Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Taubenberger, S.; Jürjens, Jan

Studie zu IT-Risikobewertungen in der Praxis

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 235 - 247


Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.

Supporting Requirements Engineers in Recognising Security Issues

Daniel Berry; Xavier Franch (Hrsg). Requirements Engineering: Foundation for Software Quality; 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings. Berlin: Springer 2011 S. 4 - 18


Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.

Systematic Development of UMLsec Design Models Based on Security Requirements

Dimitra Giannakopoulou; Fernando Orejas (Hrsg). Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Berlin: Springer 2011 S. 232 - 246



Scott, David; Guo, Jinlin; Foley, Colum et al.

TRECVid 2011 Experiments at Dublin City University

Paul Over;George Awad;Jonathan G. Fiscus;Brian Antonishek;Martial Michel;Alan F. Smeaton;Wessel Kraaij;Georges Quénot (Hrsg). Proceedings of the 2011 TREC Video Retrieval Evaluation, TRECVID 2011, Gaithersburg, MD, USA, December 5-7, 2011. Gaithersburg, MD: NIST National Institute of Standards and Technology 2011 S. 1 - 9


Schmidt, Holger; Jürjens, Jan

UMLsec4UML2 - Adopting UMLsec to Support UML2: Using UMLsec4UML2 for the Specification of Architectural Security Patterns

Dortmund: Technische Universität Dortmund 2011 S. 1 - 17


Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori et al.

Using Security Patterns to Develop Secure Systems

Haralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 16 - 31


Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge

Gilles Barthe; Anupam Datta; Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20


Bürckert, Hans-Jürgen; Furbach, Ulrich

Vom Schmuddelkind zum Fachbereich

Künstliche Intelligenz. Bd. 25. H. 4. Berlin: Springer 2011 S. 329 - 331


Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.

Werkzeuggestützte Identifikation von IT-Sicherheitsrisiken

Peter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278