Home > Research > LANCASTER UNIVERSITY LEIPZIG > Publications & Outputs
View graph of relations

LANCASTER UNIVERSITY LEIPZIG

  1. 2010
  2. Published

    Pattern-based customisable transformations for style-based service architecture evolution

    Ahmad, A. & Pahl, C., 22/11/2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. IEEE, p. 371-376 6 p. 5643631. (2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2011
  4. Published

    Customisable transformation-driven evolution for service architectures

    Ahmad, A. & Pahl, C., 5/04/2011, Proceedings - 2011 15th European Conference on Software Maintenance and Reengineering, CSMR 2011. IEEE, p. 373-376 4 p. 5741350. (Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. 2012
  6. Published

    Graph-based pattern identification from architecture change logs

    Ahmad, A., Jamshidi, P. & Pahl, C., 2012, Advanced Information Systems EngineeringWorkshops - CAiSE 2012 International Workshops, Proceedings. Bajec, M. & Eder, J. (eds.). Berlin: Springer-Verlag, p. 200-213 14 p. (Lecture Notes in Business Information Processing; vol. 112 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Pattern-driven reuse in architecture-centric evolution for service software

    Ahmad, A., Jamshidi, P. & Pahl, C., 24/07/2012, ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends. SciTePress, p. 279-284 6 p. (ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Graph-based implicit knowledge discovery from architecture change logs

    Ahmad, A., Jamshidi, P., Arshad, M. & Pahl, C., 20/08/2012, Joint 10th Working Conference on Software Architecture, WICSA 2012 and 6th European Conference on Software Architecture, ECSA 2012 - Proceedings Companion Volume. New York: The Association for Computing Machinery, p. 116-123 8 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. 2013
  10. Published

    A framework for classifying and comparing architecture-centric software evolution research

    Jamshidi, P., Ghafari, M., Ahmad, A. & Pahl, C., 8/03/2013, Proceedings of the 17th European Conference on Software Maintenance and Reengineering, CSMR 2013. IEEE, p. 305-314 10 p. 6498478. (Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Cloud Migration Research: A Systematic Review

    Jamshidi, P., Ahmad, A. & Pahl, C., 31/12/2013, In: IEEE Transactions on Cloud Computing. 1, 2, p. 142-157 16 p., 6624108.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. 2014
  13. Published

    A framework for architecture-driven migration of legacy systems to cloud-enabled software

    Ahmad, A. & Babar, M. A., 7/04/2014, 11th Working IEEE/IFIP Conference on Software Architecture, WICSA 2014 - Proceedings. The Association for Computing Machinery, p. 1-8 8 p. 7. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Towards a pattern language for self-adaptation of cloud-based architectures

    Ahmad, A. & Babar, M. A., 7/04/2014, 11th Working IEEE/IFIP Conference on Software Architecture, WICSA 2014 - Proceedings. New York: The Association for Computing Machinery, p. 1-8 8 p. 7. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Autonomic resource provisioning for cloud-based software

    Jamshidi, P., Ahmad, A. & Pahl, C., 2/06/2014, 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 - Proceedings. The Association for Computing Machinery, p. 95-104 10 p. (9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Classification and comparison of architecture evolution reuse knowledge - A systematic review

    Ahmad, A., Jamshidi, P. & Pahl, C., 18/07/2014, In: Journal of Software: Evolution and Process. 26, 7, p. 654-691 38 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 20/11/2014, 2014 IEEE Symposium on Security and Privacy. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. 2015
  19. Published

    SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

    Fett, D., Küsters, R. & Schmitz, G., 7/08/2015

    Research output: Other contribution

  20. Published

    SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

    Fett, D., Küsters, R. & Schmitz, G., 12/10/2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15. New York: ACM, p. 1358-1369 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    On the Complexity of Frequent Subtree Mining in Very Simple Structures.

    Welke, P., Horváth, T. & Wrobel, S., 27/12/2015, Springer Switerzland. Springer Nature, Vol. 9046. p. 194-209 (Lecture Notes in Computer Science; vol. 9046).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. 2016
  23. Published

    A Comprehensive Formal Security Analysis of OAuth 2.0.

