2016

2016

Publications

Privacy Aware Machine Learning and the Right to be Forgotten
Malle Bernd, Kieseberg Peter, Schrittwieser Sebastian, Holzinger Andreas, ERCIM News, issue 107, 2016.
Hierarchical-Table-Based Model for All-Digital RF Transmitters
Leder Norbert, Pichler Bernhard, Faseth Thomas, Ruotsalainen Henri, Arthaber Holger, IEEE Transactions on Microwave Theory and Techniques, issue 99, 2016.
Forensics using Internal Database Structures
Kieseberg Peter, Weippl Edgar, Schrittwieser Sebastian, ERCIM News, issue 108, 2016.
Detection of Data Leaks in Collaborative Data Driven Research
Kieseberg Peter, Weippl Edgar, Schrittwieser Sebastian, ERCIM News, issue 105, 2016.
Can it keep pace with progress in code analysis
Schrittwieser Sebastian, Katzenbeisser S, Kinder J, Merzdovnik G, Weippl Edgar, Computing Surveys, vol. 49, issue 1, 2016.
When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging
Schröder Svenja, Huber Markus, Wind David, Rottermanner C, , EuroUSEC, 2016.
Pin it! Improving Android network security at runtime
Buhov Damjan, Huber Markus, Merzdovnik Georg, Weippl Edgar, , IFIP Networking Conference (IFIP Networking) and Workshops, IEEE, 2016.
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large
Mayer Wilfried, Zauner Aaron, Schmiedecker Martin, Huber Markus, , 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, IEEE, 2016.
TAON: An Ontology-based Approach to Mitigating Targeted Attacks
Luh Robert, Schrittwieser Sebastian, Marschalek Stefan, , International Conference on Information Integration and Web-based Applications & Services (iiWAS), ACM, 2016.
Business Continuity & Desaster Recovery als Planspiel umgesetzt
Haslinger Daniel, Lang-Muhr Christoph, In: Kompetenzorientiert Lehren und Prüfen, Tag der Lehre, St. Pölten, ikon Verlag, ISBN: 978-3-99023-450-1, 2016.
Moderne Beschaffung mit Berücksichtigung von IT-Security
Österreicher Gabor, Pötzelsberger Gerhard, Piller Ernst, , D-A-CH Security, pp. 214-223, 2016.
The Role of ICT to Achieve the UN Sustainable Development Goals (SDG)
Tjoa A Min, Tjoa Simon, In: ICT for Promoting Human Development and Protecting the Environment, 6th IFIP World Information Technology Forum, WITFOR 2016, Springer, pp. 3-13, URL: http://link.springer.com/chapter/10.1007/978-3-319-44447-5_1/fulltext.html, 10.1007/978-3-319-44447-5_1, 2016.
Detection of Man-in-the-Middle Attacks on Industrial Control Networks
Eigner Oliver, Kreimel Philipp, Tavolato Paul, , 2016 International Conference on Software Security and Assurance (ICSSA), St. Pölten, Austria, IEEE, 2016.
Assessment of Server State via Inter-Clone Differences
Pirker Martin, Nusser Andreas, , 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication
Temper Marlies, Tjoa Simon, , the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
Defeating the Database Adversary Using Deception – A MySQL Database Honeypot
Wegerer Mathias, Tjoa Simon, , 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
Catch Me If You Can! Transparent Detection Of Shellcode
Buhov Damjan, Thron Richard, Schrittwieser Sebastian, , the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
Enterprise Mobility - Market, products and technical approaches; relevant organisational and legal aspects
Travniček Reinhard, Höllwarth Tobias, Árpád Geréd, Haidvogl Gerald, Lang-Muhr Christoph, , https://www.eurocloud.at/projekte/publikationen/leitfaeden.html, 2016.
Semantics-aware detection of targeted attacks – A survey
Luh Robert, Marschalek Stefan, Kaiser Manfred, Janicke H, Schrittwieser Sebastian, Journal of Computer Virology and Hacking Techniques, pp. 1-39, 2016.
Empirical Malware Research through Observation of System Behaviour
Marschalek Stefan, Kaiser Manfred, Luh Robert, Schrittwieser Sebastian, In: First Workshop on Empirical Research Methods in Information Security, ACM, pp. 467-469, 10.1145/2872518.2888609, 2016.
A Work-Flow for Empirical Exploration of Security Events
Pirker Martin, Nusser Andreas, In: 25th International Conference Companion on World Wide Web, 25th International Conference Companion on World Wide Web, WWW '16 Companion, ACM, URL: http://www2016.net/proceedings/companion/p477.pdf, 10.1145/2872518.2888607, 2016.