Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Jürjens, Jan
Model-based Security Engineering with UMLAlessandro Aldini; Roberto Gorrieri; Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures. Berlin: Springer 2005 S. 42 - 77
Botaschanjan, Jewgenij; Jürjens, Jan
MoDll: Modeling and Analyzing Time-ConstraintsJerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 299 - 306
Frey, Hannes; Görgen, Daniel
Planar graph routing on geographical clustersAd Hoc Networks. Bd. 3. H. 5. Amsterdam: Elsevier 2005 S. 560 - 574
Zöbel, Dieter; Polock, David
Priority Inheritance Revisited. Towards the conformance of real-time protocolsTechnique et Science Informatiques. Bd. 24. H. 8. Paris: Edition Hermès 2005 S. 939 - 961
Jürjens, Jan
Return on Security Investment - TutorialInfotage. Starnberger See. 2005
Jürjens, Jan; Golesteanu, Catinca
Reverse EngineeringMünchen: Technische Universität München, Institut für Informatik 2005 S. 1 - 49
Jürjens, Jan
Secure Systems Development with UMLBerlin: Springer 2005
Jürjens, Jan
Sound Methods and Effective Tools for Model-based Security Engineering with UMLGruia-Catalin Roman; William Griswold; Bashar Nuseibeh (Hrsg). Proceedings of the 27th International Conference on Software Engineering ICSE 2005: May 15. - 21., 2005; St. Louis; MO, USA. New York, NY: ACM Association for Computing Machinery 2005 S. 322 - 331
Jürjens, Jan
Testing Critical and Embedded Systems: Tutorial6th International Conference on Software Testing (ICSTEST 2005), April 6--8, 2005, Düsseldorf, German, Tutorial. 2005