Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2017 | Conference Paper | LibreCat-ID: 46359
Carnein M, Assenmacher D, Trautmann H. Stream Clustering of Chat Messages with Applications to Twitch Streams. In: de Cesare S, Ulrich F, eds. Proceedings of the 36$^th$ International Conference on Conceptual Modeling (ER’17). Springer International Publishing; 2017:79–88. doi:10.1007/978-3-319-70625-2_8
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 46362
Grimme C, Preuss M, Adam L, Trautmann H. Social Bots: Human-Like by Means of Human Control? Big Data. 2017;5(4):279–293. doi:10.1089/big.2017.0044
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 46358
Carnein M, Assenmacher D, Trautmann H. An Empirical Comparison of Stream Clustering Algorithms. In: Proceedings of the ACM International Conference on Computing Frontiers (CF ’17). ; 2017:361–365. doi:10.1145/3075564.3078887
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 48863
Bossek J. Ecr 2.0: A Modular Framework for Evolutionary Computation in R. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion. GECCO ’17. Association for Computing Machinery; 2017:1187–1193. doi:10.1145/3067695.3082470
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 48857
Bossek J, Grimme C. A Pareto-Beneficial Sub-Tree Mutation for the Multi-Criteria Minimum Spanning Tree Problem. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI). ; 2017:1–8. doi:10.1109/SSCI.2017.8285183
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 48856
Bossek J, Grimme C. An Extended Mutation-Based Priority-Rule Integration Concept for Multi-Objective Machine Scheduling. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI). ; 2017:1–8. doi:10.1109/SSCI.2017.8285224
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 48864
Bossek J. mcMST: A Toolbox for the Multi-Criteria Minimum Spanning Tree Problem. Journal of Open Source Software. 2017;2(17):374. doi:10.21105/joss.00374
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 48865
Bossek J. Smoof: Single- and Multi-Objective Optimization Test Functions. The R Journal. 2017;9(1):103–113.
LibreCat
 

2017 | Journal Article | LibreCat-ID: 48837
Bischl B, Richter J, Bossek J, Horn D, Thomas J, Lang M. mlrMBO: A Modular Framework for Model-Based Optimization of Expensive Black-Box Functions. CoRR. Published online 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 6721 | OA
Heindorf S, Potthast M, Bast H, Buchhold B, Haussmann E. WSDM Cup 2017: Vandalism Detection and Triple Scoring. In: WSDM. ACM; 2017:827-828. doi:10.1145/3018661.3022762
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 47249
Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM; 2017. doi:10.1145/3133956.3134059
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 47309
Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur Priv. 2017;15(2):50–60. doi:10.1109/MSP.2017.24
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47245
Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In: Fernandez JM, Payer M, eds. 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017. USENIX Association; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 47243
Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE Computer Society; 2017:121–136. doi:10.1109/SP.2017.31
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47250
Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting Android Developers in Writing Secure Code. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM; 2017. doi:10.1145/3133956.3133977
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47248
Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need Support, Too: A Survey of Security Advice for Software Developers. In: 2017 IEEE Cybersecurity Development (SecDev). IEEE; 2017. doi:10.1109/secdev.2017.17
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47242
Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: 2016 IEEE Cybersecurity Development (SecDev). IEEE; 2017. doi:10.1109/secdev.2016.013
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47246
Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE; 2017. doi:10.1109/sp.2017.52
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47244
Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017. USENIX Association; 2017:81–95.
LibreCat
 

2017 | Report | LibreCat-ID: 47873
Redmiles EM, Acar Y, Fahl S, Mazurek ML. A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. University of Maryland Computer Science Department; 2017. doi:10.13016/M22K2W
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed