Adrian Dabrowski
Adrian Dabrowski
TU Vienna, SBA-Research
Bestätigte E-Mail-Adresse bei seclab.tuwien.ac.at - Startseite
TitelZitiert vonJahr
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
612014
IPv6 security: attacks and countermeasures in a nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14), 2014
332014
QR inception: Barcode-in-barcode attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
192014
Framework based on privacy policy hiding for preventing unauthorized face image processing
A Dabrowski, ER Weippl, I Echizen
2013 IEEE International Conference on Systems, Man, and Cybernetics, 455-461, 2013
182013
On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018
162018
The messenger shoots back: Network operator based IMSI catcher detection
A Dabrowski, G Petzl, ER Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
152016
Hardware malware
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 4 (2), 1-115, 2013
13*2013
Browser history stealing with captive Wi-Fi portals
A Dabrowski, G Merzdovnik, N Kommenda, E Weippl
2016 IEEE Security and Privacy Workshops (SPW), 234-240, 2016
102016
Ok glass, leave me alone: towards a systematization of privacy enhancing technologies for wearable computing
K Krombholz, A Dabrowski, M Smith, E Weippl
International Conference on Financial Cryptography and Data Security, 274-280, 2015
102015
Grid shock: Coordinated load-changing attacks on power grids: The non-smart power grid is vulnerable to cyber attacks as well
A Dabrowski, J Ullrich, ER Weippl
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
9*2017
Leveraging competitive gamification for sustainable fun and profit in security education
A Dabrowski, M Kammerstetter, E Thamm, E Weippl, W Kastner
2015 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2015
82015
Exploring design directions for wearable privacy
K Krombholz, A Dabrowski, M Smith, E Weippl
52017
Towards a hardware Trojan detection cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl
2014 Ninth International Conference on Availability, Reliability and …, 2014
52014
A digital interface for imagery and control of a Navico/Lowrance broadband radar
A Dabrowski, S Busch, R Stelzer
Robotic Sailing, 169-181, 2011
52011
Centrobot Portal for Robotics Educational Course Material
R Balogh, A Dabrowski, W Hammerl, A Hofmann, JRP Petroviv
First International Conference on Robotics in Education, Bratislava, Slovakia, 2010
52010
Tag detection for preventing unauthorized face image processing
A Escalada Jiménez, A Dabrowski, N Sonehara, JM Montero Martínez, ...
Telecomunicacion, 2014
4*2014
Poster: Hardware trojans-detect and react?
A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl
Network and Distributed System Security (NDSS) Symposium, 2014
22014
" If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
12019
Measuring Cookies and Web Privacy in a Post-GDPR World
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
International Conference on Passive and Active Network Measurement, 258-270, 2019
12019
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid
A Dabrowski, J Ullrich, ER Weippl
e & i Elektrotechnik und Informationstechnik 135 (3), 250-255, 2018
12018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20