A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

Conversational Agents in Healthcare: A Variability Perspective

R May, K Denecke - Proceedings of the 18th International Working …, 2024 - dl.acm.org
Conversational agents in healthcare are gaining popularity, for example, in the context of
eliciting medical histories. Furthermore, due to the growing diversity of use cases and …

[PDF][PDF] Towards vulnerabilities caused by application configuring: A meta analysis of the National Vulnerability Database

R May, XM Zerweck - 24. Nachwuchswissenschaftler …, 2024 - monami.hs-mittweida.de
Configuring applications might lead to diverse security issues. In this study, 263
vulnerabilities of the National Vul-nerability Database were analyzed, which were caused by …