Følg
Jan-Christoph Küster
Jan-Christoph Küster
ANU-NICTA PhD Student
Verificeret mail på anu.edu.au - Startside
Titel
Citeret af
Citeret af
År
From propositional to first-order monitoring
A Bauer, JC Küster, G Vegliach
International Conference on Runtime Verification, 59-75, 2013
782013
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
662011
Runtime Verification meets Android Security
A Bauer, JC Küster, G Vegliach
442012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
302012
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
Requirements Engineering: Foundation for Software Quality: 18th …, 2012
272012
The ins and outs of first-order runtime verification
A Bauer, JC Küster, G Vegliach
Formal Methods in System Design 46 (3), 286-316, 2015
212015
Monitoring real android malware
JC Küster, A Bauer
Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015
142015
Platform-Centric Android Monitoring---Modular and Efficient
JC Küster, A Bauer
arXiv preprint arXiv:1406.2041, 2014
62014
Runtime verification on data-carrying traces
JC Küster
The Australian National University, 2016
52016
From propositional to first-order monitoring
JC Küster
Robotfußballer im virtuellen Raum
JC Küster, A Schulte
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–11