Number of items: 501.
Hsu, Sheryl and Tran, Manda and Fass, Aurore
(2024)
What is in the Chrome Web Store?
Khodayari, Soheil and Barber, Thomas and Pellegrino, Giancarlo
(2024)
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web.
Jallow, Alfusainey and Schilling, Michael and Backes, Michael and Bugiel, Sven
(2024)
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Siegel, Rudolf and Mrowczynski, Rafael and Hellenthal, Maria and Schilling, Michael
(2023)
Poster: From Hashes to Ashes – A Comparison of Transcription Services.
Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha
(2023)
“We’ve Disabled MFA for You”: An Evaluation of the Security and
Usability of Multi-Factor Authentication Recovery Deployments.
(In Press)
Rack, Jeremy and Staicu, Cristian-Alexandru
(2023)
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications.
Mustafa, Maryam and Asad, Abdul Moeed and Hassan, Shehrbano and Haider, Urooj and Durrani, Zainab and Krombholz, Katharina
(2023)
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Hantke, Florian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2023)
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements.
Stivala, Giada and Abdelnabi, Sahar and Mengascini, Andrea and Graziano, Mariano and Fritz, Mario and Pellegrino, Giancarlo
(2023)
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
(In Press)
Izhikevich, Liz and Tran, Manda and Kallitsis, Michalis and Fass, Aurore and Durumeric, Zakir
(2023)
Cloud Watching: Understanding Attacks Against Cloud-Hosted Services.
Fassl, Matthias and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proceedings of the ACM on Human-Computer Interaction, 7 (CSCW2).
Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Koenig, Vincent and Cranor, Lorrie Faith
(2023)
Empirical Research Methods in Usable Privacy and Security.
In:
Human Factors in Privacy Research.
Springer Cham, pp. 29-53.
ISBN 978-3-031-28643-8
Gerhardt, Dañiel and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha
(2023)
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories.
Gröber, Lea and Mrowczynski, Rafael and Vijay, Nimisha and Muller, Daphne A. and Dabrowski, Adrian and Krombholz, Katharina
(2023)
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters’ Motivation, Operation, and Security Mindset.
Staicu, Cristian-Alexandru and Rahaman, Sazzadur and Kiss, Ágnes and Backes, Michael
(2023)
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Blechschmidt, Birk and Stock, Ben
(2023)
Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild.
AlHamdan, Abdullah and Staicu, Cristian-Alexandru
(2023)
SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes.
Shcherbakov, Mikhail and Balliu, Musard and Staicu, Cristian-Alexandru
(2023)
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js.
Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha
(2023)
“Would You Give the Same Priority to the Bank and a Game? I Do Not!”
Exploring Credential Management Strategies and Obstacles during Password Manager Setup.
Utz, Christine and Michels, Matthias and Degeling, Martin and Marnau, Ninja and Stock, Ben
(2023)
Comparing Large-Scale Privacy and Security Notifications.
(In Press)
Wermke, Dominik and Klemmer, Jan H. and Wöhler, Noah and Schmüser, Juliane and Harshini Sri Ramulu, Yasemin Acar and Fahl, Sascha
(2023)
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain.
Khodayari, Soheil and Pellegrino, Giancarlo
(2023)
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses.
(Submitted)
Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin
(2023)
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
Guthoff, Carolyn and Anell, Simon and Hainzinger, Johann and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Rautenstrauch, Jannis and Pellegrino, Giancarlo and Stock, Ben
(2023)
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.
Bhuiyan, Masudul Hasan Masud and Parthasarathy, Adithya Srinivas and Vasilakis, Nikos and Pradel, Michael and Staicu, Cristian-Alexandru
(2023)
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript.
Ortloff, Anna-Marie and Fassl, Matthias and Ponticello, Alexander and Martius, Florin and Mertens, Anna and Krombholz, Katharina and Smith, Matthew
(2023)
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Hasan, Rakibul and Weil, Rebecca and Siegel, Rudolf and Krombholz, Katharina
(2023)
A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP).
Fassl, Matthias and Krombholz, Katharina
(2023)
Why I Can't Authenticate --- Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
Wi, Seongil and Nguyen, Trung Tin and Kim, Jiwhan and Stock, Ben and Son, Sooel
(2023)
DiffCSP: Finding Browser Bugs in Content Security
Policy Enforcement through Differential Testing.
Ghorbani Lyastani, Sanam and Bugiel, Sven and Backes, Michael
(2023)
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Utz, Christine and Amft, Sabrina and Degeling, Martin and Holz, Thorsten and Fahl, Sascha and Schaub, Florian
(2023)
Privacy Rarely Considered: Exploring Considerations in the
Adoption of Third-Party Services by Websites.
Agarwal, Shubham
(2022)
Helping or Hindering? How Browser Extensions Undermine Security.
(In Press)
Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022)
Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
(In Press)
Hantke, Florian and Stock, Ben
(2022)
HTML Violations and Where to Find Them: A Longitudinal Analysis of Specification Violations in HTML.
Ruth, Kimberly and Fass, Aurore and Azose, Jonathan and Pearson, Mark and Thomas, Emma and Sadowski, Caitlin and Durumeric, Zakir
(2022)
A World Wide View of Browsing the World Wide Web.
Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha
(2022)
Where to Recruit for Security Development Studies:
Comparing Six Software Developer Samples.
Langer, Markus and Siegel, Rudolf and Schilling, Michael and Hunsicker, Tim and König, Cornelius J.
(2022)
An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behavior.
Hasan, Rakibul and Siegel, Rudolf and Weil, Rebecca and Krombholz, Katharina
(2022)
Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy.
Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina
(2022)
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha
(2022)
If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.
Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022)
Industrial practitioners' mental models of adversarial machine learning.
Pfeffer, Katharina and Mai, Alexandra and Weippl, Edgar and Rader, Emilee and Krombholz, Katharina
(2022)
Replication: Stories as Informal Lessons about Security.
Roth, Sebastian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2022)
The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna
(2022)
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Mai, Alexandra and Schedler, Oliver and Weippl, Edgar and Krombholz, Katharina
(2022)
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators’ Difficulties with TLS Configurations.
Mai, Alexandra and Guelmino, Leonard and Pfeffer, Katharina and Weippl, Edgar and Krombholz, Katharina
(2022)
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
Klein, David and Barber, Thomas and Bensalim, Souphiane and Stock, Ben and Johns, Martin
(2022)
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
Stolz, Peter and Roth, Sebastian and Stock, Ben
(2022)
To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression.
Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha
(2022)
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha
(2022)
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha
(2022)
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Khodayari, Soheil and Pellegrino, Giancarlo
(2022)
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.
Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022)
Reproducibility and Replicability of Web Measurement Studies.
Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Cranor, Lorrie Faith and Koenig, Vincent
(2021)
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Transactions on Computer-Human Interaction, 28 (6).
pp. 1-50.
