Остановите войну!
for scientists:
default search action
Christian Jung
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Martin de Boer, Stijn de Gouw, Jonas Klamroth, Christian Jung, Mattias Ulbrich, Alexander Weigl:
Formal Specification and Verification of JDK's Identity Hash Map Implementation. Formal Aspects Comput. 35(3): 18:1-18:26 (2023) - [j7]Michael Beil, P. Vernon van Heerden, Dylan W. De Lange, Wojciech Szczeklik, Susannah Leaver, Bertrand Guidet, Hans Flaatten, Christian Jung, Sigal Sviri, Leo Joskowicz:
Contribution of information about acute and geriatric characteristics to decisions about life-sustaining treatment for old patients in intensive care. BMC Medical Informatics Decis. Mak. 23(1): 1 (2023) - [i4]Christian Jung, Claudia Redenbach:
An Analytical Representation of the 2d Generalized Balanced Power Diagram. CoRR abs/2303.15275 (2023) - 2022
- [j6]Tin Barisin, Christian Jung, Franziska Müsebeck, Claudia Redenbach, Katja Schladitz:
Methods for segmenting cracks in 3d images of concrete: A comparison based on semi-synthetic images. Pattern Recognit. 129: 108747 (2022) - [c14]Martin de Boer, Stijn de Gouw, Jonas Klamroth, Christian Jung, Mattias Ulbrich, Alexander Weigl:
Formal Specification and Verification of JDK's Identity Hash Map Implementation. IFM 2022: 45-62 - [p1]Christian Jung, Jörg Dörr:
Data Usage Control. Designing Data Spaces 2022: 129-146 - [i3]Christian Jung, Claudia Redenbach:
Crack Modeling via Minimum-Weight Surfaces in 3d Voronoi Diagrams. CoRR abs/2210.05093 (2022) - 2021
- [j5]Bernhard Wernly, Behrooz Mamandipoor, Philipp Baldia, Christian Jung, Venet Osmani:
Machine learning predicts mortality in septic patients using only routinely available ABG variables: a multi-centre evaluation. Int. J. Medical Informatics 145: 104312 (2021) - [j4]Behrooz Mamandipoor, Fernando Frutos-Vivar, Oscar Peñuelas, Richard Rezar, Konstantinos Raymondos, Alfonso Muriel, Bin Du, Arnaud W. Thille, Fernando Rios, Marco González, Lorenzo del-Sorbo, María Del Carmen Marín, Bruno Valle Pinheiro, Marco Antonio Soares, Nicolas Nin, Salvatore M. Maggiore, Andrew Bersten, Malte Kelm, Raphael Romano Bruno, Pravin Amin, Nahit Cakar, Gee Young Suh, Fekri Abroug, Manuel Jibaja, Dimitros Matamis, Amine Ali Zeggwagh, Yuda Sutherasan, Antonio Anzueto, Bernhard Wernly, Andrés Esteban, Christian Jung, Venet Osmani:
Machine learning predicts mortality based on analysis of ventilation parameters of critically ill patients: multi-centre validation. BMC Medical Informatics Decis. Mak. 21(1): 152 (2021) - [i2]Tin Barisin, Christian Jung, Franziska Müsebeck, Claudia Redenbach, Katja Schladitz:
Methods for segmenting cracks in 3d images of concrete: A comparison based on semi-synthetic images. CoRR abs/2112.09493 (2021) - 2020
- [c13]Arghavan Hosseinzadeh, Andreas Eitel, Christian Jung:
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements. ICISSP 2020: 397-405
2010 – 2019
- 2019
- [b2]Christian Jung:
Data-driven optimization of hot rolling processes. Dortmund University, Germany, 2019 - [b1]Christian Jung:
Context-aware Security. Kaiserslautern University of Technology, Germany, Fraunhofer Verlag 2019, ISBN 978-3-8396-1490-7, pp. 1-400 - [j3]Johannes Zrenner, Frederik Möller, Christian Jung, Andreas Eitel, Boris Otto:
Usage control architecture options for data sovereignty in business ecosystems. J. Enterp. Inf. Manag. 32(3): 477-495 (2019) - 2016
- [j2]Martin Steinebach, Erik Krempel, Christian Jung, Mario Hoffmann:
Datenschutz und Datenanalyse. Datenschutz und Datensicherheit 40(7): 440-445 (2016) - 2015
- [c12]Christian Jung, Denis Feth, Yehia Elrakaiby:
Automatic derivation of context descriptions. CogSIMA 2015: 70-76 - 2014
- [c11]Christian Jung, Andreas Eitel, Reinhard Schwarz:
Enhancing Cloud Security with Context-aware Usage Control Policies. GI-Jahrestagung 2014: 211-222 - [c10]Manuel Rudolph, Reinhard Schwarz, Christian Jung:
Security policy specification templates for critical infrastructure services in the cloud. ICITST 2014: 61-66 - 2013
- [c9]Christian Jung, Denis Feth, Christian Seise:
Context-Aware Policy Enforcement for Android. SERE 2013: 40-49 - 2012
- [c8]Denis Feth, Christian Jung:
Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments. MobiSec 2012: 69-80 - 2011
- [j1]Christian Jung, Manuel Rudolph, Reinhard Schwarz:
Security Evaluation of Service-Oriented Systems Using the SiSOA Method. Int. J. Secur. Softw. Eng. 2(4): 19-33 (2011) - [c7]Christian Jung, Manuel Rudolph, Reinhard Schwarz:
Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base. ARES 2011: 698-703 - [c6]Christian Jung, Daniel Karch, Sebastian Knopp, Dennis Luxen, Peter Sanders:
Engineering efficient error-correcting geocoding. GIS 2011: 469-472 - [i1]Christian Jung, Daniel Karch, Sebastian Knopp, Dennis Luxen, Peter Sanders:
Efficient Error-Correcting Geocoding. CoRR abs/1102.3306 (2011) - 2010
- [c5]Christian Jung, Frank Elberzhager, Alessandra Bagnato, Fabio Raiteri:
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project. ARES 2010: 531-536 - [c4]Ad J. van de Goor, Christian Jung, Said Hamdioui, Georgi Gaydadjiev:
Low-cost, customized and flexible SRAM MBIST engine. DDECS 2010: 382-387 - [c3]Pablo Oliveira Antonino, Slawomir Duszynski, Christian Jung, Manuel Rudolph:
Indicator-based architecture-level security evaluation in a service-oriented environment. ECSA Companion Volume 2010: 221-228
2000 – 2009
- 2009
- [c2]Frank Elberzhager, Marek Jawurek, Christian Jung, Alexander Klaus:
Progress report on the experimental evaluation of security inspection guidance. ESEM 2009: 485-489 - 2007
- [c1]Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt:
Phishing in the Wireless: Implementation and Analysis. SEC 2007: 145-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-29 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint