2013

Schriftpublikationen

Poisel, Rainer / Malzer, Erich und Tjoa, Simon (2013): Evidence and Cloud Computing: The Virtual Machine Introspection Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4(1), S. 135–152.

Poisel, Rainer / Rybnicek, Marlies / Schildendorfer, Bernhard und Tjoa, Simon (2013): Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 5(3).

Poisel, Rainer / Rybnicek, Marlies und Tjoa, Simon (2013a): Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures. In: International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain. IEEE.

Poisel, Rainer / Rybnicek, Marlies und Tjoa, Simon (2013b): Taxonomy of Data Fragment Classification Technique. In: 5th International Conference on Digital Forensics & Cyber Crime, Moscow, Russia. Springer.

Rybnicek, Marlies / Poisel, Rainer und Tjoa, Simon (2013a): Automatisierte Akquise und Auswertung kinderpornographischer Inhalte. In: 7. Forschungsforum der Österreichischen Fachhochschulen, Dornbirn, Österreich.

Rybnicek, Marlies / Poisel, Rainer und Tjoa, Simon (2013b): Facebook Watchdog: A Research Agenda For Detecting Online Grooming and Bullying Activities. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), Manchester, England. IEEE.

Schrattenholzer, Matthias / Ruzicka, Manfred / Rybnicek, Marlies / Poisel, Rainer und Tjoa, Simon (2013): Wer spielt gewinnt. In: D-A-CH Security, Nürnberg, Deutschland.

Westfeld, A. / Wurzer, J. / Fabian, C. und Piller, E. (2013): Pit Stop for an Audio Steganography Algorithm. In: 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS), Springer, S. 123–134.

Wöhrer, A. / Kaniovskyi, Y. und Kobler, M. (2013): Modding and Cloud Gaming: Business Considerations and Technical Aspects. In: International Conference on Internet and Web Applications and Services (ICIW), Rome, Italy.

Vorträge

Westfeld, A. / Wurzer, J. / Fabian, C. und Piller, E. (2013): Pit Stop for an Audio Steganography Algorithm. In: 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS), Springer, S. 123–134.