Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications chronologically - back to overwiew...

G. Wondracek, T. Holz, Ch. Platzer, E. Kirda, C. Krügel: Is the Internet for Porn? An Insight Into the Online Adult Industry
The Ninth Workshop on the Economics of Information Security (WEIS 2010), ACM Press, 2010; 14 pages
bib details pdf

C. Kolbitsch, C. Krügel, E. Kirda: Extending Mondrian Memory Protection
IST-091 Information Assurance and Cyber Defence, NATO Research and Technology Organization (NATO RTO), 2010, ISBN: 978-92-837-0115-6; 18 pages
bib details pdf

C. Leita, U. Bayer, E. Kirda: Exploiting diverse observation perspectives to get insights on the malware landscape
Proceedings of the 40th Dependable Systems & Networks Conference (DSN), IEEE Computer Society, 2010, p. 393 - 402
bib details pdf

C. Kolbitsch, T. Holz, C. Krügel, E. Kirda: Automated Extraction of Proprietary Gadgets from Malware Binaries
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 29 - 44
bib details doi pdf

G. Wondracek, T. Holz, E. Kirda, C. Krügel: A Practical Attack to De-Anonymize Social Network Users
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 223 - 238
bib details doi pdf

P. Milani Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Krügel, S. Zanero: Identifying Dormant Functionality in Malware Programs
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 61 - 76
bib details pdf

M. Balduzzi, M. Egele, D. Balzarotti, E. Kirda, C. Krügel: A Solution for the Automated Detection of Clickjacking Attacks
ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China; in: Proceedings of the 5th ACM Symposium on Information computer and Communication Security, ACM, 5 (2010), ISBN: 978-1-60558-936-7, p. 135 - 144
bib details doi pdf

S. Khattab: Efficient Interference Reduction in Low Complex Digital Direct Sequence Spread Spectrum Systems (PhD Thesis)
reviewers: A. Goiser, U. Schmid; E389, 2010; oral examination: 2010-06-02
bib details

P. Ferschin, M. Di Angelo, G. Suter: Exploring the potential of game engines for real-time light simulation
BAUSIM 2010, Vienna; in: BAUSIM 2010, A. Mahdavi, B. Martens (ed.); 2010, ISBN: 978-3-85437-317-9, p. 499 - 504
bib details

P. Smejkal, M. Di Angelo: Informatikunterricht in der Wiener AHS-Unterstufe
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7, p. 326 - 331
bib details

R. Planinc, M. Di Angelo: Facebook im Unterricht
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7, p. 296 - 304
bib details

M. Eisenbarth, M. Di Angelo: Experimentieren mit digitalem Ton
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 291 - 295
bib details

R. Planinc, E. Wetzinger, M. Di Angelo: Von der Kamera ins Web
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 285 - 290
bib details

M. Di Angelo, K. Berger, A. Schönbauer: Begabtenförderung mit LEGO Mindstorms
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 275 - 279
bib details

A. Goiser, S. Khattab, G. Fassl, U. Schmid: A New Robust Interference Reduction Scheme for Low Complexity Direct-Sequence Spread-Spectrum Receivers: Performance
CTRQ-2010, IEEE Conference Proceedings, 2010, ISBN: 978-0-7695-4070-2; 7 pages
bib details pdf

B. Huber, P. Puschner: A Code Policy Guaranteeing Fully Automated Path Analysis
10th International Workshop on Worst-Case Execution-Time Analysis, Brussels, Belgium; in: A Code Policy Guaranteeing Fully Automated Path Analysis, Austrian Computer Society, 2010, ISBN: 978-3-85403-268-7, p. 80 - 90
bib details

B. Huber, W. Puffitsch, M. Schoeberl: WCET driven design space exploration of an object cache
Workshop on Java Technologies for Real-time and Embedded Systems (JTRES), Prague, Czech Republic; in: WCET driven design space exploration of an object cache, ACM, 2010, ISBN: 978-1-4503-0122-0, p. 26 - 35
bib details doi

M. Schoeberl: Scheduling of Hard Real-Time Garbage Collection
Real-Time Systems, 45 (2010), p. 176 - 213
bib details doi

A. Wasicek, H. Kopetz, C. El Salloum: A System-on-a-Chip Platform for Mixed-Criticality Applications
Proceedings of 13th IEEE International Symposium on Object/component/service-oriented Real-time distributed computing (ISORC'10), Carmona, Seville, Spain; in: Proceedings of 13th IEEE International Symposium on Object/component/service-oriented Real-time distributed computing (ISORC'10), IEEE, 2010, ISBN: 978-1-4244-7083-9, p. 210 - 216
bib details doi

M. Schoeberl, W. Puffitsch, R. Pedersen, B. Huber: Worst-case execution time analysis for a Java processor
Software: Practice and Experience, 40 (2010), p. 507 - 542
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 >   >>