Detecting Security Vulnerabilities using Clone Detection and Community Knowledge. FP Viertel, W Brunotte, D Strüber, K Schneider SEKE, 245-324, 2019 | 12 | 2019 |
Tacit knowledge in software evolution JO Johanssen, FP Viertel, B Bruegge, K Schneider Managed Software Evolution, 77-105, 2019 | 3 | 2019 |
Are third-party libraries secure? a software library checker for java FP Viertel, F Kortum, L Wagner, K Schneider Risks and Security of Internet and Systems: 13th International Conference …, 2019 | 3 | 2019 |
Maintaining security in software evolution J Jürjens, K Schneider, J Bürger, FP Viertel, D Strüber, M Goedicke, ... Managed Software Evolution, 207-253, 2019 | 2 | 2019 |
Vulnerability Recognition by Execution Trace Differentiation FP Viertel, O Karras, K Schneider Geselllschaft für Informatik eV, 2017 | 2 | 2017 |
System evolution through semi-automatic elicitation of security requirements: A Position Paper C Vargas, J Bürger, F Viertel, B Vogel-Heuser, J Jürjens IFAC-PapersOnLine 51 (10), 64-69, 2018 | 1 | 2018 |
Heuristic and Knowledge-Based Security Checks of Source Code Artifacts Using Community Knowledge FP Viertel Logos Verlag Berlin GmbH, 2021 | | 2021 |
Community Knowledge About Security: Identification and Classification of User Contributions FP Viertel, W Brunotte, Y Evers, K Schneider Risks and Security of Internet and Systems: 15th International Conference …, 2021 | | 2021 |
System evolution through semi-automatic elicitation of security requirements C Vargas, J Bürger, F Viertel, B Vogel-Heuser, J Jürjens | | 2018 |
System evolution through semi-automatic elicitation of security requirements: A Position Paper C Vargas Martinez, J Bürger, F Viertel, B Vogel-Heuser 3rd IFAC Conference on Embedded Systems, Computational Intelligence and …, 2018 | | 2018 |