[{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47305","status":"public","editor":[{"full_name":"Kelley, Patrick Gage","last_name":"Kelley","first_name":"Patrick Gage"},{"last_name":"Kapadia","full_name":"Kapadia, Apu","first_name":"Apu"}],"type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","title":"\"Would You Give the Same Priority to the Bank and a Game? I Do Not!\" Exploring Credential Management Strategies and Obstacles during Password Manager Setup","date_created":"2023-09-22T13:29:29Z","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_updated":"2024-06-05T12:44:28Z","publisher":"USENIX Association","citation":{"short":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, S. Fahl, in: P.G. Kelley, A. Kapadia (Eds.), Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 171–190.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Acar_Fahl_2023, title={“Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha}, editor={Kelley, Patrick Gage and Kapadia, Apu}, year={2023}, pages={171–190} }","mla":"Amft, Sabrina, et al. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, USENIX Association, 2023, pp. 171–190.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Acar, Y., &#38; Fahl, S. (2023). “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In P. G. Kelley &#38; A. Kapadia (Eds.), <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i> (pp. 171–190). USENIX Association.","ama":"Amft S, Höltervennhoff S, Huaman N, Acar Y, Fahl S. “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In: Kelley PG, Kapadia A, eds. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:171–190.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, 171–190. USENIX Association, 2023.","ieee":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, and S. Fahl, “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 171–190."},"page":"171–190","year":"2023"},{"publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"status":"public","_id":"47301","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"year":"2023","citation":{"apa":"Höltervennhoff, S., Klostermeyer, P., Wöhler, N., Acar, Y., &#38; Fahl, S. (2023). “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","ama":"Höltervennhoff S, Klostermeyer P, Wöhler N, Acar Y, Fahl S. “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","bibtex":"@inproceedings{Höltervennhoff_Klostermeyer_Wöhler_Acar_Fahl_2023, title={“I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Klostermeyer, Philip and Wöhler, Noah and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","short":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Höltervennhoff, Sandra, et al. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","chicago":"Höltervennhoff, Sandra, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, and Sascha Fahl. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, and S. Fahl, “‘I wouldn’t want my unsafe code to run my pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023."},"date_updated":"2024-06-05T12:49:13Z","publisher":"USENIX Association","author":[{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"first_name":"Philip","last_name":"Klostermeyer","full_name":"Klostermeyer, Philip"},{"full_name":"Wöhler, Noah","last_name":"Wöhler","first_name":"Noah"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:27:45Z","title":"\"I wouldn’t want my unsafe code to run my pacemaker\": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust"},{"date_updated":"2024-06-05T12:42:46Z","publisher":"USENIX Association","date_created":"2023-09-22T13:26:37Z","author":[{"last_name":"Mink","full_name":"Mink, Jaron","first_name":"Jaron"},{"full_name":"Kaur, Harjot","last_name":"Kaur","first_name":"Harjot"},{"full_name":"Schmüser, Juliane","last_name":"Schmüser","first_name":"Juliane"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"title":"\"Security is not my field, I’m a stats guy\": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry","year":"2023","citation":{"apa":"Mink, J., Kaur, H., Schmüser, J., Fahl, S., &#38; Acar, Y. (2023). “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","bibtex":"@inproceedings{Mink_Kaur_Schmüser_Fahl_Acar_2023, title={“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Mink, Jaron and Kaur, Harjot and Schmüser, Juliane and Fahl, Sascha and Acar, Yasemin}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","mla":"Mink, Jaron, et al. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, Y. Acar, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","ieee":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, and Y. Acar, “‘Security is not my field, I’m a stats guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Mink, Jaron, Harjot Kaur, Juliane Schmüser, Sascha Fahl, and Yasemin Acar. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ama":"Mink J, Kaur H, Schmüser J, Fahl S, Acar Y. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023."},"_id":"47298","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"status":"public"},{"user_id":"14931","department":[{"_id":"858"}],"_id":"47842","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2023 IEEE Symposium on Security and Privacy (SP)","status":"public","date_created":"2023-10-06T16:11:54Z","author":[{"first_name":"Marcel","id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"publisher":"IEEE","date_updated":"2024-06-05T12:44:03Z","doi":"10.1109/sp46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","publication_status":"published","citation":{"apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>."},"year":"2023"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47295","status":"public","type":"journal_article","publication":"CoRR","doi":"10.48550/arXiv.2306.09708","title":"Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"Krause, Alexander","last_name":"Krause","first_name":"Alexander"},{"first_name":"Lucy","full_name":"Simko, Lucy","last_name":"Simko"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:25:13Z","volume":"abs/2306.09708","date_updated":"2024-06-05T12:43:30Z","citation":{"chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i> abs/2306.09708 (2023). <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>.","ieee":"S. Amft <i>et al.</i>, “Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication,” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>. 2023;abs/2306.09708. doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>, <i>abs/2306.09708</i>. <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>","bibtex":"@article{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication}, volume={abs/2306.09708}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>}, journal={CoRR}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, year={2023} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, CoRR abs/2306.09708 (2023).","mla":"Amft, Sabrina, et al. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>."},"year":"2023"},{"date_updated":"2024-06-05T12:41:36Z","author":[{"full_name":"Tran, Mindy","id":"99001","last_name":"Tran","first_name":"Mindy"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Cucker","full_name":"Cucker, Michel","first_name":"Michel"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:55Z","volume":"abs/2307.15642","title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit","doi":"10.48550/arXiv.2307.15642","year":"2023","citation":{"chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>.","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>"},"_id":"47294","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public"},{"status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"_id":"47293","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2023","citation":{"bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>","ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>."},"title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","doi":"10.48550/arXiv.2307.16557","date_updated":"2024-06-05T12:41:59Z","volume":"abs/2307.16557","author":[{"full_name":"Dunlap, Trevor","last_name":"Dunlap","first_name":"Trevor"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Cucker","full_name":"Cucker, Michel","first_name":"Michel"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"last_name":"Kapravelos","full_name":"Kapravelos, Alexandros","first_name":"Alexandros"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"full_name":"Williams, Laurie A.","last_name":"Williams","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:29Z"},{"language":[{"iso":"eng"}],"_id":"47292","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"journal_article","publication":"CoRR","title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit","doi":"10.48550/arXiv.2308.06850","date_updated":"2024-06-05T12:42:20Z","author":[{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Cukier, Michel","last_name":"Cukier","first_name":"Michel"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:23:45Z","volume":"abs/2308.06850","year":"2023","citation":{"apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>.","ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>"}},{"citation":{"bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023."},"year":"2023","date_created":"2023-09-22T13:27:24Z","author":[{"first_name":"Tadayoshi","full_name":"Kohno, Tadayoshi","last_name":"Kohno"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Wulf","last_name":"Loh","full_name":"Loh, Wulf"}],"date_updated":"2024-06-05T12:49:39Z","publisher":"USENIX Association","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","status":"public","editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47300","language":[{"iso":"eng"}]},{"year":"2023","citation":{"apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299."},"page":"283–299","publisher":"USENIX Association","date_updated":"2024-06-05T12:50:02Z","date_created":"2023-09-22T13:45:47Z","author":[{"first_name":"Lorenzo","last_name":"Neil","full_name":"Neil, Lorenzo"},{"first_name":"Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Reaves, Bradley","last_name":"Reaves","first_name":"Bradley"}],"title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice","type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","status":"public","_id":"47312","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}]},{"citation":{"apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>","short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>.","ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>"},"year":"2023","doi":"10.48550/arXiv.2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","date_created":"2023-09-22T13:23:22Z","author":[{"last_name":"Klemmer","full_name":"Klemmer, Jan H.","first_name":"Jan H."