Relationship Between Joint Stiffness and Muscle Activity
    in Unstable Ankles and Copers.” <i>J Sport Rehabil</i>, vol. 26, no. 1, 2017,
    pp. 15–25, doi:<a href="https://doi.org/10.1123/jsr.2015-0061">10.1123/jsr.2015-0061</a>.
  short: A. Needle, T. Kaminski, J. Baumeister, J. Higginson, W. Farquhar, C. Swanik,
    J Sport Rehabil 26 (2017) 15–25.
date_created: 2020-11-18T13:43:28Z
date_updated: 2022-01-06T06:54:26Z
department:
- _id: '17'
- _id: '172'
doi: 10.1123/jsr.2015-0061
external_id:
  pmid:
  - '27632852'
intvolume: '        26'
issue: '1'
language:
- iso: eng
page: 15-25
pmid: '1'
publication: J Sport Rehabil
publication_identifier:
  issn:
  - 1056-6716
  - 1543-3072
status: public
title: The Relationship Between Joint Stiffness and Muscle Activity in Unstable Ankles
  and Copers.
type: journal_article
user_id: '62406'
volume: 26
year: '2017'
...
---
_id: '20460'
author:
- first_name: K
  full_name: Berner, K
  last_name: Berner
- first_name: L
  full_name: Morris, L
  last_name: Morris
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
- first_name: Q
  full_name: Louw, Q
  last_name: Louw
citation:
  ama: 'Berner K, Morris L, Baumeister J, Louw Q. Objective impairments of glait and
    balance in adults living with HIV-1 infection: a systematic review and meta-analysis
    of observational studies. <i>BMC Musculoskelet Disord</i>. 2017;18(1):325.'
  apa: 'Berner, K., Morris, L., Baumeister, J., &#38; Louw, Q. (2017). Objective impairments
    of glait and balance in adults living with HIV-1 infection: a systematic review
    and meta-analysis of observational studies. <i>BMC Musculoskelet Disord</i>, <i>18</i>(1),
    325.'
  bibtex: '@article{Berner_Morris_Baumeister_Louw_2017, title={Objective impairments
    of glait and balance in adults living with HIV-1 infection: a systematic review
    and meta-analysis of observational studies}, volume={18}, number={1}, journal={BMC
    Musculoskelet Disord}, author={Berner, K and Morris, L and Baumeister, Jochen
    and Louw, Q}, year={2017}, pages={325} }'
  chicago: 'Berner, K, L Morris, Jochen Baumeister, and Q Louw. “Objective Impairments
    of Glait and Balance in Adults Living with HIV-1 Infection: A Systematic Review
    and Meta-Analysis of Observational Studies.” <i>BMC Musculoskelet Disord</i> 18,
    no. 1 (2017): 325.'
  ieee: 'K. Berner, L. Morris, J. Baumeister, and Q. Louw, “Objective impairments
    of glait and balance in adults living with HIV-1 infection: a systematic review
    and meta-analysis of observational studies,” <i>BMC Musculoskelet Disord</i>,
    vol. 18, no. 1, p. 325, 2017.'
  mla: 'Berner, K., et al. “Objective Impairments of Glait and Balance in Adults Living
    with HIV-1 Infection: A Systematic Review and Meta-Analysis of Observational Studies.”
    <i>BMC Musculoskelet Disord</i>, vol. 18, no. 1, 2017, p. 325.'
  short: K. Berner, L. Morris, J. Baumeister, Q. Louw, BMC Musculoskelet Disord 18
    (2017) 325.
date_created: 2020-11-23T14:30:01Z
date_updated: 2022-01-06T06:54:27Z
department:
- _id: '17'
- _id: '172'
intvolume: '        18'
issue: '1'
language:
- iso: eng
page: '325'
publication: BMC Musculoskelet Disord
status: public
title: 'Objective impairments of glait and balance in adults living with HIV-1 infection:
  a systematic review and meta-analysis of observational studies'
type: journal_article
user_id: '62406'
volume: 18
year: '2017'
...
---
_id: '20493'
author:
- first_name: Benjamin Philipp
  full_name: Krebs, Benjamin Philipp
  last_name: Krebs
citation:
  ama: 'Krebs BP. Talent management and workforce performance: The too-much-potential-talent-effect.
    . In: ; 2017.'
  apa: 'Krebs, B. P. (2017). <i>Talent management and workforce performance: The too-much-potential-talent-effect.
    </i>. Academy of Management Annual Meeting , Atlanta, USA.'
  bibtex: '@inproceedings{Krebs_2017, title={Talent management and workforce performance:
    The too-much-potential-talent-effect. }, author={Krebs, Benjamin Philipp}, year={2017}
    }'
  chicago: 'Krebs, Benjamin Philipp. “Talent Management and Workforce Performance:
    The Too-Much-Potential-Talent-Effect. ,” 2017.'
  ieee: 'B. P. Krebs, “Talent management and workforce performance: The too-much-potential-talent-effect.
    ,” presented at the Academy of Management Annual Meeting , Atlanta, USA, 2017.'
  mla: 'Krebs, Benjamin Philipp. <i>Talent Management and Workforce Performance: The
    Too-Much-Potential-Talent-Effect. </i>. 2017.'
  short: 'B.P. Krebs, in: 2017.'
conference:
  end_date: 2017-08-08
  location: Atlanta, USA
  name: 'Academy of Management Annual Meeting '
  start_date: 2017-08-04
date_created: 2020-11-24T12:03:17Z
date_updated: 2022-01-06T06:54:27Z
department:
- _id: '178'
language:
- iso: eng
status: public
title: 'Talent management and workforce performance: The too-much-potential-talent-effect. '
type: conference
user_id: '63338'
year: '2017'
...
