We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Android Market Analysis with Activation Patterns
Teufl P., Kraxberger S., Orthacker C., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers
Android Security Permissions - Can we trust them?
Orthacker C., Teufl P., Kraxberger S., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers
Trusted Location Based Services
Teufl P., Zefferer T., Kreuzhuber S., Lesjak C.
7th International Conference for Internet Technology and Secured Transactions
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
Knowledge Extraction from RDF Data with Activation Patterns
Teufl P., Lackner G.
Journal of Universal Computer Science , Vol. 17(7), 2011
Bedrohungsanalyse und Sicherheitsanforderungen für M-Government Applikationen
Zefferer T., Teufl P.
2011
Mobile Platform Information Flow Security
Hein D., Teufl P., Zefferer T.
2011
Extracting Semantic Knowledge from Twitter
Teufl P., Kraxberger S.
Third international conference on eParticipation (ePart 2011)
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics
Lackner G., Teufl P.
AISC
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment, 2011
Studie Sicherheitsanalyse BlackBerry OS 5
Teufl P., Dietrich K.
2010
User Tracking based on Behavioral Fingerprints
Lackner G., Teufl P., Weinberger R.
CANS 2010 Proceedings
Event correlation on the basis of Activation Patterns
Teufl P., Payer U., Fellner R.
2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing
Location Privacy in Kabellosen Netzwerken
Lackner G., Teufl P.
DACH2010
From NLP (Natural Language Processing) to MLP (Machine Language Processing)
Teufl P., Lackner G., Payer U.
Computer Network Security
RDF Data Analysis with Activation Patterns
Teufl P., Lackner G.
I-Know '10 and I-Semantics '10
Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods
Lackner G., Payer U., Teufl P.
International journal of network security, Vol. Vol. 9(No. 2), 2009
