Folgen
Peter Frühwirt
Peter Frühwirt
Bestätigte E-Mail-Adresse bei broadcom.com
Titel
Zitiert von
Zitiert von
Jahr
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
1542012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
1362014
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
782010
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
5th International Workshop on Digital Forensic, 2012
74*2012
A tamper-proof audit and control system for the doctor in the loop
P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger
Brain Informatics 3, 269-279, 2016
412016
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
412015
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation 11 (4), 336-348, 2014
392014
The role and security of firewalls in cyber-physical cloud computing
J Ullrich, J Cropper, P Frühwirt, E Weippl
EURASIP Journal on Information Security 2016, 1-20, 2016
312016
Witnesses for the doctor in the loop
P Kieseberg, J Schantl, P Frühwirt, E Weippl, A Holzinger
Brain Informatics and Health: 8th International Conference, BIH 2015, London …, 2015
272015
Security and privacy of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
International Journal of Pervasive Computing and Communications 11 (2), 132-150, 2015
162015
The role and security of firewalls in iaas cloud computing
J Cropper, J Ullrich, P Frühwirt, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
152015
What's new with whatsapp & co.? revisiting the security of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
Proceedings of the 16th International Conference on Information Integration …, 2014
142014
Using machine learning techniques for traffic classification and preliminary surveying of an attacker’s profile
P Frühwirt, S Schrittwieser, ER Weippl
6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), 2014
112014
Security tests for mobile applications - Why using TLS/SSL is not enough
P Kieseberg, P Fruhwirt, S Schrittwieser, E Weippl
Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE …, 2015
72015
Analysis of the internals of mysql/innodb b+ tree index navigation from a forensic perspective
P Kieseberg, S Schrittwieser, P Frühwirt, E Weippl
2019 International Conference on Software Security and Assurance (ICSSA), 46-51, 2019
62019
Using internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding
P Fruhwirt, P Kieseberg, E Weippl
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
62015
Genie in a Model? Why Model Driven Security will not secure your Web Application.
C Hochreiner, P Frühwirt, Z Ma, P Kieseberg, S Schrittwieser, ER Weippl
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (3), 44-62, 2014
42014
Security testing for mobile applications
P Kieseberg, P Fruhwirt, S Schrittwieser
ERCIM News 109, 2017
12017
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles
P Frühwirt, P Kieseberg, C Hochreiner, S Schrittwieser, E Weippl
12014
A tamper-proof audit and control system for the doctor in the loop
PKBMP Frühwirt, EWA Holzinger
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20