Android security permissions–can we trust them? C Orthacker, P Teufl, S Kraxberger, G Lackner, M Gissing, A Marsalek, ... Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 80 | 2012 |
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) P Teufl, M Ferk, A Fitzek, D Hein, S Kraxberger, C Orthacker Security and communication networks 9 (5), 389-419, 2016 | 64 | 2016 |
Passive RFID technology for the Internet of Things S Dominikus, M Aigner, S Kraxberger 2010 International Conference for Internet Technology and Secured …, 2010 | 46 | 2010 |
Android market analysis with activation patterns P Teufl, S Kraxberger, C Orthacker, G Lackner, M Gissing, A Marsalek, ... Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 28 | 2012 |
Extracting semantic knowledge from twitter P Teufl, S Kraxberger Electronic Participation: Third IFIP WG 8.5 International Conference, ePart …, 2011 | 24 | 2011 |
Secure communication with RFID tags in the Internet of Things S Dominikus, S Kraxberger Security and Communication Networks 7 (12), 2639-2653, 2014 | 20 | 2014 |
A process to facilitate automated automotive cybersecurity testing S Marksteiner, N Marko, A Smulders, S Karagiannis, F Stahl, ... 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 1-7, 2021 | 16 | 2021 |
Wlan location determination without active client collaboration S Kraxberger, G Lackner, U Payer Proceedings of the 6th International Wireless Communications and Mobile …, 2010 | 9 | 2010 |
Trusted identity management for overlay networks S Kraxberger, R Toegl, M Pirker, EP Guijarro, GG Millan Information Security Practice and Experience: 9th International Conference …, 2013 | 8 | 2013 |
Security concept for peer-to-peer systems S Kraxberger, U Payer Proceedings of the 2009 International Conference on Wireless Communications …, 2009 | 8 | 2009 |
IPv6 label switching on IEEE 802.15. 4 U Payer, S Kraxberger, P Holzer 2009 Third International Conference on Sensor Technologies and Applications …, 2009 | 6 | 2009 |
Massive data mining for polymorphic code detection U Payer, P Teufl, S Kraxberger, M Lamberger International Workshop on Mathematical Methods, Models, and Architectures …, 2005 | 6 | 2005 |
Polymorphic code detection with GA optimized markov models U Payer, S Kraxberger Communications and Multimedia Security: 9th IFIP TC-6 TC-11International …, 2005 | 6 | 2005 |
Cost-effective routing for a greener internet B Bergler, C Preschern, A Reiter, S Kraxberger 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010 | 5 | 2010 |
General security concept for embedded P2P systems S Kraxberger, U Payer, S Tillich Proceedings of the 5th Annual International Conference on Mobile and …, 2008 | 4 | 2008 |
Low-cost RFID tags as IPv6 nodes in the Internet of Things S Dominikus, H Gross, M Aigner, S Kraxberger Radio Frequency Identification System Security, 114-128, 2011 | 3 | 2011 |
An autonomous attestation token to secure mobile agents in disaster response DM Hein, R Toegl, S Kraxberger Security and communication networks 3 (5), 421-438, 2010 | 3 | 2010 |
Secure multi-agent system for multi-hop environments S Kraxberger, P Danner, D Hein Computer Network Security: 5th International Conference on Mathematical …, 2010 | 3 | 2010 |
Secure routing approach for unstructured p2p systems S Kraxberger, U Payer 2009 Third International Conference on Emerging Security Information …, 2009 | 3 | 2009 |
Securing emergency response operations using distributed trust decisions P Danner, D Hein, S Kraxberger 2010 Fourth International Conference on Network and System Security, 62-69, 2010 | 2 | 2010 |