default search action
Thomas Leich
- > Home > Persons > Thomas Leich
Publications
- 2025
- [c120]Christian Biermann, Richard May, Thomas Leich:
Integrating Security into the Product-Line-Engineering Framework: A Security-Engineering Extension. ICSOFT 2025: 75-86 - [c119]Richard May, Leonard Cassel
, Hashir Hussain, Muhammad Talha Siddique, Tobias Niemand, Paul Scholz, Thomas Leich:
Adopting Artificial-Intelligence Systems in Manufacturing: A Practitioner Survey on Challenges and Added Value. ICSOFT 2025: 87-98 - [c117]Richard May
, Christian Biermann
, Jacob Krüger
, Thomas Leich
:
Asking Security Practitioners: Did You Find the Vulnerable (Mis)Configuration? VaMoS 2025: 30-39 - 2024
- [j17]Richard May
, Niklas Baron, Jacob Krüger
, Thomas Leich:
Pandemic startup software engineering: An experience report on the development of a COVID-19 certificate verification system. J. Syst. Softw. 216: 112106 (2024) - [c116]Richard May
, Jacob Krüger
, Thomas Leich
:
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. ARES 2024: 44:1-44:12 - [c113]Richard May
, Johanna Daher
, Jacob Krüger
, Thomas Leich
:
An Experience Report on Using Video-Creation Tasks in Requirements-Engineering Education. SEET@ICSE 2024: 201-211 - [c112]Richard May, Alen John Alex, Rakky Suresh, Thomas Leich:
Product-Line Engineering for Smart Manufacturing: A Systematic Mapping Study on Security Concepts. ICSOFT 2024: 323-330 - [c108]Richard May
, Christian Biermann
, Xenia Marlene Zerweck
, Kai Ludwig
, Jacob Krüger
, Thomas Leich
:
Vulnerably (Mis)Configured? Exploring 10 Years of Developers' Q&As on Stack Overflow. VaMoS 2024: 112-122 - [c107]Philipp Zellmer
, Lennart Holsten
, Richard May
, Thomas Leich
:
A Practitioners Perspective on Addressing Cyber Security and Variability Challenges in Modern Automotive Systems. VaMoS 2024: 129-133 - 2023
- [c105]Richard May, Christian Biermann, Andy Kenner, Jacob Krüger, Thomas Leich:
A Product-Line-Engineering Framework for Secure Enterprise-Resource-Planning Systems. CENTERIS/ProjMAN/HCist 2023: 1619-1626 - [c102]Richard May, Tobias Niemand, Paul Scholz, Thomas Leich:
Design Patterns for Monitoring and Prediction Machine Learning Systems: Systematic Literature Review and Cluster Analysis. ICSOFT 2023: 209-216 - [c101]Richard May, Jyoti Gautam, Chetan Sharma, Christian Biermann, Thomas Leich:
A Systematic Mapping Study on Security in Configurable Safety-Critical Systems Based on Product-Line Concepts. ICSOFT 2023: 217-224 - 2022
- [c86]Richard May
, Christian Biermann, Jacob Krüger, Gunter Saake, Thomas Leich:
A systematic mapping study of security concepts for configurable data storages. SPLC (A) 2022: 108-119 - 2021
- [c81]Andy Kenner, Richard May, Jacob Krüger, Gunter Saake, Thomas Leich:
Safety, security, and configurable software systems: a systematic mapping study. SPLC (A) 2021: 148-159
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-14 22:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint