default search action
Bernd Grobauer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Patrick Stöckle, Michael Sammereier, Bernd Grobauer, Alexander Pretschner:
Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules. AST 2023: 90-100 - [c12]Patrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner:
Automatisierte Identifikation von sicherheitsrelevanten Konfigurationseinstellungen mittels NLP. Software Engineering 2023: 115-116 - [i4]Patrick Stöckle, Michael Sammereier, Bernd Grobauer, Alexander Pretschner:
Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules. CoRR abs/2303.05901 (2023) - 2022
- [c11]Patrick Stöckle, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner:
Hardening with Scapolite: A DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations. CODASPY 2022: 137-142 - [c10]Patrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner:
Automated Identification of Security-Relevant Configuration Settings Using NLP. ASE 2022: 131:1-131:5 - [i3]Patrick Stöckle, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner:
Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations. CoRR abs/2209.08824 (2022) - [i2]Patrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner:
Automated Identification of Security-Relevant Configuration Settings Using NLP. CoRR abs/2209.08853 (2022) - [i1]Patrick Stöckle, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. CoRR abs/2209.08936 (2022) - 2021
- [c9]Patrick Stöckle, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. Software Engineering 2021: 101-102 - 2020
- [c8]Patrick Stöckle, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. ASE 2020: 598-610
2010 – 2019
- 2017
- [c7]Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck:
Mining Attributed Graphs for Threat Intelligence. CODASPY 2017: 15-22 - 2015
- [j5]Bernd Grobauer, Klaus-Peter Kossakowski, Thomas Schreck:
Klassifikation von IT-Sicherheitsvorfällen. Datenschutz und Datensicherheit 40(1): 17-21 (2015) - 2011
- [j4]Bernd Grobauer, Tobias Walloschek, Elmar Stöcker:
Understanding Cloud Computing Vulnerabilities. IEEE Secur. Priv. 9(2): 50-57 (2011) - 2010
- [c6]Bernd Grobauer, Thomas Schreck:
Towards incident handling in the cloud: challenges and approaches. CCSW 2010: 77-86
2000 – 2009
- 2006
- [c5]Bernd Grobauer, Jens Ingo Mehlau, Jürgen Sander:
CarmentiS: A Co-Operative Approach Towards Situation Awareness and Early Warning for the Internet. IMF 2006: 55-66 - 2001
- [j3]Bernd Grobauer, Zhe Yang:
The Second Futamura Projection for Type-Directed Partial Evaluation. High. Order Symb. Comput. 14(2-3): 173-219 (2001) - [j2]Olivier Danvy, Bernd Grobauer, Morten Rhiger:
A Unifying Approach to Goal-directed Evaluation. New Gener. Comput. 20(1): 53-74 (2001) - [j1]Bernd Grobauer, Julia L. Lawall:
Partial Evaluation of Pattern Matching in Strings, revisited. Nord. J. Comput. 8(4): 437-462 (2001) - [c4]Bernd Grobauer:
Cost Recurrences for DML Programs. ICFP 2001: 253-264 - [c3]Olivier Danvy, Bernd Grobauer, Morten Rhiger:
A Unifying Approach to Goal-Directed Evaluation. SAIG 2001: 108-125 - 2000
- [c2]Bernd Grobauer, Zhe Yang:
The Second Futamura Projection for Type-Directed Partial Evaluation. PEPM 2000: 22-32
1990 – 1999
- 1999
- [c1]Bernd Grobauer, Olaf Müller:
From I/O Automata to Timed I/O Automata. TPHOLs 1999: 273-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint