[{"_id":"20522","date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/phdHolzinger.pdf"}],"supervisor":[{"full_name":"Bodden, Eric","first_name":"Eric","last_name":"Bodden"}],"language":[{"iso":"eng"}],"type":"dissertation","year":"2019","citation":{"chicago":"Holzinger, Philipp. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019.","ama":"Holzinger P. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn; 2019.","apa":"Holzinger, P. (2019). A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn.","bibtex":"@book{Holzinger_2019, title={A Systematic Analysis and Hardening of the Java Security Architecture}, publisher={Universität Paderborn}, author={Holzinger, Philipp}, year={2019} }","mla":"Holzinger, Philipp. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019.","short":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture, Universität Paderborn, 2019.","ieee":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019."},"user_id":"5786","title":"A Systematic Analysis and Hardening of the Java Security Architecture","department":[{"_id":"76"}],"author":[{"first_name":"Philipp","full_name":"Holzinger, Philipp","last_name":"Holzinger"}],"publisher":"Universität Paderborn","date_created":"2020-11-26T10:44:52Z","status":"public"},{"department":[{"_id":"76"}],"author":[{"last_name":"Nguyen Quang Do","first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa"}],"publisher":"Universität Paderborn","date_created":"2020-11-26T10:47:51Z","status":"public","user_id":"5786","title":"User-Centered Tool Design for Data-Flow Analysis","language":[{"iso":"eng"}],"supervisor":[{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"citation":{"ama":"Nguyen Quang Do L. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn; 2019.","apa":"Nguyen Quang Do, L. (2019). User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn.","chicago":"Nguyen Quang Do, Lisa. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019.","bibtex":"@book{Nguyen Quang Do_2019, title={User-Centered Tool Design for Data-Flow Analysis}, publisher={Universität Paderborn}, author={Nguyen Quang Do, Lisa}, year={2019} }","mla":"Nguyen Quang Do, Lisa. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019.","short":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis, Universität Paderborn, 2019.","ieee":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019."},"year":"2019","type":"dissertation","_id":"20524","date_updated":"2022-01-06T06:54:29Z"},{"title":"Architectural Runtime Verification","user_id":"5786","department":[{"_id":"76"}],"publication":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)","author":[{"first_name":"Lars","full_name":"Stockmann, Lars","last_name":"Stockmann","id":"48144"},{"first_name":"Sven","full_name":"Laux, Sven","last_name":"Laux"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"date_created":"2020-11-27T10:16:59Z","status":"public","date_updated":"2022-01-06T06:54:29Z","_id":"20525","doi":"10.1109/ICSA-C.2019.00021","main_file_link":[{"url":"http://www.bodden.de/pubs/stockmann19architectural.pdf"}],"page":"77-84","citation":{"short":"L. Stockmann, S. Laux, E. Bodden, in: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84.","ieee":"L. Stockmann, S. Laux, and E. Bodden, “Architectural Runtime Verification,” in 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84, doi: 10.1109/ICSA-C.2019.00021.","ama":"Stockmann L, Laux S, Bodden E. Architectural Runtime Verification. In: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C). ; 2019:77-84. doi:10.1109/ICSA-C.2019.00021","apa":"Stockmann, L., Laux, S., & Bodden, E. (2019). Architectural Runtime Verification. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 77–84. https://doi.org/10.1109/ICSA-C.2019.00021","chicago":"Stockmann, Lars, Sven Laux, and Eric Bodden. “Architectural Runtime Verification.” In 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 77–84, 2019. https://doi.org/10.1109/ICSA-C.2019.00021.","bibtex":"@inproceedings{Stockmann_Laux_Bodden_2019, title={Architectural Runtime Verification}, DOI={10.1109/ICSA-C.2019.00021}, booktitle={2019 IEEE International Conference on Software Architecture Companion (ICSA-C)}, author={Stockmann, Lars and Laux, Sven and Bodden, Eric}, year={2019}, pages={77–84} }","mla":"Stockmann, Lars, et al. “Architectural Runtime Verification.” 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84, doi:10.1109/ICSA-C.2019.00021."},"type":"conference","year":"2019","language":[{"iso":"eng"}]},{"user_id":"5786","title":"The Impact of Developer Experience in Using Java Cryptography","date_created":"2020-11-27T10:20:37Z","status":"public","publication_identifier":{"issn":["1949-3770"]},"publication":"2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","department":[{"_id":"76"}],"author":[{"last_name":"Hazhirpasand","full_name":"Hazhirpasand, Mohammadreza","first_name":"Mohammadreza"},{"first_name":"Mohammad","full_name":"Ghafari, Mohammad","last_name":"Ghafari"},{"full_name":"Krüger, Stefan","first_name":"Stefan","last_name":"Krüger"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"},{"first_name":"Oskar","full_name":"Nierstrasz, Oskar","last_name":"Nierstrasz"}],"doi":"10.1109/ESEM.2019.8870184","date_updated":"2022-01-06T06:54:29Z","_id":"20527","language":[{"iso":"eng"}],"page":"1-6","type":"conference","citation":{"ieee":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, and O. Nierstrasz, “The Impact of Developer Experience in Using Java Cryptography,” in 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6, doi: 10.1109/ESEM.2019.8870184.","short":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, O. Nierstrasz, in: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6.","bibtex":"@inproceedings{Hazhirpasand_Ghafari_Krüger_Bodden_Nierstrasz_2019, title={The Impact of Developer Experience in Using Java Cryptography}, DOI={10.1109/ESEM.2019.8870184}, booktitle={2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)}, author={Hazhirpasand, Mohammadreza and Ghafari, Mohammad and Krüger, Stefan and Bodden, Eric and Nierstrasz, Oskar}, year={2019}, pages={1–6} }","mla":"Hazhirpasand, Mohammadreza, et al. “The Impact of Developer Experience in Using Java Cryptography.” 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6, doi:10.1109/ESEM.2019.8870184.","apa":"Hazhirpasand, M., Ghafari, M., Krüger, S., Bodden, E., & Nierstrasz, O. (2019). The Impact of Developer Experience in Using Java Cryptography. 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 1–6. https://doi.org/10.1109/ESEM.2019.8870184","ama":"Hazhirpasand M, Ghafari M, Krüger S, Bodden E, Nierstrasz O. The Impact of Developer Experience in Using Java Cryptography. In: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). ; 2019:1-6. doi:10.1109/ESEM.2019.8870184","chicago":"Hazhirpasand, Mohammadreza, Mohammad Ghafari, Stefan Krüger, Eric Bodden, and Oskar Nierstrasz. “The Impact of Developer Experience in Using Java Cryptography.” In 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 1–6, 2019. https://doi.org/10.1109/ESEM.2019.8870184."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/hazhirpasand19impact.pdf"}]},{"user_id":"5786","title":"AuthCheck: Program-state Analysis for Access-control Vulnerabilities","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"full_name":"Petrasch, Tobias","first_name":"Tobias","last_name":"Petrasch"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"last_name":"Bodden","id":"59256","first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647"}],"publication":"10th Workshop on Tools for Automatic Program Analysis (TAPAS)","department":[{"_id":"76"},{"_id":"241"}],"status":"public","date_created":"2020-11-27T10:21:19Z","date_updated":"2022-01-06T06:54:29Z","_id":"20528","main_file_link":[{"url":"http://www.bodden.de/pubs/piskachev19authcheck.pdf"}],"language":[{"iso":"eng"}],"year":"2019","citation":{"ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-state Analysis for Access-control Vulnerabilities,” 2019.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","bibtex":"@inproceedings{Piskachev_Petrasch_Späth_Bodden_2019, title={AuthCheck: Program-state Analysis for Access-control Vulnerabilities}, booktitle={10th Workshop on Tools for Automatic Program Analysis (TAPAS)}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2019} }","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","apa":"Piskachev, G., Petrasch, T., Späth, J., & Bodden, E. (2019). AuthCheck: Program-state Analysis for Access-control Vulnerabilities. 10th Workshop on Tools for Automatic Program Analysis (TAPAS).","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-state Analysis for Access-control Vulnerabilities. In: 10th Workshop on Tools for Automatic Program Analysis (TAPAS). ; 2019."},"type":"conference"},{"main_file_link":[{"url":"http://www.bodden.de/pubs/nachtigall19explaining.pdf"}],"type":"conference","year":"2019","citation":{"ieee":"M. Nachtigall, L. Nguyen Quang Do, and E. Bodden, “Explaining Static Analysis -- A Perspective,” 2019.","short":"M. Nachtigall, L. Nguyen Quang Do, E. Bodden, in: 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","mla":"Nachtigall, Marcus, et al. “Explaining Static Analysis -- A Perspective.” 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","bibtex":"@inproceedings{Nachtigall_Nguyen Quang Do_Bodden_2019, title={Explaining Static Analysis -- A Perspective}, booktitle={1st International Workshop on Explainable Software (EXPLAIN) at ASE}, author={Nachtigall, Marcus and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","apa":"Nachtigall, M., Nguyen Quang Do, L., & Bodden, E. (2019). Explaining Static Analysis -- A Perspective. 1st International Workshop on Explainable Software (EXPLAIN) at ASE.","ama":"Nachtigall M, Nguyen Quang Do L, Bodden E. Explaining Static Analysis -- A Perspective. In: 1st International Workshop on Explainable Software (EXPLAIN) at ASE. ; 2019.","chicago":"Nachtigall, Marcus, Lisa Nguyen Quang Do, and Eric Bodden. “Explaining Static Analysis -- A Perspective.” In 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019."},"language":[{"iso":"eng"}],"_id":"20529","date_updated":"2022-01-06T06:54:29Z","author":[{"full_name":"Nachtigall, Marcus","first_name":"Marcus","id":"41213","last_name":"Nachtigall"},{"last_name":"Nguyen Quang Do","first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"department":[{"_id":"76"}],"publication":"1st International Workshop on Explainable Software (EXPLAIN) at ASE","status":"public","date_created":"2020-11-27T10:22:38Z","title":"Explaining Static Analysis -- A Perspective","user_id":"5786"},{"language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"short":"L. Luo, E. Bodden, J. Späth, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","ieee":"L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” 2019.","chicago":"Luo, Linghui, Eric Bodden, and Johannes Späth. “A Qualitative Analysis of Android Taint-Analysis Results.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","ama":"Luo L, Bodden E, Späth J. A Qualitative Analysis of Android Taint-Analysis Results. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019). ; 2019.","apa":"Luo, L., Bodden, E., & Späth, J. (2019). A Qualitative Analysis of Android Taint-Analysis Results. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019).","mla":"Luo, Linghui, et al. “A Qualitative Analysis of Android Taint-Analysis Results.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","bibtex":"@inproceedings{Luo_Bodden_Späth_2019, title={A Qualitative Analysis of Android Taint-Analysis Results}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)}, author={Luo, Linghui and Bodden, Eric and Späth, Johannes}, year={2019} }"},"main_file_link":[{"url":"http://www.bodden.de/pubs/ase19qualitative.pdf"}],"_id":"20531","date_updated":"2022-01-06T06:54:29Z","status":"public","date_created":"2020-11-27T10:25:40Z","author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"}],"publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)","department":[{"_id":"76"}],"user_id":"5786","title":"A Qualitative Analysis of Android Taint-Analysis Results"},{"status":"public","date_created":"2020-11-27T10:37:17Z","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"last_name":"Johnson","first_name":"Oshando","full_name":"Johnson, Oshando"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"department":[{"_id":"76"}],"publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track","user_id":"5786","title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","language":[{"iso":"eng"}],"type":"conference","citation":{"mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2019, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2019} }","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track. ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., & Bodden, E. (2019). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2019.","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19swanAssist.pdf"}],"_id":"20532","date_updated":"2022-01-06T06:54:29Z"},{"status":"public","date_created":"2020-11-27T10:48:38Z","publication_identifier":{"issn":["2326-3881"]},"author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"publication":"IEEE Transactions on Software Engineering","department":[{"_id":"76"}],"user_id":"5786","title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","language":[{"iso":"eng"}],"citation":{"ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” IEEE Transactions on Software Engineering, pp. 1–1, 2019, doi: 10.1109/TSE.2019.2948910.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, pp. 1–1, doi:10.1109/TSE.2019.2948910.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={10.1109/TSE.2019.2948910}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., & Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering, 1–1. https://doi.org/10.1109/TSE.2019.2948910","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering. Published online 2019:1-1. doi:10.1109/TSE.2019.2948910","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, 1–1. https://doi.org/10.1109/TSE.2019.2948910."},"type":"journal_article","year":"2019","page":"1-1","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"doi":"10.1109/TSE.2019.2948910","_id":"20533","date_updated":"2022-01-06T06:54:29Z"},{"user_id":"5786","title":"Codebase-Adaptive Detection of Security-Relevant Methods","date_created":"2020-11-27T10:49:33Z","status":"public","department":[{"_id":"76"}],"publication":"ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","author":[{"last_name":"Piskachev","first_name":"Goran","full_name":"Piskachev, Goran"},{"last_name":"Nguyen Quang Do","first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"_id":"20534","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"citation":{"ieee":"G. Piskachev, L. Nguyen Quang Do, and E. Bodden, “Codebase-Adaptive Detection of Security-Relevant Methods,” 2019.","short":"G. Piskachev, L. Nguyen Quang Do, E. Bodden, in: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","ama":"Piskachev G, Nguyen Quang Do L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods. In: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., & Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019."},"type":"conference","year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/issta19swan.pdf"}]},{"main_file_link":[{"url":"http://www.bodden.de/pubs/ldb19magpiebridge.pdf"}],"language":[{"iso":"eng"}],"citation":{"chicago":"Luo, Linghui, Julian Dolby, and Eric Bodden. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” In European Conference on Object-Oriented Programming (ECOOP), 2019.","apa":"Luo, L., Dolby, J., & Bodden, E. (2019). MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. European Conference on Object-Oriented Programming (ECOOP).","ama":"Luo L, Dolby J, Bodden E. MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. In: European Conference on Object-Oriented Programming (ECOOP). ; 2019.","mla":"Luo, Linghui, et al. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” European Conference on Object-Oriented Programming (ECOOP), 2019.","bibtex":"@inproceedings{Luo_Dolby_Bodden_2019, title={MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Luo, Linghui and Dolby, Julian and Bodden, Eric}, year={2019} }","short":"L. Luo, J. Dolby, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2019.","ieee":"L. Luo, J. Dolby, and E. Bodden, “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors,” 2019."},"year":"2019","type":"conference","_id":"20535","date_updated":"2022-01-06T06:54:29Z","author":[{"full_name":"Luo, Linghui","first_name":"Linghui","last_name":"Luo"},{"full_name":"Dolby, Julian","first_name":"Julian","last_name":"Dolby"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"department":[{"_id":"76"}],"publication":"European Conference on Object-Oriented Programming (ECOOP)","status":"public","date_created":"2020-11-27T10:50:07Z","user_id":"5786","title":"MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors"},{"author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"}],"publisher":"Universität Paderborn","department":[{"_id":"76"}],"status":"public","date_created":"2020-11-27T10:50:55Z","title":"Synchronized Pushdown Systems for Pointer and Data-Flow Analysis","user_id":"5786","main_file_link":[{"url":"http://www.bodden.de/pubs/phdSpaeth.pdf"}],"citation":{"chicago":"Späth, Johannes. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019.","ama":"Späth J. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn; 2019.","apa":"Späth, J. (2019). Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn.","bibtex":"@book{Späth_2019, title={Synchronized Pushdown Systems for Pointer and Data-Flow Analysis}, publisher={Universität Paderborn}, author={Späth, Johannes}, year={2019} }","mla":"Späth, Johannes. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019.","short":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis, Universität Paderborn, 2019.","ieee":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019."},"year":"2019","type":"dissertation","supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"language":[{"iso":"eng"}],"_id":"20536","date_updated":"2022-01-06T06:54:29Z"},{"user_id":"5786","title":"Codebase-Adaptive Detection of Security-Relevant Methods","status":"public","date_created":"2020-11-27T10:51:53Z","author":[{"first_name":"Goran","full_name":"Piskachev, Goran","last_name":"Piskachev"},{"first_name":"Lisa","full_name":"Nguyen, Lisa","last_name":"Nguyen"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"department":[{"_id":"76"}],"_id":"20537","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"citation":{"apa":"Piskachev, G., Nguyen, L., & Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods.","ama":"Piskachev G, Nguyen L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods.; 2019.","chicago":"Piskachev, Goran, Lisa Nguyen, and Eric Bodden. Codebase-Adaptive Detection of Security-Relevant Methods, 2019.","bibtex":"@book{Piskachev_Nguyen_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, author={Piskachev, Goran and Nguyen, Lisa and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. Codebase-Adaptive Detection of Security-Relevant Methods. 2019.","short":"G. Piskachev, L. Nguyen, E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods, 2019.","ieee":"G. Piskachev, L. Nguyen, and E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods. 2019."},"type":"report","year":"2019"},{"author":[{"first_name":"Sigmund","full_name":"Albert Gorski Iii, Sigmund","last_name":"Albert Gorski Iii"},{"last_name":"Andow","full_name":"Andow, Benjamin","first_name":"Benjamin"},{"full_name":"Nadkarni, Adwait","first_name":"Adwait","last_name":"Nadkarni"},{"full_name":"Manandhar, Sunil","first_name":"Sunil","last_name":"Manandhar"},{"last_name":"Enck","first_name":"William","full_name":"Enck, William"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"},{"full_name":"Bartel, Alexandre","first_name":"Alexandre","last_name":"Bartel"}],"keyword":["ITSECWEBSITE","CROSSING"],"department":[{"_id":"76"}],"publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","status":"public","date_created":"2020-11-27T10:52:59Z","title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware","user_id":"5786","main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"year":"2019","type":"conference","citation":{"ieee":"S. Albert Gorski Iii et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }","ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: ACM Conference on Data and Application Security and Privacy (CODASPY 2019). ; 2019.","apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., & Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. ACM Conference on Data and Application Security and Privacy (CODASPY 2019).","chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019."},"language":[{"iso":"eng"}],"_id":"20538","date_updated":"2022-01-06T06:54:29Z"},{"issue":"POPL","_id":"20539","intvolume":" 3","type":"journal_article","year":"2019","citation":{"chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3, no. POPL (2019): 48:1-48:29. https://doi.org/10.1145/3290361.","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages. 2019;3(POPL):48:1-48:29. doi:10.1145/3290361","apa":"Späth, J., Ali, K., & Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, 3(POPL), 48:1-48:29. https://doi.org/10.1145/3290361","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={10.1145/3290361}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:10.1145/3290361.","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: 10.1145/3290361."