ISSN 1073-0516
Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021)
12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021)
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Vasilakis, Nikos and Staicu, Cristian-Alexandru and Ntousakis, Grigoris and Kallas, Konstantinos and Karel, Ben and DeHon, André and Pradel, Michael
(2021)
Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction.
Fischer, Jonas and Olah, Anna and Vreeken, Jilles
(2021)
What’s in the Box? Exploring the Inner Life of Neural Networks with Robust Rules.
Schmidt, Florian and Marx, Alexander and Baumgarten, Nina and Hebel, Marie and Wegner, Martin and Kaulich, Manuel and Leisegang, Matthias S and Brandes, Ralf P and Göke, Jonathan and Vreeken, Jilles and Schulz, Marcel H
(2021)
Integrative analysis of epigenetics data identifies gene-specific regulatory elements.
Nucleic acids research.
Fassl, Matthias and Neumayr, Michaela and Schedler, Oliver and Krombholz, Katharina
(2021)
Transferring Update Behavior from Smartphones to Smart Consumer Devices.
(Submitted)
Likaj, Xhelal and Khodayari, Soheil and Pellegrino, Giancarlo
(2021)
Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks.
Scaletta, Marco and Hähnle, Reiner and Steinhöfel, Dominic and Bubel, Richard
(2021)
Delta-based Verification of Software Product Families.
Lampel, Johannes and Just, Sascha and Apel, Sven and Zeller, Andreas
(2021)
When Life Gives You Oranges: Detecting and Diagnosing Intermittent Job Failures at Mozilla.
Fischer, Jonas and Vreeken, Jilles
(2021)
Differentiable Pattern Set Mining.
Coupette, Corinna and Vreeken, Jilles
(2021)
Graph Similarity Description: How Are These Graphs Similar?
Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021)
Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
Huaman, Nicolas and von Skarczinski, Bennet and Wermke, Dominik and Stransky, Christian and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha
(2021)
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises.
Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin
(2021)
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha
(2021)
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Pfeffer, Katharina and Mai, Alexandra and Dabrowski, Adrian and Gusenbauer, Matthias and Schindler, Philipp and Weippl, Edgar and Franz, Michael and Krombholz, Katharina
(2021)
On the Usability of Authenticity Checks for Hardware Security Tokens.
Ponticello, Alexander and Fassl, Matthias and Krombholz, Katharina
(2021)
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
Khodayari, Soheil and Pellegrino, Giancarlo
(2021)
JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals.
Petzka, Henning and Kamp, Michael and Adilova, Linara and Sminchisescu, Cristian and Boley, Mario
(2021)
Relative Flatness and Generalization.
Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021)
Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
Marx, Alexander and Gretton, Arthur and Mooij, Joris
(2021)
A Weaker Faithfulness Assumption based on Triple Interactions.
Meiser, Gordon and Laperdrix, Pierre and Stock, Ben
(2021)
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
Dutta, Arghya and Vreeken, Jilles and Ghiringhelli, Luca M and Bereau, Tristan
(2021)
Data-driven equation for drug-membrane permeability across drugs and membranes.
The Journal of Chemical Physics.
Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
(Submitted)
Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021)
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
Gröber, Lea and Fassl, Matthias and Gupta, Abhilash and Krombholz, Katharina
(2021)
Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents.
Eriksson, Benjamin and Pellegrino, Giancarlo and Sabelfeld, Andrei
(2021)
Black Widow: Blackbox Data-driven Web Scanning.
Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2021)
Discovering reliable causal rules.
Marx, Alexander and Yang, Lincen and van Leeuwen, Matthijs
(2021)
Estimating Conditional Mutual Information for Discrete-Continuous Mixtures using Multi-Dimensional Adaptive Histograms.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Exploring User-Centered Security Design for Usable Authentication Ceremonies.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Stop the Consent Theater.
Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2021)
Mining Easily Understandable Models from Complex Event Logs.
Kalofolias, Janis and Welke, Pascal and Vreeken, Jilles
(2021)
SUSAN: The Structural Similarity Random Walk Kernel.
Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha
(2021)
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.
Albert, Elvira and Hähnle, Reiner and Merayo, Alicia and Steinhöfel, Dominic
(2021)
Certified Abstract Cost Analysis.
Mian, Osman and Marx, Alexander and Vreeken, Jilles
(2021)
Discovering Fully Oriented Causal Networks.
Calzavara, Stefano and Urban, Tobias and Tatang, Dennis and Steffens, Marius and Stock, Ben
(2021)
Reining in the Web's Inconsistencies with Site Policy.
Steffens, Marius and Musch, Marius and Johns, Martin and Stock, Ben
(2021)
Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
Cueppers, Joscha and Vreeken, Jilles
(2020)
Just Wait For It... Mining Sequential Patterns with Reliable Prediction Delays.
(In Press)
Steffens, Marius and Stock, Ben
(2020)
PMForce: Systematically Analyzing PostMessage Handlers at Scale.
Dalleiger, Sebastian and Vreeken, Jilles
(2020)
The Relaxed Maximum Entropy Distribution and its Application to Pattern Discovery.
(In Press)
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2020)
Discovering Dependencies with Reliable Mutual Information.
Knowledge and Information Systems.
ISSN 0219-1377
Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Poster: Debugging Inputs.
(In Press)
Anell, Simon and Gröber, Lea and Krombholz, Katharina
(2020)
End User and Expert Perceptions of Threats and Potential Countermeasures.
Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020)
Security, Availability, and Multiple Information Sources:
Exploring Update Behavior of System Administrators.
Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020)
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
Penerath, Frederic and Mandros, Panagiotis and Vreeken, Jilles
(2020)
Discovering Approximate Functional Dependencies using Smoothed Mutual Information.
Mandros, Panagiotis and Kaltenpoth, David and Boley, Mario and Vreeken, Jilles
(2020)
Discovering Functional Dependencies from Mixed-Type Data.
Fischer, Jonas and Vreeken, Jilles
(2020)
Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.
Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020)
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Roth, Sebastian and Backes, Michael and Stock, Ben
(2020)
Assessing the Impact of Script Gadgets on CSP at Scale.
Budhathoki, Kailash
(2020)
Causal Inference on Discrete Data.
Doctoral thesis, Saarland University.
Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020)
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Belth, Caleb and Zheng, X and Vreeken, Jilles and Koutra, Danai
(2020)
What is Normal, What is Strange, and What is Missing in an Knowledge Graph.
Koch, Simon and Sauer, Tim and Johns, Martin and Pellegrino, Giancarlo
(2020)
Raccoon: Automated Verification of Guarded Race Conditions in Web Applications.
