Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Felderer, Michael; Katt, Basel; Kalb, Philipp et al.
Evolution of Security Engineering Artifacts: A State of the Art SurveyInternational Journal of Secure Software Engineering. Bd. 5. H. 4. Hershey, PA: IGI Global 2014 S. 48 - 98
Roylance, Rebecca; Endesfelder, David; Jamal-Hanjani, Mariam et al.
Expression of regulators of mitotic fidelity are associated with intercellular heterogeneity and chromosomal instability in primary breast cancerBreast cancer research and treatment. Bd. 148. Dordrecht: Springer Science + Business Media B.V. 2014 S. 221 - 229
Jürjens, Jan
Geschäftsprozesse in der Cloud -- aber sicher! (... und compliant)Software Engineering + Architecture (SEACON 2014). 2014 S. 1 - 83
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a general-purpose C verifier to prove cryptographic protocolsJournal of Computer Security. Bd. 22. H. 5. Amsterdam: IOS Press 2014 S. 823 - 866
Sofronie-Stokkermans, Viorica
Hierarchical Reasoning in Local Theory Extensions and ApplicationsFranz Winkler; Viorel Negru; Tetsuo Ida; Tudor Jebelean; Dana Petcu; Stephen Watt; Daniela Zaharie (Hrsg). Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing SYNASC 2014; 22-25 September 2014; Timisoara, Romania. Los Alamitos, CA: IEEE Computer Society 2014 S. 34 - 41
Scheglmann, Stefan; Lämmel, Ralf; Leinberger, Martin et al.
IDE Integrated RDF Exploration, Access and RDF-Based Code Typing with LITEQValentina Presutti; Claudia d’Amato; Fabien Gandon; Mathieu d’Aquin; Steffen Staab; Anna Tordai (Hrsg). The Semantic Web: Trends and Challenges; 11th International Conference, ESWC 2014, Anissaras, Crete, Greece, May 25-29, 2014. Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 505 - 510
Loepp, Benedikt; Ziegler, Jürgen
Komplexe Präferenzprofile für intermodale NavigationMichael Koch;Andreas Butz;Johann Schlichter (Hrsg). Mensch und Computer 2014 – Workshopband: 14. Fachübergreifende Konferenz für Interaktive und Kooperative Medien – Interaktiv unterwegs - Freiräume gestalten; 31. August bis 3. September 2014 in München. Berlin: De Gruyter Oldenbourg 2014 S. 191 - 198
Horbach, Matthias; Sofronie-Stokkermans, Viorica
Locality Transfer: From Constrained Axiomatizations to Reachability PredicatesStéphane Demri; Deepak Kapur; Christoph Weidenbach (Hrsg). Automated Reasoning: 7th International Joint Conference, IJCAR 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 19-22, 2014. Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 192 - 207
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Maintaining Requirements for Long-Living Software Systems by Incorporating Security KnowledgeTony Gorschek; Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112