| Publication | Date of Publication | Type |
|---|
| Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub | 2025-02-18 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset) | 2025-02-11 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 3: OpenSSL dataset) | 2025-02-11 | Dataset |
| Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 4: Poppler Dataset) | 2025-02-11 | Dataset |
| On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset | 2024-05-04 | Dataset |
| A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations | 2024-04-15 | Dataset |
| Artefact for ``Addressing Combinatorial Experiments and Scarcity of Subjects by Provably Orthogonal and Crossover Experimental Designs | 2024-02-19 | Dataset |
| Artefact for ``Addressing Combinatorial Experiments and Scarcity1 of Subjects by Provably Orthogonal and Crossover2 Experimental Designs | 2024-02-16 | Dataset |
| Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics (dataset) | 2024-01-10 | Dataset |
| [DEPRECATED] A manually-curated categorisation of Java Maven libraries along Python PyPI Topics (dataset) | 2024-01-10 | Dataset |
| A graph-based representation of the Hack Forums using Neo4j | 2023-08-09 | Dataset |
| Technical Leverage Analysis in the Python Ecosystem | 2023-07-20 | Dataset |
| Documentary sources of case studies on the issues a data protection officer faces on a daily basis | 2023-04-29 | Dataset |
| Cross-language corpora of privacy policies | 2023-03-16 | Dataset |
| Advanced Persistent Threats (APTs) campaigns database | 2022-11-24 | Dataset |
| Practical witness-key-agreement for blockchain-based dark pools financial trading | 2022-06-22 | Paper |
| Minimal disclosure in hierarchical Hippocratic databases with delegation | 2022-03-09 | Paper |
| Technical Leverage Dataset for Java Dependencies in Maven | 2022-03-04 | Dataset |
| Code Analysis Tables for Developers Interviews on Dependencies Paper | 2021-11-27 | Dataset |
| Database - A Calculus of Tracking: Theory and Practice | 2021-01-16 | Dataset |
| Strongly analytic tableaux for normal modal logics | 2020-01-21 | Paper |
| A uniform tableaux method for nonmonotonic modal logics | 2019-10-08 | Paper |
| Tableaux and algorithms for Propositional Dynamic Logic with Converse | 2019-01-15 | Paper |
| Tableaux methods for access control in distributed systems | 2019-01-15 | Paper |
| Verifying security protocols as planning in logic programming | 2017-06-13 | Paper |
| Runtime enforcement of security policies on black box reactive programs | 2016-09-29 | Paper |
| Towards an independent semantics and verification technology for the HLPSL specification language | 2013-09-26 | Paper |
| Attacking fair-exchange protocols: parallel models vs. trace models | 2013-07-24 | Paper |
| A method for security governance, risk, and compliance (GRC): a goal-process approach | 2011-09-16 | Paper |
| A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems | 2009-10-26 | Paper |
| Matching in security-by-contract for mobile code | 2009-07-20 | Paper |
| Trust Management | 2007-09-25 | Paper |
| Verifying the SET purchase protocols | 2007-01-30 | Paper |
| How to fake an RSA signature by encoding modular root finding as a SAT problem | 2003-09-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4707750 | 2003-06-11 | Paper |
| Combining deduction and model checking into tableaux and algorithms for converse-PDL. | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4786009 | 2002-12-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2767083 | 2002-01-28 | Paper |
| Logical cryptanalysis as a SAT problem | 2001-10-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721183 | 2001-07-01 | Paper |
| Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard | 2001-05-01 | Paper |
| EXPtime tableaux for ALC | 2000-12-12 | Paper |
| The proof complexity of analytic and clausal tableaux | 2000-08-21 | Paper |
| Single step tableaux for modal logics. Computational properties, complexity and methodology | 2000-05-17 | Paper |
| Tableau methods for formal verification of multi-agent distributed systems | 1998-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3838815 | 1998-08-13 | Paper |