2014

2014

Publications

Taxonomy of Data Fragment Classification Technique
Poisel Rainer, Rybnicek Marlies, Tjoa Simon, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 5th International Conference on Digital Forensics & Cyber Crime, 132, Moscow, Russia, Springer, pp. 67-85, 2014.
Problem Characterization and Abstraction for Visual Analytics in Behavior-Based Malware Pattern Analysis
Wagner Markus, Aigner Wolfgang, Rind Alexander, Luh Robert, Dornhackl H., Kadletz K., Tavolato Paul, et al. In: Proceedings of the 2014 IEEE Workshop on Visualization for Cyber Security (VizSec 2014), ACM, pp. 9–16, ISBN: 978-1-4503-2826-5, 10.1145/2671491.2671498, 2014.
Keeping an Eye on Your Security Through Assurance Indicators
Ouedraogo Moussa, Kuo Chien-Ting, Tjoa Simon, Preston David, Dubois Eric, Simoes Paulo, Tiago Cruz, et al. , 12th International Conference on Security and Cryptography (SECRYPT), Scitpress DigitalLibrary, 2014.
A Roadmap to Continuous Biometric Authentication on Mobile Devices
Rybnicek Marlies, Lang-Muhr Christoph, Haslinger Daniel, , 10th International Wireless Communications and Mobile Computing Conference (IWCMC), Nikosia, Zypern, IEEE, 2014.
Simulation-based Cyber-Attack Assessment of Critical Infrastructures
Rybnicek Marlies, Tjoa Simon, Poisel Rainer, In: Lecture Notes in Business Information Processing, 10th International Workshop on Enterprise & Organizational Modeling and Simulation (EOMAS 2014), Thessaloniki, Griechenland, Springer, 2014.
Towards Fully Automated Digital Alibis with Social Interaction
Beyer Stefanie, Mulazzani Martin, Schrittwieser Sebastian, Huber Markus, Weippl Edgar, In: Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014.
InnoDB Datenbank Forensik – Rekonstruktion von Abfragen über Datenbank-interne Logfiles
Fruehwirt Peter, Kieseberg Peter, Hochreiner Christoph, Schrittwieser Sebastian, Weippl Edgar, In: GI Sicherheit 2014, 2014.
Malicious Behavior Patterns
Dornhackl H., Kadletz K., Luh R., Tavolato P., , CyberPatterns 2014: 8th International Symposium on service-Oriented System Engineering, IEEE, 2014.
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
Kieseberg Peter, Schrittwieser Sebastian, Mulazzani Martin, Echizen Isao, Weippl Edgar, Special Issue on Security and Privacy in Business Networking, 2014.

Lectures

Problem Characterization and Abstraction for Visual Analytics in Behavior-Based Malware Pattern Analysis
Wagner Markus, Aigner Wolfgang, Rind Alexander, Luh Robert, Dornhackl H., Kadletz K., Tavolato Paul, et al. In: Proceedings of the 2014 IEEE Workshop on Visualization for Cyber Security (VizSec 2014), ACM, pp. 9–16, ISBN: 978-1-4503-2826-5, 10.1145/2671491.2671498, 2014.
Keeping an Eye on Your Security Through Assurance Indicators
Ouedraogo Moussa, Kuo Chien-Ting, Tjoa Simon, Preston David, Dubois Eric, Simoes Paulo, Tiago Cruz, et al. , 12th International Conference on Security and Cryptography (SECRYPT), Scitpress DigitalLibrary, 2014.
A Roadmap to Continuous Biometric Authentication on Mobile Devices
Rybnicek Marlies, Lang-Muhr Christoph, Haslinger Daniel, , 10th International Wireless Communications and Mobile Computing Conference (IWCMC), Nikosia, Zypern, IEEE, 2014.
Simulation-based Cyber-Attack Assessment of Critical Infrastructures
Rybnicek Marlies, Tjoa Simon, Poisel Rainer, In: Lecture Notes in Business Information Processing, 10th International Workshop on Enterprise & Organizational Modeling and Simulation (EOMAS 2014), Thessaloniki, Griechenland, Springer, 2014.
Towards Fully Automated Digital Alibis with Social Interaction
Beyer Stefanie, Mulazzani Martin, Schrittwieser Sebastian, Huber Markus, Weippl Edgar, In: Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014.
InnoDB Datenbank Forensik – Rekonstruktion von Abfragen über Datenbank-interne Logfiles
Fruehwirt Peter, Kieseberg Peter, Hochreiner Christoph, Schrittwieser Sebastian, Weippl Edgar, In: GI Sicherheit 2014, 2014.
Malicious Behavior Patterns
Dornhackl H., Kadletz K., Luh R., Tavolato P., , CyberPatterns 2014: 8th International Symposium on service-Oriented System Engineering, IEEE, 2014.
Lernverschiedenheit und Studienerfolg
Haag Johann, „Diversität: Jenseits von sozialen Kategorien?“ Heterogenität von Studierenden und Lernverschiedenheiten neu denken! Ein Expertengespräch organisiert vom Projekt nexus (Hochschulrektorenkonferenz (HRK)) – Konzepte und gute Praxis für Studium und Lehre, Universitätsclub Bonn, 2014.
Ist das freiwillig oder muss ich dahin?!
Metzger Christiane, Haag Johann, In: GABF-Tagung 2014, Geblockte Module als Reaktion auf eine heterogene Lernmotivation, Frankfurt am Main, Deutschland, 2014.