---
_id: '2050'
author:
- first_name: Dieter
  full_name: Krimphove, Dieter
  id: '282'
  last_name: Krimphove
citation:
  ama: 'Krimphove D. Kommentierung § 3 GWB (Mittelstandskartelle). In: Busche J, Röhling
    A, eds. <i>Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>. Köln:
    Carl Heymanns Verlag KG; 2017:466 – 538.'
  apa: 'Krimphove, D. (2017). Kommentierung § 3 GWB (Mittelstandskartelle). In J.
    Busche &#38; A. Röhling (Eds.), <i>Kölner Kommentar zum Kartellrecht Bd. 1 ( §§
    1 – 34a GWB)</i> (pp. 466 – 538). Köln: Carl Heymanns Verlag KG.'
  bibtex: '@inbook{Krimphove_2017, place={Köln}, title={Kommentierung § 3 GWB (Mittelstandskartelle)},
    booktitle={Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)}, publisher={Carl
    Heymanns Verlag KG}, author={Krimphove, Dieter}, editor={Busche, Jan and Röhling,
    AndreasEditors}, year={2017}, pages={466 – 538} }'
  chicago: 'Krimphove, Dieter. “Kommentierung § 3 GWB (Mittelstandskartelle).” In
    <i>Kölner Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, edited by Jan
    Busche and Andreas Röhling, 466 – 538. Köln: Carl Heymanns Verlag KG, 2017.'
  ieee: 'D. Krimphove, “Kommentierung § 3 GWB (Mittelstandskartelle),” in <i>Kölner
    Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, J. Busche and A. Röhling,
    Eds. Köln: Carl Heymanns Verlag KG, 2017, pp. 466 – 538.'
  mla: Krimphove, Dieter. “Kommentierung § 3 GWB (Mittelstandskartelle).” <i>Kölner
    Kommentar Zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)</i>, edited by Jan Busche and
    Andreas Röhling, Carl Heymanns Verlag KG, 2017, pp. 466 – 538.
  short: 'D. Krimphove, in: J. Busche, A. Röhling (Eds.), Kölner Kommentar Zum Kartellrecht
    Bd. 1 ( §§ 1 – 34a GWB), Carl Heymanns Verlag KG, Köln, 2017, pp. 466 – 538.'
date_created: 2018-03-29T12:52:52Z
date_updated: 2022-01-06T06:54:28Z
editor:
- first_name: Jan
  full_name: Busche, Jan
  last_name: Busche
- first_name: Andreas
  full_name: Röhling, Andreas
  last_name: Röhling
page: 466 – 538
place: Köln
publication: Kölner Kommentar zum Kartellrecht Bd. 1 ( §§ 1 – 34a GWB)
publisher: Carl Heymanns Verlag KG
status: public
title: Kommentierung § 3 GWB (Mittelstandskartelle)
type: book_chapter
user_id: '282'
year: '2017'
...
---
_id: '2051'
author:
- first_name: Dieter
  full_name: Krimphove, Dieter
  id: '282'
  last_name: Krimphove
citation:
  ama: Krimphove D. Eigentum – Zum Bedeutungswandel eines Rechtsinstituts. <i>Rechtstheorie</i>.
    2017;(Jg. 47, Heft 3):271 – 317.
  apa: Krimphove, D. (2017). Eigentum – Zum Bedeutungswandel eines Rechtsinstituts.
    <i>Rechtstheorie</i>, (Jg. 47, Heft 3), 271 – 317.
  bibtex: '@article{Krimphove_2017, title={Eigentum – Zum Bedeutungswandel eines Rechtsinstituts},
    number={Jg. 47, Heft 3}, journal={Rechtstheorie}, publisher={Dunker und Humblot},
    author={Krimphove, Dieter}, year={2017}, pages={271 – 317} }'
  chicago: 'Krimphove, Dieter. “Eigentum – Zum Bedeutungswandel Eines Rechtsinstituts.”
    <i>Rechtstheorie</i>, no. Jg. 47, Heft 3 (2017): 271 – 317.'
  ieee: D. Krimphove, “Eigentum – Zum Bedeutungswandel eines Rechtsinstituts,” <i>Rechtstheorie</i>,
    no. Jg. 47, Heft 3, pp. 271 – 317, 2017.
  mla: Krimphove, Dieter. “Eigentum – Zum Bedeutungswandel Eines Rechtsinstituts.”
    <i>Rechtstheorie</i>, no. Jg. 47, Heft 3, Dunker und Humblot, 2017, pp. 271 –
    317.
  short: D. Krimphove, Rechtstheorie (2017) 271 – 317.
date_created: 2018-03-29T12:54:40Z
date_updated: 2022-01-06T06:54:29Z
issue: Jg. 47, Heft 3
page: 271 – 317
publication: Rechtstheorie
publisher: Dunker und Humblot
status: public
title: Eigentum – Zum Bedeutungswandel eines Rechtsinstituts
type: journal_article
user_id: '282'
year: '2017'
...
---
_id: '2052'
author:
- first_name: Dieter
  full_name: Krimphove, Dieter
  id: '282'
  last_name: Krimphove
citation:
  ama: 'Krimphove D. A historical Overview of the Development of Legal Logic. In:
    Krimphove D, Lentner GM, eds. <i>Law and Logic – Contemporary Issues</i>. Berlin:
    Dunker und Humblot; 2017:11 – 53.'
  apa: 'Krimphove, D. (2017). A historical Overview of the Development of Legal Logic.
    In D. Krimphove &#38; G. M. Lentner (Eds.), <i>Law and Logic – Contemporary Issues</i>
    (pp. 11 – 53). Berlin: Dunker und Humblot.'
  bibtex: '@inbook{Krimphove_2017, place={Berlin}, title={A historical Overview of
    the Development of Legal Logic}, booktitle={Law and Logic – Contemporary Issues},
    publisher={Dunker und Humblot}, author={Krimphove, Dieter}, editor={Krimphove,
    Dieter and Lentner, Gabriel M.Editors}, year={2017}, pages={11 – 53} }'
  chicago: 'Krimphove, Dieter. “A Historical Overview of the Development of Legal
    Logic.” In <i>Law and Logic – Contemporary Issues</i>, edited by Dieter Krimphove
    and Gabriel M. Lentner, 11 – 53. Berlin: Dunker und Humblot, 2017.'
  ieee: 'D. Krimphove, “A historical Overview of the Development of Legal Logic,”
    in <i>Law and Logic – Contemporary Issues</i>, D. Krimphove and G. M. Lentner,
    Eds. Berlin: Dunker und Humblot, 2017, pp. 11 – 53.'
  mla: Krimphove, Dieter. “A Historical Overview of the Development of Legal Logic.”
    <i>Law and Logic – Contemporary Issues</i>, edited by Dieter Krimphove and Gabriel
    M. Lentner, Dunker und Humblot, 2017, pp. 11 – 53.
  short: 'D. Krimphove, in: D. Krimphove, G.M. Lentner (Eds.), Law and Logic – Contemporary
    Issues, Dunker und Humblot, Berlin, 2017, pp. 11 – 53.'
date_created: 2018-03-29T12:57:20Z
date_updated: 2022-01-06T06:54:29Z
editor:
- first_name: Dieter
  full_name: Krimphove, Dieter
  last_name: Krimphove
- first_name: Gabriel M.
  full_name: Lentner, Gabriel M.
  last_name: Lentner
page: 11 – 53
place: Berlin
publication: Law and Logic – Contemporary Issues
publisher: Dunker und Humblot
status: public
title: A historical Overview of the Development of Legal Logic
type: book_chapter
user_id: '282'
year: '2017'
...
---
_id: '2054'
author:
- first_name: Dieter
  full_name: Krimphove, Dieter
  id: '282'
  last_name: Krimphove
- first_name: Christoph
  full_name: Lüke, Christoph
  last_name: Lüke
citation:
  ama: 'Krimphove D, Lüke C. The Transformation of the Mortgage Credit Directive in
    German Law. In: Anderson M, Arroyo Amayuelas E, eds. <i>The Impact of the Mortgage
    Credit Directive in Europe</i>. Groningen: Europa Law Publishing ; 2017:205 –
    233.'
  apa: 'Krimphove, D., &#38; Lüke, C. (2017). The Transformation of the Mortgage Credit
    Directive in German Law. In M. Anderson &#38; E. Arroyo Amayuelas (Eds.), <i>The
    Impact of the Mortgage Credit Directive in Europe</i> (pp. 205 – 233). Groningen:
    Europa Law Publishing .'
  bibtex: '@inbook{Krimphove_Lüke_2017, place={Groningen}, title={The Transformation
    of the Mortgage Credit Directive in German Law}, booktitle={The Impact of the
    Mortgage Credit Directive in Europe}, publisher={Europa Law Publishing }, author={Krimphove,
    Dieter and Lüke, Christoph}, editor={Anderson, Miriam and Arroyo Amayuelas, EstherEditors},
    year={2017}, pages={205 – 233} }'
  chicago: 'Krimphove, Dieter, and Christoph Lüke. “The Transformation of the Mortgage
    Credit Directive in German Law.” In <i>The Impact of the Mortgage Credit Directive
    in Europe</i>, edited by Miriam Anderson and Esther Arroyo Amayuelas, 205 – 233.
    Groningen: Europa Law Publishing , 2017.'
  ieee: 'D. Krimphove and C. Lüke, “The Transformation of the Mortgage Credit Directive
    in German Law,” in <i>The Impact of the Mortgage Credit Directive in Europe</i>,
    M. Anderson and E. Arroyo Amayuelas, Eds. Groningen: Europa Law Publishing , 2017,
    pp. 205 – 233.'
  mla: Krimphove, Dieter, and Christoph Lüke. “The Transformation of the Mortgage
    Credit Directive in German Law.” <i>The Impact of the Mortgage Credit Directive
    in Europe</i>, edited by Miriam Anderson and Esther Arroyo Amayuelas, Europa Law
    Publishing , 2017, pp. 205 – 233.
  short: 'D. Krimphove, C. Lüke, in: M. Anderson, E. Arroyo Amayuelas (Eds.), The
    Impact of the Mortgage Credit Directive in Europe, Europa Law Publishing , Groningen,
    2017, pp. 205 – 233.'
date_created: 2018-03-29T13:01:47Z
date_updated: 2022-01-06T06:54:29Z
editor:
- first_name: Miriam
  full_name: Anderson, Miriam
  last_name: Anderson
- first_name: Esther
  full_name: Arroyo Amayuelas, Esther
  last_name: Arroyo Amayuelas
page: 205 – 233
place: Groningen
publication: The Impact of the Mortgage Credit Directive in Europe
publisher: 'Europa Law Publishing '
status: public
title: The Transformation of the Mortgage Credit Directive in German Law
type: book_chapter
user_id: '282'
year: '2017'
...
---
_id: '20552'
abstract:
- lang: eng
  text: Das Zukunftsszenario der Industrie 4.0 ist gepr{\"a}gt durch einen massiven
    Anstieg der unternehmens{\"u}bergreifenden Vernetzung. Um einer Bedrohung durch
    unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken,
    muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme
    ein hoher Stellenwert einger{\"a}umt werden. Dieses Paradigma wird als Security
    by Design bezeichnet. {\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt
    werden k{\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit
    erf{\"u}llen und damit die Eigenschaft der Industrial Security gew{\"a}hrleisten.
    Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit
    vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering
    eine Entwicklung nach dem Paradigma Security by Design erm{\"o}glicht.
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
citation:
  ama: 'Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW,
    Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>.
    Springer Berlin Heidelberg; 2017:1-24. doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>'
  apa: Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design.
    In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler
    und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>
  bibtex: '@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial
    Security by Design}, DOI={<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>},
    booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer
    Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer,
    Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017},
    pages={1–24} }'
  chicago: 'Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security
    by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>,
    edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg:
    Springer Berlin Heidelberg, 2017. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.'
  ieee: 'C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in
    <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier,
    G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2017, pp. 1–24.'
  mla: Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung
    Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al.,
    Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>.
  short: 'C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen
    (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin
    Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.'
date_created: 2020-11-30T09:56:23Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1007/978-3-662-52903-4_8-1
editor:
- first_name: Günter W.
  full_name: Maier, Günter W.
  last_name: Maier
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
- first_name: Eckhard
  full_name: Steffen, Eckhard
  last_name: Steffen
keyword:
- ITSECWEBSITE
language:
- iso: eng
page: 1-24
place: Berlin, Heidelberg
publication: Handbuch Gestaltung digitaler und vernetzter Arbeitswelten
publication_identifier:
  isbn:
  - 978-3-662-52903-4
publisher: Springer Berlin Heidelberg
status: public
title: Industrial Security by Design
type: book_chapter
user_id: '5786'
year: '2017'
...
---
_id: '20553'
abstract:
- lang: eng
  text: Finding and fixing software vulnerabilities have become a major struggle for
    most software development companies. While generally without alternative, such
    fixing efforts are a major cost factor, which is why companies have a vital interest
    in focusing their secure software development activities such that they obtain
    an optimal return on this investment. We investigate, in this paper, quantitatively
    the major factors that impact the time it takes to fix a given security issue
    based on data collected automatically within SAP's secure development process,
    and we show how the issue fix time could be used to monitor the fixing process.
    We use three machine learning methods and evaluate their predictive power in predicting
    the time to fix issues. Interestingly, the models indicate that vulnerability
    type has less dominant impact on issue fix time than previously believed. The
    time it takes to fix an issue instead seems much more related to the component
    in which the potential vulnerability resides, the project related to the issue,
    the development groups that address the issue, and the closeness of the software
    release date. This indicates that the software structure, the fixing processes,
    and the development groups are the dominant factors that impact the time spent
    to address security issues. SAP can use the models to implement a continuous improvement
    of its secure software development process and to measure the impact of individual
    improvements. The development teams at SAP develop different types of software,
    adopt different internal development processes, use different programming languages
    and platforms, and are located in different cities and countries. Other organizations,
    may use the results---with precaution---and be learning organizations.
author:
- first_name: Lotfi
  full_name: Ben Othmane, Lotfi
  last_name: Ben Othmane
- first_name: Golriz
  full_name: Chehrazi, Golriz
  last_name: Chehrazi
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Petar
  full_name: Tsalovski, Petar
  last_name: Tsalovski
- first_name: Achim D.
  full_name: Brucker, Achim D.
  last_name: Brucker
citation:
  ama: 'Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing
    Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science
    and Engineering</i>. 2017;2(2):107-124. doi:<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>'
  apa: 'Ben Othmane, L., Chehrazi, G., Bodden, E., Tsalovski, P., &#38; Brucker, A.
    D. (2017). Time for Addressing Software Security Issues: Prediction Models and
    Impacting Factors. <i>Data Science and Engineering</i>, <i>2</i>(2), 107–124.
    <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>'
  bibtex: '@article{Ben Othmane_Chehrazi_Bodden_Tsalovski_Brucker_2017, title={Time
    for Addressing Software Security Issues: Prediction Models and Impacting Factors},
    volume={2}, DOI={<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>},
    number={2}, journal={Data Science and Engineering}, author={Ben Othmane, Lotfi
    and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim
    D.}, year={2017}, pages={107–124} }'
  chicago: 'Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and
    Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models
    and Impacting Factors.” <i>Data Science and Engineering</i> 2, no. 2 (2017): 107–24.
    <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  ieee: 'L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker,
    “Time for Addressing Software Security Issues: Prediction Models and Impacting
    Factors,” <i>Data Science and Engineering</i>, vol. 2, no. 2, pp. 107–124, 2017,
    doi: <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  mla: 'Ben Othmane, Lotfi, et al. “Time for Addressing Software Security Issues:
    Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i>,
    vol. 2, no. 2, 2017, pp. 107–24, doi:<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  short: L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A.D. Brucker, Data
    Science and Engineering 2 (2017) 107–124.
date_created: 2020-11-30T10:24:50Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: https://doi.org/10.1007/s41019-016-0019-8
intvolume: '         2'
issue: '2'
language:
- iso: eng
page: 107-124
publication: Data Science and Engineering
publication_identifier:
  issn:
  - 2364-1541
related_material:
  link:
  - relation: confirmation
    url: http://bodden.de/pubs/bcb17time.pdf
status: public
title: 'Time for Addressing Software Security Issues: Prediction Models and Impacting
  Factors'
type: journal_article
user_id: '5786'
volume: 2
year: '2017'
...
---
_id: '20554'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Bodden E. <i>Self-Adaptive Static Analysis</i>.; 2017.
  apa: Bodden, E. (2017). <i>Self-adaptive static analysis</i>.
  bibtex: '@book{Bodden_2017, title={Self-adaptive static analysis}, author={Bodden,
    Eric}, year={2017} }'
  chicago: Bodden, Eric. <i>Self-Adaptive Static Analysis</i>, 2017.
  ieee: E. Bodden, <i>Self-adaptive static analysis</i>. 2017.
  mla: Bodden, Eric. <i>Self-Adaptive Static Analysis</i>. 2017.
  short: E. Bodden, Self-Adaptive Static Analysis, 2017.
date_created: 2020-11-30T10:27:21Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/abs/1710.07430
report_number: arXiv:1710.07430
status: public
title: Self-adaptive static analysis
type: report
user_id: '5786'
year: '2017'
...
---
_id: '20557'
author:
- first_name: Max
  full_name: Lillack, Max
  last_name: Lillack
- first_name: Christian
  full_name: Kästner, Christian
  last_name: Kästner
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE
    Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>
  apa: Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration
    Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1.
    <a href="https://doi.org/10.1109/TSE.2017.2756048">https://doi.org/10.1109/TSE.2017.2756048</a>
  bibtex: '@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration
    Options}, volume={PP}, DOI={<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>},
    number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack,
    Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }'
  chicago: 'Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time
    Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no.
    99 (2017): 1–1. <a href="https://doi.org/10.1109/TSE.2017.2756048">https://doi.org/10.1109/TSE.2017.2756048</a>.'
  ieee: 'M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration
    Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp.
    1–1, 2017, doi: <a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>.'
  mla: Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions
    on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>.
  short: M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering
    PP (2017) 1–1.
date_created: 2020-11-30T11:06:43Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
doi: 10.1109/TSE.2017.2756048
issue: '99'
keyword:
- Androids
- Bluetooth
- Humanoid robots
- Java
- Software
- Tools
- Configuration options
- Static analysis
- Variability mining
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/lkb17lotrack.pdf
page: 1-1
publication: IEEE Transactions on Software Engineering
publication_identifier:
  issn:
  - 0098-5589
status: public
title: Tracking Load-time Configuration Options
type: journal_article
user_id: '5786'
volume: PP
year: '2017'
...
---
_id: '20558'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Michael
  full_name: Reif, Michael
  last_name: Reif
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Florian
  full_name: Göpfert, Florian
  last_name: Göpfert
- first_name: Felix
  full_name: Günther, Felix
  last_name: Günther
- first_name: Christian
  full_name: Weinert, Christian
  last_name: Weinert
- first_name: Daniel
  full_name: Demmler, Daniel
  last_name: Demmler
- first_name: Ram
  full_name: Kamath, Ram
  last_name: Kamath
citation:
  ama: 'Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using
    Cryptography. In: <i>International Conference on Automated Software Engineering
    (ASE 2017), Tool Demo Track</i>. ; 2017.'
  apa: 'Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert,
    F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt:
    Supporting Developers in using Cryptography. <i>International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track</i>.'
  bibtex: '@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et
    al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International
    Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger,
    Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden,
    Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler,
    Daniel and et al.}, year={2017} }'
  chicago: 'Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric
    Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    In <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  ieee: 'S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,”
    2017.'
  mla: 'Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  short: 'S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F.
    Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track, 2017.'
date_created: 2020-11-30T11:08:26Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/knr+17cognicrypt.pdf
publication: International Conference on Automated Software Engineering (ASE 2017),
  Tool Demo Track
status: public
title: 'CogniCrypt: Supporting Developers in using Cryptography'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20559'
author:
- first_name: Lisa Nguyen Quang
  full_name: Do, Lisa Nguyen Quang
  last_name: Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: 'Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time
    Static Analysis. In: <i>Proceedings of the 26th ACM SIGSOFT International Symposium
    on Software Testing and Analysis</i>. ISSTA 2017. ACM; 2017:307-317. doi:<a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>'
  apa: Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2017). Just-in-time Static Analysis. <i>Proceedings of the 26th ACM SIGSOFT
    International Symposium on Software Testing and Analysis</i>, 307–317. <a href="https://doi.org/10.1145/3092703.3092705">https://doi.org/10.1145/3092703.3092705</a>
  bibtex: '@inproceedings{Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, place={New
    York, NY, USA}, series={ISSTA 2017}, title={Just-in-time Static Analysis}, DOI={<a
    href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>}, booktitle={Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis},
    publisher={ACM}, author={Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin
    and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017}, pages={307–317},
    collection={ISSTA 2017} }'
  chicago: 'Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In <i>Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>,
    307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. <a href="https://doi.org/10.1145/3092703.3092705">https://doi.org/10.1145/3092703.3092705</a>.'
  ieee: 'L. N. Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    “Just-in-time Static Analysis,” in <i>Proceedings of the 26th ACM SIGSOFT International
    Symposium on Software Testing and Analysis</i>, 2017, pp. 307–317, doi: <a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>.'
  mla: Do, Lisa Nguyen Quang, et al. “Just-in-Time Static Analysis.” <i>Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>,
    ACM, 2017, pp. 307–17, doi:<a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>.
  short: 'L.N.Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in:
    Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing
    and Analysis, ACM, New York, NY, USA, 2017, pp. 307–317.'
date_created: 2020-11-30T11:10:01Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
doi: 10.1145/3092703.3092705
keyword:
- Just-in-Time
- Layered analysis
- Static analysis
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/nal+17jit.pdf
page: 307-317
place: New York, NY, USA
publication: Proceedings of the 26th ACM SIGSOFT International Symposium on Software
  Testing and Analysis
publication_identifier:
  isbn:
  - 978-1-4503-5076-1
publisher: ACM
series_title: ISSTA 2017
status: public
title: Just-in-time Static Analysis
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20659'
author:
- first_name: YW
  full_name: An, YW
  last_name: An
- first_name: A
  full_name: DiTrani Lobacz, A
  last_name: DiTrani Lobacz
- first_name: T
  full_name: Lehmann, T
  last_name: Lehmann
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
- first_name: CB
  full_name: Swanik, CB
  last_name: Swanik
citation:
  ama: An Y, DiTrani Lobacz A, Lehmann T, Baumeister J, Swanik C. Altered brain activity
    during joint loading after anterior cruciate ligament reconstruction. 2017;49(5S):360.
  apa: An, Y., DiTrani Lobacz, A., Lehmann, T., Baumeister, J., &#38; Swanik, C. (2017).
    Altered brain activity during joint loading after anterior cruciate ligament reconstruction.
  bibtex: '@article{An_DiTrani Lobacz_Lehmann_Baumeister_Swanik_2017, series={Med
    Sci Sports Exerx}, title={Altered brain activity during joint loading after anterior
    cruciate ligament reconstruction}, volume={49}, number={5S}, author={An, YW and
    DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB}, year={2017},
    pages={360}, collection={Med Sci Sports Exerx} }'
  chicago: An, YW, A DiTrani Lobacz, T Lehmann, Jochen Baumeister, and CB Swanik.
