Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 501.

Conference or Workshop Item (A Paper)

Hsu, Sheryl and Tran, Manda and Fass, Aurore
(2024) What is in the Chrome Web Store?
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Khodayari, Soheil and Barber, Thomas and Pellegrino, Giancarlo
(2024) The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web.
In: 45th IEEE Symposium on Security and Privacy, SAN FRANCISCO, CA.
Conference: SP IEEE Symposium on Security and Privacy

Jallow, Alfusainey and Schilling, Michael and Backes, Michael and Bugiel, Sven
(2024) Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
In: 45th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Siegel, Rudolf and Mrowczynski, Rafael and Hellenthal, Maria and Schilling, Michael
(2023) Poster: From Hashes to Ashes – A Comparison of Transcription Services.
In: ACM CCS 2023.
Conference: CCS ACM Conference on Computer and Communications Security

Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha
(2023) “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.
In: The 30th ACM Conference on Computer and Communication Security, 26.11.2023-30.11.2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Rack, Jeremy and Staicu, Cristian-Alexandru
(2023) Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications.
In: CCS 2023, 26-30 Nov 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security

Mustafa, Maryam and Asad, Abdul Moeed and Hassan, Shehrbano and Haider, Urooj and Durrani, Zainab and Krombholz, Katharina
(2023) Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23), 26--30. November 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security

Hantke, Florian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2023) You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements.
In: ACM CCS 2023.
Conference: CCS ACM Conference on Computer and Communications Security

Stivala, Giada and Abdelnabi, Sahar and Mengascini, Andrea and Graziano, Mariano and Fritz, Mario and Pellegrino, Giancarlo
(2023) From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
In: ACSAC '23: Proceedings of the 38th Annual Computer Security Applications Conference, 4-8 December 2023, Austin, TX.
Conference: ACSAC Annual Computer Security Applications Conference
(In Press)

Izhikevich, Liz and Tran, Manda and Kallitsis, Michalis and Fass, Aurore and Durumeric, Zakir
(2023) Cloud Watching: Understanding Attacks Against Cloud-Hosted Services.
In: IMC (ACM Internet Measurement Conference).
Conference: IMC Internet Measurement Conference

Gerhardt, Dañiel and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023) Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
In: 32nd USENIX Security Symposium, 9-11 Aug 2023, Anaheim, CA, USA.
Conference: USENIX-Security Usenix Security Symposium

Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha
(2023) Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories.
In: 32nd USENIX Security Symposium, 9-11 Aug 2023, Anaheim, CA, USA.
Conference: USENIX-Security Usenix Security Symposium

Gröber, Lea and Mrowczynski, Rafael and Vijay, Nimisha and Muller, Daphne A. and Dabrowski, Adrian and Krombholz, Katharina
(2023) To Cloud or not to Cloud: A Qualitative Study on Self-Hosters’ Motivation, Operation, and Security Mindset.
In: The 32nd USENIX Security Symposium, August 9–11, 2023, Annaheim, CA, US.
Conference: USENIX-Security Usenix Security Symposium

Staicu, Cristian-Alexandru and Rahaman, Sazzadur and Kiss, Ágnes and Backes, Michael
(2023) Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Blechschmidt, Birk and Stock, Ben
(2023) Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

AlHamdan, Abdullah and Staicu, Cristian-Alexandru
(2023) SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Shcherbakov, Mikhail and Balliu, Musard and Staicu, Cristian-Alexandru
(2023) Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha
(2023) “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup.
In: Nineteenth Symposium on Usable Privacy and Security, 06.08.2023-08.08.2023, Anaheim, CA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Utz, Christine and Michels, Matthias and Degeling, Martin and Marnau, Ninja and Stock, Ben
(2023) Comparing Large-Scale Privacy and Security Notifications.
In: PETS 2023, July 10–15, 2023, Lausanne, Switzerland.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Wermke, Dominik and Klemmer, Jan H. and Wöhler, Noah and Schmüser, Juliane and Harshini Sri Ramulu, Yasemin Acar and Fahl, Sascha
(2023) "Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain.
In: 44th IEEE Symposium on Security and Privacy (S&P '23), 22-25 May 2023, HYATT REGENCY, SAN FRANCISCO, CA.
Conference: SP IEEE Symposium on Security and Privacy

Khodayari, Soheil and Pellegrino, Giancarlo
(2023) It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses.
In: 44th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy
(Submitted)

Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin
(2023) It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
In: 44th IEEE Symposium on Security and Privacy (S&P '23), 22-25 May 2023, San Francisco, CA.
Conference: SP IEEE Symposium on Security and Privacy

Guthoff, Carolyn and Anell, Simon and Hainzinger, Johann and Dabrowski, Adrian and Krombholz, Katharina
(2023) Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
In: 44th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Rautenstrauch, Jannis and Pellegrino, Giancarlo and Stock, Ben
(2023) The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.
In: 44th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Bhuiyan, Masudul Hasan Masud and Parthasarathy, Adithya Srinivas and Vasilakis, Nikos and Pradel, Michael and Staicu, Cristian-Alexandru
(2023) SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript.
In: ICSE 2023, 14-20 May 2023, Melbourne, Australia.
Conference: ICSE International Conference on Software Engineering

Ortloff, Anna-Marie and Fassl, Matthias and Ponticello, Alexander and Martius, Florin and Mertens, Anna and Krombholz, Katharina and Smith, Matthew
(2023) Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
In: CHI Conference on Human Factors in Computing Systems (CHI '23), Hamburg, Germany.
Conference: CHI International Conference on Human Factors in Computing Systems

Hasan, Rakibul and Weil, Rebecca and Siegel, Rudolf and Krombholz, Katharina
(2023) A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP).
In: CHI Conference on Human Factors in Computing Systems (CHI '23), Hamburg, Germany.
Conference: CHI International Conference on Human Factors in Computing Systems

Fassl, Matthias and Krombholz, Katharina
(2023) Why I Can't Authenticate --- Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
In: CHI Conference on Human Factors in Computing Systems (CHI '23), Hamburg, Germany.
Conference: CHI International Conference on Human Factors in Computing Systems

Wi, Seongil and Nguyen, Trung Tin and Kim, Jiwhan and Stock, Ben and Son, Sooel
(2023) DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing.
In: NDSS.
Conference: NDSS Network and Distributed System Security Symposium

Ghorbani Lyastani, Sanam and Bugiel, Sven and Backes, Michael
(2023) A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
In: Network and Distributed System Security (NDSS) Symposium 2023, 27 February - 3 March 2023, San Diego, CA, USA.
Conference: NDSS Network and Distributed System Security Symposium

Utz, Christine and Amft, Sabrina and Degeling, Martin and Holz, Thorsten and Fahl, Sascha and Schaub, Florian
(2023) Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites.
In: PETS 2023.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Agarwal, Shubham
(2022) Helping or Hindering? How Browser Extensions Undermine Security.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022) Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Hantke, Florian and Stock, Ben
(2022) HTML Violations and Where to Find Them: A Longitudinal Analysis of Specification Violations in HTML.
In: ACM Internet Measurement Conference.
Conference: IMC Internet Measurement Conference

Ruth, Kimberly and Fass, Aurore and Azose, Jonathan and Pearson, Mark and Thomas, Emma and Sadowski, Caitlin and Durumeric, Zakir
(2022) A World Wide View of Browsing the World Wide Web.
In: IMC (ACM Internet Measurement Conference).
Conference: IMC ACM Internet Measurement Conference

Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha
(2022) Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
In: 31st USENIX Security Symposium, August 10-12, 2022, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Langer, Markus and Siegel, Rudolf and Schilling, Michael and Hunsicker, Tim and König, Cornelius J.
(2022) An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behavior.
In: Eighteenth Symposium on Usable Privacy and Security, 08.08 - 09.08.2022, Boston, MA.
Conference: SOUPS Symposium On Usable Privacy and Security

Hasan, Rakibul and Siegel, Rudolf and Weil, Rebecca and Krombholz, Katharina
(2022) Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy.
In: Eighteenth Symposium on Usable Privacy and Security, 08.08 - 09.08.2022, Boston, MA.
Conference: SOUPS Symposium On Usable Privacy and Security

Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina
(2022) Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
In: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha
(2022) If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.
In: Eighteenth Symposium on Usable Privacy and Security, 08.08 - 09.08.2022, Boston, MA.
Conference: SOUPS Symposium On Usable Privacy and Security

Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022) Industrial practitioners' mental models of adversarial machine learning.
In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2022, 7-9. August, 2022, Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Pfeffer, Katharina and Mai, Alexandra and Weippl, Edgar and Rader, Emilee and Krombholz, Katharina
(2022) Replication: Stories as Informal Lessons about Security.
In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2022, 7-9. August, 2022, Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Roth, Sebastian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2022) The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna
(2022) Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
In: 31st USENIX Security Symposium, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Mai, Alexandra and Schedler, Oliver and Weippl, Edgar and Krombholz, Katharina
(2022) Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators’ Difficulties with TLS Configurations.
In: HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust.
Conference: UNSPECIFIED

Mai, Alexandra and Guelmino, Leonard and Pfeffer, Katharina and Weippl, Edgar and Krombholz, Katharina
(2022) Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
In: HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy an Trust.
Conference: UNSPECIFIED

Klein, David and Barber, Thomas and Bensalim, Souphiane and Stock, Ben and Johns, Martin
(2022) Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Stolz, Peter and Roth, Sebastian and Stock, Ben
(2022) To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression.
In: SecWeb Workshop, May 26, 2022, San Francisco.
Conference: IEEE SPW IEEE Symposium on Security and Privacy Workshops

Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha
(2022) 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
In: 43rd IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha
(2022) Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
In: 43rd IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha
(2022) How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Khodayari, Soheil and Pellegrino, Giancarlo
(2022) The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022) Reproducibility and Replicability of Web Measurement Studies.
In: TheWebConf 2022.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021) 12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021) DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Vasilakis, Nikos and Staicu, Cristian-Alexandru and Ntousakis, Grigoris and Kallas, Konstantinos and Karel, Ben and DeHon, André and Pradel, Michael
(2021) Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction.
In: 28th ACM Conference on Computer and Communications Security (CCS 2021).
Conference: CCS ACM Conference on Computer and Communications Security

Fischer, Jonas and Olah, Anna and Vreeken, Jilles
(2021) What’s in the Box? Exploring the Inner Life of Neural Networks with Robust Rules.
In: International Conference on Machine Learning.
Conference: ICML International Conference on Machine Learning

Fassl, Matthias and Neumayr, Michaela and Schedler, Oliver and Krombholz, Katharina
(2021) Transferring Update Behavior from Smartphones to Smart Consumer Devices.
In: The 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, 2021-10, Virtual Workshop.
Conference: ESORICS European Symposium On Research In Computer Security
(Submitted)

Likaj, Xhelal and Khodayari, Soheil and Pellegrino, Giancarlo
(2021) Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks.
In: 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ’21).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Scaletta, Marco and Hähnle, Reiner and Steinhöfel, Dominic and Bubel, Richard
(2021) Delta-based Verification of Software Product Families.
In: 20th International Conference on Generative Programming: Concepts & Experiences, Chicago, USA (Hybrid).
Conference: GPCE International Conference on Generative Programming and Component Engineering

Lampel, Johannes and Just, Sascha and Apel, Sven and Zeller, Andreas
(2021) When Life Gives You Oranges: Detecting and Diagnosing Intermittent Job Failures at Mozilla.
In: ESEC/FSE 2021.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Fischer, Jonas and Vreeken, Jilles
(2021) Differentiable Pattern Set Mining.
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Coupette, Corinna and Vreeken, Jilles
(2021) Graph Similarity Description: How Are These Graphs Similar?
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021) Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
In: USENIX Security '21.
Conference: USENIX-Security Usenix Security Symposium

Huaman, Nicolas and von Skarczinski, Bennet and Wermke, Dominik and Stransky, Christian and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha
(2021) A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises.
In: In 30th USENIX Security Symposium, USENIX Security '21, August 11-13, 2021, Vancouver, B.C., Canada.
Conference: USENIX-Security Usenix Security Symposium

Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin
(2021) Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
In: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021., August 8-10, 2021.
Conference: SOUPS Symposium On Usable Privacy and Security

Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha
(2021) On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
In: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021., August 8-10, 2021.
Conference: SOUPS Symposium On Usable Privacy and Security

Pfeffer, Katharina and Mai, Alexandra and Dabrowski, Adrian and Gusenbauer, Matthias and Schindler, Philipp and Weippl, Edgar and Franz, Michael and Krombholz, Katharina
(2021) On the Usability of Authenticity Checks for Hardware Security Tokens.
In: Usenix Security 2021.
Conference: USENIX-Security Usenix Security Symposium

Ponticello, Alexander and Fassl, Matthias and Krombholz, Katharina
(2021) Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
In: Seventeenth Symposium on Usable Privacy and Security, August 8-10, 2021, Virtual Conference.
Conference: SOUPS Symposium On Usable Privacy and Security

Khodayari, Soheil and Pellegrino, Giancarlo
(2021) JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals.
In: 30th USENIX Security Symposium (USENIX Security'21).
Conference: USENIX-Security Usenix Security Symposium

Petzka, Henning and Kamp, Michael and Adilova, Linara and Sminchisescu, Cristian and Boley, Mario
(2021) Relative Flatness and Generalization.
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021) Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Marx, Alexander and Gretton, Arthur and Mooij, Joris
(2021) A Weaker Faithfulness Assumption based on Triple Interactions.
In: Uncertainty in Artificial Intelligence.
Conference: UAI Conference in Uncertainty in Artificial Intelligence

Meiser, Gordon and Laperdrix, Pierre and Stock, Ben
(2021) Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
In: AsiaCCS 2021.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021) Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
In: 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21).
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(Submitted)

Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021) Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021).
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Gröber, Lea and Fassl, Matthias and Gupta, Abhilash and Krombholz, Katharina
(2021) Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents.
In: CHI 2021.
Conference: CHI International Conference on Human Factors in Computing Systems

Eriksson, Benjamin and Pellegrino, Giancarlo and Sabelfeld, Andrei
(2021) Black Widow: Blackbox Data-driven Web Scanning.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP 2021.
Conference: SP IEEE Symposium on Security and Privacy

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2021) Discovering reliable causal rules.
In: SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Marx, Alexander and Yang, Lincen and van Leeuwen, Matthijs
(2021) Estimating Conditional Mutual Information for Discrete-Continuous Mixtures using Multi-Dimensional Adaptive Histograms.
In: SDM.
Conference: SDM SIAM International Conference on Data Mining

Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021) Exploring User-Centered Security Design for Usable Authentication Ceremonies.
In: CHI 2021, May 8-13, 2021, Online Virtual Conference (originally Yokohama, Japan).
Conference: CHI International Conference on Human Factors in Computing Systems

Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021) Stop the Consent Theater.
In: alt.chi 2021, May 8-13, 2021, Yokohama, Japan.
Conference: CHI International Conference on Human Factors in Computing Systems

Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2021) Mining Easily Understandable Models from Complex Event Logs.
In: Proceedings of the 2021 SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Kalofolias, Janis and Welke, Pascal and Vreeken, Jilles
(2021) SUSAN: The Structural Similarity Random Walk Kernel.
In: Proceedings of the 2021 SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha
(2021) They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.
In: 42nd IEEE Symposium on Security and Privacy, IEEE S&P 2021., May 24-27, 2021.
Conference: SP IEEE Symposium on Security and Privacy

Albert, Elvira and Hähnle, Reiner and Merayo, Alicia and Steinhöfel, Dominic
(2021) Certified Abstract Cost Analysis.
In: 24th International Conference on Fundamental Approaches to Software Engineering, Virtual.
Conference: FASE Fundamental Approaches to Software Engineering

Mian, Osman and Marx, Alexander and Vreeken, Jilles
(2021) Discovering Fully Oriented Causal Networks.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Calzavara, Stefano and Urban, Tobias and Tatang, Dennis and Steffens, Marius and Stock, Ben
(2021) Reining in the Web's Inconsistencies with Site Policy.
In: Network and Distributed Systems Security (NDSS) Symposium 2021.
Conference: NDSS Network and Distributed System Security Symposium

Steffens, Marius and Musch, Marius and Johns, Martin and Stock, Ben
(2021) Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
In: Network and Distributed Systems Security (NDSS) Symposium 2021.
Conference: NDSS Network and Distributed System Security Symposium

Cueppers, Joscha and Vreeken, Jilles
(2020) Just Wait For It... Mining Sequential Patterns with Reliable Prediction Delays.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

Steffens, Marius and Stock, Ben
(2020) PMForce: Systematically Analyzing PostMessage Handlers at Scale.
In: ACM CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Dalleiger, Sebastian and Vreeken, Jilles
(2020) The Relaxed Maximum Entropy Distribution and its Application to Pattern Discovery.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Poster: Debugging Inputs.
In: 42nd International Conference on Software Engineering Companion, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering
(In Press)

Anell, Simon and Gröber, Lea and Krombholz, Katharina
(2020) End User and Expert Perceptions of Threats and Potential Countermeasures.
In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Conference: EuroUSEC The European Workshop on Usable Security

Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020) Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Conference: EuroUSEC The European Workshop on Usable Security

Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020) Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.
Conference: SOUPS Symposium On Usable Privacy and Security

Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020) User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.
Conference: SOUPS Symposium On Usable Privacy and Security

Penerath, Frederic and Mandros, Panagiotis and Vreeken, Jilles
(2020) Discovering Approximate Functional Dependencies using Smoothed Mutual Information.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Mandros, Panagiotis and Kaltenpoth, David and Boley, Mario and Vreeken, Jilles
(2020) Discovering Functional Dependencies from Mixed-Type Data.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Fischer, Jonas and Vreeken, Jilles
(2020) Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020) A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
In: Proceedings of the 29th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Roth, Sebastian and Backes, Michael and Stock, Ben
(2020) Assessing the Impact of Script Gadgets on CSP at Scale.
In: AsiaCCS 2020.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020) Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
In: Proceedings of the 41st IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Belth, Caleb and Zheng, X and Vreeken, Jilles and Koutra, Danai
(2020) What is Normal, What is Strange, and What is Missing in an Knowledge Graph.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Koch, Simon and Sauer, Tim and Johns, Martin and Pellegrino, Giancarlo
(2020) Raccoon: Automated Verification of Guarded Race Conditions in Web Applications.
In: The 35th ACM/SIGAPP Symposium On Applied Computing, March 30-April 3, 2020, Brno, Czech Republic.
Conference: SAC ACM Symposium on Applied Computing

Sudhodanan, Avinash and Khodayari, Soheil and Caballero, Juan
(2020) Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
In: NDSS 2020, 23 – 26 February 2020, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Roth, Sebastian and Barron, Timothy and Calzavara, Stefano and Nikiforakis, Nick and Stock, Ben
(2020) Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
In: NDSS 2020.
Conference: NDSS Network and Distributed System Security Symposium

Stivala, Giada and Pellegrino, Giancarlo
(2020) Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
In: 27th Annual Network and Distributed System Security symposium, February 2020, San Diego.
Conference: NDSS Network and Distributed System Security Symposium

Tramèr, Florian and Dupré, Pascal and Gili, Rusak and Pellegrino, Giancarlo and Boneh, Dan
(2019) AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
In: CCS 19.
Conference: CCS ACM Conference on Computer and Communications Security

Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019) A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
In: CCS 19, London, UK.
Conference: CCS ACM Conference on Computer and Communications Security

Alam, Aftab and Krombholz, Katharina and Bugiel, Sven
(2019) Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Fischer, Jonas and Vreeken, Jilles
(2019) Sets of Robust Rules, and How to Find Them.
In: ECMLPKDD.
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Marx, Alexander and Vreeken, Jilles
(2019) Identifiability of Cause and Effect using Regularized Regression.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Vreeken, Jilles and Yamanishi, Kenji
(2019) Modern MDL meets Data Mining Insights, Theory, and Practice.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Musch, Marius and Steffens, Marius and Roth, Sebastian and Stock, Ben and Johns, Martin
(2019) ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: SP IEEE Symposium on Security and Privacy

Kaltenpoth, David and Vreeken, Jilles
(2019) We Are Not Your Real Parents: Telling Causal from Confounded using MDL.
In: SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019) "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Marx, Alexander and Vreeken, Jilles
(2019) Testing Conditional Independence on Discrete Data using Stochastic Complexity.
In: International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Marx, Alexander and Vreeken, Jilles
(2019) Approximating Algorithmic Conditional Independence for Discrete Data.
In: First AAAI Spring Symposium Beyond Curve Fitting: Causation, Counterfactuals, and Imagination-based AI.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019) Stop to Unlock - Improving the Security of Android Unlock Patterns.
In: Workshop on Usable Security and Privacy (USEC) 2019.
Conference: USEC Usable Security and Privacy

Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019) Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Zhao, Qingchuan and Zuo, Chaoshun and Pellegrino, Giancarlo and Zhiqiang, Li
(2019) Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Saran, Divyam and Vreeken, Jilles
(2019) Summarizing Dynamic Graphs using MDL.
In: ECMLPKDD Workshop on Graph Embedding and Mining (GEM).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018) Rule Discovery for Exploratory Causal Reasoning.
In: NeurIPS 2018 workshop on Causal Learning.
Conference: NeurIPS Conference on Neural Information Processing Systems

Marx, Alexander and Vreeken, Jilles
(2018) Stochastic Complexity for Testing Conditional Independence on Discrete Data.
In: NeurIPS 2018 Workshop on Causal Learning.
Conference: NeurIPS Conference on Neural Information Processing Systems

Budhathoki, Kailash and Vreeken, Jilles
(2018) Accurate Causal Inference on Discrete Data.
In: IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM IEEE International Conference on Data Mining

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2018) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms.
In: IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM IEEE International Conference on Data Mining

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Marx, Alexander and Vreeken, Jilles
(2018) Causal Inference on Multivariate and Mixed Type Data.
In: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Transferring Tests Across Web Applications.
In: ICWE - International Conference for Web Engineering.
Conference: ICWE International Conference on Web Engineering

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Budhathoki, Kailash and Vreeken, Jilles
(2018) Causal Inference on Event Sequences.
In: SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS Network and Distributed System Security Symposium

Krombholz, Katharina and Dabrowski, Adrian and Purgathofer, Peter and Weippl, Edgar
(2018) Poster: The Petri Dish Attack - Guessing Secrets Based on Bacterial Growth.
In: NDSS 2018.

Pereira Borges Jr., Nataniel and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering.
Conference: ASE Automated Software Engineering Conference

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST International Conference on Software Testing, Verification and Validation

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.

Nasri, Mitra and Brandenburg, Björn B.
(2017) An Exact and Sustainable Analysis of Non-preemptive Scheduling.
In: 2017 IEEE Real-Time Systems Symposium (RTSS).
Conference: RTSS Real Time Systems Symposium

Marnau, Ninja
(2017) Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung.
In: INFORMATIK 2017, Workshop Recht und Technik.

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) Where is the Bug and How is It Fixed? An Experiment with Practitioners.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017) Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
In: Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17).

Krombholz, Katharina and Mayer, Wilfried and Schmiedecker, Martin and Weippl, Edgar
(2017) "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
In: 26th USENIX Security Symposium (USENIX Security 2017).
Conference: USENIX-Security Usenix Security Symposium

Pang, Jun and Zhang, Yang
(2017) Quantifying Location Sociality.
In: ACM Conference on Hypertext and Social Media.

Gujarati, Arpan and Nasri, Mitra and Brandenburg, Björn B.
(2017) Quantifying the Resiliency of Replicated Networked Control Systems to Transient Faults.
In: Proceedings of the Work-in-Progress Session of the 29th Euromicro Conference on Real-Time Systems (ECRTS 2017).
Conference: ECRTS Euromicro Conference on Real-Time Systems

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017) Comparing the Usability of Cryptographic APIs.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: SP IEEE Symposium on Security and Privacy

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) How Developers Debug Software- The DBGBENCH Dataset.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
Conference: ICSE International Conference on Software Engineering

Rau, Andreas
(2017) Topic-driven testing.
In: Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International Conference on, Buenos Aires, Argentina.
Conference: ICSE International Conference on Software Engineering

Havrikov, Nikolas
(2017) Efficient fuzz testing leveraging input, code, and execution.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
Conference: ICSE International Conference on Software Engineering

Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017) Efficient and Flexible Discovery of PHP Application Vulnerabilities.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Tramèr, Floran and Atlidakis, Vaggelis and Geambasu, Roxana and Hsu, Daniel and Hubaux, Jean-Pierre and Humbert, Mathias and Juels, Ari and Lin, Huang
(2017) FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
In: UNSPECIFIED.

Nasri, Mitra and Brandenburg, Björn B.
(2017) Offline Equivalence: A Non-preemptive Scheduling Technique for Resource-Constrained Embedded Real-Time Systems.
In: 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Patel, P. and Vanga, Manohar and Brandenburg, Björn B.
(2017) TimerShield: Protecting High-Priority Tasks from Low-Priority Timer Interference.
In: 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Blond, Stevens Le and Gilbert, Cedric and Upadhyay, Utkarsh and Gomez-Rodriguez, Manuel and Choffnes, David
(2017) A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Krombholz, Katharina and Dabrowski, Adrian and Smith, Matthew and Weippl, Edgar
(2017) Exploring Design Directions for Wearable Privacy.
In: USEC'17.

Krüger, Jochen and Vogelgesang, Stephanie and Weller, Michael
(2017) Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016.
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017) How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
In: Proceedings of the 26th USENIX Security Symposium (USENIX Security '17).
Conference: USENIX-Security Usenix Security Symposium

Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017) Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Zarezade, Ali and Upadhyay, U. and Rabiee, H. and Gomez-Rodriguez, Manuel
(2017) RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks.
In: WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2017) Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Jankowiak, Martin and Gomez-Rodriguez, Manuel
(2017) Uncovering the Spatiotemporal Patterns of Collective Social Activity.
In: 2017 SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Gambi, Alessio and Kappler, Sebastian and Lampel, Johannes and Zeller, Andreas
(2017) CUT: automatic unit testing in the cloud.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017.
Conference: ISSTA International Symposium on Software Testing and Analysis

Hinrichs, Frauke and Vreeken, Jilles
(2017) Characterising the Difference and the Norm between Sequence Databases.
In: Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP).

Budhathoki, Kailash and Vreeken, Jilles
(2017) Correlation by Compression.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017) Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2017) Discovering Reliable Approximate Functional Dependencies.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2017) Efficiently Discovering Locally Exceptional yet Globally Representative Subgroups.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2017) Efficiently Discovering Unexpected Pattern Co-Occurrences.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Bhattacharyya, Apratim and Vreeken, Jilles
(2017) Efficiently Summarising Event Sequences with Rich Interleaving Patterns.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Nasri, Mitra and Brandenburg, Björn B.
(2017) An Exact and Sustainable Analysis of Non-preemptive Scheduling.
In: 2017 IEEE Real-Time Systems Symposium, RTSS 2017, Paris, France, December 5-8, 2017.
Conference: RTSS Real Time Systems Symposium

Pienta, Robert and Kahng, Minsuk and Lin, Zhang and Vreeken, Jilles and Talukdar, Partha and Abello, James and Parameswaran, Ganesh and Chau, Duen Horng
(2017) FACETS : Adaptive Local Exploration of Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Budhathoki, Kailash and Vreeken, Jilles
(2017) MDL for Causal Inference on Discrete Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Höschele, Matthias and Zeller, Andreas
(2017) Mining input grammars with AUTOGRAM.
In: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017 - Companion Volume.
Conference: ICSE International Conference on Software Engineering

Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017) Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
In: Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Gambi, Alessio and Mayr-Dorn, Christoph and Zeller, Andreas
(2017) Model-based testing of end-user collaboration intensive systems.
In: Proceedings of the Symposium on Applied Computing, SAC 2017, Marrakech, Morocco, April 3-7, 2017.

Gambi, Alessio and Gorla, Alessandra and Zeller, Andreas
(2017) O!Snap: Cost-Efficient Testing in the Cloud.
In: 2017 IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, Tokyo, Japan, March 13-17, 2017.
Conference: ICST International Conference on Software Testing, Verification and Validation

Krüger, Frederik and Vogelgesang, Stephanie
(2017) Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
In: Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Grosse, Kathrin and Vreeken, Jilles
(2017) Summarising Event Sequences using Serial Episodes and an Ontology.
In: Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP).

Vanga, Manohar and Bastoni, Andrea and Theiling, Henrik and Brandenburg, Björn B.
(2017) Supporting low-latency, low-criticality tasks in a certified mixed-criticality OS.
In: Proceedings of the 25th International Conference on Real-Time Networks and Systems, RTNS 2017, Grenoble, France, October 04 - 06, 2017.

Gujarati, Arpan and Elnikety, Sameh and He, Yuxiong and McKinley, Kathryn S. and Brandenburg, Björn B.
(2017) Swayam: distributed autoscaling to meet SLAs of machine learning inference services with resource efficiency.
In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11 - 15, 2017.
Conference: Middleware ACM/IFIP/USENIX International Middleware Conference

Marx, Alexander and Vreeken, Jilles
(2017) Telling Cause from Effect by MDL-based Local and Global Regression.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Seufert, Stephan and Berberich, Klaus and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Ernst, Patrick and Weikum, Gerhard
(2016) ESPRESSO: Explaining Relationships between Entity Sets.
In: Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).

Zeller, Andreas
(2016) Software verstehen, zerstören, schützen mit automatischen Software-Modellen.
In: 46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016).

Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016) An Empirical Study of Textual Key-Fingerprint Representations.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016) Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
In: Symposium on Usable Privacy and Security (SOUPS) 2016.

Jamrozik, Konrad and Styp-Rekowsky, Philipp von and Zeller, Andreas
(2016) Mining Sandboxes.
In: Proceedings of the 38th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Hammacher, Clemens and Streit, Kevin and Zeller, Andreas and Hack, Sebastian
(2016) Thread-level Speculation with Kernel Support.
In: Proceedings of the 25th International Conference on Compiler Construction.
Conference: CC International Conference on Compiler Construction

Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar
(2016) The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
In: Financial Cryptography and Data Security 2016.

Chakraborty, Abhijnan and Ghosh, Saptarshi and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News.
In: Proceedings of the 10th International Conference on Web and Social Media.

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media.
In: Proceedings of the 10th International Conference on Web and Social Media.

De, Abir and Valera, Isabel and Ganguly, Niloy and Bhattacharya, Sourangshu and Gomez-Rodriguez, Manuel
(2016) Learning and Forecasting Opinion Dynamics in Social Networks.
In: NIPS '16: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Zafar, Muhammad Bilal and Gummadi, Krishna P. and Danescu-Niculescu-Mizil, Cristian
(2016) Message Impartiality in Social Media Discussions.
In: Proceedings of the 10th International Conference on Web and Social Media.

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gummadi, Krishna P. and Gomez-Rodriguez, Manuel
(2016) On the Efficiency of the Information Networks in Social Media.
In: Proceedings of the 9th ACM International Conference on Web Search and Data Mining.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2016) On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs.
In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16).
Conference: CSCW ACM Conference on Computer Supported Cooperative Work

Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio and McIntosh, Jess and McNeill, Charlie and Fraser, Mike
(2016) Understanding Same-Side Interactions with Wrist-Worn Devices.
In: Proceedings of the 9th Nordic Conference on Human-Computer Interaction. Nordic Conference on Human-Computer Interaction (NordiCHI-16), October 23-27, Gothenburg, Sweden.

Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle
(2016) You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
In: IEEE SecDev 2016.

Budhathoki, Kailash and Vreeken, Jilles
(2016) Causal Inference by Compression.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Flexibly Mining Better Subgroups.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2016) Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Möllers, Frederik and Hessel, Stefan
(2016) Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Rozenshtein, Polina and Gionis, Aristides and Prakash, B. Aditya and Vreeken, Jilles
(2016) Reconstructing an Epidemic over Time.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Just, Sascha and Herzig, Kim and Czerwonka, Jacek and Murphy, Brendan
(2016) Switching to Git: The Good, the Bad, and the Ugly.
In: International Symposium on Software Reliability Engineering (ISSRE).

Nguyen, Hoang-Vu and Mandros, Panagiotis and Vreeken, Jilles
(2016) Universal Dependency Analysis.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Schuh, Stefan and Chen, Xiao and Dittrich, Jens
(2016) An experimental comparison of thirteen relational equi-joins in main memory.
In: Proceedings of the 2016 International Conference on Management of Data.

Stock, Ben and Kaiser, Bernd and Pfistner, Stephan and Lekies, Sebastian and Johns, Martin
(2015) From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
In: Proceedings of the 22nd ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj
(2015) In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).

Salvesen, Kevin and Galeotti, Juan Pablo and Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2015) Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing.
In: Proceedings of the Eighth International Workshop on Search-Based Software Testing.

Zeller, Andreas
(2015) Test Complement Exclusion: Guarantees from Dynamic Analysis.
In: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension.

Alvarez, V. and Richter, Stefan and Chen, X. and Dittrich, Jens
(2015) A comparison of adaptive radix trees and hash tables.
In: 2015 IEEE 31st International Conference on Data Engineering.
Conference: ICDE International Conference on Data Engineering

Zeller, Andreas and Herzig, Kim and Just, Sascha
(2015) It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction.
In: Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI).

Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015) COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
In: NIPS '15: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Characterizing Information Diets of Social Media Users.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015) The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Hessel, Stefan
(2015) Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS".
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Krüger, Jochen and Vogelgesang, Stephanie
(2015) Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht.
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015) The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015) Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
In: Proc. of the 24th International Conference on World Wide Web (WWW 2015).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015) On the Reliability of Profile Matching Across Large Online Social Networks.
In: Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) Quantifying Information Overload in Social Media and its Impact on Social Contagions.
In: ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media.

Lekies, Sebastian and Stock, Ben and Wentzel, Martin and Johns, Martin
(2015) The Unexpected Dangers of Dynamic JavaScript.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security Usenix Security Symposium

Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015) jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015) AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
In: Proceedings of the IEEE Conference on Visualization (VIS).

Dittrich, Jens
(2015) The Case for Small Data Management.
In: Datenbanksysteme für Business, Technologie und Web (BTW), 16. Fachtagung des GI-Fachbereichs "Datenbanken und Informationssysteme" (DBIS), 4.-6.3.2015 in Hamburg, Germany. Proceedings.

Vreeken, Jilles
(2015) Causal Inference by Direction of Information.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2015) The Difference and the Norm — Characterising Similarities and Differences between Databases.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015) Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015) Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2015) Non-Parametric Jensen-Shannon Divergence.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Havrikov, Nikolas and Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) XMLMate: Evolutionary XML Test Generation.
In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014) Probabilistic Prediction of Privacy Risks in User Search Histories.
In: Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14).

Simeonovski, Milivoj
(2014) Poster: Quasi-ID: In fact, I am a human.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Stock, Ben and Lekies, Sebastian and Mueller, Tobias and Spiegel, Patrick and Johns, Martin
(2014) Precise Client-side Protection against DOM-based Cross-Site Scripting.
In: 23rd USENIX Security Symposium (USENIX Security 14).
Conference: USENIX-Security Usenix Security Symposium

Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014) Towards Detecting Anomalous User Behavior in Online Social Networks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Stock, Ben and Lekies, Sebastian and Johns, Martin
(2014) DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.
In: Sicherheit.

Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014) Deep Twitter diving: exploring topical groups in microblogs at scale.
In: Proc. of the Computer Supported Cooperative Work (CSCW '14).
Conference: CSCW ACM Conference on Computer Supported Cooperative Work

Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014) Discovering Emerging Entities with Ambiguous Names.
In: Proc. of the 23rd International Conference on World Wide Web (WWW 2014).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Bichhawat, Abhishek
(2014) Exception Handling for Dynamic Information Flow Control.
In: Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition).

Bird, Christian and Ranganath, Venkatesh-Prasad and Zimmermann, Thomas and Nagappan, Nachiappan and Zeller, Andreas
(2014) Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines.
In: Companion Proceedings of the 36th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014) A Fresh Look on Knowledge Bases: Distilling Named Events from News.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014) Inferring user interests in the Twitter social network.
In: Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14).

Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014) Interacting with 3D Content on Stereoscopic Displays.
In: Proceedings of the International Symposium on Pervasive Displays (PerDis).

Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI International Conference on Human Factors in Computing Systems

Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014) Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI).

Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014) JTACO: Test Execution for Faster Bounded Verification.
In: Proc. of the 8th International Conference on Tests and Proofs (TAP 2014).

Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014) KnowLife: a Knowledge Graph for Health and Life Sciences.
In: Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14).
Conference: ICDE International Conference on Data Engineering

Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014) Main Memory Adaptive Indexing for Multi-core Systems.
In: Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN).

Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014) People on Drugs: Credibility of User Statements in Health Communities.
In: Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2014) ProCrawl: Mining Test Models from Multi-user Web Applications.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2014).
Conference: ISSTA International Symposium on Software Testing and Analysis

Stock, Ben and Johns, Martin
(2014) Protecting Users Against XSS-based Password Manager Abuse.
In: Proceedings of the 9th ACM symposium on Information, computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014) Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
In: Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014..

Thome, Julian and Gorla, Alessandra and Zeller, Andreas
(2014) Search-based Security Testing of Web Applications.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.

Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014) SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
In: Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario.
Conference: CHI International Conference on Human Factors in Computing Systems

Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) Test Generation Across Multiple Layers.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.

Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014) Understanding and Specifying Social Access Control Lists.
In: Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014).

Dallmeier, Valentin and Pohl, Bernd and Burger, Martin and Mirold, Michael and Zeller, Andreas
(2014) WebMate: Web Application Test Generation in the Real World.
In: Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014).

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Interaction Model to Predict Subjective-Specificity of Search Results.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014) Multivariate Maximal Correlation Analysis.
In: Proceedings of the International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Supporting Exploratory Search Through User Modelling.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014) VoG: Summarizing and Understanding Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Lekies, Sebastian and Stock, Ben and Johns, Martin
(2013) 25 Million Flows Later - Large-scale Detection of DOM-based XSS.
In: 20th ACM Conference on Computer and Communications Security Berlin 4.11.2013.
Conference: CCS ACM Conference on Computer and Communications Security

Johns, Martin and Lekies, Sebastian and Stock, Ben
(2013) Eradicating DNS Rebinding with the Extended Same-Origin Policy.
In: 22nd USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Kappes, Jörg H and Andres, Bjoern and Hamprecht, Fred A. and Schnörr, Christoph and Nowozin, Sebastian and Batra, Dhruv and Kim, Sungwoong and Kausler, Bernhard X and Lellmann, Jan and Komodakis, Nikos and Rother, Carsten
(2013) A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

Reischuk, Raphael M. and Schröder, Florian and Gehrke, Johannes
(2013) DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
In: CCS~'13: Proceedings of the 20th ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2013) Detecting Deadlock in Programs with Data-Centric Synchronization.
In: ICSE '13: Proceedings of the 35th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Hammer, Christian
(2013) Efficient Algorithms for Control Closures.
In: 1st International Workshop on Interference and Dependence.

Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
In: Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD).

Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013) Fine-grained Semantic Typing of Emerging Entities.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL Association of Computational Linguistics

Richards, Gregor and Hammer, Christian and Nardelli, Francesco Zappa and Jagannathan, Suresh and Vitek, Jan
(2013) Flexible Access Control for JavaScript.
In: Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications.
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications

Taneva, Bilyana and Weikum, Gerhard
(2013) Gem-based Entity-Knowledge Maintenance.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Jamrozik, Konrad and Fraser, Gordon and Tillmann, Nikolai and Halleux, Jonathan De
(2013) Generating Test Suites with Augmented Dynamic Symbolic Execution.
In: Proc. of the 7th International Conference on Tests and Proofs (TAP 2013).

Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013) HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL Association of Computational Linguistics

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2013) It's not a bug, it's a feature: how misclassification impacts bug prediction.
In: Proc. of the 35th International Conference on Software Engineering (ICSE 2013).
Conference: ICSE International Conference on Software Engineering

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2013) Mining behavior models from enterprise web applications.
In: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013) On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Predicting defects using change genealogies.
In: Proc. of the 24th International IEEE Symposium on Software Reliability Engineering (ISSRE 2013).
Conference: ISSRE International Symposium on Software Reliability Engineering

Rößler, Jeremias and Zeller, Andreas and Fraser, Gordon and Zamfir, Cristian and Candea, George
(2013) Reconstructing Core Dumps.
In: Proc. of the Sixth International IEEE Conference on Software Testing, Verification and Validation (ICST 2013).
Conference: ICST International Conference on Software Testing, Verification and Validation

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2013) Sambamba: Runtime Adaptive Parallel Execution.
In: Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems.

Vivanti, Mattia and Mis, Andre and Gorla, Alessandra and Fraser, Gordon
(2013) Search-based data-flow test generation.
In: IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013.

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) WWHow! Freeing Data Storage from Cages.
In: Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR Conference on Innovative Data Systems Research

Dallmeier, Valentin and Burger, Martin and Orth, Tobias and Zeller, Andreas
(2013) WebMate: Generating Test Cases for Web 2.0.
In: Proc. Software Quality Days 2013.

Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013) What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Herzig, Kim and Zeller, Andreas
(2013) The impact of tangled code changes.
In: Proc. of the 10th Working Conference on Mining Software Repositories (MSR 2013).
Conference: MSR IEEE International Working Conference on Mining Software Repositories

Böhmer, Matthias and Krüger, Antonio
(2013) A study on icon arrangement by smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI International Conference on Human Factors in Computing Systems

Jindal, Alekh and Schuhknecht, Felix Martin and Dittrich, Jens and Khachatryan, Karen and Bunte, Alexander
(2013) How Achaeans Would Construct Columns in Troy.
In: CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings.

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013) CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013) Detecting Bicliques in GF[q].
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013) Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013) Mining Connection Pathways for Marked Nodes in Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013) Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Suchanek, Fabian M and Gross-Amblard, David
(2012) Adding fake facts to ontologies.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Defending Against Large-scale Crawls in Online Social Networks.
In: Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012.
Conference: CoNEXT ACM International Conference on Emerging Networking Experiments and Technologies

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) EXSYST: Search-based GUI testing.
In: Proc. of the 34th International Conference on Software Engineering (ICSE 2012).
Conference: ICSE International Conference on Software Engineering

Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Exploring the design space of social network-based Sybil defense.
In: Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012).