},"page":"48:1-48:29","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"user_id":"5786","status":"public","date_created":"2020-11-27T10:53:57Z","volume":3,"publisher":"ACM","author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","doi":"10.1145/3290361","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","publication_identifier":{"issn":["2475-1421"]},"department":[{"_id":"76"}]},{"page":"18-20","citation":{"short":"V. Aßmuth, D. Teutenberg, G. Meschut, in: DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V. (Ed.), 19. Kolloquium Gemeinsame Forschung in der Klebtechnik, 2019, pp. 18–20.","ieee":"V. Aßmuth, D. Teutenberg, and G. Meschut, “Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile,” in 19. Kolloquium Gemeinsame Forschung in der Klebtechnik, Köln, 2019, pp. 18–20.","chicago":"Aßmuth, Verena, Dominik Teutenberg, and Gerson Meschut. “Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile.” In 19. Kolloquium Gemeinsame Forschung in der Klebtechnik, edited by DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V., 18–20, 2019.","ama":"Aßmuth V, Teutenberg D, Meschut G. Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile. In: DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V., ed. 19. Kolloquium Gemeinsame Forschung in der Klebtechnik. ; 2019:18-20.","apa":"Aßmuth, V., Teutenberg, D., & Meschut, G. (2019). Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile. In DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V. (Ed.), 19. Kolloquium Gemeinsame Forschung in der Klebtechnik (pp. 18–20). Köln.","mla":"Aßmuth, Verena, et al. “Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile.” 19. Kolloquium Gemeinsame Forschung in der Klebtechnik, edited by DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V., 2019, pp. 18–20.","bibtex":"@inproceedings{Aßmuth_Teutenberg_Meschut_2019, title={Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile}, booktitle={19. Kolloquium Gemeinsame Forschung in der Klebtechnik}, author={Aßmuth, Verena and Teutenberg, Dominik and Meschut, Gerson}, editor={DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V.Editor}, year={2019}, pages={18–20} }"},"type":"conference","year":"2019","language":[{"iso":"ger"}],"conference":{"end_date":"2019-02-13","location":"Köln","name":"19. Kolloquium Gemeinsame Forschung in der Klebtechnik","start_date":"2019-02-12"},"date_updated":"2022-01-06T06:54:31Z","_id":"20626","corporate_editor":["DECHEMA Gesellschaft für Chemische Technik und Biotechnologie e.V."],"publication":"19. Kolloquium Gemeinsame Forschung in der Klebtechnik","department":[{"_id":"157"}],"author":[{"last_name":"Aßmuth","id":"53299","first_name":"Verena","full_name":"Aßmuth, Verena"},{"last_name":"Teutenberg","id":"537","first_name":"Dominik","full_name":"Teutenberg, Dominik"},{"id":"32056","last_name":"Meschut","full_name":"Meschut, Gerson","orcid":"0000-0002-2763-1246","first_name":"Gerson"}],"date_created":"2020-12-02T12:44:59Z","status":"public","title":"Analyse und Vorhersage rezeptur- und zeitabhängiger Enthaftungserscheinungen geklebter SMC-Bauteile","user_id":"53299"},{"title":"Analysis of formulation- and aging-dependent failure phenomena of bonded Sheet Molding Compounds (SMC)","user_id":"53299","date_created":"2020-12-02T12:51:19Z","status":"public","department":[{"_id":"157"}],"author":[{"full_name":"Aßmuth, Verena","first_name":"Verena","id":"53299","last_name":"Aßmuth"},{"first_name":"Dominik","full_name":"Teutenberg, Dominik","last_name":"Teutenberg","id":"537"},{"id":"32056","last_name":"Meschut","orcid":"0000-0002-2763-1246","full_name":"Meschut, Gerson","first_name":"Gerson"}],"corporate_editor":["42nd Annual Meeting The Adhesion Society"],"conference":{"end_date":"2019-02-20","name":"42nd Annual Meeting The Adhesion Society","start_date":"2019-02-17","location":"Hilton Head, South Carolina"},"_id":"20632","date_updated":"2022-01-06T06:54:31Z","year":"2019","type":"conference","citation":{"mla":"Aßmuth, Verena, et al. Analysis of Formulation- and Aging-Dependent Failure Phenomena of Bonded Sheet Molding Compounds (SMC). Edited by 42nd Annual Meeting The Adhesion Society, 2019.","bibtex":"@inproceedings{Aßmuth_Teutenberg_Meschut_2019, title={Analysis of formulation- and aging-dependent failure phenomena of bonded Sheet Molding Compounds (SMC)}, author={Aßmuth, Verena and Teutenberg, Dominik and Meschut, Gerson}, editor={42nd Annual Meeting The Adhesion SocietyEditor}, year={2019} }","ama":"Aßmuth V, Teutenberg D, Meschut G. Analysis of formulation- and aging-dependent failure phenomena of bonded Sheet Molding Compounds (SMC). In: 42nd Annual Meeting The Adhesion Society, ed. ; 2019.","apa":"Aßmuth, V., Teutenberg, D., & Meschut, G. (2019). Analysis of formulation- and aging-dependent failure phenomena of bonded Sheet Molding Compounds (SMC). In 42nd Annual Meeting The Adhesion Society (Ed.). Presented at the 42nd Annual Meeting The Adhesion Society, Hilton Head, South Carolina.","chicago":"Aßmuth, Verena, Dominik Teutenberg, and Gerson Meschut. “Analysis of Formulation- and Aging-Dependent Failure Phenomena of Bonded Sheet Molding Compounds (SMC).” edited by 42nd Annual Meeting The Adhesion Society, 2019.","ieee":"V. Aßmuth, D. Teutenberg, and G. Meschut, “Analysis of formulation- and aging-dependent failure phenomena of bonded Sheet Molding Compounds (SMC),” presented at the 42nd Annual Meeting The Adhesion Society, Hilton Head, South Carolina, 2019.","short":"V. Aßmuth, D. Teutenberg, G. Meschut, in: 42nd Annual Meeting The Adhesion Society (Ed.), 2019."},"language":[{"iso":"eng"}]},{"author":[{"last_name":"Vogt","full_name":"Vogt, S","first_name":"S"},{"full_name":"Neuhaus, D","first_name":"D","last_name":"Neuhaus"},{"full_name":"Baumeister, Jochen","orcid":"0000-0003-2683-5826","first_name":"Jochen","id":"46","last_name":"Baumeister"}],"publication":"Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten","department":[{"_id":"17"},{"_id":"172"}],"status":"public","date_created":"2020-12-02T14:18:29Z","user_id":"62406","title":"Effects of different visual conditions on standing balance in a virtual reality scene: a pilot study","language":[{"iso":"eng"}],"citation":{"mla":"Vogt, S., et al. “Effects of Different Visual Conditions on Standing Balance in a Virtual Reality Scene: A Pilot Study.” Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019.","bibtex":"@inproceedings{Vogt_Neuhaus_Baumeister_2019, title={Effects of different visual conditions on standing balance in a virtual reality scene: a pilot study}, booktitle={Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten}, author={Vogt, S and Neuhaus, D and Baumeister, Jochen}, year={2019} }","ama":"Vogt S, Neuhaus D, Baumeister J. Effects of different visual conditions on standing balance in a virtual reality scene: a pilot study. In: Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten. ; 2019.","apa":"Vogt, S., Neuhaus, D., & Baumeister, J. (2019). Effects of different visual conditions on standing balance in a virtual reality scene: a pilot study. In Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten.","chicago":"Vogt, S, D Neuhaus, and Jochen Baumeister. “Effects of Different Visual Conditions on Standing Balance in a Virtual Reality Scene: A Pilot Study.” In Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019.","ieee":"S. Vogt, D. Neuhaus, and J. Baumeister, “Effects of different visual conditions on standing balance in a virtual reality scene: a pilot study,” in Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten, 2019.","short":"S. Vogt, D. Neuhaus, J. Baumeister, in: Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019."},"year":"2019","type":"conference_abstract","_id":"20664","date_updated":"2022-01-06T06:54:31Z"},{"status":"public","date_created":"2020-12-02T14:20:00Z","author":[{"full_name":"Neuhaus, D","first_name":"D","last_name":"Neuhaus"},{"first_name":"S","full_name":"Vogt, S","last_name":"Vogt"},{"full_name":"Boschmann, A","first_name":"A","last_name":"Boschmann"},{"last_name":"Dosen","full_name":"Dosen, S","first_name":"S"},{"id":"46","last_name":"Baumeister","orcid":"0000-0003-2683-5826","full_name":"Baumeister, Jochen","first_name":"Jochen"}],"publication":"Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten","department":[{"_id":"17"},{"_id":"172"}],"title":"Effects of an augmented reality training using a myoelectric hand prosthesis: a pilot study","user_id":"46","type":"conference_abstract","citation":{"short":"D. Neuhaus, S. Vogt, A. Boschmann, S. Dosen, J. Baumeister, in: Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019.","ieee":"D. Neuhaus, S. Vogt, A. Boschmann, S. Dosen, and J. Baumeister, “Effects of an augmented reality training using a myoelectric hand prosthesis: a pilot study,” in Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten, 2019.","chicago":"Neuhaus, D, S Vogt, A Boschmann, S Dosen, and Jochen Baumeister. “Effects of an Augmented Reality Training Using a Myoelectric Hand Prosthesis: A Pilot Study.” In Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019.","ama":"Neuhaus D, Vogt S, Boschmann A, Dosen S, Baumeister J. Effects of an augmented reality training using a myoelectric hand prosthesis: a pilot study. In: Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten. ; 2019.","apa":"Neuhaus, D., Vogt, S., Boschmann, A., Dosen, S., & Baumeister, J. (2019). Effects of an augmented reality training using a myoelectric hand prosthesis: a pilot study. In Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten.","bibtex":"@inproceedings{Neuhaus_Vogt_Boschmann_Dosen_Baumeister_2019, title={Effects of an augmented reality training using a myoelectric hand prosthesis: a pilot study}, booktitle={Sportmotorik 2019. Adaptation, Lernen und virtuelle Welten}, author={Neuhaus, D and Vogt, S and Boschmann, A and Dosen, S and Baumeister, Jochen}, year={2019} }","mla":"Neuhaus, D., et al. “Effects of an Augmented Reality Training Using a Myoelectric Hand Prosthesis: A Pilot Study.” Sportmotorik 2019. Adaptation, Lernen Und Virtuelle Welten, 2019."},"year":"2019","language":[{"iso":"eng"}],"_id":"20665","date_updated":"2022-01-06T06:54:31Z"},{"date_created":"2020-12-02T14:29:31Z","status":"public","department":[{"_id":"17"},{"_id":"172"}],"author":[{"first_name":"S","full_name":"Bonnette, S","last_name":"Bonnette"},{"last_name":"Diekfuss","first_name":"JA","full_name":"Diekfuss, JA"},{"first_name":"KD","full_name":"Barber Foss, KD","last_name":"Barber Foss"},{"full_name":"DiCesare, CA","first_name":"CA","last_name":"DiCesare"},{"full_name":"Riley, MA ","first_name":"MA ","last_name":"Riley"},{"full_name":"Riehm, C","first_name":"C","last_name":"Riehm"},{"full_name":"Moore, C","first_name":"C","last_name":"Moore"},{"full_name":"Grooms, DR","first_name":"DR","last_name":"Grooms"},{"full_name":"Myer, GD","first_name":"GD","last_name":"Myer"},{"last_name":"Baumeister","id":"46","first_name":"Jochen","orcid":"0000-0003-2683-5826","full_name":"Baumeister, Jochen"}],"user_id":"62406","title":"A preliminary prospective Analysis of electrocortical signatures underlying ACL injury","language":[{"iso":"eng"}],"type":"conference_abstract","citation":{"bibtex":"@inproceedings{Bonnette_Diekfuss_Barber Foss_DiCesare_Riley_Riehm_Moore_Grooms_Myer_Baumeister_2019, title={A preliminary prospective Analysis of electrocortical signatures underlying ACL injury}, author={Bonnette, S and Diekfuss, JA and Barber Foss, KD and DiCesare, CA and Riley, MA and Riehm, C and Moore, C and Grooms, DR and Myer, GD and Baumeister, Jochen}, year={2019} }","mla":"Bonnette, S., et al. A Preliminary Prospective Analysis of Electrocortical Signatures Underlying ACL Injury. 2019.","chicago":"Bonnette, S, JA Diekfuss, KD Barber Foss, CA DiCesare, MA Riley, C Riehm, C Moore, DR Grooms, GD Myer, and Jochen Baumeister. “A Preliminary Prospective Analysis of Electrocortical Signatures Underlying ACL Injury,” 2019.","ama":"Bonnette S, Diekfuss J, Barber Foss K, et al. A preliminary prospective Analysis of electrocortical signatures underlying ACL injury. In: ; 2019.","apa":"Bonnette, S., Diekfuss, J., Barber Foss, K., DiCesare, C., Riley, M., Riehm, C., … Baumeister, J. (2019). A preliminary prospective Analysis of electrocortical signatures underlying ACL injury.","ieee":"S. Bonnette et al., “A preliminary prospective Analysis of electrocortical signatures underlying ACL injury,” 2019.","short":"S. Bonnette, J. Diekfuss, K. Barber Foss, C. DiCesare, M. Riley, C. Riehm, C. Moore, D. Grooms, G. Myer, J. Baumeister, in: 2019."},"year":"2019","_id":"20668","date_updated":"2022-01-06T06:54:31Z"}]