    “Altered Brain Activity during Joint Loading after Anterior Cruciate Ligament
    Reconstruction.” Med Sci Sports Exerx, 2017.
  ieee: Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, and C. Swanik, “Altered
    brain activity during joint loading after anterior cruciate ligament reconstruction,”
    vol. 49, no. 5S. p. 360, 2017.
  mla: An, YW, et al. <i>Altered Brain Activity during Joint Loading after Anterior
    Cruciate Ligament Reconstruction</i>. Vol. 49, no. 5S, 2017, p. 360.
  short: Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, C. Swanik, 49 (2017)
    360.
date_created: 2020-12-02T13:43:21Z
date_updated: 2022-01-06T06:54:31Z
department:
- _id: '17'
- _id: '172'
intvolume: '        49'
issue: 5S
language:
- iso: eng
page: '360'
series_title: Med Sci Sports Exerx
status: public
title: Altered brain activity during joint loading after anterior cruciate ligament
  reconstruction
type: conference_abstract
user_id: '62406'
volume: 49
year: '2017'
...
---
_id: '20660'
author:
- first_name: YW
  full_name: An, YW
  last_name: An
- first_name: A
  full_name: DiTrani Lobacz, A
  last_name: DiTrani Lobacz
- first_name: T
  full_name: Lehmann, T
  last_name: Lehmann
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
- first_name: CB
  full_name: Swanik, CB
  last_name: Swanik
citation:
  ama: An Y, DiTrani Lobacz A, Lehmann T, Baumeister J, Swanik C. Altered cortical
    activation patterns following anterior cruciate ligament reconstruction during
    joint loading. 2017;52(6):136.
  apa: An, Y., DiTrani Lobacz, A., Lehmann, T., Baumeister, J., &#38; Swanik, C. (2017).
    Altered cortical activation patterns following anterior cruciate ligament reconstruction
    during joint loading.
  bibtex: '@article{An_DiTrani Lobacz_Lehmann_Baumeister_Swanik_2017, series={J Athl
    Train}, title={Altered cortical activation patterns following anterior cruciate
    ligament reconstruction during joint loading}, volume={52}, number={6}, author={An,
    YW and DiTrani Lobacz, A and Lehmann, T and Baumeister, Jochen and Swanik, CB},
    year={2017}, pages={136}, collection={J Athl Train} }'
  chicago: An, YW, A DiTrani Lobacz, T Lehmann, Jochen Baumeister, and CB Swanik.
    “Altered Cortical Activation Patterns Following Anterior Cruciate Ligament Reconstruction
    during Joint Loading.” J Athl Train, 2017.
  ieee: Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, and C. Swanik, “Altered
    cortical activation patterns following anterior cruciate ligament reconstruction
    during joint loading,” vol. 52, no. 6. p. 136, 2017.
  mla: An, YW, et al. <i>Altered Cortical Activation Patterns Following Anterior Cruciate
    Ligament Reconstruction during Joint Loading</i>. Vol. 52, no. 6, 2017, p. 136.
  short: Y. An, A. DiTrani Lobacz, T. Lehmann, J. Baumeister, C. Swanik, 52 (2017)
    136.
date_created: 2020-12-02T13:45:25Z
date_updated: 2022-01-06T06:54:31Z
department:
- _id: '17'
- _id: '172'
intvolume: '        52'
issue: '6'
language:
- iso: eng
page: '136'
series_title: J Athl Train
status: public
title: Altered cortical activation patterns following anterior cruciate ligament reconstruction
  during joint loading
type: conference_abstract
user_id: '62406'
volume: 52
year: '2017'
...
---
_id: '20661'
author:
- first_name: P
  full_name: Anders, P
  last_name: Anders
- first_name: T
  full_name: Lehmann, T
  last_name: Lehmann
- first_name: H
  full_name: Müller, H
  last_name: Müller
- first_name: I
  full_name: Molde, I
  last_name: Molde
- first_name: 'KB '
  full_name: 'Gronvik, KB '
  last_name: Gronvik
- first_name: N
  full_name: SkaeretMaroni, N
  last_name: SkaeretMaroni
- first_name: B
  full_name: Vereijken, B
  last_name: Vereijken
- first_name: Jochen
  full_name: Baumeister, Jochen
  id: '46'
  last_name: Baumeister
  orcid: 0000-0003-2683-5826
citation:
  ama: Anders P, Lehmann T, Müller H, et al. Balance exergames increase cortical activity
    in frontal areas of the brain. 2017;57(1):351.
  apa: Anders, P., Lehmann, T., Müller, H., Molde, I., Gronvik, K., SkaeretMaroni,
    N., … Baumeister, J. (2017). Balance exergames increase cortical activity in frontal
    areas of the brain.
  bibtex: '@article{Anders_Lehmann_Müller_Molde_Gronvik_SkaeretMaroni_Vereijken_Baumeister_2017,
    series={Gait &#38; Posture}, title={Balance exergames increase cortical activity
    in frontal areas of the brain}, volume={57}, number={1}, author={Anders, P and
    Lehmann, T and Müller, H and Molde, I and Gronvik, KB  and SkaeretMaroni, N and
    Vereijken, B and Baumeister, Jochen}, year={2017}, pages={351}, collection={Gait
    &#38; Posture} }'
  chicago: Anders, P, T Lehmann, H Müller, I Molde, KB  Gronvik, N SkaeretMaroni,
    B Vereijken, and Jochen Baumeister. “Balance Exergames Increase Cortical Activity
    in Frontal Areas of the Brain.” Gait &#38; Posture, 2017.
  ieee: P. Anders <i>et al.</i>, “Balance exergames increase cortical activity in
    frontal areas of the brain,” vol. 57, no. 1. p. 351, 2017.
  mla: Anders, P., et al. <i>Balance Exergames Increase Cortical Activity in Frontal
    Areas of the Brain</i>. Vol. 57, no. 1, 2017, p. 351.
  short: P. Anders, T. Lehmann, H. Müller, I. Molde, K. Gronvik, N. SkaeretMaroni,
    B. Vereijken, J. Baumeister, 57 (2017) 351.
date_created: 2020-12-02T13:48:59Z
date_updated: 2022-01-06T06:54:31Z
department:
- _id: '17'
- _id: '172'
intvolume: '        57'
issue: '1'
language:
- iso: eng
page: '351'
series_title: Gait & Posture
status: public
title: Balance exergames increase cortical activity in frontal areas of the brain
type: conference_abstract
user_id: '62406'
volume: 57
year: '2017'
...
---
_id: '20715'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: 'Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah:
    Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference
    for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017.'
  apa: 'Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.'
  bibtex: '@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017,
    title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen
    Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith,
    Justin and Murphy-Hill, Emerson}, year={2017} }'
  chicago: 'Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  ieee: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.'
  mla: 'Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  short: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill,
    in: International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track, 2017.'
date_created: 2020-12-14T11:51:44Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/dal17cheetah.pdf
publication: International Conference for Software Engineering (ICSE), Tool Demonstrations
  Track
status: public
title: 'Cheetah: Just-in-Time Taint Analysis for Android Apps'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20791'
abstract:
- lang: eng
  text: Intelligente technische Systeme, wie autonom fahrende Fahrzeuge, werden in
    einem hohen Maß durch Software realisiert. Der Weg zum autonomen Fahren führt
    unweigerlich über eine steigende Vernetzung von Steuergeräten im Fahrzeug und
    über Fahrzeuggrenzen hinweg. Damit einher geht eine stetig steigende Komplexität
    der Software. Deshalb liegt es auf der Hand, dass die systematische Qualitätssicherung
    für derartige technische Systeme sehr früh, also bereits entwicklungsbegleitend,
    erfolgen muss. Dazu lässt sich das Software-in-the-Loop-Verfahren einsetzen, das
    auf etablierte Techniken des Hardware-in-the-Loop-Verfahrens zurückgreift. Eine
    besondere Herausforderung besteht darin, Simulationsmodelle und Testbibliotheken
    sowie die zugehörigen Visualisierungs- und Testwerkzeuge in beiden Welten synergetisch
    zu nutzen. Das Ziel ist eine einheitliche X-in-the-Loop (XIL) Basis für beide
    Verfahren. Der Schlüssel zu einer einheitlichen Basis für durchgängige XIL-Testszenarien
    ist der Einsatz eines übergeordneten Systemmodells. Es definiert die Systemgrenze
    und umliegenden Systeme in der Umwelt. Zudem dient das Systemmodell als Ordnungsschema
    für die Ablage der Artefakte wie Verhaltensmodelle, Testskripte, Parametersätze
    oder Workflows. Ein zentrales Datenmanagementwerkzeug, welches sämtliche Strukturinformationen,
    Verhaltensmodelle und Variantenbezüge verknüpft, ermöglicht ein teilautomatisches
    Umschalten zwischen den Testszenarien. In diesem Beitrag stellen wir eine solche
    Lösung vor.
author:
- first_name: Joachim
  full_name: Schmitz, Joachim
  last_name: Schmitz
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
citation:
  ama: 'Schmitz J, Fockel M. Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien.
    In: <i> Tag Des Systems Engineering 2017</i>. Gesellschaft f{\"u}r Systems Engineering
    e.V.; 2017.'
  apa: Schmitz, J., &#38; Fockel, M. (2017). Systemmodelle als Schlüssel zu durchgängigen
    XIL-Testszenarien. In <i> Tag des Systems Engineering 2017</i>. Gesellschaft f{\"u}r
    Systems Engineering e.V.
  bibtex: '@inproceedings{Schmitz_Fockel_2017, title={Systemmodelle als Schlüssel
    zu durchgängigen XIL-Testszenarien}, booktitle={ Tag des Systems Engineering 2017},
    publisher={Gesellschaft f{\"u}r Systems Engineering e.V.}, author={Schmitz, Joachim
    and Fockel, Markus}, year={2017} }'
  chicago: Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen
    XIL-Testszenarien.” In <i> Tag Des Systems Engineering 2017</i>. Gesellschaft
    f{\"u}r Systems Engineering e.V., 2017.
  ieee: J. Schmitz and M. Fockel, “Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien,”
    in <i> Tag des Systems Engineering 2017</i>, 2017.
  mla: Schmitz, Joachim, and Markus Fockel. “Systemmodelle Als Schlüssel Zu Durchgängigen
    XIL-Testszenarien.” <i> Tag Des Systems Engineering 2017</i>, Gesellschaft f{\"u}r
    Systems Engineering e.V., 2017.
  short: 'J. Schmitz, M. Fockel, in:  Tag Des Systems Engineering 2017, Gesellschaft
    f{\"u}r Systems Engineering e.V., 2017.'
date_created: 2020-12-17T13:29:01Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '241'
- _id: '662'
language:
- iso: eng
publication: ' Tag des Systems Engineering 2017'
publisher: Gesellschaft f{\"u}r Systems Engineering e.V.
status: public
title: Systemmodelle als Schlüssel zu durchgängigen XIL-Testszenarien
type: conference
user_id: '8472'
year: '2017'
...
---
_id: '20792'
author:
- first_name: Stefano
  full_name: Schivo, Stefano
  last_name: Schivo
- first_name: Bugra M.
  full_name: Yildiz., Bugra M.
  last_name: Yildiz.
- first_name: Enno
  full_name: Ruijters, Enno
  last_name: Ruijters
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Rajesh
  full_name: Kumar, Rajesh
  last_name: Kumar
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Arend
  full_name: Rensink, Arend
  last_name: Rensink
- first_name: Mariëlle
  full_name: Stoelinga, Mariëlle
  last_name: Stoelinga
citation:
  ama: 'Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End
    Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds.