Sudhodanan, Avinash and Khodayari, Soheil and Caballero, Juan
(2020)
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Roth, Sebastian and Barron, Timothy and Calzavara, Stefano and Nikiforakis, Nick and Stock, Ben
(2020)
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Stivala, Giada and Pellegrino, Giancarlo
(2020)
Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
Tramèr, Florian and Dupré, Pascal and Gili, Rusak and Pellegrino, Giancarlo and Boneh, Dan
(2019)
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019)
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Alam, Aftab and Krombholz, Katharina and Bugiel, Sven
(2019)
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Fischer, Jonas and Vreeken, Jilles
(2019)
Sets of Robust Rules, and How to Find Them.
Marx, Alexander and Vreeken, Jilles
(2019)
Identifiability of Cause and Effect using Regularized Regression.
Vreeken, Jilles and Yamanishi, Kenji
(2019)
Modern MDL meets Data Mining Insights, Theory, and Practice.
Musch, Marius and Steffens, Marius and Roth, Sebastian and Stock, Ben and Johns, Martin
(2019)
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019)
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Kaltenpoth, David and Vreeken, Jilles
(2019)
We Are Not Your Real Parents: Telling Causal from Confounded using MDL.
Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019)
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Marnau, Ninja
(2019)
Stellungnahme gegenüber dem Landtag des Saarlandes in der Anhörung zur Drucksache 16/761 „Informationssicherheitsgesetz Saarland – IT-SiG SL“ sowie Änderung weiterer Vorschriften.
Marnau, Ninja
(2019)
Stellungnahme gegenüber dem Landtag des Freistaats Sachen in der Anhörung zur Drucksache 6/16724 „Gesetz zur Neuordnung der Informationssicherheit im Freistaat Sachsen“.
Marx, Alexander and Vreeken, Jilles
(2019)
Testing Conditional Independence on Discrete Data using Stochastic Complexity.
Marx, Alexander and Vreeken, Jilles
(2019)
Approximating Algorithmic Conditional Independence for Discrete Data.
Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019)
Stop to Unlock - Improving the Security of Android Unlock Patterns.
Marnau, Ninja
(2019)
Comments on the “Draft Ethics Guidelines for Trustworthy AI” by the High-Level
Expert Group on Artificial Intelligence.
Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019)
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Zhao, Qingchuan and Zuo, Chaoshun and Pellegrino, Giancarlo and Zhiqiang, Li
(2019)
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Marx, Alexander and Vreeken, Jilles
(2019)
Telling Cause from Effect by Local and Global Regression.
Knowledge and Information Systems.
(In Press)
Saran, Divyam and Vreeken, Jilles
(2019)
Summarizing Dynamic Graphs using MDL.
Marnau, Ninja
(2018)
Paris Call: Important Commitment Against The Arms Race With Cyber Weapons.
Tagesspiegel - Background Digitalisierung.
Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018)
Rule Discovery for Exploratory Causal Reasoning.
Marx, Alexander and Vreeken, Jilles
(2018)
Stochastic Complexity for Testing Conditional Independence on Discrete Data.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Accurate Causal Inference on Discrete Data.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2018)
Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms.
Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018)
Investigating System Operators' Perspective on Security Misconfigurations.
Marx, Alexander and Vreeken, Jilles
(2018)
Causal Inference on Multivariate and Mixed Type Data.
Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018)
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Wu, Hao and Ning, Y and Chakraborty, P and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2018)
Generating Realistic Synthetic Population Datasets.
ACM Transactions on Knowledge Discovery and Data Mining, 12 (4).
pp. 1-45.
Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018)
Transferring Tests Across Web Applications.
List, Markus and Hornakova, Andrea and Vreeken, Jilles and Schulz, Marcel
(2018)
JAMI: Fast Computation of Conditional Mutual Information for ceRNA network analysis.
Bioinformatics, 34 (17).
pp. 3050-3051.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2).
pp. 285-307.
Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018)
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Causal Inference on Event Sequences.
Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018)
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
Krombholz, Katharina and Dabrowski, Adrian and Purgathofer, Peter and Weippl, Edgar
(2018)
Poster: The Petri Dish Attack - Guessing Secrets Based on Bacterial Growth.
Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018)
The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.
Pereira Borges Jr., Nataniel and Hotzkow, Jenny and Zeller, Andreas
(2018)
DroidMate-2: A Platform for Android Test Generation.
Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018)
Practical Test Dependency Detection.
Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018)
Wo ist der Fehler und wie wird er behoben?
Ein Experiment mit Softwareentwicklern.
Nasri, Mitra and Brandenburg, Björn B.
(2017)
An Exact and Sustainable Analysis of Non-preemptive Scheduling.
Marnau, Ninja
(2017)
Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung.
Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017)
Where is the Bug and How is It Fixed? An Experiment with Practitioners.
Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017)
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Krombholz, Katharina and Mayer, Wilfried and Schmiedecker, Martin and Weippl, Edgar
(2017)
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle and Fahl, Sascha
(2017)
Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
UNSPECIFIED.
Pang, Jun and Zhang, Yang
(2017)
Quantifying Location Sociality.
Brodowski, Dominik and Marnau, Ninja
(2017)
Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB).
Neue Zeitschrift für Strafrecht (NStZ), 07/201.
Judmayer, Aljosha and Stifter, Nicholas and Krombholz, Katharina and Weippl, Edgar, eds.
(2017)
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and their Consensus Mechanisms.
Morgan & Claypool Publishers.
Gujarati, Arpan and Nasri, Mitra and Brandenburg, Björn B.
(2017)
Quantifying the Resiliency of Replicated Networked Control Systems to Transient Faults.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017)
Comparing the Usability of Cryptographic APIs.
Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017)
How Developers Debug Software- The DBGBENCH Dataset.
Rau, Andreas
(2017)
Topic-driven testing.
Havrikov, Nikolas
(2017)
Efficient fuzz testing leveraging input, code, and execution.
Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017)
Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Tramèr, Floran and Atlidakis, Vaggelis and Geambasu, Roxana and Hsu, Daniel and Hubaux, Jean-Pierre and Humbert, Mathias and Juels, Ari and Lin, Huang
(2017)
FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017)
How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.
Nasri, Mitra and Brandenburg, Björn B.
(2017)
Offline Equivalence: A Non-preemptive Scheduling Technique for Resource-Constrained Embedded Real-Time Systems.
Patel, P. and Vanga, Manohar and Brandenburg, Björn B.
(2017)
TimerShield: Protecting High-Priority Tasks from Low-Priority Timer Interference.
Blond, Stevens Le and Gilbert, Cedric and Upadhyay, Utkarsh and Gomez-Rodriguez, Manuel and Choffnes, David
(2017)
A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
Krombholz, Katharina and Dabrowski, Adrian and Smith, Matthew and Weippl, Edgar
(2017)
Exploring Design Directions for Wearable Privacy.
Krüger, Jochen and Vogelgesang, Stephanie and Weller, Michael
(2017)
Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016.
Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017)
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017)
Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
Hessel, Stefan
(2017)
"My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?
JurPC (13).
Zarezade, Ali and Upadhyay, U. and Rabiee, H. and Gomez-Rodriguez, Manuel
(2017)
RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks.
Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2017)
Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
Vogelgesang, Stephanie and Hessel, Stefan
(2017)
Spionagegeräte im Kinderzimmer? – Zur Problematik des § 90 TKG bei Smart Toys.
ZD - Zeitschrift für den Datenschutz, 7 (6).
pp. 269-273.
ISSN 2192-5593
Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017)
Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5).
pp. 291-295.
ISSN 1434-596X
Jankowiak, Martin and Gomez-Rodriguez, Manuel
(2017)
Uncovering the Spatiotemporal Patterns of Collective Social Activity.
Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2017)
Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting.
CoRR, abs/17.
Höschele, Matthias and Kampmann, Alexander and Zeller, Andreas
(2017)
Active Learning of Input Grammars.
CoRR, abs/17.
Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017)
Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8).
pp. 501-506.
Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017)
Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8).
pp. 501-506.
Fisher, Andrea K. and Vreeken, Jilles and Klakow, Dietrich
(2017)
Beyond Pairwise Similarity: Quantifying and Characterizing Linguistic Similarity between Groups of Languages by MDL.
Computacion y Sistemas.
Gambi, Alessio and Kappler, Sebastian and Lampel, Johannes and Zeller, Andreas
(2017)
CUT: automatic unit testing in the cloud.
Hinrichs, Frauke and Vreeken, Jilles
(2017)
Characterising the Difference and the Norm between Sequence Databases.
Budhathoki, Kailash and Vreeken, Jilles
(2017)
Correlation by Compression.
Vogelgesang, Stephanie
(2017)
Datensicherheit und IT-Sicherheit in der Justiz.
juris – Die Monatszeitschrift.
Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017)
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2017)
Discovering Reliable Approximate Functional Dependencies.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2017)
Efficiently Discovering Locally Exceptional yet Globally Representative Subgroups.
Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2017)
Efficiently Discovering Unexpected Pattern Co-Occurrences.
Bhattacharyya, Apratim and Vreeken, Jilles
(2017)
Efficiently Summarising Event Sequences with Rich Interleaving Patterns.
Nasri, Mitra and Brandenburg, Björn B.
(2017)
An Exact and Sustainable Analysis of Non-preemptive Scheduling.
Gembalczyk, David and Schuhknecht, Felix Martin and Dittrich, Jens
(2017)
An Experimental Analysis of Different Key-Value Stores and Relational Databases.
Datenbanksysteme für Business, Technologie und Web (BTW 2017).
Pienta, Robert and Kahng, Minsuk and Lin, Zhang and Vreeken, Jilles and Talukdar, Partha and Abello, James and Parameswaran, Ganesh and Chau, Duen Horng
(2017)
FACETS : Adaptive Local Exploration of Large Graphs.
Boley, Mario and Goldsmit, Brian R. and Ghiringhelli, Luca M. and Vreeken, Jilles
(2017)
Identifying Consistent Statements about Numerical Data with Dispersion-Corrected Subgroup Discovery.
Data Mining and Knowledge Discovery, 31 (5).
pp. 1391-1418.
Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017)
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Budhathoki, Kailash and Vreeken, Jilles
(2017)
MDL for Causal Inference on Discrete Data.
Höschele, Matthias and Zeller, Andreas
(2017)
Mining input grammars with AUTOGRAM.
Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017)
Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
Gambi, Alessio and Mayr-Dorn, Christoph and Zeller, Andreas
(2017)
Model-based testing of end-user collaboration intensive systems.
Gambi, Alessio and Gorla, Alessandra and Zeller, Andreas
(2017)
O!Snap: Cost-Efficient Testing in the Cloud.
Budhathoki, Kailash and Vreeken, Jilles
(2017)
Origo: Causal Inference by Compression.
Knowledge and Information Systems.
Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2017)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-85.
Krüger, Frederik and Vogelgesang, Stephanie
(2017)
Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017)
Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5).
pp. 291-295.
Grosse, Kathrin and Vreeken, Jilles
(2017)
Summarising Event Sequences using Serial Episodes and an Ontology.
Vanga, Manohar and Bastoni, Andrea and Theiling, Henrik and Brandenburg, Björn B.
(2017)
Supporting low-latency, low-criticality tasks in a certified mixed-criticality OS.
Gujarati, Arpan and Elnikety, Sameh and He, Yuxiong and McKinley, Kathryn S. and Brandenburg, Björn B.
(2017)
Swayam: distributed autoscaling to meet SLAs of machine learning inference services with resource efficiency.
Marx, Alexander and Vreeken, Jilles
(2017)
Telling Cause from Effect by MDL-based Local and Global Regression.
Goldsmith, Brian and Boley, Mario and Vreeken, Jilles and Scheffler, Matthias and Ghiringhelli, Luca M.
(2017)
Uncovering Structure-Property Relationships of Materials by Subgroup Discovery.
New Journal of Physics, 17.
Seufert, Stephan and Berberich, Klaus and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Ernst, Patrick and Weikum, Gerhard
(2016)
ESPRESSO: Explaining Relationships between Entity Sets.
Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016)
On Profile Linkability despite Anonymity in Social Media Systems.
Zeller, Andreas
(2016)
Software verstehen, zerstören, schützen mit automatischen Software-Modellen.
Weikum, Gerhard and Hoffart, Johannes and Suchanek, Fabian M
(2016)
Ten Years of Knowledge Harvesting: Lessons and Challenges.
IEEE Data Engineering Bulletin, 39 (3).
pp. 41-50.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift.
ISSN 2197-5345
Krüger, Jochen and Möllers, Frederik
(2016)
Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht.
ISSN 1434-596X
Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016)
An Empirical Study of Textual Key-Fingerprint Representations.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Zeller, Andreas
(2016)
Automatisches Sicherheitstesten.
Datenschutz und Datensicherheit (DuD), 40 (8).
pp. 519-522.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit – DuD, 40 (8).
pp. 497-502.
ISSN 1614-0702
Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016)
Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
Jamrozik, Konrad and Styp-Rekowsky, Philipp von and Zeller, Andreas
(2016)
Mining Sandboxes.
Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2016)
J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features.
Transactions of the Association for Computational Linguistics (TACL), 4.
pp. 215-229.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016)
You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
Marnau, Ninja
(2016)
Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.
Herzig, Kim and Just, Sascha and Zeller, Andreas
(2016)
The Impact of Tangled Code Changes on Defect Prediction Models.
Empirical Software Engineering, 21 (2).
pp. 303-336.
ISSN 1382-3256
Hammacher, Clemens and Streit, Kevin and Zeller, Andreas and Hack, Sebastian
(2016)
Thread-level Speculation with Kernel Support.
Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar
(2016)
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Vogelgesang, Stephanie
(2016)
Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?
juris – Die Monatszeitschrift, 3 (1).
pp. 2-8.
ISSN 2197-5345
Chakraborty, Abhijnan and Ghosh, Saptarshi and Ganguly, Niloy and Gummadi, Krishna P.
