"Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Run-time Verification of Cryptographic Protocols", Journal for Computers & Security, vol. 29, 2010.
"A Graph Query Language for EMF models", Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
"A Tool for Managing Evolving Security Requirements", CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Incremental Evaluation of Model Queries over EMF Models", Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.
Acceptance rate: 21%
"Implementing Efficient Model Validation in EMF Tools: Tool Demonstration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
"Change-driven model transformations. Change (in) the rule to rule the change.", Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
"A Tool for Managing Evolving Security Requirements", CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery", Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011.
"Graph Transformation with Incremental Pattern Matching on a Relational Database", International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.
In Review for Post-proceedings.
"Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
"Parallelization of Graph Transformation Based on Incremental Pattern Matching", 8th International Workshop on Graph Transformation and Visual Modeling Techniques, York, United Kingdom, 2009.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
"Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests", A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
"SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009.
Paradigma "Lebendige Sicherheit"., , vol. 11, no. 1, 2011.
"Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering", International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)), 2010.
"MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure", International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
"Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.", The Fifth International Conference on Software Engineering Advances, Nice, France, IEEE Computer Society, 08/2010.
"Living Models - Ten Principles for Change-Driven Software Engineering", Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
"Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011.
SeAAS – Introduction and Empirical Performance Evaluation, , no. QE-2011-24: QE, 2011.
"Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2.