    <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>.
    Lecture Notes in Computer Science. Springer; 2017:319-336. doi:<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>'
  apa: 'Schivo, S., Yildiz., B. M., Ruijters, E., Gerking, C., Kumar, R., Dziwok,
    S., Rensink, A., &#38; Stoelinga, M. (2017). How to Efficiently Build a Front-End
    Tool for UPPAAL: A Model-Driven Approach. In K. G. Larsen, O. Sokolsky, &#38;
    J. Wang (Eds.), <i>Dependable Software Engineering, 3rd International Symposium
    (SETTA 2017)</i> (Issue 10606, pp. 319–336). Springer. <a href="https://doi.org/10.1007/978-3-319-69483-2_19">https://doi.org/10.1007/978-3-319-69483-2_19</a>'
  bibtex: '@inproceedings{Schivo_Yildiz._Ruijters_Gerking_Kumar_Dziwok_Rensink_Stoelinga_2017,
    place={Changsha}, series={Lecture Notes in Computer Science}, title={How to Efficiently
    Build a Front-End Tool for UPPAAL: A Model-Driven Approach}, DOI={<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>},
    number={10606}, booktitle={Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)}, publisher={Springer}, author={Schivo, Stefano and Yildiz.,
    Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok,
    Stefan and Rensink, Arend and Stoelinga, Mariëlle}, editor={Larsen, Kim G. and
    Sokolsky, Oleg and Wang, Ji}, year={2017}, pages={319–336}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking,
    Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently
    Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In <i>Dependable
    Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by
    Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science.
    Changsha: Springer, 2017. <a href="https://doi.org/10.1007/978-3-319-69483-2_19">https://doi.org/10.1007/978-3-319-69483-2_19</a>.'
  ieee: 'S. Schivo <i>et al.</i>, “How to Efficiently Build a Front-End Tool for UPPAAL:
    A Model-Driven Approach,” in <i>Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)</i>, 2017, no. 10606, pp. 319–336, doi: <a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>.'
  mla: 'Schivo, Stefano, et al. “How to Efficiently Build a Front-End Tool for UPPAAL:
    A Model-Driven Approach.” <i>Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)</i>, edited by Kim G. Larsen et al., no. 10606, Springer,
    2017, pp. 319–36, doi:<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>.'
  short: 'S. Schivo, B.M. Yildiz., E. Ruijters, C. Gerking, R. Kumar, S. Dziwok, A.
    Rensink, M. Stoelinga, in: K.G. Larsen, O. Sokolsky, J. Wang (Eds.), Dependable
    Software Engineering, 3rd International Symposium (SETTA 2017), Springer, Changsha,
    2017, pp. 319–336.'
date_created: 2020-12-17T13:30:15Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '76'
- _id: '241'
doi: 10.1007/978-3-319-69483-2_19
editor:
- first_name: Kim G.
  full_name: Larsen, Kim G.
  last_name: Larsen
- first_name: Oleg
  full_name: Sokolsky, Oleg
  last_name: Sokolsky
- first_name: Ji
  full_name: Wang, Ji
  last_name: Wang
issue: '10606'
language:
- iso: eng
page: 319-336
place: Changsha
publication: Dependable Software Engineering, 3rd International Symposium (SETTA 2017)
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: 'How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20793'
abstract:
- lang: eng
  text: Scenario-based requirements engineering addresses the message-based coordination
    of software-intensive systems and enables, if underpinned with formal languages,
    automatic requirements validation techniques for improving the quality of a requirements
    specification. One of such requirements engineering approaches bases on a recent
    visual Live Sequence Chart variant compliant to the Unified Modeling Language,
    so-called Modal Sequence Diagrams (MSDs). The usage of patterns is known to be
    constructive thanks to assembling solutions by means of reusable building blocks
    that are proven in practice, so that recurring problems do not need to be solved
    over and over again. Thus, patterns also gained momentum in the area of requirements
    documentation. In this technical report, we introduce a model- and scenario-based
    pattern catalog for MSD requirements. Our MSD requirement pattern catalog consolidates
    and unifies 86 requirement patterns from three well-known, practice-oriented requirement
    pattern catalogs, each covering different aspects.
author:
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
citation:
  ama: Fockel M, Holtmann J, Koch T, Schmelter D. <i>Model-Based Requirement Pattern
    Catalog</i>. Paderborn, Germany; 2017.
  apa: Fockel, M., Holtmann, J., Koch, T., &#38; Schmelter, D. (2017). <i>Model-based
    Requirement Pattern Catalog</i>. Paderborn, Germany.
  bibtex: '@book{Fockel_Holtmann_Koch_Schmelter_2017, place={Paderborn, Germany},
    title={Model-based Requirement Pattern Catalog}, author={Fockel, Markus and Holtmann,
    Jörg and Koch, Thorsten and Schmelter, David}, year={2017} }'
  chicago: Fockel, Markus, Jörg Holtmann, Thorsten Koch, and David Schmelter. <i>Model-Based
    Requirement Pattern Catalog</i>. Paderborn, Germany, 2017.
  ieee: M. Fockel, J. Holtmann, T. Koch, and D. Schmelter, <i>Model-based Requirement
    Pattern Catalog</i>. Paderborn, Germany, 2017.
  mla: Fockel, Markus, et al. <i>Model-Based Requirement Pattern Catalog</i>. 2017.
  short: M. Fockel, J. Holtmann, T. Koch, D. Schmelter, Model-Based Requirement Pattern
    Catalog, Paderborn, Germany, 2017.
date_created: 2020-12-17T13:31:36Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '241'
- _id: '662'
language:
- iso: eng
place: Paderborn, Germany
report_number: tr-ri-17-354
status: public
title: Model-based Requirement Pattern Catalog
type: report
user_id: '8472'
year: '2017'
...
