Author of the publication

Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design.

, , , , and . PVM, volume P-298 of LNI, page 247-252. Gesellschaft für Informatik e.V., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloudbasierte Infrastruktur für Bibliotheksdaten - auf dem Weg zu einer Neuordnung der deutschen Verbundlandschaft, , , , , , , , , and . (2013)APDCM 2022 Keynote Talk: Solving QUBOs on Digital and Quantum Computers., , and . IPDPS Workshops, page 413. IEEE, (2022)How far are German companies in improving security through static program analysis tools?, , , , and . SecDev, page 7-15. IEEE, (2022)Article's scientific prestige: Measuring the impact of individual articles in the web of science., , , , , , , and . J. Informetrics, 17 (1): 101379 (February 2023)DeepGreen - Open Access Transformation: Eine Handreichung für institutionelle Repositorien, , , , , , , , , and 13 other author(s). (2019)Mathematical methods for physical layout of printed circuit boards: an overview., , and . OR Spectrum, 30 (3): 453 (2008)Ganztagsschule, and . BLK-Programm "Demokratie lernen & leben", Berlin, (2005)Enabling Research through the SCIP Optimization Suite 8.0., , , , , , , , , and 25 other author(s). ACM Trans. Math. Softw., 49 (2): 22:1-22:21 (June 2023)Implications, Conflicts, and Reductions for Steiner Trees., and . IPCO, volume 12707 of Lecture Notes in Computer Science, page 473-487. Springer, (2021)Integrating Security Protocols in Scenario-based Requirements Specifications., , , and . MODELSWARD, page 15-25. SCITEPRESS, (2022)