    Fett, D., Küsters, R. & Schmitz, G., 2016

    Research output: Other contribution

  24. Published

    Pi and More: Eine Veranstaltungsreihe rund um "kleine Computer"

    Fett, D. & Schmitz, G., 2016, Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

    Fett, D., Küsters, R. & Schmitz, G., 13/01/2016, Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham: Springer, (Lecture Notes in Computer Science; vol. 9326).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Probabilistic Frequent Subtree Kernels.

    Welke, P., Horváth, T. & Wrobel, S., 18/05/2016, Probabilistic Frequent Subtree Kernels.. Springer, Cham, Vol. 9067. p. 179-193 14 p. (Lecture Notes in Computer Science; vol. 9607).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Differentiating smartphone users by app usage.

    Welke, P., Andone, I., Blaszkiewicz, K. & Markowetz, A., 12/09/2016, Differentiating smartphone users by app usage.. The Association for Computing Machinery, p. 519-523 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Ligand Affinity Prediction with Multi-pattern Kernels.

    Ullrich, K., Mack, J. & Welke, P., 21/09/2016, Ligand Affinity Prediction with Multi-pattern Kernels.. Springer Nature, p. 474-489 15 p. (Lecture Notes in Computer Science; vol. 9956).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Min-Hashing for Probabilistic Frequent Subtree Feature Spaces.

    Welke, P., Horváth, T. & Wrobel, S., 21/09/2016, Min-Hashing for Probabilistic Frequent Subtree Feature Spaces.. 1 ed. Springer, Cham, Vol. 9956. p. 67-82 15 p. (Lecture Notes in Computer Science; vol. 9956).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    A comprehensive formal security analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24/10/2016, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 1204-1215

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    DNSSEC Misconfigurations in Popular Domains

    Dai, T., Shulman, H. & Waidner, M., 28/10/2016, Cryptology and Network Security. CANS 2016.. Foresti, S. & Persiano, G. (eds.). Cham: Springer, p. 651-660 10 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Software architectures for robotic systems: A systematic mapping study

    Ahmad, A. & Babar, M. A., 1/12/2016, In: Journal of Systems and Software. 122, p. 16-39 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Three-hop distance estimation in social graphs.

    Welke, P., Markowetz, A., Suel, T. & Christoforaki, M., 5/12/2016, Three-hop distance estimation in social graphs.. IEEE, p. 1048-1055 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. 2017
  35. Published

    Index Appearance Record for Transforming Rabin Automata into Parity Automata.

    Kretínský, J., Meggendorfer, T., Waldmann, C. & Weininger, M., 31/03/2017, TACAS 2017: Tools and Algorithms for the Construction and Analysis of Systems. Springer, p. 443-460 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Decision Theory Meets Linear Optimization Beyond Computation

    Jansen, C., Schollmeyer, G. & Augustin, T., 15/06/2017, Symbolic and Quantitative Approaches to Reasoning with Uncertainty: 14th European Conference, ECSQARU 2017, Lugano, Switzerland, July 10–14, 2017, Proceedings. Antonucci, A., Cholvy, L. & Papini, O. (eds.). Cham: Springer, p. 329-339 11 p. (Lecture Notes in Computer Science; vol. 10369).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Value Iteration for Long-Run Average Reward in Markov Decision Processes.

    Ashok, P., Chatterjee, K., Daca, P., Kretínský, J. & Meggendorfer, T., 13/07/2017, CAV 2017: Computer Aided Verification . Majumdar, R. & Kunčak, V. (eds.). Cham: Springer, p. 201-221 21 p. (Lecture Notes in Computer Science ; vol. 10426).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A simple descriptive method for multidimensional item response theory based on stochastic dominance

    Schollmeyer, G., Jansen, C. & Augustin, T., 31/08/2017, Technical Reports, Department of Statistics, LMU Munich, 210 30 p.

    Research output: Contribution to specialist publicationTechnical Reportpeer-review

  39. Published

    Detecting stochastic dominance for poset-valued random variables as an example of linear programming on closure systems

    Schollmeyer, G., Jansen, C. & Augustin, T., 31/08/2017, Technical Reports, Department of Statistics, LMU Munich, 209 69 p.

    Research output: Contribution to specialist publicationTechnical Reportpeer-review

  40. Published
  41. Published

    Efficient Strategy Iteration for Mean Payoff in Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 27/09/2017, ATVA 2017: Automated Technology for Verification and Analysis . Springer, p. 380-399 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines

    Fett, D., Küsters, R. & Schmitz, G., 28/09/2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. 2018
  44. Published

    Owl: A Library for ω-Words, Automata, and LTL.

    Kretínský, J., Meggendorfer, T. & Sickert, S., 2018, ATVA 2018: Automated Technology for Verification and Analysis. Springer, p. 543-550 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Conditional Value-at-Risk for Reachability and Mean Payoff in Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 9/07/2018, LICS. p. 609-618 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Rabinizer 4: From LTL to Your Favourite Deterministic Automaton.

    Kretínský, J., Meggendorfer, T., Sickert, S. & Ziegler, C., 18/07/2018, CAV 2018: Computer Aided Verification . Springer, p. 567-577 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    IoT-based implementation and mobility-driven management of the smart and energy efficient home appliance ecosystem

    Ahmad, A., Altamimi, A. B. & Alshammari, M. T., 22/07/2018, Smart Societies, Infrastructure, Technologies and Applications - First International Conference, SCITA 2017, Proceedings. Mehmood, R., Katib, I., Chlamtac, I. & Bhaduri, B. (eds.). Springer-Verlag, p. 353-356 4 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 224).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Concepts for decision making under severe uncertainty with partial ordinal and partial cardinal preferences

    Jansen, C., Schollmeyer, G. & Augustin, T., 31/07/2018, In: International Journal of Approximate Reasoning. 98, p. 112-131 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Mining Tree Patterns with Partially Injective Homomorphisms.

    Schulz, T. H., Horváth, T., Welke, P. & Wrobel, S., 14/09/2018, Mining Tree Patterns with Partially Injective Homomorphisms.. Springer, Cham, Vol. 11052. p. 585-601 16 p. (Lecture Notes in Computer Science; vol. 11052).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Domain Validation++ For MitM-Resilient PKI

    Brandt, M., Dai, T., Klein, A., Shulman, H. & Waidner, M., 15/10/2018, ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 2060-2076 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Off-Path Attacks Against PKI

    Dai, T., Shulman, H. & Waidner, M., 15/10/2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 2213-2215 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  52. Published

    Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures

    Ahmad, A., Pahl, C., Altamimi, A. B. & Alreshidi, A., 1/11/2018, In: Journal of Computer Science and Technology. 33, 6, p. 1278-1306 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    A probabilistic evaluation framework for preference aggregation reflecting group homogeneity

    Jansen, C., Schollmeyer, G. & Augustin, T., 30/11/2018, In: Mathematical Social Sciences. 96, p. 49-62 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Probabilistic frequent subtrees for efficient graph classification and retrieval

    Welke, P., Horváth, T. & Wrobel, S., 30/11/2018, In: Machine Learning. 107, 11, p. 1847-1873 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. 2019
  56. Published
  57. Published

    A mobile cloud framework for context-aware and portable recommender system for smart markets

    Khan, A., Ahmad, A., Rahman, A. U. & Alkhalil, A., 21/06/2019, EAI/Springer Innovations in Communication and Computing. Mehmood, R., See, S., Katib, I. & Chlamtac, I. (eds.). Cham: Springer, p. 283-309 27 p. (EAI/Springer Innovations in Communication and Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. Published

    Architecting software for the Internet of Thing based systems

    Alreshidi, A. & Ahmad, A., 10/07/2019, In: Future Internet. 11, 7, 153.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  59. Published

    Probabilistic and exact frequent subtree mining in graphs beyond forests

    Welke, P., Horváth, T. & Wrobel, S., 15/07/2019, In: Machine Learning. 108, 7, p. 1137-1164 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Of Cores: A Partial-Exploration Framework for Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 1/08/2019, 30th International Conference on Concurrency Theory, CONCUR 2019. Fokkink, W. & van Glabbeek, R. (eds.). p. 1-17 17 p. 5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 140).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Semantic Labelling and Learning for Parity Game Solving in LTL Synthesis.

    Kretínský, J., Manta, A. & Meggendorfer, T., 21/10/2019, Automated Technology for Verification and Analysis- 17th International Symposium, AVTA 2019, Proceedings. Chen, Y.-F., Cheng, C.-H. & Esparza, J. (eds.). p. 404-422 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11781 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Software architecture for mobile cloud computing systems

    Alreshidi, A., Ahmad, A., Altamimi, A. B., Sultan, K. & Mehmood, R., 13/11/2019, In: Future Internet. 11, 11, 238.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Cloud-based detection of road bottlenecks using obd-ii telematics

    Sohail, A. M., Khattak, K. S., Iqbal, A., Khan, Z. H. & Ahmad, A., 29/11/2019, Proceedings - 22nd International Multitopic Conference, INMIC 2019. Institute of Electrical and Electronics Engineers Inc., 9022754. (Proceedings - 22nd International Multitopic Conference, INMIC 2019).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Satisfiability Bounds for ω-Regular Properties in Bounded-Parameter Markov Decision Processes.

    Weininger, M., Meggendorfer, T. & Kretínský, J., 11/12/2019, 2019 IEEE 58th Conference on Decision and Control, CDC 2019. p. 2284-2291 8 p. 9029460. (Proceedings of the IEEE Conference on Decision and Control; vol. 2019-December).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. 2020
  66. Published

    Efficient Frequent Subtree Mining Beyond Forests

    Welke, P., 30/06/2020, IOS Press. 188 p. (Dissertations in Artificial Intelligence; vol. 348)

    Research output: Book/Report/ProceedingsBook

  67. Published

    Classification and Mapping of Adaptive Security for Mobile Computing

    Sajjad, M., Ahmad, A., Malik, A. W., Altamimi, A. B. & Alseadoon, I., 1/07/2020, In: IEEE Transactions on Emerging Topics in Computing. 8, 3, p. 814-832 19 p., 8252799.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    HOPS: Probabilistic Subtree Mining for Small and Large Graphs.

    Welke, P., Seiffarth, F., Kamp, M. & Wrobel, S., 20/08/2020, p. 1275-1284.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  69. Published

    Of Cores: A Partial-Exploration Framework for Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 1/10/2020, In: Log. Methods Comput. Sci.. 16, 4, 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Efficient Frequent Subgraph Mining in Transactional Databases.

    Welke, P., 9/10/2020, Efficient Frequent Subgraph Mining in Transactional Databases.. IEEE, p. 307-314 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Multiple Texts as a Limiting Factor in Online Learning: Quantifying (Dis-)similarities of Knowledge Networks across Languages

    Mehler, A., Hemati, W., Welke, P., Konca, M. & Uslu, T., 3/11/2020, In: Frontiers in Education. 5, 562670.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    An empirical study on developing secure mobile health apps: The developers' perspective

    Aljedaani, B., Ahmad, A., Zahedi, M. & Babar, M. A., 1/12/2020, Proceedings - 2020 27th Asia-Pacific Software Engineering Conference, APSEC 2020. IEEE Computer Society Press, p. 208-217 10 p. 9359266. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC; vol. 2020-December).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Security awareness of end-users of mobile health applications: An empirical study

    Aljedaani, B., Ahmad, A., Zahedi, M. & Ali Babar, M., 7/12/2020, Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2020. The Association for Computing Machinery, p. 125-136 12 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study

    Iwaya, L. H., Ahmad, A. & Ali Babar, M., 31/12/2020, In: IEEE Access. 8, p. 150081-150112 32 p., 9165743.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. 2021
  76. Published

    A Generalized Weisfeiler-Lehman Graph Kernel

    Schulz, T. H., Horváth, T., Welke, P. & Wrobel, S., 20/01/2021, Arxiv.

    Research output: Working paperPreprint

  77. Published

    Decision Snippet Features

    Welke, P., Alkhoury, F., Bauckhage, C. & Wrobel, S., 5/05/2021, 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, p. 4260-4267 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Explainable Machine Learning with Prior Knowledge: An Overview

    Beckh, K., Müller, S., Jakobs, M., Toborek, V., Tan, H., Fischer, R., Welke, P., Houben, S. & von Rueden, L., 21/05/2021, Arxiv.

