default search action
Stefan Dziwok
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2017
- [b1]Stefan Dziwok:
Specification and verification for real-time coordination protocols of cyber-physical systems. University of Paderborn, Germany, 2017
Journal Articles
- 2015
- [j1]Christian Heinzemann, Christian Brenner, Stefan Dziwok, Wilhelm Schäfer:
Automata-based refinement checking for real-time systems. Comput. Sci. Res. Dev. 30(3-4): 255-283 (2015)
Conference and Workshop Papers
- 2024
- [c16]Samira Taaibi, Stefan Dziwok, Lars Hermerschmidt, Thorsten Koch, Sven Merschjohann, Mark Vollmary:
Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report. AMCIS 2024 - 2022
- [c15]Thorsten Koch, Sascha Trippel, Stefan Dziwok, Eric Bodden:
Integrating Security Protocols in Scenario-based Requirements Specifications. MODELSWARD 2022: 15-25 - [c14]Goran Piskachev, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, Eric Bodden:
How far are German companies in improving security through static program analysis tools? SecDev 2022: 7-15 - 2020
- [c13]Thorsten Koch, Stefan Dziwok, Jörg Holtmann, Eric Bodden:
Scenario-based specification of security protocols and transformation to security model checkers. MoDELS 2020: 343-353 - [c12]Masud Fazal-Baqaie, Jan-Niclas Strüwer, David Schmelter, Stefan Dziwok:
Coaching on the Job bei Unternehmen des Maschinenbaus. SE 2020: 201-207 - 2019
- [c11]Faruk Pasic, Benedict Wohlers, Stefan Dziwok, Matthias Becker, Matthias Heinrich:
A KPI-based Condition Monitoring System for the Beer Brewing Process. ETFA 2019: 1469-1472 - [c10]Masud Fazal-Baqaie, Jan-Niclas Strüwer, David Schmelter, Stefan Dziwok:
Coaching on the Job bei Unternehmen des Maschinen- und Anlagenbaus. PVM 2019: 31-43 - [c9]Katharina Altemeier, Matthias Becker, Stefan Dziwok, Thorsten Koch, Sven Merschjohann:
Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design. PVM 2019: 247-252 - 2017
- [c8]Stefano Schivo, Bugra M. Yildiz, Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, Mariëlle Stoelinga:
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. SETTA 2017: 319-336 - 2015
- [c7]Christopher Gerking, Wilhelm Schäfer, Stefan Dziwok, Christian Heinzemann:
Domain-Specific Model Checking for Cyber-Physical Systems. MoDeVVa@MoDELS 2015: 18-27 - 2014
- [c6]Uwe Pohlmann, Henning Trsek, Lars Duerkop, Stefan Dziwok, Felix Oestersotebier:
Application of an intelligent network architecture on a cooperative cyber-physical system: An experience report. ETFA 2014: 1-6 - [c5]Steffen Becker, Stefan Dziwok, Christopher Gerking, Christian Heinzemann, Wilhelm Schäfer, Matthias Meyer, Uwe Pohlmann:
The MechatronicUML method: model-driven software engineering of self-adaptive mechatronic systems. ICSE Companion 2014: 614-615 - [c4]Stefan Dziwok, Sebastian Goschin, Steffen Becker:
Specifying Intra-Component Dependencies for Synthesizing Component Behaviors. ModComp@MoDELS 2014: 16-25 - [c3]Stefan Dziwok, Christopher Gerking, Steffen Becker, Sebastian Thiele, Christian Heinzemann, Uwe Pohlmann:
A tool suite for the model-driven software engineering of cyber-physical systems. SIGSOFT FSE 2014: 715-718 - [c2]Uwe Pohlmann, Stefan Dziwok, Matthias Meyer, Matthias Tichy, Sebastian Thiele:
A modelica coordination pattern library for cyber-physical systems. SimuTools 2014: 76-85 - 2012
- [c1]Stefan Dziwok, Christian Heinzemann, Matthias Tichy:
Real-Time Coordination Patterns for Advanced Mechatronic Systems. COORDINATION 2012: 166-180
Informal and Other Publications
- 2022
- [i2]Goran Piskachev, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, Eric Bodden:
How far are German companies in improving security through static program analysis tools? CoRR abs/2208.06136 (2022) - 2021
- [i1]Stefan Dziwok, Thorsten Koch, Sven Merschjohann, Boris Budweg, Sebastian Leuer:
AppSecure.nrw Software Security Study. CoRR abs/2108.11752 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint