[{"title":"Method for data inventory and classification","date_created":"2020-11-20T12:16:09Z","author":[{"first_name":"Melina","last_name":"Massmann","full_name":"Massmann, Melina"},{"first_name":"Maurice","id":"77201","full_name":"Meyer, Maurice","orcid":"0000-0003-0606-7321","last_name":"Meyer"},{"first_name":"Maximilian","full_name":"Frank, Maximilian","last_name":"Frank"},{"full_name":"von Enzberg, Sebastian","last_name":"von Enzberg","first_name":"Sebastian"},{"first_name":"Arno","full_name":"Kühn, Arno","last_name":"Kühn"},{"last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman","first_name":"Roman"}],"date_updated":"2022-01-06T06:54:27Z","citation":{"bibtex":"@article{Massmann_Meyer_Frank_von Enzberg_Kühn_Dumitrescu_2020, title={Method for data inventory and classification}, number={93}, journal={Procedia CIRP}, author={Massmann, Melina and Meyer, Maurice and Frank, Maximilian and von Enzberg, Sebastian and Kühn, Arno and Dumitrescu, Roman}, year={2020}, pages={234–239} }","mla":"Massmann, Melina, et al. “Method for Data Inventory and Classification.” <i>Procedia CIRP</i>, no. 93, 2020, pp. 234–39.","short":"M. Massmann, M. Meyer, M. Frank, S. von Enzberg, A. Kühn, R. Dumitrescu, Procedia CIRP (2020) 234–239.","apa":"Massmann, M., Meyer, M., Frank, M., von Enzberg, S., Kühn, A., &#38; Dumitrescu, R. (2020). Method for data inventory and classification. <i>Procedia CIRP</i>, (93), 234–239.","ieee":"M. Massmann, M. Meyer, M. Frank, S. von Enzberg, A. Kühn, and R. Dumitrescu, “Method for data inventory and classification,” <i>Procedia CIRP</i>, no. 93, pp. 234–239, 2020.","chicago":"Massmann, Melina, Maurice Meyer, Maximilian Frank, Sebastian von Enzberg, Arno Kühn, and Roman Dumitrescu. “Method for Data Inventory and Classification.” <i>Procedia CIRP</i>, no. 93 (2020): 234–39.","ama":"Massmann M, Meyer M, Frank M, von Enzberg S, Kühn A, Dumitrescu R. Method for data inventory and classification. <i>Procedia CIRP</i>. 2020;(93):234-239."},"page":"234-239","year":"2020","issue":"93","language":[{"iso":"eng"}],"article_type":"original","user_id":"77201","department":[{"_id":"563"}],"_id":"20447","status":"public","type":"journal_article","publication":"Procedia CIRP"},{"author":[{"last_name":"Meyer","orcid":"0000-0003-0606-7321","full_name":"Meyer, Maurice","id":"77201","first_name":"Maurice"},{"first_name":"Maximilian","full_name":"Frank, Maximilian","last_name":"Frank"},{"first_name":"Melina","full_name":"Massmann, Melina","last_name":"Massmann"},{"full_name":"Wendt, Niklas","last_name":"Wendt","first_name":"Niklas"},{"id":"16190","full_name":"Dumitrescu, Roman","last_name":"Dumitrescu","first_name":"Roman"}],"date_created":"2020-11-20T12:18:11Z","date_updated":"2022-01-06T06:54:27Z","title":"Data-Driven Product Generation and Retrofit Planning","issue":"93","citation":{"ama":"Meyer M, Frank M, Massmann M, Wendt N, Dumitrescu R. Data-Driven Product Generation and Retrofit Planning. <i>Procedia CIRP</i>. 2020;(93):965-970.","ieee":"M. Meyer, M. Frank, M. Massmann, N. Wendt, and R. Dumitrescu, “Data-Driven Product Generation and Retrofit Planning,” <i>Procedia CIRP</i>, no. 93, pp. 965–970, 2020.","chicago":"Meyer, Maurice, Maximilian Frank, Melina Massmann, Niklas Wendt, and Roman Dumitrescu. “Data-Driven Product Generation and Retrofit Planning.” <i>Procedia CIRP</i>, no. 93 (2020): 965–70.","short":"M. Meyer, M. Frank, M. Massmann, N. Wendt, R. Dumitrescu, Procedia CIRP (2020) 965–970.","bibtex":"@article{Meyer_Frank_Massmann_Wendt_Dumitrescu_2020, title={Data-Driven Product Generation and Retrofit Planning}, number={93}, journal={Procedia CIRP}, author={Meyer, Maurice and Frank, Maximilian and Massmann, Melina and Wendt, Niklas and Dumitrescu, Roman}, year={2020}, pages={965–970} }","mla":"Meyer, Maurice, et al. “Data-Driven Product Generation and Retrofit Planning.” <i>Procedia CIRP</i>, no. 93, 2020, pp. 965–70.","apa":"Meyer, M., Frank, M., Massmann, M., Wendt, N., &#38; Dumitrescu, R. (2020). Data-Driven Product Generation and Retrofit Planning. <i>Procedia CIRP</i>, (93), 965–970."},"page":"965-970","year":"2020","user_id":"77201","department":[{"_id":"563"}],"_id":"20448","language":[{"iso":"eng"}],"article_type":"original","type":"journal_article","publication":"Procedia CIRP","status":"public"},{"department":[{"_id":"563"}],"user_id":"77201","_id":"20449","language":[{"iso":"eng"}],"article_type":"original","publication":" wt Werkstattstechnik online ","type":"journal_article","status":"public","volume":110,"author":[{"last_name":"Uhlmann","full_name":"Uhlmann, Eckart","first_name":"Eckart"},{"full_name":"Dumitrescu, Roman","last_name":"Dumitrescu","first_name":"Roman"},{"last_name":"Polte","full_name":"Polte, Julian","first_name":"Julian"},{"first_name":"Maurice","id":"77201","full_name":"Meyer, Maurice","last_name":"Meyer","orcid":"0000-0003-0606-7321"},{"first_name":"Deniz","full_name":"Simsek, Deniz","last_name":"Simsek"}],"date_created":"2020-11-20T12:20:03Z","date_updated":"2022-01-06T06:54:27Z","title":"Datengetriebene Steigerung der Verfügbarkeit","issue":"07-08","intvolume":"       110","page":"532-535","citation":{"ama":"Uhlmann E, Dumitrescu R, Polte J, Meyer M, Simsek D. Datengetriebene Steigerung der Verfügbarkeit. <i> wt Werkstattstechnik online </i>. 2020;110(07-08):532-535.","chicago":"Uhlmann, Eckart, Roman Dumitrescu, Julian Polte, Maurice Meyer, and Deniz Simsek. “Datengetriebene Steigerung Der Verfügbarkeit.” <i> Wt Werkstattstechnik Online </i> 110, no. 07–08 (2020): 532–35.","ieee":"E. Uhlmann, R. Dumitrescu, J. Polte, M. Meyer, and D. Simsek, “Datengetriebene Steigerung der Verfügbarkeit,” <i> wt Werkstattstechnik online </i>, vol. 110, no. 07–08, pp. 532–535, 2020.","apa":"Uhlmann, E., Dumitrescu, R., Polte, J., Meyer, M., &#38; Simsek, D. (2020). Datengetriebene Steigerung der Verfügbarkeit. <i> Wt Werkstattstechnik Online </i>, <i>110</i>(07–08), 532–535.","short":"E. Uhlmann, R. Dumitrescu, J. Polte, M. Meyer, D. Simsek,  Wt Werkstattstechnik Online  110 (2020) 532–535.","mla":"Uhlmann, Eckart, et al. “Datengetriebene Steigerung Der Verfügbarkeit.” <i> Wt Werkstattstechnik Online </i>, vol. 110, no. 07–08, 2020, pp. 532–35.","bibtex":"@article{Uhlmann_Dumitrescu_Polte_Meyer_Simsek_2020, title={Datengetriebene Steigerung der Verfügbarkeit}, volume={110}, number={07–08}, journal={ wt Werkstattstechnik online }, author={Uhlmann, Eckart and Dumitrescu, Roman and Polte, Julian and Meyer, Maurice and Simsek, Deniz}, year={2020}, pages={532–535} }"},"year":"2020"},{"department":[{"_id":"563"}],"user_id":"77201","_id":"20450","language":[{"iso":"eng"}],"article_type":"original","publication":"Procedia Manufacturing","type":"journal_article","status":"public","date_created":"2020-11-20T12:22:19Z","author":[{"last_name":"Massmann","full_name":"Massmann, Melina","first_name":"Melina"},{"last_name":"Meyer","orcid":"0000-0003-0606-7321","full_name":"Meyer, Maurice","id":"77201","first_name":"Maurice"},{"first_name":"Maximilian","full_name":"Frank, Maximilian","last_name":"Frank"},{"first_name":"Sebastian","full_name":"von Enzberg, Sebastian","last_name":"von Enzberg"},{"first_name":"Arno","full_name":"Kühn, Arno","last_name":"Kühn"},{"last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman","first_name":"Roman"}],"date_updated":"2022-01-06T06:54:27Z","title":"Framework for Data Analytics in Data-Driven Product Planning","citation":{"chicago":"Massmann, Melina, Maurice Meyer, Maximilian Frank, Sebastian von Enzberg, Arno Kühn, and Roman Dumitrescu. “Framework for Data Analytics in Data-Driven Product Planning.” <i>Procedia Manufacturing</i>, 2020.","ieee":"M. Massmann, M. Meyer, M. Frank, S. von Enzberg, A. Kühn, and R. Dumitrescu, “Framework for Data Analytics in Data-Driven Product Planning,” <i>Procedia Manufacturing</i>, 2020.","ama":"Massmann M, Meyer M, Frank M, von Enzberg S, Kühn A, Dumitrescu R. Framework for Data Analytics in Data-Driven Product Planning. <i>Procedia Manufacturing</i>. 2020.","apa":"Massmann, M., Meyer, M., Frank, M., von Enzberg, S., Kühn, A., &#38; Dumitrescu, R. (2020). Framework for Data Analytics in Data-Driven Product Planning. <i>Procedia Manufacturing</i>.","bibtex":"@article{Massmann_Meyer_Frank_von Enzberg_Kühn_Dumitrescu_2020, title={Framework for Data Analytics in Data-Driven Product Planning}, journal={Procedia Manufacturing}, author={Massmann, Melina and Meyer, Maurice and Frank, Maximilian and von Enzberg, Sebastian and Kühn, Arno and Dumitrescu, Roman}, year={2020} }","short":"M. Massmann, M. Meyer, M. Frank, S. von Enzberg, A. Kühn, R. Dumitrescu, Procedia Manufacturing (2020).","mla":"Massmann, Melina, et al. “Framework for Data Analytics in Data-Driven Product Planning.” <i>Procedia Manufacturing</i>, 2020."},"year":"2020"},{"publication_identifier":{"isbn":["9781450389211"]},"year":"2020","place":"New York, NY, USA","citation":{"mla":"Terfloth, Lutz, et al. <i>Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example</i>. Association for Computing Machinery, 2020, doi:<a href=\"https://doi.org/10.1145/3428029.3428052\">10.1145/3428029.3428052</a>.","short":"L. Terfloth, L. Budde, C. Schulte, in: Association for Computing Machinery, New York, NY, USA, 2020.","bibtex":"@inproceedings{Terfloth_Budde_Schulte_2020, place={New York, NY, USA}, title={Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example}, DOI={<a href=\"https://doi.org/10.1145/3428029.3428052\">10.1145/3428029.3428052</a>}, publisher={Association for Computing Machinery}, author={Terfloth, Lutz and Budde, Lea and Schulte, Carsten}, year={2020} }","apa":"Terfloth, L., Budde, L., &#38; Schulte, C. (2020). Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example. New York, NY, USA: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3428029.3428052\">https://doi.org/10.1145/3428029.3428052</a>","ieee":"L. Terfloth, L. Budde, and C. Schulte, “Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example,” 2020.","chicago":"Terfloth, Lutz, Lea Budde, and Carsten Schulte. “Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example.” New York, NY, USA: Association for Computing Machinery, 2020. <a href=\"https://doi.org/10.1145/3428029.3428052\">https://doi.org/10.1145/3428029.3428052</a>.","ama":"Terfloth L, Budde L, Schulte C. Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example. In: New York, NY, USA: Association for Computing Machinery; 2020. doi:<a href=\"https://doi.org/10.1145/3428029.3428052\">10.1145/3428029.3428052</a>"},"publisher":"Association for Computing Machinery","date_updated":"2022-01-06T06:54:27Z","author":[{"last_name":"Terfloth","full_name":"Terfloth, Lutz","id":"37320","first_name":"Lutz"},{"last_name":"Budde","id":"32443","full_name":"Budde, Lea","first_name":"Lea"},{"first_name":"Carsten","id":"60311","full_name":"Schulte, Carsten","last_name":"Schulte"}],"date_created":"2020-11-23T09:48:15Z","title":"Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example","doi":"10.1145/3428029.3428052","type":"conference","abstract":[{"text":"In this paper, we present a novel approach to design teaching interventions for computing education, elaborated using an example of cybersecurity education. Cybersecurity education, similar to other computing education domains, often focuses on one aspect and separate themselves from the other approach. In other words, they focus on one of the two different aspects: a) either teaching how to use and to behave, or b) how technology works. Here we suggest another point of focal awareness for teaching – interaction – that allows the recombination of both approaches in a novel way, leading to a reconstruction of the teaching and learning content in a way that – as we hope – supports an understanding on a higher level and thus gives the chance to better develop agency. For this didactic reconstruction of teaching content, we use an approach called the hybrid interaction system framework.\r\nIn cybersecurity training, teaching interventions oftentimes are in a way successful but seem to not lead to long-lasting changes towards secure behavior. Using simply password security as an example, we show how this new approach recombines the two different priory mentioned teaching approaches in a novel way.\r\nWithin this short paper, we present our current research progress, discuss potentials and values of the approach in general, and by way of example. Our intention of this submission and early disclosure is to spark discussion and generate further insights especially regarding the following question: What implications does the hybrid interaction system approach have on learning scenarios?","lang":"eng"}],"status":"public","_id":"20452","department":[{"_id":"67"}],"user_id":"21145","language":[{"iso":"eng"}]},{"publication":"Exp Brain Res","external_id":{"pmid":["32328673"]},"language":[{"iso":"eng"}],"issue":"5","year":"2020","date_created":"2020-11-23T11:14:29Z","title":"Balance task difficulty affects postural sway and cortical activity in healthy adolescents.","type":"journal_article","status":"public","user_id":"46","department":[{"_id":"17"},{"_id":"172"}],"_id":"20457","publication_identifier":{"issn":["0014-4819","1432-1106"]},"pmid":"1","citation":{"ama":"Gebel A, Lehmann T, Granacher U. Balance task difficulty affects postural sway and cortical activity in healthy adolescents. <i>Exp Brain Res</i>. 2020;238(5):1323-1333. doi:<a href=\"https://doi.org/10.1007/s00221-020-05810-1\">10.1007/s00221-020-05810-1</a>","chicago":"Gebel, A, T Lehmann, and U Granacher. “Balance Task Difficulty Affects Postural Sway and Cortical Activity in Healthy Adolescents.” <i>Exp Brain Res</i> 238, no. 5 (2020): 1323–33. <a href=\"https://doi.org/10.1007/s00221-020-05810-1\">https://doi.org/10.1007/s00221-020-05810-1</a>.","ieee":"A. Gebel, T. Lehmann, and U. Granacher, “Balance task difficulty affects postural sway and cortical activity in healthy adolescents.,” <i>Exp Brain Res</i>, vol. 238, no. 5, pp. 1323–1333, 2020.","apa":"Gebel, A., Lehmann, T., &#38; Granacher, U. (2020). Balance task difficulty affects postural sway and cortical activity in healthy adolescents. <i>Exp Brain Res</i>, <i>238</i>(5), 1323–1333. <a href=\"https://doi.org/10.1007/s00221-020-05810-1\">https://doi.org/10.1007/s00221-020-05810-1</a>","bibtex":"@article{Gebel_Lehmann_Granacher_2020, title={Balance task difficulty affects postural sway and cortical activity in healthy adolescents.}, volume={238}, DOI={<a href=\"https://doi.org/10.1007/s00221-020-05810-1\">10.1007/s00221-020-05810-1</a>}, number={5}, journal={Exp Brain Res}, author={Gebel, A and Lehmann, T and Granacher, U}, year={2020}, pages={1323–1333} }","mla":"Gebel, A., et al. “Balance Task Difficulty Affects Postural Sway and Cortical Activity in Healthy Adolescents.” <i>Exp Brain Res</i>, vol. 238, no. 5, 2020, pp. 1323–33, doi:<a href=\"https://doi.org/10.1007/s00221-020-05810-1\">10.1007/s00221-020-05810-1</a>.","short":"A. Gebel, T. Lehmann, U. Granacher, Exp Brain Res 238 (2020) 1323–1333."},"page":"1323-1333","intvolume":"       238","author":[{"full_name":"Gebel, A","last_name":"Gebel","first_name":"A"},{"last_name":"Lehmann","full_name":"Lehmann, T","first_name":"T"},{"last_name":"Granacher","full_name":"Granacher, U","first_name":"U"}],"volume":238,"date_updated":"2022-01-06T06:54:27Z","doi":"10.1007/s00221-020-05810-1"},{"type":"journal_article","status":"public","_id":"20469","department":[{"_id":"17"},{"_id":"172"}],"user_id":"62406","pmid":"1","publication_identifier":{"issn":["2197-1153"]},"intvolume":"         7","page":"64","citation":{"chicago":"Tischer, T, G Bode, M Buhs, B Marquass, S Nehrer, S Vogt, W Zinser, et al. “Platelet-Rich Plasma (PRP) as Therapy for Cartilage, Tendon and Muscle Damage - German Working Group Position Statement.” <i>J Exp Orthop</i> 7, no. 1 (2020): 64. <a href=\"https://doi.org/10.1186/s40634-020-00282-2\">https://doi.org/10.1186/s40634-020-00282-2</a>.","ieee":"T. Tischer <i>et al.</i>, “Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement.,” <i>J Exp Orthop</i>, vol. 7, no. 1, p. 64, 2020.","ama":"Tischer T, Bode G, Buhs M, et al. Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement. <i>J Exp Orthop</i>. 2020;7(1):64. doi:<a href=\"https://doi.org/10.1186/s40634-020-00282-2\">10.1186/s40634-020-00282-2</a>","bibtex":"@article{Tischer_Bode_Buhs_Marquass_Nehrer_Vogt_Zinser_Angele_Spahn_Welsch_et al._2020, title={Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement.}, volume={7}, DOI={<a href=\"https://doi.org/10.1186/s40634-020-00282-2\">10.1186/s40634-020-00282-2</a>}, number={1}, journal={J Exp Orthop}, author={Tischer, T and Bode, G and Buhs, M and Marquass, B and Nehrer, S and Vogt, S and Zinser, W and Angele, P and Spahn, G and Welsch, GH and et al.}, year={2020}, pages={64} }","mla":"Tischer, T., et al. “Platelet-Rich Plasma (PRP) as Therapy for Cartilage, Tendon and Muscle Damage - German Working Group Position Statement.” <i>J Exp Orthop</i>, vol. 7, no. 1, 2020, p. 64, doi:<a href=\"https://doi.org/10.1186/s40634-020-00282-2\">10.1186/s40634-020-00282-2</a>.","short":"T. Tischer, G. Bode, M. Buhs, B. Marquass, S. Nehrer, S. Vogt, W. Zinser, P. Angele, G. Spahn, G. Welsch, P. Niemeyer, H. Madry, J Exp Orthop 7 (2020) 64.","apa":"Tischer, T., Bode, G., Buhs, M., Marquass, B., Nehrer, S., Vogt, S., … Madry, H. (2020). Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement. <i>J Exp Orthop</i>, <i>7</i>(1), 64. <a href=\"https://doi.org/10.1186/s40634-020-00282-2\">https://doi.org/10.1186/s40634-020-00282-2</a>"},"date_updated":"2022-01-06T06:54:27Z","volume":7,"author":[{"first_name":"T","last_name":"Tischer","full_name":"Tischer, T"},{"first_name":"G","full_name":"Bode, G","last_name":"Bode"},{"first_name":"M","last_name":"Buhs","full_name":"Buhs, M"},{"full_name":"Marquass, B","last_name":"Marquass","first_name":"B"},{"first_name":"S","full_name":"Nehrer, S","last_name":"Nehrer"},{"first_name":"S","last_name":"Vogt","full_name":"Vogt, S"},{"last_name":"Zinser","full_name":"Zinser, W","first_name":"W"},{"first_name":"P","full_name":"Angele, P","last_name":"Angele"},{"last_name":"Spahn","full_name":"Spahn, G","first_name":"G"},{"first_name":"GH","full_name":"Welsch, GH","last_name":"Welsch"},{"full_name":"Niemeyer, P","last_name":"Niemeyer","first_name":"P"},{"last_name":"Madry","full_name":"Madry, H","first_name":"H"}],"doi":"10.1186/s40634-020-00282-2","publication":"J Exp Orthop","external_id":{"pmid":["32885339"]},"language":[{"iso":"eng"}],"issue":"1","year":"2020","date_created":"2020-11-23T11:48:41Z","title":"Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement."},{"title":"The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings","date_updated":"2022-01-06T06:54:27Z","volume":85,"author":[{"first_name":"P","full_name":"Anders, P","last_name":"Anders"},{"first_name":"H","full_name":"Müller, H","last_name":"Müller"},{"last_name":"Skjæret-Maroni","full_name":"Skjæret-Maroni, N","first_name":"N"},{"last_name":"Vereijken","full_name":"Vereijken, B","first_name":"B"},{"last_name":"Baumeister","orcid":"0000-0003-2683-5826","full_name":"Baumeister, Jochen","id":"46","first_name":"Jochen"}],"date_created":"2020-11-23T15:51:39Z","year":"2020","page":"2673-2683","intvolume":"        85","citation":{"apa":"Anders, P., Müller, H., Skjæret-Maroni, N., Vereijken, B., &#38; Baumeister, J. (2020). The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings. <i>Medical &#38; Biological Engineering &#38; Computing</i>, <i>85</i>, 2673–2683.","bibtex":"@article{Anders_Müller_Skjæret-Maroni_Vereijken_Baumeister_2020, title={The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings}, volume={85}, journal={Medical &#38; Biological Engineering &#38; Computing}, author={Anders, P and Müller, H and Skjæret-Maroni, N and Vereijken, B and Baumeister, Jochen}, year={2020}, pages={2673–2683} }","short":"P. Anders, H. Müller, N. Skjæret-Maroni, B. Vereijken, J. Baumeister, Medical &#38; Biological Engineering &#38; Computing 85 (2020) 2673–2683.","mla":"Anders, P., et al. “The Influence of Motor Tasks and Cut-off Parameter Selection on Artifact Subspace Reconstruction in EEG Recordings.” <i>Medical &#38; Biological Engineering &#38; Computing</i>, vol. 85, 2020, pp. 2673–83.","chicago":"Anders, P, H Müller, N Skjæret-Maroni, B Vereijken, and Jochen Baumeister. “The Influence of Motor Tasks and Cut-off Parameter Selection on Artifact Subspace Reconstruction in EEG Recordings.” <i>Medical &#38; Biological Engineering &#38; Computing</i> 85 (2020): 2673–83.","ieee":"P. Anders, H. Müller, N. Skjæret-Maroni, B. Vereijken, and J. Baumeister, “The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings,” <i>Medical &#38; Biological Engineering &#38; Computing</i>, vol. 85, pp. 2673–2683, 2020.","ama":"Anders P, Müller H, Skjæret-Maroni N, Vereijken B, Baumeister J. The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings. <i>Medical &#38; Biological Engineering &#38; Computing</i>. 2020;85:2673-2683."},"language":[{"iso":"eng"}],"_id":"20490","department":[{"_id":"17"},{"_id":"172"}],"user_id":"46","status":"public","publication":"Medical & Biological Engineering & Computing","type":"journal_article"},{"citation":{"short":"M. Jochmaring, A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks, 2020.","bibtex":"@book{Jochmaring_2020, title={A self stabilizing protocol for well-formed trees in hybrid networks}, author={Jochmaring, Moritz}, year={2020} }","mla":"Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>. 2020.","apa":"Jochmaring, M. (2020). <i>A self stabilizing protocol for well-formed trees in hybrid networks</i>.","ama":"Jochmaring M. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>.; 2020.","chicago":"Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>, 2020.","ieee":"M. Jochmaring, <i>A self stabilizing protocol for well-formed trees in hybrid networks</i>. 2020."},"year":"2020","title":"A self stabilizing protocol for well-formed trees in hybrid networks","supervisor":[{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"author":[{"first_name":"Moritz","last_name":"Jochmaring","full_name":"Jochmaring, Moritz"}],"date_created":"2020-11-25T07:03:16Z","date_updated":"2022-01-06T06:54:27Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"department":[{"_id":"79"}],"user_id":"15504","_id":"20495","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subproject A1"},{"name":"SFB 901 - Project Area A","_id":"2"}]},{"project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"_id":"20496","user_id":"61189","keyword":["pc2-ressources"],"language":[{"iso":"eng"}],"type":"journal_article","publication":"The Journal of Physical Chemistry C","status":"public","date_updated":"2022-01-06T06:54:27Z","author":[{"full_name":"Streiter, Martin","last_name":"Streiter","first_name":"Martin"},{"first_name":"Tillmann G.","full_name":"Fischer, Tillmann G.","last_name":"Fischer"},{"full_name":"Wiebeler, Christian","last_name":"Wiebeler","first_name":"Christian"},{"first_name":"Sebastian","full_name":"Reichert, Sebastian","last_name":"Reichert"},{"last_name":"Langenickel","full_name":"Langenickel, Jörn","first_name":"Jörn"},{"full_name":"Zeitler, Kirsten","last_name":"Zeitler","first_name":"Kirsten"},{"first_name":"Carsten","last_name":"Deibel","full_name":"Deibel, Carsten"}],"date_created":"2020-11-25T07:19:15Z","title":"Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN","doi":"10.1021/acs.jpcc.0c03341","publication_status":"published","publication_identifier":{"issn":["1932-7447","1932-7455"]},"year":"2020","citation":{"chicago":"Streiter, Martin, Tillmann G. Fischer, Christian Wiebeler, Sebastian Reichert, Jörn Langenickel, Kirsten Zeitler, and Carsten Deibel. “Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN.” <i>The Journal of Physical Chemistry C</i>, 2020, 15007–14. <a href=\"https://doi.org/10.1021/acs.jpcc.0c03341\">https://doi.org/10.1021/acs.jpcc.0c03341</a>.","ieee":"M. Streiter <i>et al.</i>, “Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN,” <i>The Journal of Physical Chemistry C</i>, pp. 15007–15014, 2020.","ama":"Streiter M, Fischer TG, Wiebeler C, et al. Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN. <i>The Journal of Physical Chemistry C</i>. 2020:15007-15014. doi:<a href=\"https://doi.org/10.1021/acs.jpcc.0c03341\">10.1021/acs.jpcc.0c03341</a>","apa":"Streiter, M., Fischer, T. G., Wiebeler, C., Reichert, S., Langenickel, J., Zeitler, K., &#38; Deibel, C. (2020). Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN. <i>The Journal of Physical Chemistry C</i>, 15007–15014. <a href=\"https://doi.org/10.1021/acs.jpcc.0c03341\">https://doi.org/10.1021/acs.jpcc.0c03341</a>","mla":"Streiter, Martin, et al. “Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN.” <i>The Journal of Physical Chemistry C</i>, 2020, pp. 15007–14, doi:<a href=\"https://doi.org/10.1021/acs.jpcc.0c03341\">10.1021/acs.jpcc.0c03341</a>.","bibtex":"@article{Streiter_Fischer_Wiebeler_Reichert_Langenickel_Zeitler_Deibel_2020, title={Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN}, DOI={<a href=\"https://doi.org/10.1021/acs.jpcc.0c03341\">10.1021/acs.jpcc.0c03341</a>}, journal={The Journal of Physical Chemistry C}, author={Streiter, Martin and Fischer, Tillmann G. and Wiebeler, Christian and Reichert, Sebastian and Langenickel, Jörn and Zeitler, Kirsten and Deibel, Carsten}, year={2020}, pages={15007–15014} }","short":"M. Streiter, T.G. Fischer, C. Wiebeler, S. Reichert, J. Langenickel, K. Zeitler, C. Deibel, The Journal of Physical Chemistry C (2020) 15007–15014."},"page":"15007-15014"},{"publication":"Royal Society of Chemistry ","type":"journal_article","status":"public","file":[{"date_updated":"2020-11-25T14:38:43Z","date_created":"2020-11-25T14:38:43Z","creator":"nprante","file_size":2709287,"file_name":"A photoredox catalysed Heck reaction via hole transfer from Ru to GO authorreprints.pdf","access_level":"closed","file_id":"20502","content_type":"application/pdf","success":1,"relation":"main_file"}],"department":[{"_id":"15"},{"_id":"286"},{"_id":"321"},{"_id":"9"}],"user_id":"77496","_id":"20501","language":[{"iso":"eng"}],"file_date_updated":"2020-11-25T14:38:43Z","ddc":["540"],"issue":"42930-42937","has_accepted_license":"1","intvolume":"        10","citation":{"chicago":"Rosenthal, Marta, Jörg K N  Lindner, Uwe Gerstmann, Armin Meier, W Gero Schmidt, and René Wilhelm. “A Photoredox Catalysed Heck Reaction via Hole Transfer from a Ru(II)-Bis(Terpyridine) Complex to Graphene Oxide .” <i>Royal Society of Chemistry </i> 10, no. 42930–42937 (2020). <a href=\"https://doi.org/10.1039/d0ra08749a\">https://doi.org/10.1039/d0ra08749a</a>.","ieee":"M. Rosenthal, J. K. N. Lindner, U. Gerstmann, A. Meier, W. G. Schmidt, and R. Wilhelm, “A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide ,” <i>Royal Society of Chemistry </i>, vol. 10, no. 42930–42937, 2020.","ama":"Rosenthal M, Lindner JKN, Gerstmann U, Meier A, Schmidt WG, Wilhelm R. A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide . <i>Royal Society of Chemistry </i>. 2020;10(42930-42937). doi:<a href=\"https://doi.org/10.1039/d0ra08749a\">10.1039/d0ra08749a</a>","apa":"Rosenthal, M., Lindner, J. K. N., Gerstmann, U., Meier, A., Schmidt, W. G., &#38; Wilhelm, R. (2020). A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide . <i>Royal Society of Chemistry </i>, <i>10</i>(42930–42937). <a href=\"https://doi.org/10.1039/d0ra08749a\">https://doi.org/10.1039/d0ra08749a</a>","short":"M. Rosenthal, J.K.N. Lindner, U. Gerstmann, A. Meier, W.G. Schmidt, R. Wilhelm, Royal Society of Chemistry  10 (2020).","bibtex":"@article{Rosenthal_Lindner_Gerstmann_Meier_Schmidt_Wilhelm_2020, title={A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide }, volume={10}, DOI={<a href=\"https://doi.org/10.1039/d0ra08749a\">10.1039/d0ra08749a</a>}, number={42930–42937}, journal={Royal Society of Chemistry }, author={Rosenthal, Marta and Lindner, Jörg K N  and Gerstmann, Uwe and Meier, Armin and Schmidt, W Gero and Wilhelm, René}, year={2020} }","mla":"Rosenthal, Marta, et al. “A Photoredox Catalysed Heck Reaction via Hole Transfer from a Ru(II)-Bis(Terpyridine) Complex to Graphene Oxide .” <i>Royal Society of Chemistry </i>, vol. 10, no. 42930–42937, 2020, doi:<a href=\"https://doi.org/10.1039/d0ra08749a\">10.1039/d0ra08749a</a>."},"year":"2020","volume":10,"date_created":"2020-11-25T14:39:30Z","author":[{"full_name":"Rosenthal, Marta","last_name":"Rosenthal","first_name":"Marta"},{"first_name":"Jörg K N ","full_name":"Lindner, Jörg K N ","last_name":"Lindner"},{"last_name":"Gerstmann","full_name":"Gerstmann, Uwe","first_name":"Uwe"},{"full_name":"Meier, Armin","last_name":"Meier","first_name":"Armin"},{"full_name":"Schmidt, W Gero","last_name":"Schmidt","first_name":"W Gero"},{"last_name":"Wilhelm","full_name":"Wilhelm, René","first_name":"René"}],"date_updated":"2022-01-06T06:54:28Z","doi":"10.1039/d0ra08749a","title":"A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide "},{"volume":169,"date_created":"2020-11-26T08:32:56Z","author":[{"full_name":"Geismann, Johannes","id":"20063","last_name":"Geismann","orcid":"https://orcid.org/0000-0003-2015-2047","first_name":"Johannes"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_updated":"2022-01-06T06:54:29Z","doi":"https://doi.org/10.1016/j.jss.2020.110697","title":"A systematic literature review of model-driven security engineering for cyber–physical systems","publication_identifier":{"issn":["0164-1212"]},"page":"110697","intvolume":"       169","citation":{"mla":"Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of Model-Driven Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems and Software</i>, vol. 169, 2020, p. 110697, doi:<a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>.","short":"J. Geismann, E. Bodden, Journal of Systems and Software 169 (2020) 110697.","bibtex":"@article{Geismann_Bodden_2020, title={A systematic literature review of model-driven security engineering for cyber–physical systems}, volume={169}, DOI={<a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>}, journal={Journal of Systems and Software}, author={Geismann, Johannes and Bodden, Eric}, year={2020}, pages={110697} }","apa":"Geismann, J., &#38; Bodden, E. (2020). A systematic literature review of model-driven security engineering for cyber–physical systems. <i>Journal of Systems and Software</i>, <i>169</i>, 110697. <a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>","ama":"Geismann J, Bodden E. A systematic literature review of model-driven security engineering for cyber–physical systems. <i>Journal of Systems and Software</i>. 2020;169:110697. doi:<a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>","chicago":"Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of Model-Driven Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems and Software</i> 169 (2020): 110697. <a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>.","ieee":"J. Geismann and E. Bodden, “A systematic literature review of model-driven security engineering for cyber–physical systems,” <i>Journal of Systems and Software</i>, vol. 169, p. 110697, 2020, doi: <a href=\"https://doi.org/10.1016/j.jss.2020.110697\">https://doi.org/10.1016/j.jss.2020.110697</a>."},"year":"2020","department":[{"_id":"76"}],"user_id":"5786","_id":"20507","language":[{"iso":"eng"}],"publication":"Journal of Systems and Software","type":"journal_article","status":"public"},{"status":"public","type":"conference","publication":"2020 IEEE Computer Security Foundations Symposium (CSF)","language":[{"iso":"eng"}],"_id":"20509","user_id":"5786","department":[{"_id":"76"}],"year":"2020","citation":{"apa":"Fischer, A., Janneck, J., Kussmaul, J., Krätzschmar, N., Kerschbaum, F., &#38; Bodden, E. (2020). PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage. <i>2020 IEEE Computer Security Foundations Symposium (CSF)</i>.","short":"A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, E. Bodden, in: 2020 IEEE Computer Security Foundations Symposium (CSF), 2020.","bibtex":"@inproceedings{Fischer_Janneck_Kussmaul_Krätzschmar_Kerschbaum_Bodden_2020, title={PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage}, booktitle={2020 IEEE Computer Security Foundations Symposium (CSF)}, author={Fischer, Andreas and Janneck, Jonas and Kussmaul, Jörn and Krätzschmar, Nikolas and Kerschbaum, Florian and Bodden, Eric}, year={2020} }","mla":"Fischer, Andreas, et al. “PASAPTO: Policy-Aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage.” <i>2020 IEEE Computer Security Foundations Symposium (CSF)</i>, 2020.","ama":"Fischer A, Janneck J, Kussmaul J, Krätzschmar N, Kerschbaum F, Bodden E. PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage. In: <i>2020 IEEE Computer Security Foundations Symposium (CSF)</i>. ; 2020.","chicago":"Fischer, Andreas, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, and Eric Bodden. “PASAPTO: Policy-Aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage.” In <i>2020 IEEE Computer Security Foundations Symposium (CSF)</i>, 2020.","ieee":"A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, and E. Bodden, “PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage,” 2020."},"title":"PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage","main_file_link":[{"url":"http://www.bodden.de/pubs/fjk+20pasapto.pdf"}],"date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-26T08:40:08Z","author":[{"first_name":"Andreas","last_name":"Fischer","full_name":"Fischer, Andreas"},{"last_name":"Janneck","full_name":"Janneck, Jonas","first_name":"Jonas"},{"full_name":"Kussmaul, Jörn","last_name":"Kussmaul","first_name":"Jörn"},{"full_name":"Krätzschmar, Nikolas","last_name":"Krätzschmar","first_name":"Nikolas"},{"first_name":"Florian","last_name":"Kerschbaum","full_name":"Kerschbaum, Florian"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}]},{"citation":{"bibtex":"@inproceedings{Fischer_Fuhry_Kerschbaum_Bodden_2020, title={Computation on Encrypted Data using Dataflow Authentication}, booktitle={Privacy Enhancing Technologies Symposium (PETS/PoPETS)}, author={Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden, Eric}, year={2020} }","mla":"Fischer, Andreas, et al. “Computation on Encrypted Data Using Dataflow Authentication.” <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>, 2020.","short":"A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, in: Privacy Enhancing Technologies Symposium (PETS/PoPETS), 2020.","apa":"Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2020). Computation on Encrypted Data using Dataflow Authentication. <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>.","chicago":"Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation on Encrypted Data Using Dataflow Authentication.” In <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>, 2020.","ieee":"A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted Data using Dataflow Authentication,” 2020.","ama":"Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data using Dataflow Authentication. In: <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>. ; 2020."},"year":"2020","date_created":"2020-11-26T08:50:59Z","author":[{"first_name":"Andreas","full_name":"Fischer, Andreas","last_name":"Fischer"},{"full_name":"Fuhry, Benny","last_name":"Fuhry","first_name":"Benny"},{"first_name":"Florian","last_name":"Kerschbaum","full_name":"Kerschbaum, Florian"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ffk+20computation.pdf"}],"title":"Computation on Encrypted Data using Dataflow Authentication","type":"conference","publication":"Privacy Enhancing Technologies Symposium (PETS/PoPETS)","status":"public","user_id":"5786","department":[{"_id":"76"}],"_id":"20511","language":[{"iso":"eng"}]},{"year":"2020","page":"185-198","citation":{"chicago":"Krüger, Stefan, Karim Ali, and Eric Bodden. “CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.” In <i>International Symposium on Code Generation and Optimization (CGO)</i>, 185–98, 2020.","ieee":"S. Krüger, K. Ali, and E. Bodden, “CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs,” in <i>International Symposium on Code Generation and Optimization (CGO)</i>, 2020, pp. 185–198.","ama":"Krüger S, Ali K, Bodden E. CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs. In: <i>International Symposium on Code Generation and Optimization (CGO)</i>. ; 2020:185-198.","apa":"Krüger, S., Ali, K., &#38; Bodden, E. (2020). CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs. <i>International Symposium on Code Generation and Optimization (CGO)</i>, 185–198.","bibtex":"@inproceedings{Krüger_Ali_Bodden_2020, title={CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs}, booktitle={International Symposium on Code Generation and Optimization (CGO)}, author={Krüger, Stefan and Ali, Karim and Bodden, Eric}, year={2020}, pages={185–198} }","mla":"Krüger, Stefan, et al. “CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.” <i>International Symposium on Code Generation and Optimization (CGO)</i>, 2020, pp. 185–98.","short":"S. Krüger, K. Ali, E. Bodden, in: International Symposium on Code Generation and Optimization (CGO), 2020, pp. 185–198."},"related_material":{"link":[{"url":"http://www.bodden.de/pubs/krueger20cognicryptgen.pdf","relation":"confirmation"}]},"title":"CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-26T08:51:01Z","author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"first_name":"Eric","last_name":"Bodden","full_name":"Bodden, Eric"}],"status":"public","publication":"International Symposium on Code Generation and Optimization (CGO)","type":"conference","language":[{"iso":"eng"}],"_id":"20512","department":[{"_id":"76"}],"user_id":"5786"},{"language":[{"iso":"eng"}],"user_id":"5786","department":[{"_id":"76"}],"_id":"20513","status":"public","abstract":[{"text":"Frühere Studien haben empirisch offenbart, dass Fehlbenutzungen von kryptographischen APIs in Softwareanwendungen weitverbreitet sind. Dies geschieht vor allem, weil Software-Entwickler_innen aufgrund schlechten API-Designs und fehlenden Kryptographiewissens Probleme bekommen, wenn sie versuchen kryptographische Features zu implementieren. Die Literatur liefert mehrere Ansätze und Vorschläge diese Probleme zu lösen, aber alle scheitern schlussendlich auf die eine oder andere Weise daran die Anforderungen der Entwickler_innenzu erfüllen. Das Resultat ist eine insgesamt lückenhafte Landschaft verschiedener nur wenigkomplementärer Ansätze.In dieser Arbeit adressieren wir das Problem kryptographischer Fehlbenutzungen systematischer durch CogniCrypt. CogniCrypt integriert verschiedene Arten von Tool Supportin einen gemeinsamen Ansatz, der Entwickler_innen davon befreit wissen zu müssen, wie diese APIs benutzt werden müssen. Zentral für unseren Ansatz ist CrySL, eine Beschreibungssprache,die die kognitive Lücke zwischen Kryptographie-Expert_innen und Software-Entwickler_innenüberbrückt. CrySL ermöglicht es Kryptographie-Expert_innen zu spezifizeren, wie die APIs,die sie bereitstellen, richtig benutzt werden. Wir haben einen Compiler für CrySL implementiert, der es erlaubt auf CrySL-Spezifikationen aufbauenden Tool Support zu entwickeln. Wir haben weiterhin die statische Analyse CogniCrypt_SAST und den Code-Generator CogniCrypt_GEN entwickelt. Schlussendlich haben wir CogniCrypt prototypisch implementiert und diesen Prototyp in einem kontrollierten Experiment evaluiert.\r\n","lang":"ger"}],"type":"dissertation","main_file_link":[{"url":"https://digital.ub.uni-paderborn.de/hs/document/preview/3500836"}],"title":"CogniCrypt -- The Secure Integration of Cryptographic Software","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"}],"date_created":"2020-11-26T09:02:19Z","supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_updated":"2022-01-06T06:54:29Z","publisher":"Universitaetsbibliothek Paderborn","citation":{"short":"S. Krüger, CogniCrypt -- The Secure Integration of Cryptographic Software, Universitaetsbibliothek Paderborn, 2020.","mla":"Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>. Universitaetsbibliothek Paderborn, 2020.","bibtex":"@book{Krüger_2020, title={CogniCrypt -- The Secure Integration of Cryptographic Software}, publisher={Universitaetsbibliothek Paderborn}, author={Krüger, Stefan}, year={2020} }","apa":"Krüger, S. (2020). <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>. Universitaetsbibliothek Paderborn.","ieee":"S. Krüger, <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>. Universitaetsbibliothek Paderborn, 2020.","chicago":"Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>. Universitaetsbibliothek Paderborn, 2020.","ama":"Krüger S. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>. Universitaetsbibliothek Paderborn; 2020."},"year":"2020"},{"doi":"https://doi.org/10.1145/3427478.3427480","title":"Model-driven engineering and usability evaluation of self-adaptive user interfaces","date_created":"2020-11-26T09:22:23Z","author":[{"orcid":"0000-0002-5967-833X","last_name":"Yigitbas","full_name":"Yigitbas, Enes","id":"8447","first_name":"Enes"}],"date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","citation":{"apa":"Yigitbas, E. (2020). Model-driven engineering and usability evaluation of self-adaptive user interfaces. In <i>ACM SIGWEB Newsletter</i>. ACM. <a href=\"https://doi.org/10.1145/3427478.3427480\">https://doi.org/10.1145/3427478.3427480</a>","short":"E. Yigitbas, in: ACM SIGWEB Newsletter, ACM, 2020.","bibtex":"@inproceedings{Yigitbas_2020, title={Model-driven engineering and usability evaluation of self-adaptive user interfaces}, DOI={<a href=\"https://doi.org/10.1145/3427478.3427480\">https://doi.org/10.1145/3427478.3427480</a>}, number={2}, booktitle={ACM SIGWEB Newsletter}, publisher={ACM}, author={Yigitbas, Enes}, year={2020} }","mla":"Yigitbas, Enes. “Model-Driven Engineering and Usability Evaluation of Self-Adaptive User Interfaces.” <i>ACM SIGWEB Newsletter</i>, 2, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3427478.3427480\">https://doi.org/10.1145/3427478.3427480</a>.","ama":"Yigitbas E. Model-driven engineering and usability evaluation of self-adaptive user interfaces. In: <i>ACM SIGWEB Newsletter</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3427478.3427480\">https://doi.org/10.1145/3427478.3427480</a>","ieee":"E. Yigitbas, “Model-driven engineering and usability evaluation of self-adaptive user interfaces,” in <i>ACM SIGWEB Newsletter</i>, 2020.","chicago":"Yigitbas, Enes. “Model-Driven Engineering and Usability Evaluation of Self-Adaptive User Interfaces.” In <i>ACM SIGWEB Newsletter</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3427478.3427480\">https://doi.org/10.1145/3427478.3427480</a>."},"year":"2020","language":[{"iso":"eng"}],"article_number":"2","user_id":"8447","department":[{"_id":"66"},{"_id":"534"}],"_id":"20514","status":"public","type":"conference","publication":"ACM SIGWEB Newsletter"},{"status":"public","abstract":[{"lang":"eng","text":"Traceability, a classic requirements engineering topic, is increasingly used in the context of model-based engineering. However, researchers and practitioners lack a concise terminology to discuss aspects of requirements traceability in situations in which engineers heavily rely on models and model-based engineering. While others have previously surveyed the domain, no one has so far provided a clear, unambiguous set of terms that can be used to discuss traceability in such a context. We therefore set out to cut a path through the jungle of terminology for model-based traceability, ground it in established terminology from requirements engineering, and derive an unambiguous set of relevant terms. We also map the terminology used in existing primary and secondary studies to our taxonomy to show differences and commonalities. The contribution of this paper is thus a terminology for model-based traceability that allows requirements engineers and engineers working with models to unambiguously discuss their joint traceability efforts."}],"publication":"2020 IEEE 28th International Requirements Engineering Conference (RE)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"241"},{"_id":"662"}],"user_id":"40982","_id":"20516","citation":{"chicago":"Holtmann, Jörg, Jan-Philipp Steghofer, Michael Rath, and David Schmelter. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” In <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE, 2020. <a href=\"https://doi.org/10.1109/re48521.2020.00014\">https://doi.org/10.1109/re48521.2020.00014</a>.","ieee":"J. Holtmann, J.-P. Steghofer, M. Rath, and D. Schmelter, “Cutting through the Jungle: Disambiguating Model-based Traceability Terminology,” in <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>, 2020.","ama":"Holtmann J, Steghofer J-P, Rath M, Schmelter D. Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In: <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE; 2020. doi:<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>","mla":"Holtmann, Jörg, et al. “Cutting through the Jungle: Disambiguating Model-Based Traceability Terminology.” <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>, IEEE, 2020, doi:<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>.","bibtex":"@inproceedings{Holtmann_Steghofer_Rath_Schmelter_2020, title={Cutting through the Jungle: Disambiguating Model-based Traceability Terminology}, DOI={<a href=\"https://doi.org/10.1109/re48521.2020.00014\">10.1109/re48521.2020.00014</a>}, booktitle={2020 IEEE 28th International Requirements Engineering Conference (RE)}, publisher={IEEE}, author={Holtmann, Jörg and Steghofer, Jan-Philipp and Rath, Michael and Schmelter, David}, year={2020} }","short":"J. Holtmann, J.-P. Steghofer, M. Rath, D. Schmelter, in: 2020 IEEE 28th International Requirements Engineering Conference (RE), IEEE, 2020.","apa":"Holtmann, J., Steghofer, J.-P., Rath, M., &#38; Schmelter, D. (2020). Cutting through the Jungle: Disambiguating Model-based Traceability Terminology. In <i>2020 IEEE 28th International Requirements Engineering Conference (RE)</i>. IEEE. <a href=\"https://doi.org/10.1109/re48521.2020.00014\">https://doi.org/10.1109/re48521.2020.00014</a>"},"year":"2020","publication_identifier":{"isbn":["9781728174389"]},"publication_status":"published","doi":"10.1109/re48521.2020.00014","title":"Cutting through the Jungle: Disambiguating Model-based Traceability Terminology","date_created":"2020-11-26T10:14:24Z","author":[{"full_name":"Holtmann, Jörg","id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"full_name":"Steghofer, Jan-Philipp","last_name":"Steghofer","first_name":"Jan-Philipp"},{"last_name":"Rath","full_name":"Rath, Michael","first_name":"Michael"},{"orcid":"0000-0001-7787-5380","last_name":"Schmelter","full_name":"Schmelter, David","id":"40982","first_name":"David"}],"publisher":"IEEE","date_updated":"2022-01-06T06:54:29Z"},{"type":"conference","publication":"ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)","status":"public","_id":"20518","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"year":"2020","citation":{"short":"T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM, 2020.","mla":"Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","bibtex":"@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers}, DOI={<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>}, booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }","apa":"Koch, T., Dziwok, S., Holtmann, J., &#38; Bodden, E. (2020). Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>","chicago":"Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based Specification of Security Protocols and Transformation to Security Model Checkers.” In <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3365438.3410946\">https://doi.org/10.1145/3365438.3410946</a>.","ieee":"T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers,” 2020, doi: <a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>.","ama":"Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers. In: <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3365438.3410946\">10.1145/3365438.3410946</a>"},"date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","date_created":"2020-11-26T10:19:54Z","author":[{"last_name":"Koch","id":"13616","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"first_name":"Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","id":"3901","full_name":"Dziwok, Stefan"},{"first_name":"Jörg","last_name":"Holtmann","orcid":"0000-0001-6141-4571","id":"3875","full_name":"Holtmann, Jörg"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"title":"Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers","doi":"10.1145/3365438.3410946"},{"date_updated":"2022-01-06T06:54:29Z","publisher":"Paderborn University","date_created":"2020-11-26T10:37:17Z","supervisor":[{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"author":[{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"}],"title":"Model-Driven Information Flow Security Engineering for Cyber-Physical Systems","doi":"10.17619/UNIPB/1-1033","year":"2020","citation":{"chicago":"Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering for Cyber-Physical Systems</i>. Paderborn University, 2020. <a href=\"https://doi.org/10.17619/UNIPB/1-1033\">https://doi.org/10.17619/UNIPB/1-1033</a>.","ieee":"C. Gerking, <i>Model-Driven Information Flow Security Engineering for Cyber-Physical Systems</i>. Paderborn University, 2020.","ama":"Gerking C. <i>Model-Driven Information Flow Security Engineering for Cyber-Physical Systems</i>. Paderborn University; 2020. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1033\">10.17619/UNIPB/1-1033</a>","bibtex":"@book{Gerking_2020, title={Model-Driven Information Flow Security Engineering for Cyber-Physical Systems}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1033\">10.17619/UNIPB/1-1033</a>}, publisher={Paderborn University}, author={Gerking, Christopher}, year={2020} }","mla":"Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering for Cyber-Physical Systems</i>. Paderborn University, 2020, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1033\">10.17619/UNIPB/1-1033</a>.","short":"C. Gerking, Model-Driven Information Flow Security Engineering for Cyber-Physical Systems, Paderborn University, 2020.","apa":"Gerking, C. (2020). <i>Model-Driven Information Flow Security Engineering for Cyber-Physical Systems</i>. Paderborn University. <a href=\"https://doi.org/10.17619/UNIPB/1-1033\">https://doi.org/10.17619/UNIPB/1-1033</a>"},"_id":"20521","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"type":"dissertation","status":"public"}]
