From propositional to first-order monitoring A Bauer, JC Küster, G Vegliach International Conference on Runtime Verification, 59-75, 2013 | 76 | 2013 |
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing K Beckers, H Schmidt, JC Kuster, S Faßbender 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 66 | 2011 |
Runtime Verification meets Android Security A Bauer, JC Küster, G Vegliach | 45 | 2012 |
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012 | 30 | 2012 |
A pattern-based method for identifying and analyzing laws K Beckers, S Faßbender, JC Küster, H Schmidt Requirements Engineering: Foundation for Software Quality: 18th …, 2012 | 25 | 2012 |
The ins and outs of first-order runtime verification A Bauer, JC Küster, G Vegliach Formal Methods in System Design 46 (3), 286-316, 2015 | 23 | 2015 |
Monitoring real android malware JC Küster, A Bauer Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015 | 14 | 2015 |
Platform-Centric Android Monitoring---Modular and Efficient JC Küster, A Bauer arXiv preprint arXiv:1406.2041, 2014 | 6 | 2014 |
Runtime verification on data-carrying traces JC Küster The Australian National University, 2016 | 5 | 2016 |
From propositional to first-order monitoring JC Küster | | |
Robotfußballer im virtuellen Raum JC Küster, A Schulte | | |