Publikationen

2018

Schriftpublikationen

A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
Rieger David, Tjoa Simon, , International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018), Springer, 2018.
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Zamyatin Alexei, Stifter Nicholas, Judmayer Aljosha, Schindler Philipp, Weippl Edgar R., In: 5th Workshop on Bitcoin and Blockchain Research, 5th Workshop on Bitcoin and Blockchain Research, URL: https://eprint.iacr.org/2018/087.pdf, 2018.
Bessere Verteidigung gegen industrielle Schadsoftware
Brandstetter Thomas, Industrial Communication Journal, 2018.
These are the good old days: Analysis and taxonomy of ICS attack campaigns
Brandstetter Thomas, Convay T., , SANS ICS Europe, 2018.
Blocking usb-based keypress injection attacks
Neuner Sebastian, Voyiatzis Artemios, Fotopoulos Spiros, Mulliner Collin, Weippl Edgar, , 32nd IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), 2018.
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids
Ullrich Johanna, Stifter Nicholas, Judmayer Aljosha, Weippl Edgar, , International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018.
On security research towards future mobile network generations
Rupprecht David, Dabrowski Adrian, Holz Thorsten, Weippl Edgar, Popper Christina, IEEE Communications Surveys & Tutorials, 2018.
Bessere Verteidigung gegen industrielle Schadsoftware
Brandstetter Thomas, Industrial Communication Journal, vol. 2, issue Mai 2018, 2018.
Can we trust Machine Learning Results? Artificial Intelligence in Safety-Critical decision Support
Holzinger Katharina, Mak Klaus, Kieseberg Peter, Holzinger Andreas, ERCIM News, vol. 112, issue 1, pp. 42-43, 2018.
SEQUIN: A Grammar Inference Framework for Analyzing Malicious System Behavior
Luh Robert, Schramm Georg, Wagner Markus, Janicke Helge, Schrittwieser Sebastian, Journal of Computer Virology and Hacking Techniques, 2018.
APT RPG: Design of a Gamified Attacker/Defender Meta Model
Robert Luh, Temper Marlies, Tjoa Simon, Schrittwieser Sebastian, In: International Workshop on FORmal methods for Security Engineering, International Workshop on FORmal methods for Security Engineering, 2018.
Attacks on Industrial Control Systems – Modeling and Anomaly Detection
Eigner Oliver, Kreimel Philipp, Tavolato Paul, In: International Workshop on FORmal methods for Security Engineering - ForSE 2018, International Workshop on FORmal methods for Security Engineering - ForSE 2018, SCITEPRESS, 2018.