},{"full_name":"Gutfleisch, Marco","last_name":"Gutfleisch","first_name":"Marco"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Sasse, M. Angela","last_name":"Sasse","first_name":"M. Angela"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"volume":"abs/2309.00744","date_updated":"2024-06-05T13:38:52Z","status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47291"},{"type":"conference","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","status":"public","editor":[{"first_name":"Weizhi","last_name":"Meng","full_name":"Meng, Weizhi"},{"full_name":"Jensen, Christian Damsgaard","last_name":"Jensen","first_name":"Christian Damsgaard"},{"full_name":"Cremers, Cas","last_name":"Cremers","first_name":"Cas"},{"last_name":"Kirda","full_name":"Kirda, Engin","first_name":"Engin"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"53362","language":[{"iso":"eng"}],"citation":{"short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>","ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>."},"page":"3138–3152","year":"2023","date_created":"2024-04-09T06:22:43Z","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra","first_name":"Sandra"},{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"last_name":"Krause","full_name":"Krause, Alexander","first_name":"Alexander"},{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"publisher":"ACM","date_updated":"2024-06-05T13:52:15Z","doi":"10.1145/3576915.3623180","title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments"},{"publication_status":"published","year":"2023","citation":{"chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>","bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>."},"publisher":"IEEE","date_updated":"2024-06-05T13:51:00Z","date_created":"2023-12-04T11:07:08Z","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"first_name":"Michael","full_name":"Reif, Michael","last_name":"Reif"},{"last_name":"Wickert","full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina"},{"first_name":"Sarah","last_name":"Nadi","full_name":"Nadi, Sarah"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","doi":"10.1109/secdev56634.2023.00015","publication":"2023 IEEE Secure Development Conference (SecDev)","type":"conference","status":"public","_id":"49438","department":[{"_id":"76"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}]},{"status":"public","type":"journal_article","publication":"IEEE Security & Privacy","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"53368","citation":{"ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63."},"intvolume":"        21","page":"59–63","year":"2023","issue":"6","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","date_created":"2024-04-09T07:14:43Z","author":[{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"volume":21,"date_updated":"2024-06-05T13:53:18Z","publisher":"IEEE"},{"language":[{"iso":"eng"}],"_id":"53366","user_id":"14931","department":[{"_id":"858"}],"status":"public","type":"conference","publication":"2024 IEEE Symposium on Security and Privacy (SP)","title":"Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study","date_updated":"2024-06-05T13:52:39Z","date_created":"2024-04-09T07:11:01Z","author":[{"full_name":"Tran, Mindy","id":"99001","last_name":"Tran","first_name":"Mindy"},{"last_name":"Munyendo","full_name":"Munyendo, Collins W","first_name":"Collins W"},{"orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000","first_name":"Harshini"},{"first_name":"Rachel Gonzalez","last_name":"Rodriguez","full_name":"Rodriguez, Rachel Gonzalez"},{"first_name":"Luisa Ball","full_name":"Schnell, Luisa Ball","last_name":"Schnell"},{"full_name":"Sula, Cora","last_name":"Sula","first_name":"Cora"},{"first_name":"Lucy","full_name":"Simko, Lucy","last_name":"Simko"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"year":"2023","citation":{"ama":"Tran M, Munyendo CW, Sri Ramulu H, et al. Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. In: <i>2024 IEEE Symposium on Security and Privacy (SP)</i>. ; 2023:4–4.","ieee":"M. Tran <i>et al.</i>, “Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study,” in <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","chicago":"Tran, Mindy, Collins W Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, and Yasemin Acar. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” In <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4, 2023.","apa":"Tran, M., Munyendo, C. W., Sri Ramulu, H., Rodriguez, R. G., Schnell, L. B., Sula, C., Simko, L., &#38; Acar, Y. (2023). Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4.","bibtex":"@inproceedings{Tran_Munyendo_Sri Ramulu_Rodriguez_Schnell_Sula_Simko_Acar_2023, title={Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study}, booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, author={Tran, Mindy and Munyendo, Collins W and Sri Ramulu, Harshini and Rodriguez, Rachel Gonzalez and Schnell, Luisa Ball and Sula, Cora and Simko, Lucy and Acar, Yasemin}, year={2023}, pages={4–4} }","short":"M. Tran, C.W. Munyendo, H. Sri Ramulu, R.G. Rodriguez, L.B. Schnell, C. Sula, L. Simko, Y. Acar, in: 2024 IEEE Symposium on Security and Privacy (SP), 2023, pp. 4–4.","mla":"Tran, Mindy, et al. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4."},"page":"4–4"},{"citation":{"short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>."},"intvolume":"        21","page":"59–63","year":"2023","issue":"6","doi":"10.1109/MSEC.2023.3316569","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","date_created":"2024-04-08T09:02:04Z","author":[{"last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"volume":21,"date_updated":"2024-06-05T13:51:52Z","status":"public","type":"journal_article","publication":"IEEE Secur. Priv.","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"53348"},{"publication":"Proc. ACM Hum. Comput. Interact.","type":"journal_article","status":"public","department":[{"_id":"858"}],"user_id":"14931","_id":"53352","language":[{"iso":"eng"}],"issue":"CSCW2","intvolume":"         7","page":"1–54","citation":{"short":"L. Simko, H. Sri Ramulu, T. Kohno, Y. Acar, Proc. ACM Hum. Comput. Interact. 7 (2023) 1–54.","bibtex":"@article{Simko_Sri Ramulu_Kohno_Acar_2023, title={The Use and Non-Use of Technology During Hurricanes}, volume={7}, DOI={<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>}, number={CSCW2}, journal={Proc. ACM Hum. Comput. Interact.}, author={Simko, Lucy and Sri Ramulu, Harshini and Kohno, Tadayoshi and Acar, Yasemin}, year={2023}, pages={1–54} }","mla":"Simko, Lucy, et al. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, 2023, pp. 1–54, doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","apa":"Simko, L., Sri Ramulu, H., Kohno, T., &#38; Acar, Y. (2023). The Use and Non-Use of Technology During Hurricanes. <i>Proc. ACM Hum. Comput. Interact.</i>, <i>7</i>(CSCW2), 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>","chicago":"Simko, Lucy, Harshini Sri Ramulu, Tadayoshi Kohno, and Yasemin Acar. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i> 7, no. CSCW2 (2023): 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>.","ieee":"L. Simko, H. Sri Ramulu, T. Kohno, and Y. Acar, “The Use and Non-Use of Technology During Hurricanes,” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, pp. 1–54, 2023, doi: <a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","ama":"Simko L, Sri Ramulu H, Kohno T, Acar Y. The Use and Non-Use of Technology During Hurricanes. <i>Proc ACM Hum Comput Interact</i>. 2023;7(CSCW2):1–54. doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>"},"year":"2023","volume":7,"author":[{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"first_name":"Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","id":"99000","full_name":"Sri Ramulu, Harshini"},{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2024-04-08T09:22:02Z","date_updated":"2024-06-05T13:53:38Z","doi":"10.1145/3610215","title":"The Use and Non-Use of Technology During Hurricanes"},{"department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","_id":"48589","project":[{"_id":"1086","name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation"},{"_id":"1084","name":"PÖM: Politische Ökonomie der Medien und der Kommunikation"}],"status":"public","type":"journal_article","doi":"10.1177/08969205231206488 ","main_file_link":[{"url":"https://doi.org/10.1177/08969205231206488 ","open_access":"1"}],"volume":50,"author":[{"full_name":"Fuchs, Christian","id":"21863","last_name":"Fuchs","orcid":"0000-0003-0589-4579","first_name":"Christian"}],"date_updated":"2024-06-10T05:13:22Z","oa":"1","page":"727-745","intvolume":"        50","citation":{"short":"C. Fuchs, Critical Sociology 50 (2023) 727–745.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={727–745} }","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 727–45, doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>, <i>50</i>(4–5), 727–745. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 727–45. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>.","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 727–745, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>. 2023;50(4-5):727-745. doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>"},"related_material":{"link":[{"description":"Comment on the article (Graham Murdock)","relation":"supplementary_material","url":"https://doi.org/10.1177/08969205231201050"},{"description":"Response to Graham Murdock","relation":"supplementary_material","url":"https://doi.org/10.1177/08969205231201382 "}]},"publication_status":"published","language":[{"iso":"eng"}],"publication":"Critical Sociology","title":"Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism","date_created":"2023-11-02T09:31:17Z","year":"2023","issue":"4-5","quality_controlled":"1"},{"title":"Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock","date_created":"2023-11-02T09:36:35Z","year":"2023","issue":"4-5","quality_controlled":"1","language":[{"iso":"eng"}],"publication":"Critical Sociology","doi":"10.1177/08969205231201382","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1177/08969205231201382 "}],"volume":50,"author":[{"orcid":"0000-0003-0589-4579","last_name":"Fuchs","full_name":"Fuchs, Christian","id":"21863","first_name":"Christian"}],"oa":"1","date_updated":"2024-06-10T05:14:13Z","page":"757-765","intvolume":"        50","citation":{"mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 757–65, doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={757–765} }","short":"C. Fuchs, Critical Sociology 50 (2023) 757–765.","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>, <i>50</i>(4–5), 757–765. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 757–765, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 757–65. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>.","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>. 2023;50(4-5):757-765. doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>"},"related_material":{"link":[{"relation":"supplementary_material","description":"Original article to which this article refers","url":"https://doi.org/10.1177/08969205231206488 "},{"url":"https://doi.org/10.1177/08969205231201050","relation":"supplementary_material","description":"Comment by Graham Murdock to which this article refers"}]},"publication_status":"published","department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","_id":"48590","project":[{"name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation","_id":"1086"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}],"status":"public","type":"journal_article"},{"author":[{"first_name":"Jonathan","last_name":"Heins","full_name":"Heins, Jonathan"},{"last_name":"Bossek","orcid":"0000-0002-4121-4668","id":"102979","full_name":"Bossek, Jakob","first_name":"Jakob"},{"last_name":"Pohl","full_name":"Pohl, Janina","first_name":"Janina"},{"last_name":"Seiler","full_name":"Seiler, Moritz","id":"105520","first_name":"Moritz"},{"first_name":"Heike","last_name":"Trautmann","orcid":"0000-0002-9788-8282","id":"100740","full_name":"Trautmann, Heike"},{"first_name":"Pascal","full_name":"Kerschke, Pascal","last_name":"Kerschke"}],"date_created":"2023-08-04T07:18:38Z","volume":940,"date_updated":"2024-06-10T11:57:21Z","doi":"https://doi.org/10.1016/j.tcs.2022.10.019","title":"A study on the effects of normalized TSP features for automated algorithm selection","publication_identifier":{"issn":["0304-3975"]},"citation":{"short":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, P. Kerschke, Theoretical Computer Science 940 (2023) 123–145.","bibtex":"@article{Heins_Bossek_Pohl_Seiler_Trautmann_Kerschke_2023, title={A study on the effects of normalized TSP features for automated algorithm selection}, volume={940}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>}, journal={Theoretical Computer Science}, author={Heins, Jonathan and Bossek, Jakob and Pohl, Janina and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}, year={2023}, pages={123–145} }","mla":"Heins, Jonathan, et al. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i>, vol. 940, 2023, pp. 123–45, doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","apa":"Heins, J., Bossek, J., Pohl, J., Seiler, M., Trautmann, H., &#38; Kerschke, P. (2023). A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>, <i>940</i>, 123–145. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>","ama":"Heins J, Bossek J, Pohl J, Seiler M, Trautmann H, Kerschke P. A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>. 2023;940:123-145. doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>","chicago":"Heins, Jonathan, Jakob Bossek, Janina Pohl, Moritz Seiler, Heike Trautmann, and Pascal Kerschke. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i> 940 (2023): 123–45. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","ieee":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, and P. Kerschke, “A study on the effects of normalized TSP features for automated algorithm selection,” <i>Theoretical Computer Science</i>, vol. 940, pp. 123–145, 2023, doi: <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>."},"intvolume":"       940","page":"123-145","year":"2023","user_id":"15504","department":[{"_id":"34"},{"_id":"819"}],"_id":"46310","language":[{"iso":"eng"}],"keyword":["Feature normalization","Algorithm selection","Traveling salesperson problem"],"type":"journal_article","publication":"Theoretical Computer Science","status":"public","abstract":[{"lang":"eng","text":"Classic automated algorithm selection (AS) for (combinatorial) optimization problems heavily relies on so-called instance features, i.e., numerical characteristics of the problem at hand ideally extracted with computationally low-demanding routines. For the traveling salesperson problem (TSP) a plethora of features have been suggested. Most of these features are, if at all, only normalized imprecisely raising the issue of feature values being strongly affected by the instance size. Such artifacts may have detrimental effects on algorithm selection models. We propose a normalization for two feature groups which stood out in multiple AS studies on the TSP: (a) features based on a minimum spanning tree (MST) and (b) nearest neighbor relationships of the input instance. To this end we theoretically derive minimum and maximum values for properties of MSTs and k-nearest neighbor graphs (NNG) of Euclidean graphs. We analyze the differences in feature space between normalized versions of these features and their unnormalized counterparts. Our empirical investigations on various TSP benchmark sets point out that the feature scaling succeeds in eliminating the effect of the instance size. A proof-of-concept AS-study shows promising results: models trained with normalized features tend to outperform those trained with the respective vanilla features."}]}]
