Follow
Jan-Christoph Küster
Jan-Christoph Küster
ANU-NICTA PhD Student
Verified email at anu.edu.au - Homepage
Title
Cited by
Cited by
Year
From propositional to first-order monitoring
A Bauer, JC Küster, G Vegliach
International Conference on Runtime Verification, 59-75, 2013
762013
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
662011
Runtime Verification meets Android Security
A Bauer, JC Küster, G Vegliach
452012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
302012
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
Requirements Engineering: Foundation for Software Quality: 18th …, 2012
252012
The ins and outs of first-order runtime verification
A Bauer, JC Küster, G Vegliach
Formal Methods in System Design 46 (3), 286-316, 2015
232015
Monitoring real android malware
JC Küster, A Bauer
Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015
142015
Platform-Centric Android Monitoring---Modular and Efficient
JC Küster, A Bauer
arXiv preprint arXiv:1406.2041, 2014
62014
Runtime verification on data-carrying traces
JC Küster
The Australian National University, 2016
52016
From propositional to first-order monitoring
JC Küster
Robotfußballer im virtuellen Raum
JC Küster, A Schulte
The system can't perform the operation now. Try again later.
Articles 1–11