BibTeX records: Jan-Christoph Küster

download as .bib file

@article{DBLP:journals/fmsd/0002KV15,
  author       = {Andreas Bauer and
                  Jan{-}Christoph K{\"{u}}ster and
                  Gil Vegliach},
  title        = {The ins and outs of first-order runtime verification},
  journal      = {Formal Methods Syst. Des.},
  volume       = {46},
  number       = {3},
  pages        = {286--316},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10703-015-0227-2},
  doi          = {10.1007/S10703-015-0227-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/0002KV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Kuster015,
  author       = {Jan{-}Christoph K{\"{u}}ster and
                  Andreas Bauer},
  editor       = {Ezio Bartocci and
                  Rupak Majumdar},
  title        = {Monitoring Real Android Malware},
  booktitle    = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
                  Austria, September 22-25, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9333},
  pages        = {136--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23820-3\_9},
  doi          = {10.1007/978-3-319-23820-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Kuster015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KuesterB14,
  author       = {Jan{-}Christoph K{\"{u}}ster and
                  Andreas Bauer},
  title        = {Platform-Centric Android Monitoring - Modular and Efficient},
  journal      = {CoRR},
  volume       = {abs/1406.2041},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.2041},
  eprinttype    = {arXiv},
  eprint       = {1406.2041},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KuesterB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/0002KV13,
  author       = {Andreas Bauer and
                  Jan{-}Christoph K{\"{u}}ster and
                  Gil Vegliach},
  editor       = {Axel Legay and
                  Saddek Bensalem},
  title        = {From Propositional to First-Order Monitoring},
  booktitle    = {Runtime Verification - 4th International Conference, {RV} 2013, Rennes,
                  France, September 24-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8174},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40787-1\_4},
  doi          = {10.1007/978-3-642-40787-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/0002KV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-3645,
  author       = {Andreas Bauer and
                  Jan{-}Christoph K{\"{u}}ster and
                  Gil Vegliach},
  title        = {From propositional to first-order monitoring},
  journal      = {CoRR},
  volume       = {abs/1303.3645},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.3645},
  eprinttype    = {arXiv},
  eprint       = {1303.3645},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-3645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BeckersFHKS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Jan{-}Christoph K{\"{u}}ster and
                  Holger Schmidt},
  editor       = {Gilles Barthe and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Supporting the Development and Documentation of {ISO} 27001 Information
                  Security Management Systems through Security Requirements Engineering
                  Approaches},
  booktitle    = {Engineering Secure Software and Systems - 4th International Symposium,
                  ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7159},
  pages        = {14--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28166-2\_2},
  doi          = {10.1007/978-3-642-28166-2\_2},
  timestamp    = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BeckersFHKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/BauerKV12,
  author       = {Andreas Bauer and
                  Jan{-}Christoph K{\"{u}}ster and
                  Gil Vegliach},
  editor       = {Alwyn Goodloe and
                  Suzette Person},
  title        = {Runtime Verification Meets Android Security},
  booktitle    = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk,
                  VA, USA, April 3-5, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7226},
  pages        = {174--180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28891-3\_18},
  doi          = {10.1007/978-3-642-28891-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/BauerKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/BeckersFKS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Jan{-}Christoph K{\"{u}}ster and
                  Holger Schmidt},
  editor       = {Bj{\"{o}}rn Regnell and
                  Daniela E. Damian},
  title        = {A Pattern-Based Method for Identifying and Analyzing Laws},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 18th International
                  Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7195},
  pages        = {256--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28714-5\_23},
  doi          = {10.1007/978-3-642-28714-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/BeckersFKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersSKF11,
  author       = {Kristian Beckers and
                  Holger Schmidt and
                  Jan{-}Christoph K{\"{u}}ster and
                  Stephan Fa{\ss}bender},
  title        = {Pattern-Based Support for Context Establishment and Asset Identification
                  of the {ISO} 27000 in the Field of Cloud Computing},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {327--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.55},
  doi          = {10.1109/ARES.2011.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersSKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics