Search

Your search keyword '"Pretschner, Alexander"' showing total 672 results

Search Constraints

Start Over You searched for: Author "Pretschner, Alexander" Remove constraint Author: "Pretschner, Alexander"
672 results on '"Pretschner, Alexander"'

Search Results

2. Analyzing the Accessibility of GitHub Repositories for PyPI and NPM Libraries

3. Rethinking People Analytics With Inverse Transparency by Design

4. Decentralized Inverse Transparency With Blockchain

5. Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

6. Feature Sets in Just-in-Time Defect Prediction: An Empirical Evaluation

7. Automated Implementation of Windows-related Security-Configuration Guides

8. Automated Identification of Security-Relevant Configuration Settings Using NLP

9. Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations

10. Increasing Employees' Willingness to Share: Introducing Appeal Strategies for People Analytics

11. PR-SZZ: How pull requests can support the tracing of defects in software repositories

12. Empowered and Embedded: Ethics and Agile Processes

13. Trustworthy Transparency by Design

14. Designing Accountable Systems

15. Ethics in the Software Development Process: From Codes of Conduct to Ethical Deliberation

16. Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection

17. From Checking to Inference: Actual Causality Computations as Optimization Problems

18. Expressing Accountability Patterns using Structural Causal Models

19. On Scenario-Based Testing of Cyber-Physical Systems

20. Extending Causal Models from Machines into Humans

21. VirtSC: Combining Virtualization Obfuscation with Self-Checksumming

22. Efficiently Checking Actual Causality with SAT Solving

23. Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods

24. Compositional Fuzzing Aided by Targeted Symbolic Execution

26. Data-Driven Assessment of Parameterized Scenarios for Autonomous Vehicles

27. Exploring a Maximal Number of Relevant Obstacles for Testing UAVs

28. A Preliminary Study on Using Text- and Image-Based Machine Learning to Predict Software Maintainability

29. A Real-Time Remote IDS Testbed for Connected Vehicles

30. Understanding and Formalizing Accountability for Cyber-Physical Systems

31. Model-Based Safety and Security Engineering

32. Automatically Assessing Vulnerabilities Discovered by Compositional Analysis

33. Reviewing KLEE's Sonar-Search Strategy in Context of Greybox Fuzzing

34. Integrating System and Process Characteristics into Regression Test Optimization

36. Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

37. ACCBench: A Framework for Comparing Causality Algorithms

39. A Causal Model of Intersection-Related Collisions for Drivers With and Without Visual Field Loss

40. One evaluation of model-based testing and its automation

41. Towards a Unified Model of Accountability Infrastructures

47. How to Conduct Experiments with a Real Car? Experiences and Practical Guidelines

48. Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks

49. Automated Anomaly Detection in CPS Log Files : A Time Series Clustering Approach

Catalog

Books, media, physical & digital resources