Markus Huber
Markus Huber
industry
Bestätigte E-Mail-Adresse bei nysos.net - Startseite
TitelZitiert vonJahr
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
USENIX Security Symposium, 65-76, 2011
1992011
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
1592015
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
Computational Science and Engineering, 2009. CSE'09. International …, 2009
1072009
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1062012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
722013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
712011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
692014
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Internet Computing, IEEE 15 (3), 28 - 34, 2011
642011
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
462010
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE, 0
43*
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy 2017, 2017
382017
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
382014
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting
M Mulazzani, E Weippl, S Schrittwieser, T Unger, M Huber, P Frühwirt
Proceedings of the Eighth International Conference on Availability …, 2013
34*2013
InnoDB database forensics: reconstructing data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
332012
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
Communications and Multimedia Security, 245-255, 2010
332010
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
292013
Who on earth is “Mr. Cypher”: automated friend injection attacks on social networking sites
M Huber, M Mulazzani, E Weippl
IFIP International Information Security Conference, 80-89, 2010
282010
Social networking sites security: Quo Vadis
M Huber, M Mulazzani, E Weippl
IEEE International Conference on Social Computing/IEEE International …, 2010
252010
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
232013
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1-20, 2012
232012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20