Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications chronologically - back to overwiew...

C. Stögerer, W. Kastner: System Management Standards for Traffic Management Systems
14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; in: Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
bib details

W. Kastner, T. Novak: Functional Safety in Building Automation
14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; in: Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
bib details

F. Praus, W. Granzer, W. Kastner: Enhanced Control Application Development in Building Automation
7th IEEE International Conference on Industrial Informatics, Cardiff, UK; in: 7th IEEE International Conference on Industrial Informatics (INDIN '09), Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09), 2009, p. 390 - 395
bib details

W. Granzer, D. Lechner, F. Praus, W. Kastner: Securing IP Backbones in Building Automation Networks
7th IEEE International Conference on Industrial Informatics, Cardiff, UK; in: Proceedings 7th IEEE International Concerence on Industrial Informatics, Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09),, 2009, p. 410 - 415
bib details

C. Kolbitsch, M. Egele, Ch. Platzer: Removing web spam links from search engine results
Journal in Computer Virology, Online First (2009), p. 1 - 12
bib details doi pdf

W. Kastner, G. Neugschwandtner: Data communications for distributed building automation
Embedded Systems Handbook, Second Edition, Volume 2: Networked Embedded Systems, CRC Press, Boca Raton, 2009, ISBN: 978-1-4398-0761-3, p. 29-1 - 29-34
bib details

B. Stone-Gross, A. Moser, C. Krügel, E. Kirda, K. Almaroth: FIRE: FInding Rogue nEtworks
Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA; in: 25th Annual Computer Security Applications Conference (ACSAC), 2009
bib details pdf

P. Wurzinger, L. Bilge, E. Kirda, C. Krügel, T. Holz, J. Göbel: Automatically Generating Models for Botnet Detection
European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France; in: 14th European Symposium on Research in Computer Security (ESORICS 2009), 2009
bib details pdf

G. Neugschwandtner, W. Kastner: Congestion control in building automation networks: Considerations for KNX
35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), Porto, Portugal; in: Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), 2009; 6 pages
bib details

G. Fuchs: Implications of VLSI Fault Models and Distributed Systems Failure Models --- A Hardware Designer's View
Dagstuhl Seminar 08371 : Fault-Tolerant Distributed Algorithms on VLSI Chips, Dagstuhl, Germany; in: Fault-Tolerant Distributed Algorithms on VLSI Chips, Leibniz Zentrum Informatik, 8371 (2009), ISSN: 1862-4405, p. ?
bib details

P. Milani Comparetti, C. Kolbitsch, E. Kirda, C. Krügel, Z. Xiaoyong, W. Xiaofeng: Effective and Efficient Malware Detection at the End Host
Usenix Security Symposium, Montreal, Canada; in: usenix 2009, 2009
bib details pdf

W. Puffitsch: Data Caching, Garbage Collection, and the Java Memory Model
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details

S. Edwards, S. Kim, E. Lee, I. Liu, H. Patel, M. Schoeberl: A Disruptive Computer Design Idea: Architectures with Repeatable Timing
2009 IEEE International Conference on Computer Design, Resort at Squaw Creek, Lake Tahoe, California; in: 2009 IEEE International Conference on Computer Design, IEEE, CFP09ICD (2009), ISBN: 978-1-4244-5028-2, p. 54 - 59
bib details

P. Wurzinger, M. Egele, E. Kirda, C. Krügel: Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks
Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Milan, Italy; in: Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2009
bib details pdf

M. Egele, E. Kirda, Ch. Krügel: Mitigating Drive-by Download Attacks: Challenges and Open Problems
Open Research Problems in Network Security Workshop, Zurich; in: Open Research Problems in Network Security Workshop, 2009
bib details pdf

M. Schoeberl: JOP Reference Handbook
CreateSpace, 2009, ISBN: 978-1438239699; 362 pages
bib details

J. Whitham, N. Audsley, M. Schoeberl: Using Hardware Methods to Improve Time-predictable Performance in Real-time Java Systems
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details doi

U. Bayer, E. Kirda, C. Krügel, D. Balzarotti, I. Habibi: , Insights Into Current Malware Behavior
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Boston, MA, USA; in: 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009
bib details

E. Kirda, M. Egele, Ch. Krügel: Removing Web Spam Links from Search Engine Results
Conference of the European Institute for Computer Antivirus Research (EICAR), Berlin; in: EICAR proceedings, 2009
bib details pdf

W. Binder, M. Schoeberl, P. Moret, A. Villazón: Cross-profiling for Java processors
Software: Practice and Experience, John Wiley and Sons, 2009, ISSN: 0038-0644, p. 1439 - 1465
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 >   >>