[{"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","status":"public","editor":[{"first_name":"Joseph A.","full_name":"Calandrino, Joseph A.","last_name":"Calandrino"},{"last_name":"Troncoso","full_name":"Troncoso, Carmela","first_name":"Carmela"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47301","language":[{"iso":"eng"}],"citation":{"chicago":"Höltervennhoff, Sandra, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, and Sascha Fahl. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, and S. Fahl, “‘I wouldn’t want my unsafe code to run my pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","ama":"Höltervennhoff S, Klostermeyer P, Wöhler N, Acar Y, Fahl S. “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","apa":"Höltervennhoff, S., Klostermeyer, P., Wöhler, N., Acar, Y., &#38; Fahl, S. (2023). “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","bibtex":"@inproceedings{Höltervennhoff_Klostermeyer_Wöhler_Acar_Fahl_2023, title={“I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Klostermeyer, Philip and Wöhler, Noah and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","short":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Höltervennhoff, Sandra, et al. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023."},"year":"2023","author":[{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"first_name":"Philip","full_name":"Klostermeyer, Philip","last_name":"Klostermeyer"},{"last_name":"Wöhler","full_name":"Wöhler, Noah","first_name":"Noah"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:27:45Z","publisher":"USENIX Association","date_updated":"2024-06-05T12:49:13Z","title":"\"I wouldn’t want my unsafe code to run my pacemaker\": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47298","status":"public","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","title":"\"Security is not my field, I’m a stats guy\": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry","author":[{"full_name":"Mink, Jaron","last_name":"Mink","first_name":"Jaron"},{"full_name":"Kaur, Harjot","last_name":"Kaur","first_name":"Harjot"},{"last_name":"Schmüser","full_name":"Schmüser, Juliane","first_name":"Juliane"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2023-09-22T13:26:37Z","date_updated":"2024-06-05T12:42:46Z","publisher":"USENIX Association","citation":{"chicago":"Mink, Jaron, Harjot Kaur, Juliane Schmüser, Sascha Fahl, and Yasemin Acar. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, and Y. Acar, “‘Security is not my field, I’m a stats guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","ama":"Mink J, Kaur H, Schmüser J, Fahl S, Acar Y. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","apa":"Mink, J., Kaur, H., Schmüser, J., Fahl, S., &#38; Acar, Y. (2023). “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","short":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, Y. Acar, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Mink, Jaron, et al. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","bibtex":"@inproceedings{Mink_Kaur_Schmüser_Fahl_Acar_2023, title={“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Mink, Jaron and Kaur, Harjot and Schmüser, Juliane and Fahl, Sascha and Acar, Yasemin}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"},"year":"2023"},{"year":"2023","citation":{"apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>"},"publication_status":"published","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","doi":"10.1109/sp46215.2023.10179320","publisher":"IEEE","date_updated":"2024-06-05T12:44:03Z","date_created":"2023-10-06T16:11:54Z","author":[{"first_name":"Marcel","full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"status":"public","type":"conference","publication":"2023 IEEE Symposium on Security and Privacy (SP)","extern":"1","language":[{"iso":"eng"}],"_id":"47842","user_id":"14931","department":[{"_id":"858"}]},{"citation":{"ieee":"S. Amft <i>et al.</i>, “Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication,” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i> abs/2306.09708 (2023). <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>.","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, CoRR abs/2306.09708 (2023).","mla":"Amft, Sabrina, et al. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","bibtex":"@article{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication}, volume={abs/2306.09708}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>}, journal={CoRR}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, year={2023} }","ama":"Amft S, Höltervennhoff S, Huaman N, et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>. 2023;abs/2306.09708. doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>, <i>abs/2306.09708</i>. <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>"},"year":"2023","doi":"10.48550/arXiv.2306.09708","title":"Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication","volume":"abs/2306.09708","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"last_name":"Krause","full_name":"Krause, Alexander","first_name":"Alexander"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:25:13Z","date_updated":"2024-06-05T12:43:30Z","status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47295"},{"publication":"CoRR","type":"journal_article","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47294","language":[{"iso":"eng"}],"citation":{"chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>.","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>","apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>."},"year":"2023","volume":"abs/2307.15642","date_created":"2023-09-22T13:24:55Z","author":[{"first_name":"Mindy","last_name":"Tran","id":"99001","full_name":"Tran, Mindy"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Michel","full_name":"Cucker, Michel","last_name":"Cucker"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"first_name":"Laurie A.","full_name":"Williams, Laurie A.","last_name":"Williams"}],"date_updated":"2024-06-05T12:41:36Z","doi":"10.48550/arXiv.2307.15642","title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit"},{"year":"2023","citation":{"apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>."},"date_updated":"2024-06-05T12:41:59Z","volume":"abs/2307.16557","date_created":"2023-09-22T13:24:29Z","author":[{"first_name":"Trevor","full_name":"Dunlap, Trevor","last_name":"Dunlap"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Cucker","full_name":"Cucker, Michel","first_name":"Michel"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"first_name":"Laurie A.","last_name":"Williams","full_name":"Williams, Laurie A."}],"title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","doi":"10.48550/arXiv.2307.16557","publication":"CoRR","type":"journal_article","status":"public","_id":"47293","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}]},{"year":"2023","citation":{"apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>."},"date_updated":"2024-06-05T12:42:20Z","volume":"abs/2308.06850","date_created":"2023-09-22T13:23:45Z","author":[{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michel","last_name":"Cukier","full_name":"Cukier, Michel"},{"first_name":"Alexandros","last_name":"Kapravelos","full_name":"Kapravelos, Alexandros"},{"first_name":"Christian","full_name":"Kästner, Christian","last_name":"Kästner"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit","doi":"10.48550/arXiv.2308.06850","publication":"CoRR","type":"journal_article","status":"public","_id":"47292","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}]},{"editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"status":"public","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","type":"conference","language":[{"iso":"eng"}],"_id":"47300","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2023","citation":{"ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association."},"title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","publisher":"USENIX Association","date_updated":"2024-06-05T12:49:39Z","author":[{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Wulf","last_name":"Loh","full_name":"Loh, Wulf"}],"date_created":"2023-09-22T13:27:24Z"},{"language":[{"iso":"eng"}],"_id":"47312","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice","date_updated":"2024-06-05T12:50:02Z","publisher":"USENIX Association","date_created":"2023-09-22T13:45:47Z","author":[{"last_name":"Neil","full_name":"Neil, Lorenzo","first_name":"Lorenzo"},{"orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","id":"99000","full_name":"Sri Ramulu, Harshini","first_name":"Harshini"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Reaves, Bradley","last_name":"Reaves","first_name":"Bradley"}],"year":"2023","citation":{"chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299.","apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }"},"page":"283–299"},{"_id":"47291","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public","date_updated":"2024-06-05T13:38:52Z","author":[{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"first_name":"Marco","last_name":"Gutfleisch","full_name":"Gutfleisch, Marco"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"M. Angela","last_name":"Sasse","full_name":"Sasse, M. Angela"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:23:22Z","volume":"abs/2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","doi":"10.48550/arXiv.2309.00744","year":"2023","citation":{"short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>","ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>."}},{"year":"2023","citation":{"ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>."},"page":"3138–3152","title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments","doi":"10.1145/3576915.3623180","publisher":"ACM","date_updated":"2024-06-05T13:52:15Z","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"Krause, Alexander","last_name":"Krause","first_name":"Alexander"},{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2024-04-09T06:22:43Z","editor":[{"full_name":"Meng, Weizhi","last_name":"Meng","first_name":"Weizhi"},{"first_name":"Christian Damsgaard","full_name":"Jensen, Christian Damsgaard","last_name":"Jensen"},{"first_name":"Cas","full_name":"Cremers, Cas","last_name":"Cremers"},{"full_name":"Kirda, Engin","last_name":"Kirda","first_name":"Engin"}],"status":"public","type":"conference","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","language":[{"iso":"eng"}],"_id":"53362","user_id":"14931","department":[{"_id":"858"}]},{"year":"2023","citation":{"ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>","bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>"},"publication_status":"published","title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","doi":"10.1109/secdev56634.2023.00015","date_updated":"2024-06-05T13:51:00Z","publisher":"IEEE","date_created":"2023-12-04T11:07:08Z","author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Reif, Michael","last_name":"Reif","first_name":"Michael"},{"last_name":"Wickert","full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina"},{"first_name":"Sarah","full_name":"Nadi, Sarah","last_name":"Nadi"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"status":"public","publication":"2023 IEEE Secure Development Conference (SecDev)","type":"conference","language":[{"iso":"eng"}],"_id":"49438","department":[{"_id":"76"},{"_id":"858"}],"user_id":"14931"},{"status":"public","publication":"IEEE Security & Privacy","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"858"}],"user_id":"14931","_id":"53368","page":"59–63","intvolume":"        21","citation":{"chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63."},"year":"2023","issue":"6","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","volume":21,"author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2024-04-09T07:14:43Z","date_updated":"2024-06-05T13:53:18Z","publisher":"IEEE"},{"publication":"2024 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public","department":[{"_id":"858"}],"user_id":"14931","_id":"53366","language":[{"iso":"eng"}],"page":"4–4","citation":{"apa":"Tran, M., Munyendo, C. W., Sri Ramulu, H., Rodriguez, R. G., Schnell, L. B., Sula, C., Simko, L., &#38; Acar, Y. (2023). Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4.","mla":"Tran, Mindy, et al. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","bibtex":"@inproceedings{Tran_Munyendo_Sri Ramulu_Rodriguez_Schnell_Sula_Simko_Acar_2023, title={Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study}, booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, author={Tran, Mindy and Munyendo, Collins W and Sri Ramulu, Harshini and Rodriguez, Rachel Gonzalez and Schnell, Luisa Ball and Sula, Cora and Simko, Lucy and Acar, Yasemin}, year={2023}, pages={4–4} }","short":"M. Tran, C.W. Munyendo, H. Sri Ramulu, R.G. Rodriguez, L.B. Schnell, C. Sula, L. Simko, Y. Acar, in: 2024 IEEE Symposium on Security and Privacy (SP), 2023, pp. 4–4.","ieee":"M. Tran <i>et al.</i>, “Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study,” in <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","chicago":"Tran, Mindy, Collins W Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, and Yasemin Acar. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” In <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4, 2023.","ama":"Tran M, Munyendo CW, Sri Ramulu H, et al. Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. In: <i>2024 IEEE Symposium on Security and Privacy (SP)</i>. ; 2023:4–4."},"year":"2023","author":[{"full_name":"Tran, Mindy","id":"99001","last_name":"Tran","first_name":"Mindy"},{"first_name":"Collins W","last_name":"Munyendo","full_name":"Munyendo, Collins W"},{"first_name":"Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000"},{"first_name":"Rachel Gonzalez","last_name":"Rodriguez","full_name":"Rodriguez, Rachel Gonzalez"},{"first_name":"Luisa Ball","full_name":"Schnell, Luisa Ball","last_name":"Schnell"},{"first_name":"Cora","last_name":"Sula","full_name":"Sula, Cora"},{"first_name":"Lucy","full_name":"Simko, Lucy","last_name":"Simko"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2024-04-09T07:11:01Z","date_updated":"2024-06-05T13:52:39Z","title":"Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study"},{"page":"59–63","intvolume":"        21","citation":{"chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>"},"year":"2023","issue":"6","doi":"10.1109/MSEC.2023.3316569","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","volume":21,"author":[{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-04-08T09:02:04Z","date_updated":"2024-06-05T13:51:52Z","status":"public","publication":"IEEE Secur. Priv.","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"858"}],"user_id":"14931","_id":"53348"},{"status":"public","type":"journal_article","publication":"Proc. ACM Hum. Comput. Interact.","language":[{"iso":"eng"}],"_id":"53352","user_id":"14931","department":[{"_id":"858"}],"year":"2023","citation":{"short":"L. Simko, H. Sri Ramulu, T. Kohno, Y. Acar, Proc. ACM Hum. Comput. Interact. 7 (2023) 1–54.","mla":"Simko, Lucy, et al. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, 2023, pp. 1–54, doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","bibtex":"@article{Simko_Sri Ramulu_Kohno_Acar_2023, title={The Use and Non-Use of Technology During Hurricanes}, volume={7}, DOI={<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>}, number={CSCW2}, journal={Proc. ACM Hum. Comput. Interact.}, author={Simko, Lucy and Sri Ramulu, Harshini and Kohno, Tadayoshi and Acar, Yasemin}, year={2023}, pages={1–54} }","apa":"Simko, L., Sri Ramulu, H., Kohno, T., &#38; Acar, Y. (2023). The Use and Non-Use of Technology During Hurricanes. <i>Proc. ACM Hum. Comput. Interact.</i>, <i>7</i>(CSCW2), 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>","ama":"Simko L, Sri Ramulu H, Kohno T, Acar Y. The Use and Non-Use of Technology During Hurricanes. <i>Proc ACM Hum Comput Interact</i>. 2023;7(CSCW2):1–54. doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>","ieee":"L. Simko, H. Sri Ramulu, T. Kohno, and Y. Acar, “The Use and Non-Use of Technology During Hurricanes,” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, pp. 1–54, 2023, doi: <a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","chicago":"Simko, Lucy, Harshini Sri Ramulu, Tadayoshi Kohno, and Yasemin Acar. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i> 7, no. CSCW2 (2023): 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>."},"intvolume":"         7","page":"1–54","issue":"CSCW2","title":"The Use and Non-Use of Technology During Hurricanes","doi":"10.1145/3610215","date_updated":"2024-06-05T13:53:38Z","author":[{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"id":"99000","full_name":"Sri Ramulu, Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","first_name":"Harshini"},{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2024-04-08T09:22:02Z","volume":7},{"year":"2023","issue":"4-5","quality_controlled":"1","title":"Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism","date_created":"2023-11-02T09:31:17Z","publication":"Critical Sociology","language":[{"iso":"eng"}],"page":"727-745","intvolume":"        50","citation":{"ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>. 2023;50(4-5):727-745. doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 727–745, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 727–45. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>.","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>, <i>50</i>(4–5), 727–745. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>","short":"C. Fuchs, Critical Sociology 50 (2023) 727–745.","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 727–45, doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={727–745} }"},"related_material":{"link":[{"url":"https://doi.org/10.1177/08969205231201050","relation":"supplementary_material","description":"Comment on the article (Graham Murdock)"},{"url":"https://doi.org/10.1177/08969205231201382 ","description":"Response to Graham Murdock","relation":"supplementary_material"}]},"publication_status":"published","doi":"10.1177/08969205231206488 ","main_file_link":[{"url":"https://doi.org/10.1177/08969205231206488 ","open_access":"1"}],"volume":50,"author":[{"first_name":"Christian","last_name":"Fuchs","orcid":"0000-0003-0589-4579","full_name":"Fuchs, Christian","id":"21863"}],"oa":"1","date_updated":"2024-06-10T05:13:22Z","status":"public","type":"journal_article","department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","_id":"48589","project":[{"name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation","_id":"1086"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}]},{"title":"Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock","date_created":"2023-11-02T09:36:35Z","year":"2023","issue":"4-5","quality_controlled":"1","language":[{"iso":"eng"}],"publication":"Critical Sociology","main_file_link":[{"url":"https://doi.org/10.1177/08969205231201382 ","open_access":"1"}],"doi":"10.1177/08969205231201382","author":[{"orcid":"0000-0003-0589-4579","last_name":"Fuchs","id":"21863","full_name":"Fuchs, Christian","first_name":"Christian"}],"volume":50,"date_updated":"2024-06-10T05:14:13Z","oa":"1","citation":{"chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 757–65. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>.","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 757–765, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>. 2023;50(4-5):757-765. doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>, <i>50</i>(4–5), 757–765. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={757–765} }","short":"C. Fuchs, Critical Sociology 50 (2023) 757–765.","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 757–65, doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>."},"intvolume":"        50","page":"757-765","related_material":{"link":[{"url":"https://doi.org/10.1177/08969205231206488 ","description":"Original article to which this article refers","relation":"supplementary_material"},{"relation":"supplementary_material","description":"Comment by Graham Murdock to which this article refers","url":"https://doi.org/10.1177/08969205231201050"}]},"publication_status":"published","user_id":"21863","department":[{"_id":"136"},{"_id":"11"}],"project":[{"name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation","_id":"1086"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}],"_id":"48590","status":"public","type":"journal_article"},{"date_updated":"2024-06-10T11:57:21Z","volume":940,"date_created":"2023-08-04T07:18:38Z","author":[{"last_name":"Heins","full_name":"Heins, Jonathan","first_name":"Jonathan"},{"first_name":"Jakob","last_name":"Bossek","orcid":"0000-0002-4121-4668","id":"102979","full_name":"Bossek, Jakob"},{"first_name":"Janina","full_name":"Pohl, Janina","last_name":"Pohl"},{"id":"105520","full_name":"Seiler, Moritz","last_name":"Seiler","first_name":"Moritz"},{"id":"100740","full_name":"Trautmann, Heike","orcid":"0000-0002-9788-8282","last_name":"Trautmann","first_name":"Heike"},{"last_name":"Kerschke","full_name":"Kerschke, Pascal","first_name":"Pascal"}],"title":"A study on the effects of normalized TSP features for automated algorithm selection","doi":"https://doi.org/10.1016/j.tcs.2022.10.019","publication_identifier":{"issn":["0304-3975"]},"year":"2023","page":"123-145","intvolume":"       940","citation":{"ama":"Heins J, Bossek J, Pohl J, Seiler M, Trautmann H, Kerschke P. A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>. 2023;940:123-145. doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>","chicago":"Heins, Jonathan, Jakob Bossek, Janina Pohl, Moritz Seiler, Heike Trautmann, and Pascal Kerschke. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i> 940 (2023): 123–45. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","ieee":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, and P. Kerschke, “A study on the effects of normalized TSP features for automated algorithm selection,” <i>Theoretical Computer Science</i>, vol. 940, pp. 123–145, 2023, doi: <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","short":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, P. Kerschke, Theoretical Computer Science 940 (2023) 123–145.","bibtex":"@article{Heins_Bossek_Pohl_Seiler_Trautmann_Kerschke_2023, title={A study on the effects of normalized TSP features for automated algorithm selection}, volume={940}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>}, journal={Theoretical Computer Science}, author={Heins, Jonathan and Bossek, Jakob and Pohl, Janina and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}, year={2023}, pages={123–145} }","mla":"Heins, Jonathan, et al. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i>, vol. 940, 2023, pp. 123–45, doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","apa":"Heins, J., Bossek, J., Pohl, J., Seiler, M., Trautmann, H., &#38; Kerschke, P. (2023). A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>, <i>940</i>, 123–145. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>"},"_id":"46310","department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","keyword":["Feature normalization","Algorithm selection","Traveling salesperson problem"],"language":[{"iso":"eng"}],"publication":"Theoretical Computer Science","type":"journal_article","abstract":[{"lang":"eng","text":"Classic automated algorithm selection (AS) for (combinatorial) optimization problems heavily relies on so-called instance features, i.e., numerical characteristics of the problem at hand ideally extracted with computationally low-demanding routines. For the traveling salesperson problem (TSP) a plethora of features have been suggested. Most of these features are, if at all, only normalized imprecisely raising the issue of feature values being strongly affected by the instance size. Such artifacts may have detrimental effects on algorithm selection models. We propose a normalization for two feature groups which stood out in multiple AS studies on the TSP: (a) features based on a minimum spanning tree (MST) and (b) nearest neighbor relationships of the input instance. To this end we theoretically derive minimum and maximum values for properties of MSTs and k-nearest neighbor graphs (NNG) of Euclidean graphs. We analyze the differences in feature space between normalized versions of these features and their unnormalized counterparts. Our empirical investigations on various TSP benchmark sets point out that the feature scaling succeeds in eliminating the effect of the instance size. A proof-of-concept AS-study shows promising results: models trained with normalized features tend to outperform those trained with the respective vanilla features."}],"status":"public"},{"title":"Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP","doi":"10.1109/SSCI52147.2023.10372008","date_updated":"2024-06-10T11:56:58Z","date_created":"2023-11-14T15:59:01Z","author":[{"first_name":"Moritz","last_name":"Seiler","id":"105520","full_name":"Seiler, Moritz"},{"first_name":"Jeroen","last_name":"Rook","full_name":"Rook, Jeroen"},{"first_name":"Jonathan","last_name":"Heins","full_name":"Heins, Jonathan"},{"first_name":"Oliver Ludger","last_name":"Preuß","orcid":"0009-0008-9308-2418","full_name":"Preuß, Oliver Ludger","id":"102978"},{"orcid":"0000-0002-4121-4668","last_name":"Bossek","full_name":"Bossek, Jakob","id":"102979","first_name":"Jakob"},{"orcid":"0000-0002-9788-8282","last_name":"Trautmann","id":"100740","full_name":"Trautmann, Heike","first_name":"Heike"}],"year":"2023","page":"361 - 368","citation":{"ieee":"M. Seiler, J. Rook, J. Heins, O. L. Preuß, J. Bossek, and H. Trautmann, “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP,” in <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, pp. 361–368, doi: <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>.","chicago":"Seiler, Moritz, Jeroen Rook, Jonathan Heins, Oliver Ludger Preuß, Jakob Bossek, and Heike Trautmann. “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP.” In <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 361–68, n.d. <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">https://doi.org/10.1109/SSCI52147.2023.10372008</a>.","ama":"Seiler M, Rook J, Heins J, Preuß OL, Bossek J, Trautmann H. Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP. In: <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>. ; :361-368. doi:<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>","short":"M. Seiler, J. Rook, J. Heins, O.L. Preuß, J. Bossek, H. Trautmann, in: 2023 IEEE Symposium Series on Computational Intelligence (SSCI), n.d., pp. 361–368.","mla":"Seiler, Moritz, et al. “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP.” <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, pp. 361–68, doi:<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>.","bibtex":"@inproceedings{Seiler_Rook_Heins_Preuß_Bossek_Trautmann, title={Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP}, DOI={<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>}, booktitle={2023 IEEE Symposium Series on Computational Intelligence (SSCI)}, author={Seiler, Moritz and Rook, Jeroen and Heins, Jonathan and Preuß, Oliver Ludger and Bossek, Jakob and Trautmann, Heike}, pages={361–368} }","apa":"Seiler, M., Rook, J., Heins, J., Preuß, O. L., Bossek, J., &#38; Trautmann, H. (n.d.). Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP. <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 361–368. <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">https://doi.org/10.1109/SSCI52147.2023.10372008</a>"},"publication_status":"accepted","extern":"1","language":[{"iso":"eng"}],"_id":"48898","department":[{"_id":"819"}],"user_id":"15504","abstract":[{"lang":"eng","text":"Automated Algorithm Configuration (AAC) usually takes a global perspective: it identifies a parameter configuration for an (optimization) algorithm that maximizes a performance metric over a set of instances. However, the optimal choice of parameters strongly depends on the instance at hand and should thus be calculated on a per-instance basis. We explore the potential of Per-Instance Algorithm Configuration (PIAC) by using Reinforcement Learning (RL). To this end, we propose a novel PIAC approach that is based on deep neural networks. We apply it to predict configurations for the Lin\\textendash Kernighan heuristic (LKH) for the Traveling Salesperson Problem (TSP) individually for every single instance. To train our PIAC approach, we create a large set of 100000 TSP instances with 2000 nodes each \\textemdash currently the largest benchmark set to the best of our knowledge. We compare our approach to the state-of-the-art AAC method Sequential Model-based Algorithm Configuration (SMAC). The results show that our PIAC approach outperforms this baseline on both the newly created instance set and established instance sets."}],"status":"public","publication":"2023 IEEE Symposium Series on Computational Intelligence (SSCI)","type":"conference"}]