(2016)
Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News.
Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2016)
Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media.
Leffer, Lena and Mayer, Hendrik
(2016)
EU-Datenschutz nach „Safe Harbor“.
Wirtschaftsführer für junge Juristen (2).
pp. 58-60.
Du, Nan and Liang, Yingyu and Balcan, Maria-Florina and Gomez-Rodriguez, Manuel and Zha, Hongyuan and Song, Le
(2016)
Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.
Journal of Machine Learning Research (JMLR).
Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).
Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016)
Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11).
pp. 729-734.
ISSN 1614-0702
Weller, Michael and Vogelgesang, Stephanie
(2016)
Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16.
jurisPR-ITR (19).
De, Abir and Valera, Isabel and Ganguly, Niloy and Bhattacharya, Sourangshu and Gomez-Rodriguez, Manuel
(2016)
Learning and Forecasting Opinion Dynamics in Social Networks.
Zafar, Muhammad Bilal and Gummadi, Krishna P. and Danescu-Niculescu-Mizil, Cristian
(2016)
Message Impartiality in Social Media Discussions.
Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016)
On Testing Embedded Software.
In:
UNSPECIFIED
Advances in Computers, 101
.
Elsevier, pp. 121-153.
ISBN 978-0-12-805158-0
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gummadi, Krishna P. and Gomez-Rodriguez, Manuel
(2016)
On the Efficiency of the Information Networks in Social Media.
Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2016)
On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs.
Böhm, Alexander and Dittrich, Jens and Mukherjee, Niloy and Pandis, Ippokrantis and Sen, Rajkumar
(2016)
Operational Analytics Data Management Systems.
PVLDB, 9 (13).
pp. 1601-1604.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 233-235.
ISSN 0170-7256
Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik-Spektrum, 39.
pp. 427-435.
ISSN 0170-6012
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12).
p. 81.
ISSN 0949-2356
Hessel, Stefan
(2016)
Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -.
JurPC (137).
Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio and McIntosh, Jess and McNeill, Charlie and Fraser, Mike
(2016)
Understanding Same-Side Interactions with Wrist-Worn Devices.
Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle
(2016)
You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2016)
An experimental evaluation and analysis of database cracking.
VLDB J., 25 (1).
pp. 27-52.
Rau, Andreas and Reinert, Maximilian and Zeller, Andreas
(2016)
Automatic Test Transfer across Applications.
Technical Report.
Chair of Software Engineering, Saarland University, Saarbrücken, Germany.
Budhathoki, Kailash and Vreeken, Jilles
(2016)
Causal Inference by Compression.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2016)
Flexibly Mining Better Subgroups.
Just, Sascha and Herzig, Kim
(2016)
Gotchas from mining bug reports.
In:
Perspectives on Data Science for Software Engineering.
Morgan Kaufmann, pp. 261-265.
Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).
Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016)
Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11).
pp. 729-734.
Athukorala, Kumaripaba and Glowacka, Dorata and Jacucci, Giulio and Oulasvirta, Antti and Vreeken, Jilles
(2016)
Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks.
Journal of the Association for Information Science and Technology, 67 (11).
pp. 2635-2651.
Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2016)
Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2016)
Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series.
Frasconi, Paolo and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles
(2016)
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence
(9851).
Springer.
Paolo, Frasconi and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles, eds.
(2016)
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence
(9852).
Springer.
Krüger, Jochen
(2016)
Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht, 19 (11).
pp. 728-731.
Dittrich, Jens
(2016)
Patterns in Data Management.
Jens Dittrich.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 233-235.
Krüger, Jochen and Vogelgesang, Stephanie
(2016)
Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39.
pp. 427-435.
Möllers, Frederik and Hessel, Stefan
(2016)
Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2016)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-137.
Schuhknecht, Felix Martin and Dittrich, Jens and Sharma, Ankur
(2016)
RUMA has it: rewired user-space memory access is possible!
Proceedings of the VLDB Endowment, 9 (10).
pp. 768-779.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift, 3 (10).
pp. 381-387.
Rozenshtein, Polina and Gionis, Aristides and Prakash, B. Aditya and Vreeken, Jilles
(2016)
Reconstructing an Epidemic over Time.
Palatinus, Endre and Dittrich, Jens
(2016)
Runtime Fragility in Main Memory.
In:
Data Management on New Hardware.
Springer, pp. 150-165.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12).
p. 81.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit - DuD, 40 (8).
pp. 497-502.
Just, Sascha and Herzig, Kim and Czerwonka, Jacek and Murphy, Brendan
(2016)
Switching to Git: The Good, the Bad, and the Ugly.
Nguyen, Hoang-Vu and Mandros, Panagiotis and Vreeken, Jilles
(2016)
Universal Dependency Analysis.
Schuh, Stefan and Chen, Xiao and Dittrich, Jens
(2016)
An experimental comparison of thirteen relational equi-joins in main memory.
Stock, Ben and Kaiser, Bernd and Pfistner, Stephan and Lekies, Sebastian and Johns, Martin
(2015)
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj
(2015)
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Zeller, Andreas and Hammacher, Clemens and Doerfert, Johannes and Streit, Kevin and Hack, Sebastian
(2015)
Generalized Task Parallelism.
ACM Transactions on Architecture and Code Optimization (TACO), 12 (1).
p. 8.
Salvesen, Kevin and Galeotti, Juan Pablo and Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2015)
Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing.
Zeller, Andreas
(2015)
Test Complement Exclusion: Guarantees from Dynamic Analysis.
Schuhknecht, Felix Martin and Khanchandani, Pankaj and Dittrich, Jens
(2015)
On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning.
Proc. VLDB Endow., 8 (9).
pp. 934-937.
Alvarez, V. and Richter, Stefan and Chen, X. and Dittrich, Jens
(2015)
A comparison of adaptive radix trees and hash tables.
Zeller, Andreas and Herzig, Kim and Just, Sascha
(2015)
It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction.
Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015)
COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Characterizing Information Diets of Social Media Users.
Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015)
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
Hessel, Stefan
(2015)
Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS".
Krüger, Jochen and Vogelgesang, Stephanie
(2015)
Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht.
Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015)
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015)
Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015.
p. 592.
Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015)
On the Reliability of Profile Matching Across Large Online Social Networks.
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015)
Quantifying Information Overload in Social Media and its Impact on Social Contagions.
Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3).
12:1-12:33.
Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015)
A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3).
pp. 96-107.
Lekies, Sebastian and Stock, Ben and Wentzel, Martin and Johns, Martin
(2015)
The Unexpected Dangers of Dynamic JavaScript.
Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015)
AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
Zimek, Arthur and Vreeken, Jilles
(2015)
The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1).
pp. 121-155.
Dittrich, Jens
(2015)
The Case for Small Data Management.
Vreeken, Jilles
(2015)
Causal Inference by Direction of Information.
Budhathoki, Kailash and Vreeken, Jilles
(2015)
The Difference and the Norm — Characterising Similarities and Differences between Databases.
Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015)
Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015)
Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
Dittrich, Jens and Bender, Patrick
(2015)
Janiform intra-document analytics for reproducible research.
Proceedings of the VLDB Endowment - Proceedings of the 41st International Conference on Very Large Data Bases, Kohala Coast, 8 (12).
pp. 1972-1975.
Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2015)
Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory.
Real-Time Systems, 51 (4).
pp. 440-483.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2015)
Non-Parametric Jensen-Shannon Divergence.
Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2015)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-72.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015)
Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3).
pp. 183-202.
Havrikov, Nikolas and Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
XMLMate: Evolutionary XML Test Generation.
Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014)
Probabilistic Prediction of Privacy Risks in User Search Histories.
Simeonovski, Milivoj
(2014)
Poster: Quasi-ID: In fact, I am a human.
Stock, Ben and Lekies, Sebastian and Mueller, Tobias and Spiegel, Patrick and Johns, Martin
(2014)
Precise Client-side Protection against DOM-based Cross-Site Scripting.
Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014)
Towards Detecting Anomalous User Behavior in Online Social Networks.
Zeller, Andreas and Wei, Yi and Meyer, Bertrand and Nordio, Martin and Furia, Carlo A. and Pei, Yu
(2014)
Automated Fixing of Programs with Contracts.
IEEE Transactions on Software Engineering, 40 (5).
pp. 427-449.
ISSN 0098-5589
Böhmer, Matthias and Krüger, Antonio
(2014)
A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2).
pp. 32-45.
Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014)
Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6).
pp. 280-287.
Stock, Ben and Lekies, Sebastian and Johns, Martin
(2014)
DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.
Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014)
Deep Twitter diving: exploring topical groups in microblogs at scale.
Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014)
Discovering Emerging Entities with Ambiguous Names.
Bichhawat, Abhishek
(2014)
Exception Handling for Dynamic Information Flow Control.
Bird, Christian and Ranganath, Venkatesh-Prasad and Zimmermann, Thomas and Nagappan, Nachiappan and Zeller, Andreas
(2014)
Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines.
Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014)
A Fresh Look on Knowledge Bases: Distilling Named Events from News.
Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin
(2014)
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.
International Journal On Advances in Intelligent Systems, 7 (4).
Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014)
Inferring user interests in the Twitter social network.
Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014)
Interacting with 3D Content on Stereoscopic Displays.
Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014)
Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014)
Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
JTACO: Test Execution for Faster Bounded Verification.
Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014)
KnowLife: a Knowledge Graph for Health and Life Sciences.
Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014)
Main Memory Adaptive Indexing for Multi-core Systems.
Herzig, Kim and Zeller, Andreas
(2014)
Mining Bug Data: A Practitioner’s Guide.
In:
Recommendation Systems in Software Engineering.
Springer Berlin Heidelberg, pp. 131-171.
ISBN 978-3-642-45134-8
Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014)
People on Drugs: Credibility of User Statements in Health Communities.
Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014)
Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 269-270.
ISSN 0170-7256
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2014)
ProCrawl: Mining Test Models from Multi-user Web Applications.
Stock, Ben and Johns, Martin
(2014)
Protecting Users Against XSS-based Password Manager Abuse.
Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014)
Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
Thome, Julian and Gorla, Alessandra and Zeller, Andreas
(2014)
Search-based Security Testing of Web Applications.
Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014)
SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
Test Generation Across Multiple Layers.
Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014)
Understanding and Specifying Social Access Control Lists.
Dallmeier, Valentin and Pohl, Bernd and Burger, Martin and Mirold, Michael and Zeller, Andreas
(2014)
WebMate: Web Application Test Generation in the Real World.
Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014)
Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1).
pp. 35-59.
Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014)
Frequent Pattern Mining.
Springer.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Interaction Model to Predict Subjective-Specificity of Search Results.
Miettinen, Pauli and Vreeken, Jilles
(2014)
MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4).
pp. 1-31.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014)
Multivariate Maximal Correlation Analysis.
Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014)
Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 269-270.
Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Supporting Exploratory Search Through User Modelling.
Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014)
Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1398-1428.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014)
Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1366-1397.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014)
VoG: Summarizing and Understanding Large Graphs.
Lekies, Sebastian and Stock, Ben and Johns, Martin
(2013)
25 Million Flows Later - Large-scale Detection of DOM-based XSS.
Johns, Martin and Lekies, Sebastian and Stock, Ben
(2013)
Eradicating DNS Rebinding with the Extended Same-Origin Policy.
Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013)
Hey, You, Get Off of My Clipboard.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161.
ISBN 978-3-642-39884-1
(Unpublished)
Schuler, David and Zeller, Andreas
(2013)
Checked coverage: an indicator for oracle quality.
Software Testing, Verification and Reliability (STVR), 23 (7).
pp. 531-551.
Kappes, Jörg H and Andres, Bjoern and Hamprecht, Fred A. and Schnörr, Christoph and Nowozin, Sebastian and Batra, Dhruv and Kim, Sungwoong and Kausler, Bernhard X and Lellmann, Jan and Komodakis, Nikos and Rother, Carsten
(2013)
A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem.
Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013)
A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6).
pp. 361-372.
Schuler, David and Zeller, Andreas
(2013)
Covering and Uncovering Equivalent Mutants.
Software Testing, Verification and Reliability (STVR), 23 (5).
pp. 353-374.
Reischuk, Raphael M. and Schröder, Florian and Gehrke, Johannes
(2013)
DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2013)
Detecting Deadlock in Programs with Data-Centric Synchronization.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013)
Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2).
pp. 29-34.
Hammer, Christian
(2013)
Efficient Algorithms for Control Closures.
Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
Bodden, Eric and Schneider, Markus and Kreutzer, Michael and Mezini, Mira and Hammer, Christian and Zeller, Andreas and Achenbach, Dirk and Huber, Matthias and Kraschewski, Daniel
(2013)
Entwicklung sicherer Software durch Security by Design.
In:
Entwicklung sicherer Software durch Security by Design : Trend- und Strategiebericht.
Fraunhofer SIT.
Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013)
Fine-grained Semantic Typing of Emerging Entities.
Richards, Gregor and Hammer, Christian and Nardelli, Francesco Zappa and Jagannathan, Suresh and Vitek, Jan
(2013)
Flexible Access Control for JavaScript.
Taneva, Bilyana and Weikum, Gerhard
(2013)
Gem-based Entity-Knowledge Maintenance.
Jamrozik, Konrad and Fraser, Gordon and Tillmann, Nikolai and Halleux, Jonathan De
(2013)
Generating Test Suites with Augmented Dynamic Symbolic Execution.
Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013)
HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
Stock, Ben
(2013)
Implementing low-level browser-based security functionality.
Masters thesis, UNSPECIFIED.
Herzig, Kim and Just, Sascha and Zeller, Andreas
(2013)
It's not a bug, it's a feature: how misclassification impacts bug prediction.
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2013)
Mining behavior models from enterprise web applications.
Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013)
Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12).
pp. 1274-1277.
Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013)
On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013)
Predicting defects using change genealogies.
Rößler, Jeremias and Zeller, Andreas and Fraser, Gordon and Zamfir, Cristian and Candea, George
(2013)
Reconstructing Core Dumps.
Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2013)
Sambamba: Runtime Adaptive Parallel Execution.
Vivanti, Mattia and Mis, Andre and Gorla, Alessandra and Fraser, Gordon
(2013)
Search-based data-flow test generation.
Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013)
Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3).
pp. 469-494.
Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013)
The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2).
pp. 97-108.
Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
WWHow! Freeing Data Storage from Cages.
Dallmeier, Valentin and Burger, Martin and Orth, Tobias and Zeller, Andreas
(2013)
WebMate: Generating Test Cases for Web 2.0.
Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013)
What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
Kim, Dongsun and Tao, Yida and Kim, Sunghun and Zeller, Andreas
(2013)
Where Should We Fix This Bug? A Two-Phase Recommendation Model.
IEEE Transactions on Software Engineering, 39 (11).
pp. 1597-1610.
Gerling, Sebastian and Gerling, Rainer W.
(2013)
Wie realistisch ist ein "Recht auf Vergessenwerden"?
Datenschutz und Datensicherheit, 37 (7).
pp. 445-446.
Herzig, Kim and Zeller, Andreas
(2013)
The impact of tangled code changes.
Böhmer, Matthias and Krüger, Antonio
(2013)
A study on icon arrangement by smartphone users.
Jindal, Alekh and Schuhknecht, Felix Martin and Dittrich, Jens and Khachatryan, Karen and Bunte, Alexander
(2013)
How Achaeans Would Construct Columns in Troy.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013)
CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013)
Classifying code changes and predicting defects using changegenealogies.
Saarland University.
Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013)
Detecting Bicliques in GF[q].
Webb, Geoffrey and Vreeken, Jilles
(2013)
Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3).
pp. 1-31.
Dittrich, Jens and Richter, Stefan and Schuh, Stefan and Quiané-Ruiz, Jorge-Arnulfo
(2013)
Efficient OR Hadoop: Why not both?
IEEE Data Eng. Bull., 36 (1).
pp. 15-23.
Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013)
Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013)
Mining Connection Pathways for Marked Nodes in Large Graphs.
Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013)
Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104.
ISBN 978-1-4503-2329-1
Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013)
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57.
ISBN 978-1-4503-2335-2
Mampaey, Michael and Vreeken, Jilles
(2013)
Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1).
pp. 130-173.
Suchanek, Fabian M and Gross-Amblard, David
(2012)
Adding fake facts to ontologies.
Dallmeier, Valentin and Knopp, Nikolai and Mallon, Christoph and Fraser, Gordon and Hack, Sebastian and Zeller, Andreas
(2012)
Automatically Generating Test Cases for Specification Mining.
IEEE Transactions on Software Engineering, 38 (2).
pp. 243-257.
Weikum, Gerhard and Hoffart, Johannes and Nakashole, Ndapandula and Spaniol, Marc and Suchanek, Fabian M and Yosef, Mohamed Amir
(2012)
Big Data Methods for Computational Linguistics.
IEEE Data Engineering Bulletin, 35 (3).
pp. 46-64.
Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012)
Defending Against Large-scale Crawls in Online Social Networks.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012)
Discovering and Exploring Relations on the Web.
Proc. of the Very Large Database Endowment (PVLDB), 5 (12).
pp. 1982-1985.
Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012)
EXSYST: Search-based GUI testing.
Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo
(2012)
Efficient Big Data Processing in Hadoop MapReduce.
The Proceedings of the VLDB Endowment (PVLDB), 5 (12).
pp. 2014-2015.
Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012)
Exploring the design space of social network-based Sybil defense.
Holler, Christian and Herzig, Kim and Zeller, Andreas
(2012)
Fuzzing with Code Fragments.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
Harmony and dissonance: organizing the people's voices on political controversies.
Rößler, Jeremias and Fraser, Gordon and Zeller, Andreas and Orso, Alessandro
(2012)
Isolating failure causes through test case generation.
Hoffart, Johannes and Seufert, Stephan and Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2012)
KORE: keyphrase overlap relatedness for entity disambiguation.
Böhm, Christoph and de, Gerard Melo and Naumann, Felix and Weikum, Gerhard
(2012)
LINDA: distributed web-of-data-scale entity matching.
Sumner, William N and Hammer, Christian and Dolby, Julian
(2012)
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.
In:
Runtime Verification.
Springer, pp. 161-176.
Scheffler, Tatjana and Schirru, Rafael and Lehmann, Paul
(2012)
Matching Points of Interest from Different Social Networking Sites.
In:
UNSPECIFIED
Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, LNAI, 7526
.
Springer, pp. 245-248.
Zeller, Andreas
(2012)
Mining Models.
Fraser, Gordon and Zeller, Andreas
(2012)
Mutation-Driven Generation of Unit Tests and Oracles.
IEEE Transactions on Software Engineering, 38 (2).
pp. 278-292.
Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo and Richter, Stefan and Schuh, Stefan and Jindal, Alekh and Schad, Jorg
(2012)
Only Aggressive Elephants are Fast Elephants.
The Proceedings of the VLDB Endowment (PVLDB), 5 (11).
pp. 1591-1602.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012)
PATTY: A Taxonomy of Relational Patterns with Semantic Types.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
PolariCQ: polarity classification of political quotations.
Kooti, Farshad and Mason, Winter A and Gummadi, Krishna P. and Cha, Meeyoung
(2012)
Predicting emerging social conventions in online social networks.
UNSPECIFIED
(2012)
Proceedings of the Workshop on JavaScript Tools.
Zeller, Andreas
(2012)
Proving programs continuous: technical perspective.
Communications of the ACM, 55 (8).
p. 106.
Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2012)
Sambamba: A Runtime System for Online Adaptive Parallelization.
Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012)
Search-based system testing: high coverage, no false alarms.
Brasser, Franz Ferdinand and Bugiel, Sven and Filyanov, Atanas and Sadeghi, Ahmad-Reza and Schulz, Steffen
(2012)
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
Ghosh, Saptarshi and Viswanath, Bimal and Kooti, Farshad and Sharma, Naveen Kumar and Korlam, Gautam and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012)
Understanding and combating link farming in the twitter social network.
Qu, Lizhen and Gemulla, Rainer and Weikum, Gerhard
(2012)
A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts.
Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2012)
A data-centric approach to synchronization.
ACM Trans. Program. Lang. Syst., 34 (1).
4:1-4:48.
Benz, Florian and Hildebrandt, Andreas and Hack, Sebastian
(2012)
A dynamic program analysis to find floating-point accuracy problems.
Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò
(2012)
A self-healing technique for Java applications.
