Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications in category Conference Papers - back to overwiew...

Conference Papers

W. Granzer, W. Kastner: Communication Services for Secure Building Automation Networks
IEEE International Symposium on Industrial Electronics (ISIE '10), Bari, Italy; in: Proceedings IEEE International Symposium on Industrial Electronics (ISIE '10), 2010, p. 3380 - 3385
bib details

M. Balduzzi, Ch. Platzer, T. Holz, E. Kirda, D. Balzarotti, Ch. Krügel: Abusing Social Networks for Automated User Profiling
Recent Advances in Intrusion Detection (RAID 2010), Springer, 2010, ISBN: 978-3-642-15511-6; 20 pages
bib details pdf

W. Granzer, W. Kastner, P. Furtak: KNX and OPC UA
KNX Scientific Conference 2010, Pamplona, Navarra, Spain; in: Proceedings KNX Scientific Conference 2010, 2010
bib details

M. Neugschwandtner, Ch. Platzer, P. Milani Comparetti, U. Bayer: dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), IEEE Computer Society, 2010; 20 pages
bib details pdf

H. Fallmann, G. Wondracek, Ch. Platzer: Covertly Probing Underground Economy Marketplaces
Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010), IEEE Computer Society, 2010; 10 pages
bib details pdf

G. Wondracek, T. Holz, Ch. Platzer, E. Kirda, C. Krügel: Is the Internet for Porn? An Insight Into the Online Adult Industry
The Ninth Workshop on the Economics of Information Security (WEIS 2010), ACM Press, 2010; 14 pages
bib details pdf

C. Kolbitsch, C. Krügel, E. Kirda: Extending Mondrian Memory Protection
IST-091 Information Assurance and Cyber Defence, NATO Research and Technology Organization (NATO RTO), 2010, ISBN: 978-92-837-0115-6; 18 pages
bib details pdf

C. Leita, U. Bayer, E. Kirda: Exploiting diverse observation perspectives to get insights on the malware landscape
Proceedings of the 40th Dependable Systems & Networks Conference (DSN), IEEE Computer Society, 2010, p. 393 - 402
bib details pdf

C. Kolbitsch, T. Holz, C. Krügel, E. Kirda: Automated Extraction of Proprietary Gadgets from Malware Binaries
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 29 - 44
bib details doi pdf

G. Wondracek, T. Holz, E. Kirda, C. Krügel: A Practical Attack to De-Anonymize Social Network Users
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 223 - 238
bib details doi pdf

P. Milani Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Krügel, S. Zanero: Identifying Dormant Functionality in Malware Programs
Proceedings of the 2010 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, p. 61 - 76
bib details pdf

M. Balduzzi, M. Egele, D. Balzarotti, E. Kirda, C. Krügel: A Solution for the Automated Detection of Clickjacking Attacks
ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China; in: Proceedings of the 5th ACM Symposium on Information computer and Communication Security, ACM, 5 (2010), ISBN: 978-1-60558-936-7, p. 135 - 144
bib details doi pdf

P. Ferschin, M. Di Angelo, G. Suter: Exploring the potential of game engines for real-time light simulation
BAUSIM 2010, Vienna; in: BAUSIM 2010, A. Mahdavi, B. Martens (ed.); 2010, ISBN: 978-3-85437-317-9, p. 499 - 504
bib details

P. Smejkal, M. Di Angelo: Informatikunterricht in der Wiener AHS-Unterstufe
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7, p. 326 - 331
bib details

R. Planinc, M. Di Angelo: Facebook im Unterricht
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7, p. 296 - 304
bib details

M. Eisenbarth, M. Di Angelo: Experimentieren mit digitalem Ton
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 291 - 295
bib details

R. Planinc, E. Wetzinger, M. Di Angelo: Von der Kamera ins Web
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 285 - 290
bib details

M. Di Angelo, K. Berger, A. Schönbauer: Begabtenförderung mit LEGO Mindstorms
25 Jahre Schulinformatik, Melk; in: 25 Jahre Schulinformatik, G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7, p. 275 - 279
bib details

A. Goiser, S. Khattab, G. Fassl, U. Schmid: A New Robust Interference Reduction Scheme for Low Complexity Direct-Sequence Spread-Spectrum Receivers: Performance
CTRQ-2010, IEEE Conference Proceedings, 2010, ISBN: 978-0-7695-4070-2; 7 pages
bib details pdf

B. Huber, P. Puschner: A Code Policy Guaranteeing Fully Automated Path Analysis
10th International Workshop on Worst-Case Execution-Time Analysis, Brussels, Belgium; in: A Code Policy Guaranteeing Fully Automated Path Analysis, Austrian Computer Society, 2010, ISBN: 978-3-85403-268-7, p. 80 - 90
bib details

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 >   >>