Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 160 | 2012 |
QR code security: A survey of attacks and challenges for usable security K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 156 | 2014 |
InnoDB Database Forensics P Frühwirt, M Huber, M Mulazzani, ER Weippl Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010 | 83 | 2010 |
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl 5th International Workshop on Digital Forensic, 2012 | 81* | 2012 |
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl Availability, Reliability and Security (ARES), 2015 10th International …, 2015 | 43 | 2015 |
A tamper-proof audit and control system for the doctor in the loop P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger Brain Informatics 3, 269-279, 2016 | 41 | 2016 |
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations P Frühwirt, P Kieseberg, K Krombholz, E Weippl Digital Investigation 11 (4), 336-348, 2014 | 41 | 2014 |
The role and security of firewalls in cyber-physical cloud computing J Ullrich, J Cropper, P Frühwirt, E Weippl EURASIP Journal on Information Security 2016, 1-20, 2016 | 36 | 2016 |
Witnesses for the doctor in the loop P Kieseberg, J Schantl, P Frühwirt, E Weippl, A Holzinger Brain Informatics and Health: 8th International Conference, BIH 2015, London …, 2015 | 29 | 2015 |
The role and security of firewalls in iaas cloud computing J Cropper, J Ullrich, P Frühwirt, E Weippl 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 16 | 2015 |
Security and privacy of smartphone messaging applications R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl International Journal of Pervasive Computing and Communications 11 (2), 132-150, 2015 | 16 | 2015 |
What's new with whatsapp & co.? revisiting the security of smartphone messaging applications R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl Proceedings of the 16th International Conference on Information Integration …, 2014 | 16 | 2014 |
Using machine learning techniques for traffic classification and preliminary surveying of an attacker’s profile P Frühwirt, S Schrittwieser, ER Weippl 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), 2014 | 11 | 2014 |
Analysis of the internals of mysql/innodb b+ tree index navigation from a forensic perspective P Kieseberg, S Schrittwieser, P Frühwirt, E Weippl 2019 International Conference on Software Security and Assurance (ICSSA), 46-51, 2019 | 8 | 2019 |
Security tests for mobile applications - Why using TLS/SSL is not enough P Kieseberg, P Fruhwirt, S Schrittwieser, E Weippl Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE …, 2015 | 8 | 2015 |
Using internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding P Fruhwirt, P Kieseberg, E Weippl Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015 | 7 | 2015 |
Genie in a Model? Why Model Driven Security will not secure your Web Application. C Hochreiner, P Frühwirt, Z Ma, P Kieseberg, S Schrittwieser, ER Weippl J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (3), 44-62, 2014 | 5 | 2014 |
Security testing for mobile applications P Kieseberg, P Fruhwirt, S Schrittwieser ERCIM News 109, 2017 | 1 | 2017 |
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles P Frühwirt, P Kieseberg, C Hochreiner, S Schrittwieser, E Weippl | 1 | 2014 |
A tamper-proof audit and control system for the doctor in the loop PKBMP Frühwirt, EWA Holzinger | | 2016 |