Tatti, Nikolaj and Vreeken, Jilles
(2012)
Comparing Apples and Oranges : Measuring Differences between Exploratory Data Mining Results.
Data Mining and Knowledge Discovery, 25 (2).
pp. 173-207.
Tatti, Nikolaj and Vreeken, Jilles
(2012)
Discovering Descriptive Tile Trees by Fast Mining of Optimal Geometric Subtiles.
Akoglu, Leman and Tong, Hanghang and Vreeken, Jilles and Faloutsos, Christos
(2012)
Fast and Reliable Anomaly Detection in Categoric Data.
Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012)
Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs.
Tatti, Nikolaj and Vreeken, Jilles
(2012)
The Long and the Short of It: Summarising Event Sequences with Serial Episodes.
Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horng and Faloutsos, Christos
(2012)
Mining and Visualizing Connection Pathways in Large Information Networks.
Vreeken, Jilles and Ling, Charles X. and Siebes, Arno and Zaki, Mohammed J. and Xu Yu, Jeffrey and Goethals, Bart and Webb, Geoffrey I. and Wu, Xindong
(2012)
Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2012.
IEEE.
Vreeken, Jilles and van Leeuwen, Matthijs and Nijssen, Siegfried and Tatti, Nikolaj and Dries, Anton and Goethals, Bart
(2012)
Proceedings of the ECML PKDD Workshop on Instant Interactive Data Mining (IID).
UNSPECIFIED.
Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2012)
Spotting Culprits in Epidemics: How many and Which ones?
Vreeken, Jilles and Tatti, Nikolaj
(2012)
Summarising Event Sequences with Serial Episodes.
Mampaey, Michael and Vreeken, Jilles and Tatti, Nikolaj
(2012)
Summarizing Data Succinctly with the Most Informative Itemsets.
Transactions on Knowledge Discovery from Data.
pp. 1-44.
Wu, Hao and Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles and Hossain, M.Shariar and Ramakrishnan, Naren
(2012)
Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts.
Smets, Koen and Vreeken, Jilles
(2012)
\textsc Slim : Directly Mining Descriptive Patterns.
Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012)
\textsc TourViz : Interactive Visualization of Connection Pathways in Large Graphs.
Liu, Yabing and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2011)
Analyzing facebook privacy settings: user expectations vs. reality.
Zheng, Nan and Paloski, Aaron and Wang, Haining
(2011)
An Efficient User Verification System via Mouse Movements.
Richards, Gregor and Hammer, Christian and Burg, Brian and Vitek, Jan
(2011)
The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications.
Just, Seth and Cleary, Alan and Shirley, Brandon and Hammer, Christian
(2011)
Information flow analysis for JavaScript.
Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011)
RAFT at work: speeding-up mapreduce applications under task and node failures.
Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011)
RAFTing MapReduce: Fast recovery on the RAFT.
Jindal, Alekh and Dittrich, Jens
(2011)
Relax and Let the Database Do the Partitioning Online.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
Securing social networks.
Bursztein, Elie and Martin, Matthieu and Mitchell, John C.
(2011)
Text-based CAPTCHA Strengths and Weaknesses.
Dittrich, Jens and Jindal, Alekh
(2011)
Towards a One Size Fits All Database Architecture.
Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2011)
Trojan data layouts: right shoes for a running elephant.
Mannan, Mohammad and Kim, Boem Heyn and Ganjali, Afshar and Lie, David
(2011)
Unicorn: Two-Factor Attestation for Data Security.
Tatti, Nikolaj and Vreeken, Jilles
(2011)
Comparing Apples and Oranges: Measuring Differences between Data Mining Results.
Vreeken, Jilles and van Leeuwen, Matthijs and Siebes, Arno
(2011)
Krimp: Mining Itemsets that Compress.
Data Minining and Knowledge Discovery, 23 (1).
pp. 169-214.
Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011)
MIME: A Framework for Interactive Visual Pattern Mining.
Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011)
MIME: A Framework for Interactive Visual Pattern Mining.
Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De, Tijl
(2011)
Maximum Entropy Modelling for Assessing Results on Real-Valued Data.
Miettinen, Pauli and Vreeken, Jilles
(2011)
Model Order Selection for Boolean Matrix Factorization.
Smets, Koen and Vreeken, Jilles
(2011)
The Odd One Out: Identifying and Characterising Anomalies.
Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles
(2011)
Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets.
Remmerie, Noor and Vijlder, Thomas De and Valkenborg, Dirk and Laukens, Kris and Smets, Koen and Vreeken, Jilles and Mertens, Inge and Carpentier, Sebastien and Panis, Bart and de Jaeger, Geert and Prinsen, Els and Witters, Erwin
(2011)
Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods.
Journal of Proteomics, 74 (8).
pp. 1201-1217.
Vreeken, Jilles and Zimek, Arthur
(2011)
When Pattern met Subspace Cluster, a Relationship Story.
Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010)
What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5).
pp. 618-643.
Vreeken, Jilles
(2010)
Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1).
pp. 75-76.
Mampaey, Michael and Vreeken, Jilles
(2010)
Summarising Data by Clustering Items.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2).
pp. 56-58.
Vreeken, Jilles
(2009)
Making Pattern Mining Useful.
Doctoral thesis, Universiteit Utrecht.
Stock, Ben
(2009)
P2P-Botnetz-Analyse--Waledac.
Bachelors thesis, UNSPECIFIED.
Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009)
Walowdac-analysis of a peer-to-peer botnet.
van Leeuwen, Matthijs and Vreeken, Jilles and Siebes, Arno
(2009)
Identifying the Components.
Data Mining and Knowledge Discovery, 19 (2).
pp. 173-292.
Heikinheimo, Hannes and Vreeken, Jilles and Siebes, Arno and Mannila, Heikki
(2009)
Low-Entropy Set Selection.
Vreeken, Jilles and Siebes, A.
(2008)
Filling in the Blanks - Krimp Minimisation for Missing Data.
Tatti, Nikolaj and Vreeken, Jilles
(2008)
Finding Good Itemsets by Packing Data.
Just, Sascha and Premraj, Rahul and Zimmermann, Thomas
(2008)
Towards the next generation of bug tracking systems.
Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2008)
What makes a good bug report?
Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2007)
Quality of Bug Reports in Eclipse.
Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007)
Characterising the Difference.
Siebes, Arno and van Leeuwen, Matthijs and Vreeken, Jilles
(2007)
MDL for Pattern Mining.
Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007)
Preserving Privacy through Data Generation.
Leeuwen, M. van and Vreeken, Jilles and Siebes, A.
(2006)
Compression Picks Item Sets That Matter.
Siebes, A. and Vreeken, Jilles and Leeuwen, M. van
(2006)
Item Sets that Compress.
Wiering, Marco and Van Veenen, Jelle and Vreeken, Jilles and Koopman, Arne
(2004)
Simulation and Optimization of Traffic in a City.
This list was generated on Wed Nov 20 22:53:02 2024 CET.