Holler, Christian and Herzig, Kim and Zeller, Andreas
(2012) Fuzzing with Code Fragments.
In: Proc. of the 21st Usenix Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) Harmony and dissonance: organizing the people's voices on political controversies.
In: Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12).
Conference: WSDM ACM International Conference on Web Search and Data Mining

Rößler, Jeremias and Fraser, Gordon and Zeller, Andreas and Orso, Alessandro
(2012) Isolating failure causes through test case generation.
In: Proc. of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA International Symposium on Software Testing and Analysis

Hoffart, Johannes and Seufert, Stephan and Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2012) KORE: keyphrase overlap relatedness for entity disambiguation.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Böhm, Christoph and de, Gerard Melo and Naumann, Felix and Weikum, Gerhard
(2012) LINDA: distributed web-of-data-scale entity matching.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Zeller, Andreas
(2012) Mining Models.
In: Proc. of the 19th International Workshop on Model Checking Software (SPIN 2012).

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions.
In: Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12).
Conference: ICDM IEEE International Conference on Data Mining

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) PATTY: A Taxonomy of Relational Patterns with Semantic Types.
In: Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012).
Conference: EMNLP Empirical Methods in Natural Language Processing

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) PolariCQ: polarity classification of political quotations.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Kooti, Farshad and Mason, Winter A and Gummadi, Krishna P. and Cha, Meeyoung
(2012) Predicting emerging social conventions in online social networks.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

UNSPECIFIED
(2012) Proceedings of the Workshop on JavaScript Tools.
In: Proceedings of the Workshop on JavaScript Tools.

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2012) Sambamba: A Runtime System for Online Adaptive Parallelization.
In: Proc. of the 21st International Conference Compiler Construction (CC 2012).
Conference: CC International Conference on Compiler Construction

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) Search-based system testing: high coverage, no false alarms.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA International Symposium on Software Testing and Analysis

Brasser, Franz Ferdinand and Bugiel, Sven and Filyanov, Atanas and Sadeghi, Ahmad-Reza and Schulz, Steffen
(2012) Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC).

Ghosh, Saptarshi and Viswanath, Bimal and Kooti, Farshad and Sharma, Naveen Kumar and Korlam, Gautam and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012) Understanding and combating link farming in the twitter social network.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Qu, Lizhen and Gemulla, Rainer and Weikum, Gerhard
(2012) A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts.
In: Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12).
Conference: CoNLL Conference on Computational Natural Language Learning

Benz, Florian and Hildebrandt, Andreas and Hack, Sebastian
(2012) A dynamic program analysis to find floating-point accuracy problems.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò
(2012) A self-healing technique for Java applications.
In: 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland.

Tatti, Nikolaj and Vreeken, Jilles
(2012) Discovering Descriptive Tile Trees by Fast Mining of Optimal Geometric Subtiles.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Akoglu, Leman and Tong, Hanghang and Vreeken, Jilles and Faloutsos, Christos
(2012) Fast and Reliable Anomaly Detection in Categoric Data.
In: Proceedings of ACM Conference on Information and Knowledge Mining (CIKM).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs.
In: Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

Tatti, Nikolaj and Vreeken, Jilles
(2012) The Long and the Short of It: Summarising Event Sequences with Serial Episodes.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horng and Faloutsos, Christos
(2012) Mining and Visualizing Connection Pathways in Large Information Networks.
In: Proceedings of the Workshop on Information in Networks (WIN).

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2012) Spotting Culprits in Epidemics: How many and Which ones?
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarising Event Sequences with Serial Episodes.
In: Proceedings of the fifth Workshop on Information Theoretic Methods in Science and Engineering (WITMSE).

Wu, Hao and Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles and Hossain, M.Shariar and Ramakrishnan, Naren
(2012) Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts.
In: Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD).

Smets, Koen and Vreeken, Jilles
(2012) \textsc Slim : Directly Mining Descriptive Patterns.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) \textsc TourViz : Interactive Visualization of Connection Pathways in Large Graphs.
In: Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Liu, Yabing and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2011) Analyzing facebook privacy settings: user expectations vs. reality.
In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011).
Conference: IMC Internet Measurement Conference

Zheng, Nan and Paloski, Aaron and Wang, Haining
(2011) An Efficient User Verification System via Mouse Movements.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Richards, Gregor and Hammer, Christian and Burg, Brian and Vitek, Jan
(2011) The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications.
In: ECOOP'11: Proceedings of the 25th European Conference on Object-Oriented Programming.
Conference: ECOOP European Conference on Object-Oriented Programming

Just, Seth and Cleary, Alan and Shirley, Brandon and Hammer, Christian
(2011) Information flow analysis for JavaScript.
In: Proceedings of the 1st ACM SIGPLAN international workshop on Programming language and systems technologies for internet clients.

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFT at work: speeding-up mapreduce applications under task and node failures.
In: Proceedings of the ACM SIGMOD International Conference on Management of data.
Conference: SIGMOD ACM Special Interest Group on Management of Data Conference

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFTing MapReduce: Fast recovery on the RAFT.
In: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE).
Conference: ICDE International Conference on Data Engineering

Jindal, Alekh and Dittrich, Jens
(2011) Relax and Let the Database Do the Partitioning Online.
In: Enabling Real-Time Business Intelligence (BIRTE).

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Bursztein, Elie and Martin, Matthieu and Mitchell, John C.
(2011) Text-based CAPTCHA Strengths and Weaknesses.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Dittrich, Jens and Jindal, Alekh
(2011) Towards a One Size Fits All Database Architecture.
In: Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR Conference on Innovative Data Systems Research

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2011) Trojan data layouts: right shoes for a running elephant.
In: Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC).

Mannan, Mohammad and Kim, Boem Heyn and Ganjali, Afshar and Lie, David
(2011) Unicorn: Two-Factor Attestation for Data Security.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Tatti, Nikolaj and Vreeken, Jilles
(2011) Comparing Apples and Oranges: Measuring Differences between Data Mining Results.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De, Tijl
(2011) Maximum Entropy Modelling for Assessing Results on Real-Valued Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Miettinen, Pauli and Vreeken, Jilles
(2011) Model Order Selection for Boolean Matrix Factorization.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Smets, Koen and Vreeken, Jilles
(2011) The Odd One Out: Identifying and Characterising Anomalies.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles
(2011) Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Vreeken, Jilles and Zimek, Arthur
(2011) When Pattern met Subspace Cluster, a Relationship Story.
In: Proceedings of the 2nd Workshop on Discovering, Summarizing and Using Multiple Clusterings (MultiClust).

Mampaey, Michael and Vreeken, Jilles
(2010) Summarising Data by Clustering Items.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).

Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009) Walowdac-analysis of a peer-to-peer botnet.
In: Computer Network Defense (EC2ND), 2009 European Conference on.

Heikinheimo, Hannes and Vreeken, Jilles and Siebes, Arno and Mannila, Heikki
(2009) Low-Entropy Set Selection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).

Vreeken, Jilles and Siebes, A.
(2008) Filling in the Blanks - Krimp Minimisation for Missing Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).

Tatti, Nikolaj and Vreeken, Jilles
(2008) Finding Good Itemsets by Packing Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Just, Sascha and Premraj, Rahul and Zimmermann, Thomas
(2008) Towards the next generation of bug tracking systems.
In: In VL/HCC '08: Proceedings of the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.

Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2008) What makes a good bug report?
In: Foundations of Software Engineering.

Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2007) Quality of Bug Reports in Eclipse.
In: Proceedings of the 2007 OOPSLA Workshop on Eclipse Technology eXchange.

Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007) Characterising the Difference.
In: KDD07.

Siebes, Arno and van Leeuwen, Matthijs and Vreeken, Jilles
(2007) MDL for Pattern Mining.
In: Proceedings of the International Conference on Statistics for Data Mining, Learning and Knowledge Extraction Models (IASC).

Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007) Preserving Privacy through Data Generation.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).

Leeuwen, M. van and Vreeken, Jilles and Siebes, A.
(2006) Compression Picks Item Sets That Matter.
In: KDD06.

Siebes, A. and Vreeken, Jilles and Leeuwen, M. van
(2006) Item Sets that Compress.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).

Wiering, Marco and Van Veenen, Jelle and Vreeken, Jilles and Koopman, Arne
(2004) Simulation and Optimization of Traffic in a City.
In: Proceedings of the IEEE Intelligent Vehicles Symposium (IV).

Article

Fassl, Matthias and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023) Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proceedings of the ACM on Human-Computer Interaction, 7 (CSCW2).

Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Cranor, Lorrie Faith and Koenig, Vincent
(2021) A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Transactions on Computer-Human Interaction, 28 (6). pp. 1-50. ISSN 1073-0516

Schmidt, Florian and Marx, Alexander and Baumgarten, Nina and Hebel, Marie and Wegner, Martin and Kaulich, Manuel and Leisegang, Matthias S and Brandes, Ralf P and Göke, Jonathan and Vreeken, Jilles and Schulz, Marcel H
(2021) Integrative analysis of epigenetics data identifies gene-specific regulatory elements.
Nucleic acids research.