    Research output: Working paperPreprint

  79. Published

    On the nature of issues in five open source microservices systems: An empirical study

    Waseem, M., Liang, P., Shahin, M., Ahmad, A. & Nassab, A. R., 21/06/2021, Proceedings of EASE 2021 - Evaluation and Assessment in Software Engineering. The Association for Computing Machinery, p. 201-210 10 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    DNS-over-TCP considered vulnerable

    Dai, T., Shulman, H. & Waidner, M., 24/07/2021, ANRW 2021 - Proceedings of the 2021 Applied Networking Research Workshop. New York: ACM, p. 76-81 6 p. (ANRW 2021 - Proceedings of the 2021 Applied Networking Research Workshop).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    From IP to transport and beyond: cross-layer attacks against applications

    Dai, T., Jeitner, P., Shulman, H. & Waidner, M., 9/08/2021, SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference. New York: ACM, p. 836-849 14 p. (SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources

    Dai, T., Jeitner, P., Shulman, H. & Waidner, M., 13/08/2021, 30th USENIX Security Symposium (USENIX Security 21).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Poster: Fragmentation Attacks on DNS over TCP

    Dai, T., Shulman, H. & Waidner, M., 4/10/2021, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Poster: Off-path VoIP Interception Attacks

    Dai, T., Shulman, H. & Waidner, M., 4/10/2021, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Graph Filtration Kernels

    Schulz, T. H., Welke, P. & Wrobel, S., 22/10/2021, Arxiv.

    Research output: Working paperPreprint

  86. Published

    Special Issue on IoT for Fighting COVID-19

    Boldrini, C., Ahmad, A., Fahmideh, M., Ramadan, R. & Younis, M., 31/10/2021, In: Pervasive and Mobile Computing. 77, 101492.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  87. Published

    DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 4/11/2021, 2021 IEEE European Symposium on Security and Privacy, (Euro S & P) 2021. IEEE, p. 523-542 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Let's Downgrade Let's Encrypt

    Dai, T., Shulman, H. & Waidner, M., 12/11/2021, Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1421 - 1440

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13/11/2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 2601-2617 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    A Tutorial-Style Introduction to DY*

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 19/11/2021, Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. Dougherty, D., Meseguer, J., Mödersheim, S. A. & Rowe, P. (eds.). Cham: Springer, p. 77-97 21 p. (Lecture Notes in Computer Science ; vol. 13066).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  91. Published

    SMap: Internet-wide Scanning for Spoofing

    Dai, T. & Shulman, H., 6/12/2021, ACSAC '21: Proceedings of the 37th Annual Computer Security Applications Conference. New York: ACM, p. 1039-1050 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Software Engineering for IoT-Driven Data Analytics Applications

    Ahmad, A., Fahmideh, M., Altamimi, A. B., Katib, I., Albeshri, A., Alreshidi, A., Alanazi, A. A. & Mehmood, R., 31/12/2021, In: IEEE Access. 9, p. 48197-48217 21 p., 9374926.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    SUSAN: The Structural Similarity Random Walk Kernel

    Kalofolias, J., Welke, P. & Vreeken, J., 31/12/2021, Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). Demeniconi, C., Davidson, I., Akoglu, L. & Terzi, E. (eds.). SIAM PUBLICATIONS, p. 298-306 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. 2022
  95. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 26/04/2022, In: IT - Information Technology. 64, 1-2, p. 43-48 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Personalmanagement

    Stargardt, T., Kotter, P. M., Dorn, T., Albrecht, C., Edwards, D. R., Winter, C., Oswald, J., Schmidt-Rettig, B., Kopetsch, T., Wende, D., Golubinski, V., Hoogestraat, F., Wild, E.-M., Winter, V., Kirchner, L., Blobner, M., Brunner, J. O., Gross, C. N. & Schoenfelder, J., 24/05/2022, Management im Gesundheitswesen. Busse, R., Schreyögg, J. & Stargardt, T. (eds.). Heidelberg: Springer, p. 437-527 91 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  97. Published

    Information efficient learning of complexly structured preferences: Elicitation procedures and their application to decision making under uncertainty

    Jansen, C., Blocher, H., Augustin, T. & Schollmeyer, G., 31/05/2022, In: International Journal of Approximate Reasoning. 144, p. 69-91 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Ethics of AI: A Systematic Literature Review of Principles and Challenges

    Khan, A. A., Badshah, S., Liang, P., Waseem, M., Khan, B., Ahmad, A., Fahmideh, M., Niazi, M. & Akbar, M. A., 13/06/2022, Proceedings of the ACM International Conference on Evaluation and Assessment in Software Engineering, EASE 2022. New York: The Association for Computing Machinery, p. 383-392 10 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Decision Models for Selecting Patterns and Strategies in Microservices Systems and their Evaluation by Practitioners

    Waseem, M., Liang, P., Ahmad, A., Shahin, M., Khan, A. A. & Márquez, G., 17/06/2022, Proceedings - 2022 ACM/IEEE 44th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2022. IEEE Computer Society Press, p. 135-144 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Graph Filtration Kernels

    Schulz, T. H., Welke, P. & Wrobel, S., 28/06/2022, p. 8196-8203. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  101. Published

    Risk-Aware Stochastic Shortest Path

    Meggendorfer, T., 28/06/2022, AAAI-22 Technical Tracks 9. p. 9858-9867 10 p. (Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022; vol. 36).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  102. Published

    Decision making with state-dependent preference systems

    Jansen, C. & Augustin, T., 4/07/2022, Information Processing and Management of Uncertainty in Knowledge-Based Systems. Cham: Springer, ( Communications in Computer and Information Science; vol. 1601).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  103. Published

    Statistical Models for Partial Orders Based on Data Depth and Formal Concept Analysis

    Blocher, H., Schollmeyer, G. & Jansen, C., 4/07/2022, Information Processing and Management of Uncertainty in Knowledge-Based Systems. Ciucci, D., Couso, I., Medina, J., Ślęzak, D., Petturiti, D., Bouchon-Meunier, B. & Yager, R. R. (eds.). Cham: Springer, (Communications in Computer and Information Sciences; vol. 1602).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  104. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 27/07/2022, 43rd IEEE Symposium on Security and Privacy (S&P 2022). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  105. Published

    A generalized Weisfeiler-Lehman graph kernel

    Schulz, T. H., Horváth, T., Welke, P. & Wrobel, S., 31/07/2022, In: Machine Learning. 111, 7, p. 2601-2629 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  106. Published

    Software Engineering for Internet of Things: The Practitioners' Perspective

    Fahmideh, M., Ahmad, A., Behnaz, A., Grundy, J. & Susilo, W., 1/08/2022, In: IEEE Transactions on Software Engineering. 48, 8, p. 2857-2878 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  107. Published

    Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs

    Chatterjee, K., Goharshady, A. K., Meggendorfer, T. & Žikelić, Đ., 7/08/2022, Computer Aided Verification - 34th International Conference, CAV 2022, Proceedings. Shoham, S. & Vizel, Y. (eds.). Cham: Springer, p. 55-78 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13371 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  108. Published

    Towards Process Centered Architecting for Quantum Software Systems

    Ahmad, A., Khan, A. A., Waseem, M., Fahmideh, M. & Mikkonen, T., 18/08/2022, Proceedings - 2022 IEEE International Conference on Quantum Software, QSW 2022. Ali, S., Ardagna, C. A., Barzen, J., Bian, H., Chang, C. K., Chang, R. N., Damiani, E., Faro, I., Feld, S., Leymann, F., Martin-Fernandez, F. J., Ward, R., Wimmer, M., Xhafa, F., Yu, J. & Zhang, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 26-31 6 p. (Proceedings - 2022 IEEE International Conference on Quantum Software, QSW 2022).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  109. Published

    A New Aligned Simple German Corpus

    Toborek, V., Busch, M., Boßert, M., Bauckhage, C. & Welke, P., 2/09/2022, Arxiv.

    Research output: Working paperPreprint

  110. Published

    Anytime Guarantees for Reachability in Uncountable Markov Decision Processes.

    Grover, K., Kretínský, J., Meggendorfer, T. & Weininger, M., 6/09/2022, 33rd International Conference on Concurrency Theory, CONCUR 2022. Klin, B., Lasota, S. & Muscholl, A. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 11:1-11:20 20 p. 11. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 243).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  111. Published

    Risk aversion over finite domains

    Baccelli, J., Schollmeyer, G. & Jansen, C., 30/09/2022, In: Theory and Decision. 93, p. 371-397 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  112. Published

    PET - A Partial Exploration Tool for Probabilistic Verification.

    Meggendorfer, T., 21/10/2022, Automated Technology for Verification and Analysis - 20th International Symposium, ATVA 2022, Proceedings. Bouajjani, A., Holík, L. & Wu, Z. (eds.). p. 320-326 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13505 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  113. Published

    Index appearance record with preorders

    Kretínský, J., Meggendorfer, T., Waldmann, C. & Weininger, M., 31/10/2022, In: Acta Informatica. 59, 5, p. 585-618 34 p., 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 Next

Back to top