We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Android Market Analysis with Activation Patterns
Teufl P., Kraxberger S., Orthacker C., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 1-12, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Android Security Permissions - Can we trust them?
Orthacker C., Teufl P., Kraxberger S., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 40-51, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Trusted Location Based Services
Teufl P., Zefferer T., Kreuzhuber S., Lesjak C.
7th International Conference for Internet Technology and Secured Transactions, 7th International Conference for Internet Technology and Secured Transactions, 185-192
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 768-773
Knowledge Extraction from RDF Data with Activation Patterns
Teufl P., Lackner G.
Journal of Universal Computer Science , Vol. 17(7), 983-1004
Extracting Semantic Knowledge from Twitter
Teufl P., Kraxberger S.
Third international conference on eParticipation (ePart 2011), 48-59
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics
Lackner G., Teufl P.
AISC, AISC, 0-0
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment
Studie Sicherheitsanalyse BlackBerry OS 5
Teufl P., Dietrich K.
User Tracking based on Behavioral Fingerprints
Lackner G., Teufl P., Weinberger R.
CANS 2010 Proceedings, 0-0
Event correlation on the basis of Activation Patterns
Teufl P., Payer U., Fellner R.
2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, 631-640
Location Privacy in Kabellosen Netzwerken
Lackner G., Teufl P.
DACH2010, DACH2010, 0-0
From NLP (Natural Language Processing) to MLP (Machine Language Processing)
Teufl P., Lackner G., Payer U.
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, 256-269, (Lecture Notes in Computer Science; vol. 6258)
RDF Data Analysis with Activation Patterns
Teufl P., Lackner G.
I-Know '10 and I-Semantics '10 , I-KNOW 2010, 18-18, ( J.UCS Conference Proceeding Series)
Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods
Lackner G., Payer U., Teufl P.
International journal of network security, Vol. Vol. 9(No. 2), 164-172