Dutta, Arghya and Vreeken, Jilles and Ghiringhelli, Luca M and Bereau, Tristan
(2021) Data-driven equation for drug-membrane permeability across drugs and membranes.
The Journal of Chemical Physics.

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2020) Discovering Dependencies with Reliable Mutual Information.
Knowledge and Information Systems. ISSN 0219-1377

Marx, Alexander and Vreeken, Jilles
(2019) Telling Cause from Effect by Local and Global Regression.
Knowledge and Information Systems.
(In Press)

Marnau, Ninja
(2018) Paris Call: Important Commitment Against The Arms Race With Cyber Weapons.
Tagesspiegel - Background Digitalisierung.

Wu, Hao and Ning, Y and Chakraborty, P and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2018) Generating Realistic Synthetic Population Datasets.
ACM Transactions on Knowledge Discovery and Data Mining, 12 (4). pp. 1-45.

List, Markus and Hornakova, Andrea and Vreeken, Jilles and Schulz, Marcel
(2018) JAMI: Fast Computation of Conditional Mutual Information for ceRNA network analysis.
Bioinformatics, 34 (17). pp. 3050-3051.

Budhathoki, Kailash and Vreeken, Jilles
(2018) Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2). pp. 285-307.

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018) The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.

Brodowski, Dominik and Marnau, Ninja
(2017) Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB).
Neue Zeitschrift für Strafrecht (NStZ), 07/201.

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017) How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.

Hessel, Stefan
(2017) "My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?
JurPC (13).

Vogelgesang, Stephanie and Hessel, Stefan
(2017) Spionagegeräte im Kinderzimmer? – Zur Problematik des § 90 TKG bei Smart Toys.
ZD - Zeitschrift für den Datenschutz, 7 (6). pp. 269-273. ISSN 2192-5593

Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017) Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5). pp. 291-295. ISSN 1434-596X

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2017) Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting.
CoRR, abs/17.

Höschele, Matthias and Kampmann, Alexander and Zeller, Andreas
(2017) Active Learning of Input Grammars.
CoRR, abs/17.

Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017) Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8). pp. 501-506.

Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017) Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8). pp. 501-506.

Fisher, Andrea K. and Vreeken, Jilles and Klakow, Dietrich
(2017) Beyond Pairwise Similarity: Quantifying and Characterizing Linguistic Similarity between Groups of Languages by MDL.
Computacion y Sistemas.

Vogelgesang, Stephanie
(2017) Datensicherheit und IT-Sicherheit in der Justiz.
juris – Die Monatszeitschrift.

Gembalczyk, David and Schuhknecht, Felix Martin and Dittrich, Jens
(2017) An Experimental Analysis of Different Key-Value Stores and Relational Databases.
Datenbanksysteme für Business, Technologie und Web (BTW 2017).

Boley, Mario and Goldsmit, Brian R. and Ghiringhelli, Luca M. and Vreeken, Jilles
(2017) Identifying Consistent Statements about Numerical Data with Dispersion-Corrected Subgroup Discovery.
Data Mining and Knowledge Discovery, 31 (5). pp. 1391-1418.

Budhathoki, Kailash and Vreeken, Jilles
(2017) Origo: Causal Inference by Compression.
Knowledge and Information Systems.

Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017) Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5). pp. 291-295.

Goldsmith, Brian and Boley, Mario and Vreeken, Jilles and Scheffler, Matthias and Ghiringhelli, Luca M.
(2017) Uncovering Structure-Property Relationships of Materials by Subgroup Discovery.
New Journal of Physics, 17.

Weikum, Gerhard and Hoffart, Johannes and Suchanek, Fabian M
(2016) Ten Years of Knowledge Harvesting: Lessons and Challenges.
IEEE Data Engineering Bulletin, 39 (3). pp. 41-50.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift. ISSN 2197-5345

Krüger, Jochen and Möllers, Frederik
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht. ISSN 1434-596X

Zeller, Andreas
(2016) Automatisches Sicherheitstesten.
Datenschutz und Datensicherheit (DuD), 40 (8). pp. 519-522.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit – DuD, 40 (8). pp. 497-502. ISSN 1614-0702

Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2016) J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features.
Transactions of the Association for Computational Linguistics (TACL), 4. pp. 215-229.

Marnau, Ninja
(2016) Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2016) The Impact of Tangled Code Changes on Defect Prediction Models.
Empirical Software Engineering, 21 (2). pp. 303-336. ISSN 1382-3256

Vogelgesang, Stephanie
(2016) Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?
juris – Die Monatszeitschrift, 3 (1). pp. 2-8. ISSN 2197-5345

Leffer, Lena and Mayer, Hendrik
(2016) EU-Datenschutz nach „Safe Harbor“.
Wirtschaftsführer für junge Juristen (2). pp. 58-60.

Du, Nan and Liang, Yingyu and Balcan, Maria-Florina and Gomez-Rodriguez, Manuel and Zha, Hongyuan and Song, Le
(2016) Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.
Journal of Machine Learning Research (JMLR).

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734. ISSN 1614-0702

Weller, Michael and Vogelgesang, Stephanie
(2016) Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16.
jurisPR-ITR (19).

Böhm, Alexander and Dittrich, Jens and Mukherjee, Niloy and Pandis, Ippokrantis and Sen, Rajkumar
(2016) Operational Analytics Data Management Systems.
PVLDB, 9 (13). pp. 1601-1604.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235. ISSN 0170-7256

Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik-Spektrum, 39. pp. 427-435. ISSN 0170-6012

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81. ISSN 0949-2356

Hessel, Stefan
(2016) Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -.
JurPC (137).

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2016) An experimental evaluation and analysis of database cracking.
VLDB J., 25 (1). pp. 27-52.

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734.

Athukorala, Kumaripaba and Glowacka, Dorata and Jacucci, Giulio and Oulasvirta, Antti and Vreeken, Jilles
(2016) Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks.
Journal of the Association for Information Science and Technology, 67 (11). pp. 2635-2651.

Krüger, Jochen
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht, 19 (11). pp. 728-731.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235.

Krüger, Jochen and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39. pp. 427-435.

Schuhknecht, Felix Martin and Dittrich, Jens and Sharma, Ankur
(2016) RUMA has it: rewired user-space memory access is possible!
Proceedings of the VLDB Endowment, 9 (10). pp. 768-779.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift, 3 (10). pp. 381-387.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit - DuD, 40 (8). pp. 497-502.

Zeller, Andreas and Hammacher, Clemens and Doerfert, Johannes and Streit, Kevin and Hack, Sebastian
(2015) Generalized Task Parallelism.
ACM Transactions on Architecture and Code Optimization (TACO), 12 (1). p. 8.

Schuhknecht, Felix Martin and Khanchandani, Pankaj and Dittrich, Jens
(2015) On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning.
Proc. VLDB Endow., 8 (9). pp. 934-937.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3). 12:1-12:33.

Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015) A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3). pp. 96-107.

Zimek, Arthur and Vreeken, Jilles
(2015) The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1). pp. 121-155.

Dittrich, Jens and Bender, Patrick
(2015) Janiform intra-document analytics for reproducible research.
Proceedings of the VLDB Endowment - Proceedings of the 41st International Conference on Very Large Data Bases, Kohala Coast, 8 (12). pp. 1972-1975.

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2015) Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory.
Real-Time Systems, 51 (4). pp. 440-483.

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015) Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3). pp. 183-202.

Zeller, Andreas and Wei, Yi and Meyer, Bertrand and Nordio, Martin and Furia, Carlo A. and Pei, Yu
(2014) Automated Fixing of Programs with Contracts.
IEEE Transactions on Software Engineering, 40 (5). pp. 427-449. ISSN 0098-5589

Böhmer, Matthias and Krüger, Antonio
(2014) A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2). pp. 32-45.

Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014) Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6). pp. 280-287.

Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin
(2014) Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.
International Journal On Advances in Intelligent Systems, 7 (4).

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270. ISSN 0170-7256

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014) Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1). pp. 35-59.

Miettinen, Pauli and Vreeken, Jilles
(2014) MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4). pp. 1-31.

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270.

Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014) Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5). pp. 1398-1428.

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014) Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5). pp. 1366-1397.

Schuler, David and Zeller, Andreas
(2013) Checked coverage: an indicator for oracle quality.
Software Testing, Verification and Reliability (STVR), 23 (7). pp. 531-551.

Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013) A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6). pp. 361-372.

Schuler, David and Zeller, Andreas
(2013) Covering and Uncovering Equivalent Mutants.
Software Testing, Verification and Reliability (STVR), 23 (5). pp. 353-374.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013) Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2). pp. 29-34.

Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013) Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12). pp. 1274-1277.

Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013) Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3). pp. 469-494.

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013) The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2). pp. 97-108.

Kim, Dongsun and Tao, Yida and Kim, Sunghun and Zeller, Andreas
(2013) Where Should We Fix This Bug? A Two-Phase Recommendation Model.
IEEE Transactions on Software Engineering, 39 (11). pp. 1597-1610.

Gerling, Sebastian and Gerling, Rainer W.
(2013) Wie realistisch ist ein "Recht auf Vergessenwerden"?
Datenschutz und Datensicherheit, 37 (7). pp. 445-446.

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Classifying code changes and predicting defects using changegenealogies.
Saarland University.

Webb, Geoffrey and Vreeken, Jilles
(2013) Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3). pp. 1-31.

Dittrich, Jens and Richter, Stefan and Schuh, Stefan and Quiané-Ruiz, Jorge-Arnulfo
(2013) Efficient OR Hadoop: Why not both?
IEEE Data Eng. Bull., 36 (1). pp. 15-23.

Mampaey, Michael and Vreeken, Jilles
(2013) Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1). pp. 130-173.

Dallmeier, Valentin and Knopp, Nikolai and Mallon, Christoph and Fraser, Gordon and Hack, Sebastian and Zeller, Andreas
(2012) Automatically Generating Test Cases for Specification Mining.
IEEE Transactions on Software Engineering, 38 (2). pp. 243-257.

Weikum, Gerhard and Hoffart, Johannes and Nakashole, Ndapandula and Spaniol, Marc and Suchanek, Fabian M and Yosef, Mohamed Amir
(2012) Big Data Methods for Computational Linguistics.
IEEE Data Engineering Bulletin, 35 (3). pp. 46-64.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) Discovering and Exploring Relations on the Web.
Proc. of the Very Large Database Endowment (PVLDB), 5 (12). pp. 1982-1985.

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo
(2012) Efficient Big Data Processing in Hadoop MapReduce.
The Proceedings of the VLDB Endowment (PVLDB), 5 (12). pp. 2014-2015.

Fraser, Gordon and Zeller, Andreas
(2012) Mutation-Driven Generation of Unit Tests and Oracles.
IEEE Transactions on Software Engineering, 38 (2). pp. 278-292.

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo and Richter, Stefan and Schuh, Stefan and Jindal, Alekh and Schad, Jorg
(2012) Only Aggressive Elephants are Fast Elephants.
The Proceedings of the VLDB Endowment (PVLDB), 5 (11). pp. 1591-1602.

Zeller, Andreas
(2012) Proving programs continuous: technical perspective.
Communications of the ACM, 55 (8). p. 106.

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2012) A data-centric approach to synchronization.
ACM Trans. Program. Lang. Syst., 34 (1). 4:1-4:48.

Tatti, Nikolaj and Vreeken, Jilles
(2012) Comparing Apples and Oranges : Measuring Differences between Exploratory Data Mining Results.
Data Mining and Knowledge Discovery, 25 (2). pp. 173-207.

Mampaey, Michael and Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarizing Data Succinctly with the Most Informative Itemsets.
Transactions on Knowledge Discovery from Data. pp. 1-44.

Vreeken, Jilles and van Leeuwen, Matthijs and Siebes, Arno
(2011) Krimp: Mining Itemsets that Compress.
Data Minining and Knowledge Discovery, 23 (1). pp. 169-214.

Remmerie, Noor and Vijlder, Thomas De and Valkenborg, Dirk and Laukens, Kris and Smets, Koen and Vreeken, Jilles and Mertens, Inge and Carpentier, Sebastien and Panis, Bart and de Jaeger, Geert and Prinsen, Els and Witters, Erwin
(2011) Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods.
Journal of Proteomics, 74 (8). pp. 1201-1217.

Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010) What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5). pp. 618-643.

Vreeken, Jilles
(2010) Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1). pp. 75-76.

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2). pp. 56-58.

van Leeuwen, Matthijs and Vreeken, Jilles and Siebes, Arno
(2009) Identifying the Components.
Data Mining and Knowledge Discovery, 19 (2). pp. 173-292.

Thesis

Budhathoki, Kailash
(2020) Causal Inference on Discrete Data.
Doctoral thesis, Saarland University.

Stock, Ben
(2013) Implementing low-level browser-based security functionality.
Masters thesis, UNSPECIFIED.

Vreeken, Jilles
(2009) Making Pattern Mining Useful.
Doctoral thesis, Universiteit Utrecht.

Stock, Ben
(2009) P2P-Botnetz-Analyse--Waledac.
Bachelors thesis, UNSPECIFIED.

Book Section

Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Koenig, Vincent and Cranor, Lorrie Faith
(2023) Empirical Research Methods in Usable Privacy and Security.
In: Human Factors in Privacy Research. Springer Cham, pp. 29-53. ISBN 978-3-031-28643-8

Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016) On Testing Embedded Software.
In: UNSPECIFIED Advances in Computers, 101 . Elsevier, pp. 121-153. ISBN 978-0-12-805158-0

Just, Sascha and Herzig, Kim
(2016) Gotchas from mining bug reports.
In: Perspectives on Data Science for Software Engineering. Morgan Kaufmann, pp. 261-265.

Palatinus, Endre and Dittrich, Jens
(2016) Runtime Fragility in Main Memory.
In: Data Management on New Hardware. Springer, pp. 150-165.

Herzig, Kim and Zeller, Andreas
(2014) Mining Bug Data: A Practitioner’s Guide.
In: Recommendation Systems in Software Engineering. Springer Berlin Heidelberg, pp. 131-171. ISBN 978-3-642-45134-8

Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013) Hey, You, Get Off of My Clipboard.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161. ISBN 978-3-642-39884-1
(Unpublished)

Bodden, Eric and Schneider, Markus and Kreutzer, Michael and Mezini, Mira and Hammer, Christian and Zeller, Andreas and Achenbach, Dirk and Huber, Matthias and Kraschewski, Daniel
(2013) Entwicklung sicherer Software durch Security by Design.
In: Entwicklung sicherer Software durch Security by Design : Trend- und Strategiebericht. Fraunhofer SIT.

Sumner, William N and Hammer, Christian and Dolby, Julian
(2012) Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.
In: Runtime Verification. Springer, pp. 161-176.

Scheffler, Tatjana and Schirru, Rafael and Lehmann, Paul
(2012) Matching Points of Interest from Different Social Networking Sites.
In: UNSPECIFIED Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, LNAI, 7526 . Springer, pp. 245-248.

Book

Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle and Fahl, Sascha
(2017) Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
UNSPECIFIED.

Judmayer, Aljosha and Stifter, Nicholas and Krombholz, Katharina and Weippl, Edgar, eds.
(2017) Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and their Consensus Mechanisms.
Morgan & Claypool Publishers.

Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2017) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-85.

Frasconi, Paolo and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles
(2016) Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence (9851). Springer.

Paolo, Frasconi and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles, eds.
(2016) Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence (9852). Springer.

Dittrich, Jens
(2016) Patterns in Data Management.
Jens Dittrich.

Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2016) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-137.

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2015) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-72.

Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014) Frequent Pattern Mining.
Springer.

Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104. ISBN 978-1-4503-2329-1

Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013) Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57. ISBN 978-1-4503-2335-2

Vreeken, Jilles and Ling, Charles X. and Siebes, Arno and Zaki, Mohammed J. and Xu Yu, Jeffrey and Goethals, Bart and Webb, Geoffrey I. and Wu, Xindong
(2012) Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2012.
IEEE.

Vreeken, Jilles and van Leeuwen, Matthijs and Nijssen, Siegfried and Tatti, Nikolaj and Dries, Anton and Goethals, Bart
(2012) Proceedings of the ECML PKDD Workshop on Instant Interactive Data Mining (IID).
UNSPECIFIED.

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.

Monograph

Rau, Andreas and Reinert, Maximilian and Zeller, Andreas
(2016) Automatic Test Transfer across Applications.
Technical Report. Chair of Software Engineering, Saarland University, Saarbrücken, Germany.

Other

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Saarlandes in der Anhörung zur Drucksache 16/761 „Informationssicherheitsgesetz Saarland – IT-SiG SL“ sowie Änderung weiterer Vorschriften.
CISPA, Landtag des Saarlandes
.

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Freistaats Sachen in der Anhörung zur Drucksache 6/16724 „Gesetz zur Neuordnung der Informationssicherheit im Freistaat Sachsen“.
CISPA, Landtag des Freistaats Sachsen
.

Marnau, Ninja
(2019) Comments on the “Draft Ethics Guidelines for Trustworthy AI” by the High-Level Expert Group on Artificial Intelligence.
European Commission AI HLEG Stakeholders' Consultation
.

This list was generated on Mon Mar 18 19:49:03 2024 CET.