Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications chronologically - back to overwiew...

W. Kastner, G. Neugschwandtner: Data communications for distributed building automation
Embedded Systems Handbook, Second Edition, Volume 2: Networked Embedded Systems, CRC Press, Boca Raton, 2009, ISBN: 978-1-4398-0761-3, p. 29-1 - 29-34
bib details

B. Stone-Gross, A. Moser, C. Krügel, E. Kirda, K. Almaroth: FIRE: FInding Rogue nEtworks
Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA; in: 25th Annual Computer Security Applications Conference (ACSAC), 2009
bib details pdf

P. Wurzinger, L. Bilge, E. Kirda, C. Krügel, T. Holz, J. Göbel: Automatically Generating Models for Botnet Detection
European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France; in: 14th European Symposium on Research in Computer Security (ESORICS 2009), 2009
bib details pdf

G. Neugschwandtner, W. Kastner: Congestion control in building automation networks: Considerations for KNX
35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), Porto, Portugal; in: Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), 2009; 6 pages
bib details

G. Fuchs: Implications of VLSI Fault Models and Distributed Systems Failure Models --- A Hardware Designer's View
Dagstuhl Seminar 08371 : Fault-Tolerant Distributed Algorithms on VLSI Chips, Dagstuhl, Germany; in: Fault-Tolerant Distributed Algorithms on VLSI Chips, Leibniz Zentrum Informatik, 8371 (2009), ISSN: 1862-4405, p. ?
bib details

P. Milani Comparetti, C. Kolbitsch, E. Kirda, C. Krügel, Z. Xiaoyong, W. Xiaofeng: Effective and Efficient Malware Detection at the End Host
Usenix Security Symposium, Montreal, Canada; in: usenix 2009, 2009
bib details pdf

W. Puffitsch: Data Caching, Garbage Collection, and the Java Memory Model
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details

S. Edwards, S. Kim, E. Lee, I. Liu, H. Patel, M. Schoeberl: A Disruptive Computer Design Idea: Architectures with Repeatable Timing
2009 IEEE International Conference on Computer Design, Resort at Squaw Creek, Lake Tahoe, California; in: 2009 IEEE International Conference on Computer Design, IEEE, CFP09ICD (2009), ISBN: 978-1-4244-5028-2, p. 54 - 59
bib details

P. Wurzinger, M. Egele, E. Kirda, C. Krügel: Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks
Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Milan, Italy; in: Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2009
bib details pdf

M. Egele, E. Kirda, Ch. Krügel: Mitigating Drive-by Download Attacks: Challenges and Open Problems
Open Research Problems in Network Security Workshop, Zurich; in: Open Research Problems in Network Security Workshop, 2009
bib details pdf

M. Schoeberl: JOP Reference Handbook
CreateSpace, 2009, ISBN: 978-1438239699; 362 pages
bib details

J. Whitham, N. Audsley, M. Schoeberl: Using Hardware Methods to Improve Time-predictable Performance in Real-time Java Systems
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details doi

U. Bayer, E. Kirda, C. Krügel, D. Balzarotti, I. Habibi: , Insights Into Current Malware Behavior
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Boston, MA, USA; in: 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009
bib details

E. Kirda, M. Egele, Ch. Krügel: Removing Web Spam Links from Search Engine Results
Conference of the European Institute for Computer Antivirus Research (EICAR), Berlin; in: EICAR proceedings, 2009
bib details pdf

W. Binder, M. Schoeberl, P. Moret, A. Villazón: Cross-profiling for Java processors
Software: Practice and Experience, John Wiley and Sons, 2009, ISSN: 0038-0644, p. 1439 - 1465
bib details doi

C. Krügel, Ch. Platzer, E. Kirda, C. Ludl, P. Wurzinger: SWAP: Mitigating XSS Attacks using a Reverse Proxy
International Workshop on Software Engineering for Secure Systems (SESS), Vancouver, Canada; in: SESS proceedings, 2009
bib details pdf

P. Milani Comparetti, G. Wondracek, C. Krügel, E. Kirda: Prospex: Protocol Specification Extraction
IEEE Symposium on Security and Privacy, The Claremont ressort, Oakland, California; in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE, 2009, ISBN: 978-0-7695-3633-0, p. 110 - 125
bib details pdf

M. Jeitler, J. Lechner: Speeding up Fault Injection for Asynchronous Logic by FPGA-based Emulation
ReConFig 2009 (International Conference on ReConFigurable Computing and FPGAs), Cancun, Quintana Roo, Mexico; in: ReConFig'09, CPS, 2009, ISBN: 9780769539171, p. 65 - 70
bib details doi

M. Jeitler, J. Lechner: Comparing the Robustness of Synchronous and Asynchronous Circuits by Fault Injection
MEMICS 2009 (Mathematical and Engineering Methods in Computer Science), Znojmo; in: MEMICS 2009 proceedings, Universität Brno, 2009, ISBN: 9788087342046, p. 110 - 117
bib details

M. Jeitler, M. Delvai, S. Reichör: Fuse - A Hardware Accelerated Hdl Fault Injection Tool
SPL 2009 (Southern Conference on Programmable Logic), Sao Carlos, Brazil; in: 2009, IEEE, 2009, ISBN: 9781424438464, p. 89 - 94
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 >   >>