Jan-Christoph Küster

According to our database1, Jan-Christoph Küster authored at least 8 papers between 2011 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The ins and outs of first-order runtime verification.
Formal Methods Syst. Des., 2015

Monitoring Real Android Malware.
Proceedings of the Runtime Verification - 6th International Conference, 2015

2014
Platform-Centric Android Monitoring - Modular and Efficient.
CoRR, 2014

2013
From Propositional to First-Order Monitoring.
Proceedings of the Runtime Verification - 4th International Conference, 2013

2012
A Pattern-Based Method for Identifying and Analyzing Laws.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Runtime Verification Meets Android Security.
Proceedings of the NASA Formal Methods, 2012

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Proceedings of the Sixth International Conference on Availability, 2011


  Loading...