Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Softwaretechnik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2722
  • 0261/287-2721
Publikationen
Ergebnisse pro Seite:  10

Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.

Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278



Beckers, Kristian; Hirsch, Martin; Jürjens, Jan

Compliance in Clouds: A cloud computing security perspective

GI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26


Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37


Sheikh Sadi, Muhammad; G. Myers, D.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk.

Comput. Syst. Sci. Eng. Bd. 25. H. 5. 2010


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93


Hilde Houmb, Siv; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.

Requir. Eng. Bd. 15. H. 1. 2010 S. 63 - 93


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols

Fabio Massacci;Dan Wallach;Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95 (Lecture Notes in Computer Science)


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols.

ESSoS. 2010 S. 79 - 95