Bernhard J. Berger

Orcid: 0000-0001-6093-9229

According to our database1, Bernhard J. Berger authored at least 31 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EvoAl<sup>2048</sup>.
CoRR, 2024

EvoAl - Codeless Domain-Optimisation.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

Finding the perfect MRI sequence for your patient - Towards an optimisation workflow for MRI-sequences.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Automatic Security-Flaw Detection Replication and Comparison.
Proceedings of the 26th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

GLRP: Guided by Layer-wise Relevance Propagation - Selecting Crucial Neurons in Artificial Neural Networks.
Proceedings of the 12th International Conference on Modern Circuits and Systems Technologies, 2023

Informatik für Ingenieure an der Technischen Universität Hamburg.
Proceedings of the 53. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2023, Designing Future, 2023

Repetitive Processes and Their Surrogate-Model Congruent Encoding for Evolutionary Algorithms - A Theoretic Proposal.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Hybrid PTX Analysis for GPU accelerated CNN inferencing aiding Computer Architecture Design.
Proceedings of the Forum on Specification & Design Languages, 2023

Machine Learning for SAST: A Lightweight and Adaptable Approach.
Proceedings of the Computer Security - ESORICS 2023, 2023

EVOAL: A Domain-Specific Language-Based Approach to Optimisation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2023

2022
Automatic detection of architectural security flaws
PhD thesis, 2022

Adapting mutation and recombination operators to range-aware relations in real-world application data.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Using density of training data to improve evolutionary algorithms with approximative fitness functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

2021
[Engineering] eNYPD - Entry Points Detector Jakarta Server Faces Use Case.
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021

Domain-driven Correlation-aware Recombination and Mutation Operators for Complex Real-world Applications.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

Improving Evolutionary Algorithms by Enhancing an Approximative Fitness Function through Prediction Intervals.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

2020
Static Extraction of Enforced Authorization Policies SeeAuthz.
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

2019
The Architectural Security Tool Suite - ARCHSEC.
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019

Towards Effective Verification of Multi-Model Access Control Properties.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
[Engineering Paper] Built-in Clone Detection in Meta Languages.
Proceedings of the 18th IEEE International Working Conference on Source Code Analysis and Manipulation, 2018

2016
Automatically Extracting Threats from Extended Data Flow Diagrams.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Taint analysis of manual service compositions using Cross-Application Call Graphs.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

2014
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

2013
Extracting and Analyzing the Implemented Security Architecture of Business Applications.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

The Transitivity-of-Trust Problem in Android Application Interaction.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
The Transitivity of Trust Problem in the Interaction of Android Applications
CoRR, 2012

An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling.
Proceedings of the Information Security and Privacy Research, 2012

2011
Software Security Comprehension.
Softwaretechnik-Trends, 2011

An Android Security Case Study with Bauhaus.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

2010
Idea: Towards Architecture-Centric Security Analysis of Software.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2008
Reduzierung der Programmgröße mit Hilfe von Klonerkennung.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008


  Loading...