1. An architecture-centric approach to detecting security patterns in software;Bunke,2011
2. C. Brandt, F. Hermann, T. Engel, Modeling and reconfiguration of critical business processes for the purpose of a business continuity management respecting security, risk and compliance requirements at credit Suisse using algebraic graph transformation, in: Enterprise Distributed Object Computing Conference Workshops, 2009, EDOCW 2009, 13th Proceedings of International Workshop on Dynamic and Declarative Business Processes (DDBP 2009), IEEE Xplore Digital Library, 2009, pp. 64–71.
3. Generation and evaluation of business continuity processes using algebraic graph transformation and the mCRL2 process algebra;Brandt;Journal of Research and Practice in Information Technology,2010
4. C. Brandt, T. Engel, F. Hermann, B. Braatz, H. Ehrig, An approach using formally well-founded domain languages for secure coarse-grained IT system modelling in a real-world banking scenario, in: Proceedings of the 18th Australasian Conference on Information Systems (ACIS 2007), Toowoomba, Queensland, Australia, pp. 1–10, Paper 62.
5. C. Brandt, F. Hermann, How far can enterprise modeling for banking be supported by graph transformation?, in: Proceedings of ICGT'10, Lecture Notes in Computer Science, vol. 6372, Springer, 2010, pp. 3–26.