[PDF][PDF] Product-line engineering for smart manufacturing: A systematic mapping study on security concepts

R May, AJ Alex, R Suresh, T Leich - International Conference on …, 2024 - researchgate.net
The growing configurability of smart-manufacturing software systems (SMSS) introduces a
variety of security concerns. Although there is an ever-increasing risk for exploiting …

A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

[HTML][HTML] Potential of Large Language Models in Health Care: Delphi Study

K Denecke, R May, LLMHealthGroup… - Journal of Medical …, 2024 - jmir.org
Background A large language model (LLM) is a machine learning model inferred from text
data that captures subtle patterns of language use in context. Modern LLMs are based on …

A Practitioners Perspective on Addressing Cyber Security and Variability Challenges in Modern Automotive Systems

P Zellmer, L Holsten, R May, T Leich - Proceedings of the 18th …, 2024 - dl.acm.org
Modern cars are becoming increasingly software-driven and interconnected, including new
innovative functions, such as over-the-air updates. Such functions are typically based on …

Conversational Agents in Healthcare: A Variability Perspective

R May, K Denecke - Proceedings of the 18th International Working …, 2024 - dl.acm.org
Conversational agents in healthcare are gaining popularity, for example, in the context of
eliciting medical histories. Furthermore, due to the growing diversity of use cases and …

[PDF][PDF] Towards vulnerabilities caused by application configuring: A meta analysis of the National Vulnerability Database

R May, XM Zerweck - 24. Nachwuchswissenschaftler …, 2024 - monami.hs-mittweida.de
Configuring applications might lead to diverse security issues. In this study, 263
vulnerabilities of the National Vul-nerability Database were analyzed, which were caused by …

[PDF][PDF] Challenges of Security and Configurability in Enterprise-Resource-Planning Systems

R May, C Biermann - 24. Nachwuchswissenschaftler …, 2024 - monami.hs-mittweida.de
In this study, we investigated security of enterprise-resource-planning systems and their
modeling based on product-line engineering techniques. Precisely, we systematically …