Publications

Here you can find a selection of current publications at SBA Research:

Top Publications:

  • Grid Shock: Coordinated Load-Change Attacks on Power Grids (2017)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC) 2017
    @INPROCEEDINGS{Dabrowski2017Grid,
       author = {Adrian Dabrowski and Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Grid Shock: Coordinated Load-Change Attacks on Power Grids},
       booktitle = {Annual Computer Security Applications Conference (ACSAC) 2017},
       year = {2017},
       month = {12},
    }
  • Swimming with Fishes and Sharks: Beneath the Surface of Queue-based Ethereum Mining Pools (2017)
    • INPROCEEDINGStrue-
    • Alexei Zamyatin and K. Wolter and S. Werner and C.E.A. Mulligan and P.G. Harrison and W.J. Knottenbelt
    • 25th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2017)
    @INPROCEEDINGS{Zamyatin2017Swimming,
       author = {Alexei Zamyatin and K. Wolter and S. Werner and {C.E.A.} Mulligan and {P.G.} Harrison and {W.J.} Knottenbelt},
       sbahotlist = {true},
       title = {Swimming with Fishes and Sharks: Beneath the Surface of Queue-based Ethereum Mining Pools},
       booktitle = {25th IEEE International Symposium on the Modeling,
       Analysis,
       and Simulation of Computer and Telecommunication Systems (MASCOTS 2017)},
       year = {2017},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201709- AZAMYATIN - mascots-crc.pdf},
    }
  • "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS (2017)
    • INPROCEEDINGStrue-
    • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl
    • 26th USENIX Security Symposium (USENIX Security 2017)
    @INPROCEEDINGS{Krombholz2017Have,
       author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
       booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sec17-krombholz.pdf},
       link_slides = {https://www.slideshare.net/SBAResearch/i-have-no-idea-what-im-doing-on-the-usability-of-deploying-https},
    }
  • Control-Flow Integrity: Precision, Security, and Performance (2017)
    • ARTICLEtrue-
    • Nathan Burow and Scott A. Carr and Joseph Nash and Per Larsen and Michael Franz and Stefan Brunthaler and Mathias Payer
    • ACM Computing Surveys (CSUR)
    @ARTICLE{Burow2017ControlFlow,
       author = {Nathan Burow and Scott A. Carr and Joseph Nash and Per Larsen and Michael Franz and Stefan Brunthaler and Mathias Payer},
       sbahotlist = {true},
       title = {Control-Flow Integrity: Precision,
       Security,
       and Performance},
       journal = {ACM Computing Surveys (CSUR)},
       year = {2017},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/CFI_brunthaler.pdf},
       volume = {50},
    }
  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools (2017)
    • INPROCEEDINGStrue-
    • Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • 2nd IEEE European Symposium on Security and Privacy (Euro S&P)
    @INPROCEEDINGS{Merzdovnik2017,
       author = {Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools},
       booktitle = {2nd IEEE European Symposium on Security and Privacy (Euro S&P)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/block_me_if_you_can.pdf},
    }
  • May the Force be with You: The Future of Force-Sensitive Authentication (2017)
    • ARTICLEtrue-
    • Katharina Krombholz and Thomas Hupperich and Thorsten Holz
    • Journal of Internet Computing, Special Issue of Usable Security and privacy
    @ARTICLE{Krombholz2017Force,
       author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
       sbahotlist = {true},
       title = {May the Force be with You: The Future of Force-Sensitive Authentication},
       journal = {Journal of Internet Computing,
       Special Issue of Usable Security and privacy},
       year = {2017},
    }
  • Network-Based Secret Communication in Clouds: A Survey (2017)
    • ARTICLEtrue-
    • Johanna Ullrich and Tanja Szeby and Joachim Fabini and Edgar R. Weippl
    • IEEE Communications Surveys & Tutorials
    @ARTICLE{Ullrich2017NetworkBased,
       author = {Johanna Ullrich and Tanja Szeby and Joachim Fabini and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Network-Based Secret Communication in Clouds: A Survey},
       journal = {IEEE Communications Surveys & Tutorials},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/secretCloud_2017.pdf},
    }
  • Information Integration for Machine Actionable Data Management Plans (2017)
    • ARTICLEtrue-
    • Tomasz Miksa and Andreas Rauber and Roman Ganguly and Paolo Budroni
    • The International Journal of Digital Curation.
    @ARTICLE{Miksa2017Information,
       author = {Tomasz Miksa and Andreas Rauber and Roman Ganguly and Paolo Budroni},
       sbahotlist = {true},
       title = {Information Integration for Machine Actionable Data Management Plans},
       journal = {The International Journal of Digital Curation.},
       year = {2017},
       pdf = {http://www.ijdc.net/index.php/ijdc/article/view/12.1.22},
       volume = {12/1},
    }
  • Identifying Impact of Software Dependencies on Replicability of Biomedical Workflows (2016)
    • ARTICLEtrue-
    • Tomasz Miksa and Andreas Rauber and Eleni Mina
    • Journal of Biomedical Informatics
    @ARTICLE{Miksa2016Identifying,
       author = {Tomasz Miksa and Andreas Rauber and Eleni Mina},
       sbahotlist = {true},
       title = {Identifying Impact of Software Dependencies on Replicability of Biomedical Workflows},
       journal = {Journal of Biomedical Informatics},
       year = {2016},
       month = {11},
       pdf = {http://www.sciencedirect.com/science/article/pii/S1532046416301484},
    }
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection (2016)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Georg Petzl and Edgar R. Weippl
    • 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)
    @INPROCEEDINGS{Dabrowski2016Messenger,
       author = {Adrian Dabrowski and Georg Petzl and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection},
       booktitle = {19th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/providerICdetection.pdf},
    }
  • Pin It! Improving Android Network Security At Runtime (2016)
    • INPROCEEDINGStrue-
    • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl
    • IFIP Networking 2016
    @INPROCEEDINGS{Buhov2016Improving,
       author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Pin It! Improving Android Network Security At Runtime},
       booktitle = {IFIP Networking 2016},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Pin It! Improving Android Network Security at Runtime.pdf},
    }
  • NavigaTor: Finding Faster Paths to Anonymity (2016)
    • INPROCEEDINGStrue-
    • Robert Annessi and Martin Schmiedecker
    • IEEE European Symposium on Security and Privacy (Euro S&P)
    @INPROCEEDINGS{Annessi2016NavigaTor,
       author = {Robert Annessi and Martin Schmiedecker},
       sbahotlist = {true},
       title = {NavigaTor: Finding Faster Paths to Anonymity},
       booktitle = {IEEE European Symposium on Security and Privacy (Euro S&P)},
       year = {2016},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/NavigaTor_preprint.pdf},
       publisher = {IEEE},
       link_source = {https://naviga-tor.github.io/#source},
       link_data = {https://naviga-tor.github.io/#data},
    }
  • Malicious hardware logic detection based on combinatorial testing (2016)
    • INPROCEEDINGStrue-
    • Paris Kitsos and Dimitris Simos and Kyriakos G. Stefanidis and Artemios G. Voyiatzis
    • DATE 2016 TRUDEVICE Workshop
    @INPROCEEDINGS{Kitsos2016Malicious,
       author = {Paris Kitsos and Dimitris Simos and {Kyriakos G.} Stefanidis and {Artemios G.} Voyiatzis},
       sbahotlist = {true},
       title = {Malicious hardware logic detection based on combinatorial testing},
       booktitle = {DATE 2016 TRUDEVICE Workshop},
       year = {2016},
       month = {3},
       link_slides = {http://www.artemiosv.info/hosted/TRUDEVICE2016.pdf},
    }
  • The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy (2016)
    • INPROCEEDINGStrue-
    • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl
    • International Conference on Financial Cryptography and Data Security (FC)
    @INPROCEEDINGS{Krombholz2016Other,
       author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
       booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
       year = {2016},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TheOtherSideOfTheCoin_FC16preConf.pdf},
    }
  • Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices (2016)
    • INPROCEEDINGStrue-
    • Katharina Krombholz and Thomas Hupperich and Thorsten Holz
    • Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)
    @INPROCEEDINGS{Krombholz2016Force,
       author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
       sbahotlist = {true},
       title = {Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices},
       booktitle = {Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Krombholz2016Force.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/use-the-force-evaluating-forcesensitive-authentication-for-mobile-devices},
    }
  • Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? (2016)
    • ARTICLEtrue-
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl
    • ACM Computing Survey (CSUR)
    @ARTICLE{Schrittwieser2016Protecting,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
       journal = {ACM Computing Survey (CSUR)},
       year = {2016},
       pdf = {http://dl.acm.org/citation.cfm?id=2886012},
       volume = {49},
       publisher = {ACM},
    }
  • PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics (2016)
    • INPROCEEDINGStrue-
    • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • 16th Annual DFRWS Conference
    @INPROCEEDINGS{Neuner2016PeekaTorrent,
       author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics},
       booktitle = {16th Annual DFRWS Conference},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/peekatorrent_preprint.pdf},
       link_source = {https://github.com/schmiedecker/peekatorrent},
       link_data = {https://www.peekatorrent.org},
       link_slides = {http://www.slideshare.net/SBAResearch/peekatorrent-leveraging-p2p-hash-values-for-digital-forensics},
    }
  • The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor (2016)
    • INPROCEEDINGStrue-
    • Johanna Ullrich and Edgar R. Weippl
    • European Symposium on Research in Computer Security (ESORICS)
    @INPROCEEDINGS{Ullrich2016Beauty,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor},
       booktitle = {European Symposium on Research in Computer Security (ESORICS)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/botb paper.pdf},
    }
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS (2016)
    • ARTICLEtrue-
    • Aaron Zauner and Hanno Böck and Philipp Jovanovic and Sean Devlin
    • Blackhat USA
    @ARTICLE{Zauner2016NonceDisrespecting,
       author = {Aaron Zauner and Hanno Böck and Philipp Jovanovic and Sean Devlin},
       sbahotlist = {true},
       title = {Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS},
       journal = {Blackhat USA},
       year = {2016},
    }
  • Exciting FPGA Cryptographic Trojans using Combinatorial Testing (2015)
    • INPROCEEDINGStrue-
    • Paris Kitsos and Dimitris Simos and Jose Torres-Jimenez and Artemios G. Voyiatzis
    • 26th IEEE International Symposium on Software Reliability Engineering (ISSRE 2015)
    @INPROCEEDINGS{Kitsos2015Exciting,
       author = {Paris Kitsos and Dimitris Simos and Jose Torres-Jimenez and {Artemios G.} Voyiatzis},
       sbahotlist = {true},
       title = {Exciting FPGA Cryptographic Trojans using Combinatorial Testing},
       booktitle = {26th IEEE International Symposium on Software Reliability Engineering (ISSRE 2015)},
       year = {2015},
       month = {11},
       pdf = {http://ieeexplore.ieee.org/abstract/document/7381800/?section=abstract},
    }
  • No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large (2015)
    • ARTICLEtrue-
    • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber
    • arXiv preprint
    @ARTICLE{Mayer2015Need,
       author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
       sbahotlist = {true},
       title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
       journal = {arXiv preprint},
       year = {2015},
       month = {10},
       pdf = {http://arxiv.org/abs/1510.08646},
       link_data = {https://scans.io/study/sba-email},
    }
  • Sustainability forecast for cloud migration. (2015)
    • INPROCEEDINGStrue-
    • Alifah Aida Lope Abdul Rahman and Shareeful Islam
    • IEEE 9th Symposium on the Maintenance and Evolution of Service-Oriented Systems and Cloud-Based Environments (MESOCA)
    @INPROCEEDINGS{Rahman2015Sustainability,
       author = {{Alifah Aida Lope Abdul} Rahman and Shareeful Islam},
       sbahotlist = {true},
       title = {Sustainability forecast for cloud migration.},
       booktitle = {IEEE 9th Symposium on the Maintenance and Evolution of Service-Oriented Systems and Cloud-Based Environments (MESOCA)},
       year = {2015},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/06_07328123.pdf},
    }
  • Privacy is Not an Option: Attacking the IPv6 Privacy Extension (2015)
    • INPROCEEDINGStrue-
    • Johanna Ullrich and Edgar R. Weippl
    • International Symposium on Recent Advances in Intrusion Detection (RAID)
    @INPROCEEDINGS{Ullrich2015Privacy,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
       booktitle = {International Symposium on Recent Advances in Intrusion Detection (RAID)},
       year = {2015},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ullrich2015Privacy.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/privacy-is-not-an-option-attacking-the-ipv6-privacy-extension},
    }
  • Assurance of Security and Privacy Requirements for Cloud Deployment Model. (2015)
    • ARTICLEtrue-
    • Shareeful Islam and Moussa Ouedraogo and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis
    • IEEE Transactions on Cloud Computing (2015)
    @ARTICLE{Islam2015Assurance,
       author = {Shareeful Islam and Moussa Ouedraogo and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis},
       sbahotlist = {true},
       title = {Assurance of Security and Privacy Requirements for Cloud Deployment Model.},
       journal = {IEEE Transactions on Cloud Computing (2015)},
       year = {2015},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/05_07364243.pdf},
       publisher = {IEEE},
    }
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
       author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
       link_source = {http://sourceforge.net/p/icc/},
    }
  • Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations (2014)
    • INPROCEEDINGStrue-
    • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl
    • SINCONF 2014 (Conference on Security of Information and Networks)
    @INPROCEEDINGS{Aufner2014Plugin,
       author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
       booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/secperv.pdf},
    }
  • Towards a Hardware Trojan Detection Cycle (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl
    • Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014
    @INPROCEEDINGS{Dabrowski2014Towards,
       author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Towards a Hardware Trojan Detection Cycle},
       booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures,
       ARES ECTCM 2014},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a hardware trojan _paper.pdf},
    }
  • Process Management Plans (2014)
    • ARTICLEtrue-
    • Tomasz Miksa and Stephan Strodl and Andreas Rauber
    • International Journal of Digital Curation
    @ARTICLE{Miksa2014Process,
       author = {Tomasz Miksa and Stephan Strodl and Andreas Rauber},
       sbahotlist = {true},
       title = {Process Management Plans},
       journal = {International Journal of Digital Curation},
       year = {2014},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/process management plans_paper.pdf},
       volume = {9},
       pages = {83-97},
    }
  • Anomaly Detection and Visualization in Generative RBAC Models (2014)
    • INPROCEEDINGStrue-
    • Maria Leitner and Stefanie Rinderle-Ma
    • Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT)
    @INPROCEEDINGS{Leitner2014Anomaly,
       author = {Maria Leitner and Stefanie Rinderle-Ma},
       sbahotlist = {true},
       title = {Anomaly Detection and Visualization in Generative RBAC Models},
       booktitle = {Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT)},
       year = {2014},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Leitner2014Anomaly.pdf},
       pages = {41-52},
       publisher = {ACM},
    }
  • Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation (2014)
    • ARTICLEtrue-
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Computers & Security
    @ARTICLE{Schrittwieser2014Covert,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
       journal = {Computers & Security},
       year = {2014},
       month = {5},
       pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
       publisher = {Elsevier Advanced Technology},
    }
  • On the security of security extensions for IP-based KNX networks (2014)
    • INPROCEEDINGStrue-
    • Aljosha Judmayer and Lukas Krammer and Wolfgang Kastner
    • 10th IEEE International Workshop on Factory Communication Systems
    @INPROCEEDINGS{Judmayer2014security,
       author = {Aljosha Judmayer and Lukas Krammer and Wolfgang Kastner},
       sbahotlist = {true},
       title = {On the security of security extensions for IP-based KNX networks},
       booktitle = {10th IEEE International Workshop on Factory Communication Systems},
       year = {2014},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/judmayer_KNX_wfcs2014.pdf},
    }
  • Using Model Driven Security Approaches in Web Application Development (2014)
    • INPROCEEDINGStrue-
    • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)
    @INPROCEEDINGS{Hochreiner2014Using,
       author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Using Model Driven Security Approaches in Web Application Development },
       booktitle = {AsiaARES (The 2014 Asian Conference on Availability,
       Reliability and Security)},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
    }
  • Using Ontologies for Enterprise Architecture Integration and Analysis (2014)
    • ARTICLEtrue-
    • Gonccalo Antunes and Marzieh Bakhshandeh and Rudolf Mayer and Jose Borbinha and Artur Caetano
    • Complex Systems Informatics and Modeling Quarterly
    @ARTICLE{Antunes2014Using,
       author = {Gonccalo Antunes and Marzieh Bakhshandeh and Rudolf Mayer and Jose Borbinha and Artur Caetano},
       sbahotlist = {true},
       title = {Using Ontologies for Enterprise Architecture Integration and Analysis},
       journal = {Complex Systems Informatics and Modeling Quarterly},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ant_csimq14.pdf},
    }
  • An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model (2014)
    • ARTICLEtrue-
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Information and Software Technology (Elsevier)
    @ARTICLE{Islam2014Empirical,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
       journal = {Information and Software Technology (Elsevier)},
       year = {2014},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/10_Paper 1.pdf},
    }
  • SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment (2014)
    • ARTICLEtrue-
    • Dawid Wolosiuk and Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and A Min Tjoa
    • Advanced Materials Research
    @ARTICLE{Wolosiuk2014SEMERGY,
       author = {Dawid Wolosiuk and Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and {A Min} Tjoa},
       sbahotlist = {true},
       title = {SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment},
       journal = {Advanced Materials Research},
       year = {2014},
       volume = {899},
       pages = {589--595},
    }
  • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata (2014)
    • ARTICLEtrue-
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl
    • Electronic Markets - The International Journal on Networked Business
    @ARTICLE{Kieseberg2014algorithm,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
       journal = {Electronic Markets - The International Journal on Networked Business},
       year = {2014},
       pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
    }
  • POSTER: Cross-Platform Malware: Write Once, Infect Everywhere (2013)
    • INPROCEEDINGStrue-
    • Martina Lindorfer and Matthias Neumayr and Juan Caballero and Christian Platzer
    • 20th ACM Conference on Computer and Communications Security (CCS)
    @INPROCEEDINGS{Lindorfer2013POSTER,
       author = {Martina Lindorfer and Matthias Neumayr and Juan Caballero and Christian Platzer},
       sbahotlist = {true},
       title = {POSTER: Cross-Platform Malware: Write Once,
       Infect Everywhere},
       booktitle = {20th ACM Conference on Computer and Communications Security (CCS)},
       year = {2013},
       month = {11},
    }
  • Cloudoscopy: Services Discovery and Topology Mapping (2013)
    • INPROCEEDINGStrue-
    • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl
    • Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
       author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Cloudoscopy: Services Discovery and Topology Mapping },
       booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
       year = {2013},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/cloud_final.pdf},
    }
  • A View To A Kill: WebView Exploitation (2013)
    • INPROCEEDINGStrue-
    • Matthias Neugschwandtner and Martina Lindorfer and Christian Platzer
    • 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
    @INPROCEEDINGS{Neugschwandtner2013View,
       author = {Matthias Neugschwandtner and Martina Lindorfer and Christian Platzer},
       sbahotlist = {true},
       title = {A View To A Kill: WebView Exploitation},
       booktitle = {6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)},
       year = {2013},
       month = {8},
    }
  • Lines of Malicious Code: Insights Into the Malicious Software Industry (2012)
    • INPROCEEDINGStrue-
    • Martina Lindorfer and Alessandro Di Federico and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero
    • 28th Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{LindorferLines,
       author = {Martina Lindorfer and Alessandro {Di Federico} and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero},
       sbahotlist = {true},
       title = {Lines of Malicious Code: Insights Into the Malicious Software Industry},
       booktitle = {28th Annual Computer Security Applications Conference (ACSAC)},
       year = {2012},
       month = {12},
    }
  • Detecting Environment-Sensitive Malware (2011)
    • INPROCEEDINGStrue-
    • Martina Lindorfer and Clemens Kolbitsch and Paolo Milani Comparetti
    • 14th International Symposium on Recent Advances in Intrusion Detection (RAID)
    @INPROCEEDINGS{Lindorfer2011Detecting,
       author = {Martina Lindorfer and Clemens Kolbitsch and Paolo Milani Comparetti},
       sbahotlist = {true},
       title = {Detecting Environment-Sensitive Malware},
       booktitle = {14th International Symposium on Recent Advances in Intrusion Detection (RAID)},
       year = {2011},
       month = {9},
    }
  • Trend Analysis of Underground Marketplaces (2017)
    • ARTICLE--
    • Klaus Kieseberg and Peter Kieseberg and Edgar R. Weippl
    • ERCIM News
    @ARTICLE{Kieseberg2017Trend,
       author = {Klaus Kieseberg and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Trend Analysis of Underground Marketplaces},
       journal = {ERCIM News},
       year = {2017},
       month = {10},
       pdf = {https://ercim-news.ercim.eu/en111/r-i/trend-analysis-of-underground-marketplaces},
       volume = {111},
    }
  • Merged Mining: Curse or Cure? (2017)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar R. Weippl
    • International Workshop on Cryptocurrencies and Blockchain Technology (CBT 17)
    @INPROCEEDINGS{Judmayer2017Merged,
       author = {Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Merged Mining: Curse or Cure?},
       booktitle = {International Workshop on Cryptocurrencies and Blockchain Technology (CBT 17)},
       year = {2017},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201709 - AJudmayer - CBT_Merged_Mining_camera_ready_final.pdf},
    }
  • Lightweight Address Hopping for Defending the IPv6 IoT (2017)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Johanna Ullrich and Georg Merzdovnik and Artemios G. Voyiatzis and Edgar R. Weippl
    • 12th International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Judmayer2017Lightweight,
       author = {Aljosha Judmayer and Johanna Ullrich and Georg Merzdovnik and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Lightweight Address Hopping for Defending the IPv6 IoT},
       booktitle = {12th International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2017},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201707 - JUDMAYER - LightweightAddressHopping.pdf},
    }
  • Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten (2017)
    • ARTICLE--
    • Eduard Fosch Villaronga and Peter Kieseberg and Tiffany Li
    • Computer Security and Law Review
    @ARTICLE{FoschVillaronga2017Humans,
       author = {Eduard {Fosch Villaronga} and Peter Kieseberg and Tiffany Li},
       title = {Humans Forget,
       Machines Remember: Artificial Intelligence and the Right to Be Forgotten},
       journal = {Computer Security and Law Review},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - PKieseberg - SSRN-id3018186.pdf},
    }
  • The More the Merrier-Federated Learning from Local Sphere Recommendations (2017)
    • INPROCEEDINGS--
    • Bernd Malle and Nicola Giuliani and Peter Kieseberg and Andreas Holzinger
    • International Cross-Domain Conference for Machine Learning and Knowledge Extraction
    @INPROCEEDINGS{Malle2017More,
       author = {Bernd Malle and Nicola Giuliani and Peter Kieseberg and Andreas Holzinger},
       title = {The More the Merrier-Federated Learning from Local Sphere Recommendations},
       booktitle = {International Cross-Domain Conference for Machine Learning and Knowledge Extraction},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - BMalle - The More the Merrier.pdf},
    }
  • DO NOT DISTURB? Classifier Behavior on Perturbed Datasets (2017)
    • INPROCEEDINGS--
    • Bernd Malle and Peter Kieseberg and Andreas Holzinger
    • International Cross-Domain Conference for Machine Learning and Knowledge Extraction
    @INPROCEEDINGS{Malle2017DISTURB,
       author = {Bernd Malle and Peter Kieseberg and Andreas Holzinger},
       title = {DO NOT DISTURB? Classifier Behavior on Perturbed Datasets},
       booktitle = {International Cross-Domain Conference for Machine Learning and Knowledge Extraction},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201708 - BMalle - DO NOT DISTURB.pdf},
    }
  • Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach (2017)
    • INPROCEEDINGS--
    • Andreas Holzinger and Bernd Malle and Peter Kieseberg and Peter M. Roth and Heimo Müller and Robert Reihs and Kurt Zatloukal
    • Towards Integrative Machine Learning and Knowledge Extraction: BIRS Workshop, Banff, AB, Canada, July 24-26, 2015, Revised Selected Papers
    @INPROCEEDINGS{Holzinger2017Machine,
       author = {Andreas Holzinger and Bernd Malle and Peter Kieseberg and {Peter M.} Roth and Heimo Müller and Robert Reihs and Kurt Zatloukal},
       title = {Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach},
       booktitle = {Towards Integrative Machine Learning and Knowledge Extraction: BIRS Workshop,
       Banff,
       AB,
       Canada,
       July 24-26,
       2015,
       Revised Selected Papers},
       year = {2017},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201707 - AHolzinger - Machine-Learning-Digital-Pathology_draft.pdf},
    }
  • u'smile - Secure Mobile Environments (2017)
    • ARTICLE--
    • Georg Merzdovnik and Damjan Buhov and Artemios G. Voyiatzis and Edgar R. Weippl
    • ERCIM News
    @ARTICLE{Merzdovnik2017usmile,
       author = {Georg Merzdovnik and Damjan Buhov and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {u'smile - Secure Mobile Environments},
       journal = {ERCIM News},
       year = {2017},
       month = {4},
       pdf = {https://ercim-news.ercim.eu/images/stories/EN109/EN109-web.pdf},
       volume = {109},
       pages = {53--54},
    }
  • Security Testing for Mobile Applications (2017)
    • ARTICLE--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser},
       title = {Security Testing for Mobile Applications},
       journal = {ERCIM News},
       year = {2017},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201704 - KIESEBERG - Pages from EN109-web.pdf},
       volume = {109},
       pages = {52--53},
    }
  • Das Testen von Algorithmen in sensibler datengetriebener Forschung (2017)
    • ARTICLE--
    • Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and Edgar R. Weippl and Andreas Holzinger
    • Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)
    @ARTICLE{Kieseberg2017Testen,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Das Testen von Algorithmen in sensibler datengetriebener Forschung},
       journal = {Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)},
       year = {2017},
       month = {4},
       pdf = {http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf},
    }
  • Coveringcerts: Combinatorial Methods for X.509 Certificate Testing (2017)
    • INPROCEEDINGS--
    • K. Kleine and Dimitris Simos
    • International Conference on Software Testing, Verification and Validation (ICST)
    @INPROCEEDINGS{Kleine2017Coveringcerts,
       author = {K. Kleine and Dimitris Simos},
       title = {Coveringcerts: Combinatorial Methods for X.509 Certificate Testing},
       booktitle = {International Conference on Software Testing,
       Verification and Validation (ICST)},
       year = {2017},
       month = {3},
    }
  • Planning-based Security Testing of the SSL/TLS Protocol (2017)
    • INPROCEEDINGS--
    • Josip Bozic and K. Kleine and Dimitris Simos and Franz Wotawa
    • Workshop on Advances in Model Based Testing (A-MOST)
    @INPROCEEDINGS{Bozic2017Planningbased,
       author = {Josip Bozic and K. Kleine and Dimitris Simos and Franz Wotawa},
       title = {Planning-based Security Testing of the SSL/TLS Protocol},
       booktitle = {Workshop on Advances in Model Based Testing (A-MOST)},
       year = {2017},
       month = {3},
    }
  • Combinatorial Methods for Modelling Composed Software Systems (2017)
    • INPROCEEDINGS--
    • Ludwig Kampel and Bernhard Garn and Dimitris Simos
    • 6th International Workshop on Combinatorial Testing (IWCT 2017)
    @INPROCEEDINGS{Kampel2017Combinatorial,
       author = {Ludwig Kampel and Bernhard Garn and Dimitris Simos},
       title = {Combinatorial Methods for Modelling Composed Software Systems},
       booktitle = {6th International Workshop on Combinatorial Testing (IWCT 2017)},
       year = {2017},
       month = {3},
       link_slides = {http://iwct2017.sba-research.org/slides/session4-talk2-simos.pdf},
    }
  • Using ontologies for verification and validation of workflow-based experiments (2017)
    • ARTICLE--
    • Tomasz Miksa and Andreas Rauber
    • Web Semantics: Science, Services and Agents on the World Wide Web
    @ARTICLE{Miksa2017Using,
       author = {Tomasz Miksa and Andreas Rauber},
       title = {Using ontologies for verification and validation of workflow-based experiments},
       journal = { Web Semantics: Science,
       Services and Agents on the World Wide Web},
       year = {2017},
       month = {3},
       pdf = {http://www.sciencedirect.com/science/article/pii/S1570826817300112},
    }
  • A performance assessment of network address shuffling in IoT systems (2017)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Aljosha Judmayer and Artemios G. Voyiatzis and Edgar R. Weippl
    • 16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)
    @INPROCEEDINGS{Merzdovnik2017performance,
       author = {Georg Merzdovnik and Aljosha Judmayer and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {A performance assessment of network address shuffling in IoT systems},
       booktitle = {16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)},
       year = {2017},
       month = {2},
       pdf = {http://eurocast2017.fulp.ulpgc.es/sites/default/files/Eurocast_2017_Extended_Abstract_Book.pdf},
    }
  • Die NIS-Richtlinie und der rechtliche Rahmen von CERTS (2017)
    • INPROCEEDINGS--
    • Christof Tschohl and Walter Hötzendorfer and Gerald Quirchmayr and Edith Huber and Otto Hellwig
    • IRIS 2017
    @INPROCEEDINGS{Tschohl2017NISRichtlinie,
       author = {Christof Tschohl and Walter Hötzendorfer and Gerald Quirchmayr and Edith Huber and Otto Hellwig},
       title = {Die NIS-Richtlinie und der rechtliche Rahmen von CERTS},
       booktitle = {IRIS 2017},
       year = {2017},
       month = {2},
       pdf = {https://www.researchgate.net/publication/314984411_DIE_NIS-RICHTLINIE_UND_DER_RECHTLICHE_RAHMEN_VON_CERTS},
    }
  • Forensics using Internal Database Structures (2017)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Forensics,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Forensics using Internal Database Structures},
       journal = {ERCIM News},
       year = {2017},
       month = {1},
       pdf = {http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf},
       volume = {108},
    }
  • Turning Active TLS Scanning to Eleven (2017)
    • INPROCEEDINGS--
    • Wilfried Mayer and Martin Schmiedecker
    • IFIP International Information Security and Privacy Conference (IFIP Sec)
    @INPROCEEDINGS{Mayer2017Turning,
       author = {Wilfried Mayer and Martin Schmiedecker},
       title = {Turning Active TLS Scanning to Eleven},
       booktitle = {IFIP International Information Security and Privacy Conference (IFIP Sec)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSec2017_preprint.pdf},
       link_source = {https://github.com/WilfriedMayer/turning-active-tls-scanning-to-eleven},
       link_slides = {https://www.slideshare.net/SBAResearch/turning-active-tls-scanning-to-eleven},
    }
  • Exploring Design Directions for Wearable Privacy (2017)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • Usable Security
    @INPROCEEDINGS{Krombholz2017Exploring,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Exploring Design Directions for Wearable Privacy},
       booktitle = {Usable Security},
       year = {2017},
       pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
    }
  • Ring Oscillators and Hardware Trojan Detection (2017)
    • INBOOK--
    • Paris Kitsos and Nicolas Sklavos and Artemios G. Voyiatzis
    • Springer International Publishing
    @INBOOK{Kitsos2017Ring,
       author = {Paris Kitsos and Nicolas Sklavos and {Artemios G.} Voyiatzis},
       title = {Ring Oscillators and Hardware Trojan Detection},
       booktitle = {Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment},
       year = {2017},
       pdf = {http://dx.doi.org/10.1007/978-3-319-44318-8_9},
       pages = {169--187},
       publisher = {Springer International Publishing},
    }
  • Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS (2017)
    • ARTICLE--
    • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Edgar R. Weippl
    • International Conference on Availability, Reliability and Security (ARES)
    @ARTICLE{Neuner2017,
       author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS},
       journal = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/hiccups.pdf},
    }
  • Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms (2017)
    • ARTICLE--
    • Aljosha Judmayer and Nicholas Stifter and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Judmayer2017Blocks,
       author = {Aljosha Judmayer and Nicholas Stifter and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Blocks and Chains: Introduction to Bitcoin,
       Cryptocurrencies,
       and Their Consensus Mechanisms},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2017},
       pdf = {https://doi.org/10.2200/S00773ED1V01Y201704SPT020},
    }
  • Real-time Forensics through Endpoint Visibility (2017)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    @INPROCEEDINGS{Kieseberg2017Realtime,
       author = {Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Real-time Forensics through Endpoint Visibility},
       booktitle = {International Conference on Digital Forensics & Cyber Crime (ICDF2C)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf},
       link_slides = {https://www.slideshare.net/SBAResearch/realtime-forensics-through-endpoint-visibility-80707652},
    }
  • Machine-actionable data management plans (madmps) (2017)
    • ARTICLE--
    • Stephanie Simms and Sarah Jones and Daniel Mietchen and Tomasz Miksa
    • Research Ideas and Outcomes (RIO)
    @ARTICLE{Simms2017Machineactionable,
       author = {Stephanie Simms and Sarah Jones and Daniel Mietchen and Tomasz Miksa},
       title = {Machine-actionable data management plans (madmps)},
       journal = {Research Ideas and Outcomes (RIO)},
       year = {2017},
       pdf = {https://riojournal.com/article/13086/list/8/},
    }
  • Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl
    • 11th International Conference on Passwords
    @INPROCEEDINGS{Dabrowski2016Mobile,
       author = {Adrian Dabrowski and {Edgar R.} Weippl},
       title = {Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication},
       booktitle = {11th International Conference on Passwords},
       year = {2016},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/wifipresence.pdf},
       link_video = {https://www.youtube.com/watch?v=6fC58E1XAAw&list=PLdIqs92nsIzT2ao_wAJ2GCRKl_3zaebgb&index=2},
    }
  • An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection (2016)
    • INPROCEEDINGS--
    • Filippos Pirpilidis and Artemios G. Voyiatzis and Lambros Pyrgas and Paris Kitsos
    • 20th Panhellenic Conference on Informatics (PCI 2016)
    @INPROCEEDINGS{Pirpilidis2016Efficient,
       author = {Filippos Pirpilidis and {Artemios G.} Voyiatzis and Lambros Pyrgas and Paris Kitsos},
       title = {An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection},
       booktitle = {20th Panhellenic Conference on Informatics (PCI 2016)},
       year = {2016},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/pci2016-115.pdf},
    }
  • Precise Data Identification Services for Long Tail Research Data (2016)
    • INPROCEEDINGS--
    • Stefan Proell and Kristof Meixner and Andreas Rauber
    • 13th International Conference on Digital Preservation (iPRES 2016)
    @INPROCEEDINGS{Proell2016Precise,
       author = {Stefan Proell and Kristof Meixner and Andreas Rauber},
       title = {Precise Data Identification Services for Long Tail Research Data},
       booktitle = {13th International Conference on Digital Preservation (iPRES 2016)},
       year = {2016},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iPRES2016-Proell.pdf},
    }
  • Condensed Cryptographic Currencies Crash Course (C5) (2016)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Edgar R. Weippl
    • 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security
    @INPROCEEDINGS{Judmayer2016Condensed,
       author = {Aljosha Judmayer and {Edgar R.} Weippl},
       title = {Condensed Cryptographic Currencies Crash Course (C5)},
       booktitle = {2016 {ACM} {SIGSAC} Conference on Computer and Communications Security},
       year = {2016},
       month = {10},
       pdf = {http://dl.acm.org/citation.cfm?id=2976754},
    }
  • Privacy Aware Machine Learning and the “Right to be forgotten (2016)
    • ARTICLE--
    • Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Malle2016Privacy,
       author = {Bernd Malle and Peter Kieseberg and Sebastian Schrittwieser and Andreas Holzinger},
       title = {Privacy Aware Machine Learning and the “Right to be forgotten},
       journal = {ERCIM News},
       year = {2016},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ERCIM_article_printed.pdf},
    }
  • A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing (2016)
    • INPROCEEDINGS--
    • Dimitris Simos and K. Kleine and Laleh Shikh Gholamhossein Ghandehari and Bernhard Garn and Yu Lei
    • International Conference on Testing Software and Systems (ICTSS)
    @INPROCEEDINGS{Simos2016Combinatorial,
       author = {Dimitris Simos and K. Kleine and {Laleh Shikh Gholamhossein} Ghandehari and Bernhard Garn and Yu Lei},
       title = {A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing},
       booktitle = {International Conference on Testing Software and Systems (ICTSS)},
       year = {2016},
       month = {10},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-47443-4_5},
    }
  • Set-based algorithms for combinatorial test set generation (2016)
    • INPROCEEDINGS--
    • Ludwig Kampel and Dimitris Simos
    • International Conference on Testing Software and Systems (ICTSS)
    @INPROCEEDINGS{Kampel2016Setbased,
       author = {Ludwig Kampel and Dimitris Simos},
       title = {Set-based algorithms for combinatorial test set generation},
       booktitle = {International Conference on Testing Software and Systems (ICTSS)},
       year = {2016},
       month = {10},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-47443-4_16},
    }
  • Notary-assisted Certificate Pinning for Improved Security of (Android) Apps (2016)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Damjan Buhov and Artemios G. Voyiatzis and Edgar R. Weippl
    • 11th International Conference on Availability, Reliability and Security (ARES 2016)
    @INPROCEEDINGS{Merzdovnik2016Notaryassisted,
       author = {Georg Merzdovnik and Damjan Buhov and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Notary-assisted Certificate Pinning for Improved Security of (Android) Apps},
       booktitle = {11th International Conference on Availability,
       Reliability and Security (ARES 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/notarypin.pdf},
    }
  • Hand Dynamics for Behavioral User Authentication (2016)
    • INPROCEEDINGS--
    • Fuensanta Torres Garcia and Katharina Krombholz and Rudolf Mayer and Edgar R. Weippl
    • 5th International Workshop on Security of Mobile Applications (IWSMA 2016)
    @INPROCEEDINGS{TorresGarcia2016Hand,
       author = {Fuensanta {Torres Garcia} and Katharina Krombholz and Rudolf Mayer and {Edgar R.} Weippl},
       title = {Hand Dynamics for Behavioral User Authentication},
       booktitle = {5th International Workshop on Security of Mobile Applications (IWSMA 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES_2016_paper_19 (2).pdf},
    }
  • A Survey on Network Resiliency Methodologies against Weather-based Disruptions (2016)
    • INPROCEEDINGS--
    • M. Tornatore and J. André and Peter Babarczi and T. Braun and E. Forstad and P. Heegaard and A. Hmaity and M. Furdek and L. Jorge and W. Kmiecik and C. Mas Machuca and L. Martins and C. Medeiros and F. Musumeci and A. Pasic and J. Rak and S. Simpson and R. Travanca and Artemios G. Voyiatzis
    • 8th International Workshop on Resilient Networks Design and Modeling (RNDM 2016)
    @INPROCEEDINGS{Tornatore2016Survey,
       author = {M. Tornatore and J. André and Peter Babarczi and T. Braun and E. Forstad and P. Heegaard and A. Hmaity and M. Furdek and L. Jorge and W. Kmiecik and C. {Mas Machuca} and L. Martins and C. Medeiros and F. Musumeci and A. Pasic and J. Rak and S. Simpson and R. Travanca and {Artemios G.} Voyiatzis},
       title = {A Survey on Network Resiliency Methodologies against Weather-based Disruptions},
       booktitle = {8th International Workshop on Resilient Networks Design and Modeling (RNDM 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/RNDM2016.pdf},
    }
  • An HMM-based Anomaly Detection Approach for SCADA Systems (2016)
    • INPROCEEDINGS--
    • Kyriakos G. Stefanidis and Artemios G. Voyiatzis
    • the 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016)
    @INPROCEEDINGS{Stefanidis2016HMMbased,
       author = {{Kyriakos G.} Stefanidis and {Artemios G.} Voyiatzis},
       title = {An HMM-based Anomaly Detection Approach for SCADA Systems},
       booktitle = {the 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016)},
       year = {2016},
       month = {9},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-45931-8_6},
    }
  • AutomationML Review Support in Multi-Disciplinary Engineering Environments (2016)
    • INPROCEEDINGS--
    • Dietmar Winkler and F.J. Ekaputra and Stefan Biffl
    • 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
    @INPROCEEDINGS{Winkler2016AutomationML,
       author = {Dietmar Winkler and F.J. Ekaputra and Stefan Biffl},
       title = {AutomationML Review Support in Multi-Disciplinary Engineering Environments},
       booktitle = {21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)},
       year = {2016},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/7733555/},
    }
  • Investigating Model Slicing Capabilities on Integrated Plant Models with AutomationML (2016)
    • INPROCEEDINGS--
    • R. Mordinyi and Dietmar Winkler and F.J. Ekaputra and M. Wimmer and Stefan Biffl
    • 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
    @INPROCEEDINGS{Mordinyi2016Investigating,
       author = {R. Mordinyi and Dietmar Winkler and F.J. Ekaputra and M. Wimmer and Stefan Biffl},
       title = {Investigating Model Slicing Capabilities on Integrated Plant Models with AutomationML},
       booktitle = {21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)},
       year = {2016},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/7733556/},
    }
  • Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness (2016)
    • INPROCEEDINGS--
    • Thomas Hupperich and Katharina Krombholz and Thorsten Holz
    • 9th International Conference on Trust and Trustworthy Computing
    @INPROCEEDINGS{Hupperich2016Sensor,
       author = {Thomas Hupperich and Katharina Krombholz and Thorsten Holz},
       title = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness},
       booktitle = {9th International Conference on Trust and Trustworthy Computing},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sensorcaptchas.pdf},
    }
  • TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach (2016)
    • INPROCEEDINGS--
    • Dimitris Simos and K. Kleine and Artemios G. Voyiatzis and R. Kuhn and R. Kacker
    • 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016)
    @INPROCEEDINGS{Simos2016Cipher,
       author = {Dimitris Simos and K. Kleine and {Artemios G.} Voyiatzis and R. Kuhn and R. Kacker},
       title = {TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach},
       booktitle = {2016 IEEE International Conference on Software Quality,
       Reliability and Security (QRS 2016)},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TLS-CCM-QRS2016.pdf},
    }
  • TERO-based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm (2016)
    • INPROCEEDINGS--
    • Paris Kitsos and Kyriakos G. Stefanidis and Artemios G. Voyiatzis
    • 19th EUROMICRO Conference on Digital System Design (DSD 2016)
    @INPROCEEDINGS{Kitsos2016TERObased,
       author = {Paris Kitsos and {Kyriakos G.} Stefanidis and {Artemios G.} Voyiatzis},
       title = {TERO-based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm},
       booktitle = {19th EUROMICRO Conference on Digital System Design (DSD 2016)},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Kitsos_C48.pdf},
    }
  • The role and security of firewalls in cyber-physical cloud computing (2016)
    • ARTICLE--
    • Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and Edgar R. Weippl
    • EURASIP Journal on Information Security
    @ARTICLE{Ullrich2016role,
       author = {Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and {Edgar R.} Weippl},
       title = {The role and security of firewalls in cyber-physical cloud computing},
       journal = {EURASIP Journal on Information Security},
       year = {2016},
       month = {8},
       pdf = {http://jis.eurasipjournals.springeropen.com/articles/10.1186/s13635-016-0042-3},
    }
  • The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases (2016)
    • INPROCEEDINGS--
    • Bernd Malle and Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • International Conference on Availability, Reliability, and Security
    @INPROCEEDINGS{Malle2016Right,
       author = {Bernd Malle and Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       title = {The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases},
       booktitle = {International Conference on Availability,
       Reliability,
       and Security},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PAML.pdf},
    }
  • Selecting security control portfolios: a multi-objective simulation-optimization approach (2016)
    • ARTICLE--
    • Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer
    • EURO Journal on Decision Processes
    @ARTICLE{Kiesling2016Selecting,
       author = {Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer},
       title = {Selecting security control portfolios: a multi-objective simulation-optimization approach},
       journal = {EURO Journal on Decision Processes},
       year = {2016},
       month = {6},
       pdf = {http://link.springer.com/article/10.1007/s40070-016-0055-7},
    }
  • Identification of Reproducible Subsets for Data Citation, Sharing and Re-Use. (2016)
    • ARTICLE--
    • Andreas Rauber and Ari Asmi and Dieter van Uytvanck and Stefan Proell
    • Bulletin of IEEE Technical Committee on Digital Libraries (TCDL)
    @ARTICLE{Rauber2016Identification,
       author = {Andreas Rauber and Ari Asmi and Dieter {van Uytvanck} and Stefan Proell},
       title = {Identification of Reproducible Subsets for Data Citation,
       Sharing and Re-Use.},
       journal = {Bulletin of IEEE Technical Committee on Digital Libraries (TCDL)},
       year = {2016},
       month = {5},
       pdf = {https://www.rd-alliance.org/system/files/documents/RDA-Guidelines_TCDL_draft.pdf},
       volume = {12},
    }
  • Browser History Stealing with Captive Wi-Fi Portals (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and Edgar R. Weippl
    • Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST)
    @INPROCEEDINGS{Dabrowski2016Browser,
       author = {Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and {Edgar R.} Weippl},
       title = {Browser History Stealing with Captive Wi-Fi Portals},
       booktitle = {Proceedings of Workshops at IEEE Security & Privacy 2016,
       Mobile Security Technologies (MoST)},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dabrowski2016Browser.pdf},
    }
  • TLScompare: Crowdsourcing Rules for HTTPS Everywhere (2016)
    • INPROCEEDINGS--
    • Wilfried Mayer and Martin Schmiedecker
    • Workshop on Empirical Research Methods in Information Security (ERMIS)
    @INPROCEEDINGS{Mayer2016TLScompare,
       author = {Wilfried Mayer and Martin Schmiedecker},
       title = {TLScompare: Crowdsourcing Rules for HTTPS Everywhere},
       booktitle = {Workshop on Empirical Research Methods in Information Security (ERMIS)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/crowdsourcing_preprint.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/tlscompareorg-crowdsourcing-rules-for-https-everywhere},
    }
  • Slick: An Intrusion Detection System for Virtualized Storage Devices (2016)
    • INPROCEEDINGS--
    • Andrei Bacs and Cristiano Giuffrida and Bernhard Grill and Herbert Bos
    • 31st ACM Symposium on Applied Computing
    @INPROCEEDINGS{Bacs2016Slick,
       author = {Andrei Bacs and Cristiano Giuffrida and Bernhard Grill and Herbert Bos},
       title = {Slick: An Intrusion Detection System for Virtualized Storage Devices},
       booktitle = {31st ACM Symposium on Applied Computing},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/slick.pdf},
    }
  • Detection of Data Leaks in Collaborative Data Driven Research (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2016Detection,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Detection of Data Leaks in Collaborative Data Driven Research},
       journal = {ERCIM News},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Detection_EN105.pdf},
    }
  • Secure Cyber-Physical Production Systems: Solid Steps towards Realization (2016)
    • INPROCEEDINGS--
    • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl
    • 1st International Workshop on Cyber-Physical Production Systems (CPPS 2016)
    @INPROCEEDINGS{Ullrich2016Secure,
       author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Secure Cyber-Physical Production Systems: Solid Steps towards Realization},
       booktitle = {1st International Workshop on Cyber-Physical Production Systems (CPPS 2016)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/cpps.pdf},
    }
  • The Quest for Privacy in Consumer IoT (2016)
    • INPROCEEDINGS--
    • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl
    • 1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016)
    @INPROCEEDINGS{Ullrich2016Quest,
       author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {The Quest for Privacy in Consumer IoT},
       booktitle = {1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/consiot.pdf},
    }
  • Efficient Triggering of Trojan Hardware Logic (2016)
    • INPROCEEDINGS--
    • Artemios G. Voyiatzis and Kyriakos G. Stefanidis and Paris Kitsos
    • 19th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2016)
    @INPROCEEDINGS{Voyiatzis2016Efficient,
       author = {{Artemios G.} Voyiatzis and {Kyriakos G.} Stefanidis and Paris Kitsos},
       title = {Efficient Triggering of Trojan Hardware Logic},
       booktitle = {19th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2016)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Kitsos_c47.pdf},
       pages = {200--205},
       publisher = {IEE},
    }
  • Cryptographic Currencies Crash Course (C4): Tutorial (2016)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Edgar R. Weippl
    • 25th International Conference on World Wide Web (WWW 2016)
    @INPROCEEDINGS{Judmayer2016Cryptographic,
       author = {Aljosha Judmayer and {Edgar R.} Weippl},
       title = {Cryptographic Currencies Crash Course (C4): Tutorial},
       booktitle = {25th International Conference on World Wide Web (WWW 2016)},
       year = {2016},
       month = {4},
       pdf = {http://www2016.net/proceedings/companion/p1021.pdf},
    }
  • Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin (2016)
    • INPROCEEDINGS--
    • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl
    • Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.
    @INPROCEEDINGS{Krombholz2016bare,
       author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
       title = {Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin},
       booktitle = {Sicherheit 2016: Sicherheit,
       Schutz und Zuverlässigkeit,
       Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.},
       year = {2016},
       month = {4},
    }
  • A tamper-proof audit and control system for the doctor in the loop (2016)
    • ARTICLE--
    • Peter Kieseberg and Bernd Malle and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • Brain Informatics
    @ARTICLE{Kiesebergtamperproof,
       author = {Peter Kieseberg and Bernd Malle and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {A tamper-proof audit and control system for the doctor in the loop},
       journal = {Brain Informatics},
       year = {2016},
       month = {3},
       pdf = {http://link.springer.com/article/10.1007/s40708-016-0046-2},
       pages = {1--11},
    }
  • CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes (2016)
    • INPROCEEDINGS--
    • Patrick Carter and Collin Mulliner and Martina Lindorfer and William Robertson and Engin Kirda
    • 20th International Conference on Financial Cryptography and Data Security (FC)
    @INPROCEEDINGS{Carter2016CuriousDroid,
       author = {Patrick Carter and Collin Mulliner and Martina Lindorfer and William Robertson and Engin Kirda},
       title = {CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes},
       booktitle = {20th International Conference on Financial Cryptography and Data Security (FC)},
       year = {2016},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/curiousdroid_fc16.pdf},
    }
  • Injecting CSP for Fun and Security (2016)
    • INPROCEEDINGS--
    • Christoph Kerschbaumer and Sid Stamm and Stefan Brunthaler
    • 2nd International Conference on Information Systems Security and Privacy
    @INPROCEEDINGS{Kerschbaumer2016Injecting,
       author = {Christoph Kerschbaumer and Sid Stamm and Stefan Brunthaler},
       title = {Injecting CSP for Fun and Security},
       booktitle = {2nd International Conference on Information Systems Security and Privacy},
       year = {2016},
       month = {2},
    }
  • Trust for the “Doctor in the Loop" (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Kieseberg2016Trust,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Trust for the “Doctor in the Loop"},
       journal = {ERCIM News},
       year = {2016},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/trustfordoctorintheloop.pdf},
    }
  • Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brasil (2016)
    • INPROCEEDINGS--
    • Marcos Kalinowski and Michael Felderer and Tayana Conte and Rodrigo Spínola and Rafael Prikladnicki and Dietmar Winkler and Daniel Méndez Fernández and Stefan Wagner
    • 8th Software Quality Days (SWQD 2016)
    @INPROCEEDINGS{Kalinowski2016Preventing,
       author = {Marcos Kalinowski and Michael Felderer and Tayana Conte and Rodrigo Spínola and Rafael Prikladnicki and Dietmar Winkler and Daniel {Méndez Fernández} and Stefan Wagner},
       title = {Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brasil},
       booktitle = {8th Software Quality Days (SWQD 2016)},
       year = {2016},
       month = {1},
       publisher = {Springer International Publishing},
    }
  • Who are you now? Fading to multiple personas (2016)
    • INPROCEEDINGS--
    • Sven Dietrich and Michael Brenner and Katharina Krombholz
    • Who are you?! Adventures in Authentication (SOUPS Workshop)
    @INPROCEEDINGS{Dietrich2016now,
       author = {Sven Dietrich and Michael Brenner and Katharina Krombholz},
       title = {Who are you now? Fading to multiple personas},
       booktitle = {Who are you?! Adventures in Authentication (SOUPS Workshop)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dietrich2016now.pdf},
    }
  • Availability, Reliability, and Security in Information Systems (2016)
    • BOOK--
    • Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl
    • Springer
    @BOOK{Buccafurri2016Availability,
       author = {Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Availability,
       Reliability,
       and Security in Information Systems},
       booktitle = {Lecture Notes in Computer Science},
       year = {2016},
       pdf = {2016 - FBuccafurri - Availability,
       Reliability,
       and Security in Information Systems - Editorial Notes.pdf},
       publisher = {Springer},
    }
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS (2016)
    • INPROCEEDINGS--
    • Hanno Böck and Aaron Zauner and Sean Devlin and Juraj Somorovsky and Philipp Jovanovic
    • 10th USENIX Workshop on Offensive Technologies (WOOT '16)
    @INPROCEEDINGS{Bck2016NonceDisrespecting,
       author = {Hanno Böck and Aaron Zauner and Sean Devlin and Juraj Somorovsky and Philipp Jovanovic},
       title = {Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS},
       booktitle = {10th USENIX Workshop on Offensive Technologies (WOOT '16)},
       year = {2016},
       pdf = {https://www.usenix.org/system/files/conference/woot16/woot16-paper-bock.pdf},
       link_slides = {https://www.usenix.org/sites/default/files/conference/protected-files/woot16_slides_bock.pdf},
    }
  • Effectiveness of File‐based Deduplication in Digital Forensics (2016)
    • ARTICLE--
    • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • Security and Communication Networks
    @ARTICLE{Neuner2016Effectiveness,
       author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Effectiveness of File‐based Deduplication in Digital Forensics},
       journal = {Security and Communication Networks},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner2016Effectiveness_preprint.pdf},
       publisher = {Wiley},
    }
  • Mapping Information Security Standard ISO 27002 to an Ontological Structure (2016)
    • ARTICLE--
    • Stefan Fenz and S. Plieschnegger and Heidelinde Hobel
    • Information and Computer Security
    @ARTICLE{Fenz2016Mapping,
       author = {Stefan Fenz and S. Plieschnegger and Heidelinde Hobel},
       title = {Mapping Information Security Standard ISO 27002 to an Ontological Structure},
       journal = {Information and Computer Security},
       year = {2016},
       pdf = {http://www.emeraldinsight.com/doi/abs/10.1108/ICS-07-2015-0030?journalCode=ics},
    }
  • Qualitätssicherung in heterogenen und verteilten Entwicklungsumgebungen für industrielle Produktionssysteme (2016)
    • INBOOK--
    • Dietmar Winkler and Richard Mordiny and Stefan Biffl
    • Springer
    @INBOOK{Winkler2016Qualittssicherung,
       author = {Dietmar Winkler and Richard Mordiny and Stefan Biffl},
       title = {Qualitätssicherung in heterogenen und verteilten Entwicklungsumgebungen für industrielle Produktionssysteme},
       booktitle = {Handbuch Industrie 4.0: Produktion,
       Automatisierung und Logistik},
       year = {2016},
       pdf = {http://dx.doi.org/10.1007/978-3-662-45537-1_89-1},
       pages = {1--20},
       publisher = {Springer},
    }
  • Integrationsplattform für anlagenmodellorientiertes Engineering - Bedarfe und Lösungsansätze (2016)
    • INBOOK--
    • Stefan Biffl and Richard Mordiny and Heinrich Steininger and Dietmar Winkler
    • Springer
    @INBOOK{Biffl2016Integrationsplattform,
       author = {Stefan Biffl and Richard Mordiny and Heinrich Steininger and Dietmar Winkler},
       title = {Integrationsplattform für anlagenmodellorientiertes Engineering - Bedarfe und Lösungsansätze},
       booktitle = {Handbuch Industrie 4.0: Produktion,
       Automatisierung und Logistik},
       year = {2016},
       pdf = {http://dx.doi.org/10.1007/978-3-662-45537-1_88-1},
       pages = {1--24},
       publisher = {Springer},
    }
  • Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services (2016)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and Artemios G. Voyiatzis and Edgar R. Weippl
    • 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)
    @INPROCEEDINGS{Merzdovnik2016Whom,
       author = {Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services},
       booktitle = {30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TLSnotaries_preprint.pdf},
    }
  • Time is on my side: Steganography in filesystem metadata (2016)
    • INPROCEEDINGS--
    • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl
    • 16th Annual DFRWS Conference
    @INPROCEEDINGS{Neuner2016Time,
       author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and {Edgar R.} Weippl},
       title = {Time is on my side: Steganography in filesystem metadata},
       booktitle = {16th Annual DFRWS Conference},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/timestampStego_preprint.pdf},
       link_data = {https://www.sba-research.org/dfrws2016/},
       link_slides = {http://www.slideshare.net/SBAResearch/time-is-on-my-side-steganography-in-filesystem-metadata},
    }
  • Multi-Disciplinary Engineering for Industrie 4.0: Semantic Challenges, Needs, and Capabilities (2016)
    • INBOOK--
    • Stefan Biffl and A. Lüder and Dietmar Winkler
    • Springer
    @INBOOK{Biffl2016MultiDisciplinary,
       author = {Stefan Biffl and A. Lüder and Dietmar Winkler},
       title = {Multi-Disciplinary Engineering for Industrie 4.0: Semantic Challenges,
       Needs,
       and Capabilities},
       booktitle = {Biffl S.,
       Sabou M. (Eds.): Semantic Web for Intelligent Engineering Applications},
       year = {2016},
       publisher = {Springer},
    }
  • No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large (2016)
    • INPROCEEDINGS--
    • Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Mayer2016Need,
       author = {Wilfried Mayer and Aaron Zauner and Martin Schmiedecker and Markus Huber},
       title = {No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/scanTLS.pdf},
       link_data = {https://scans.io/study/sba-email},
       link_slides = {http://www.slideshare.net/SBAResearch/no-need-for-black-chambers},
    }
  • On Reducing Bottlenecks in Digital Forensics (2016)
    • ARTICLE--
    • Martin Schmiedecker and Sebastian Neuner
    • ERCIM News
    @ARTICLE{Schmiedecker2016Reducing,
       author = {Martin Schmiedecker and Sebastian Neuner},
       title = {On Reducing Bottlenecks in Digital Forensics},
       journal = {ERCIM News},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/EN106-peekaTorrent.pdf},
    }
  • Weight Distribution of the Syndrome of Linear Codes and Connections to Combinatorial Designs (2016)
    • INPROCEEDINGS--
    • Christoph Pacher and Philipp Grabenweger and Dimitris Simos
    • 2016 IEEE International Symposium on Information Theory
    @INPROCEEDINGS{Pacher2016Weight,
       author = {Christoph Pacher and Philipp Grabenweger and Dimitris Simos},
       title = {Weight Distribution of the Syndrome of Linear Codes and Connections to Combinatorial Designs},
       booktitle = {2016 IEEE International Symposium on Information Theory},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ExactVariance.pdf},
    }
  • Split: Security protocol interaction testing in practice (2016)
    • ARTICLE--
    • Dimitris Simos
    • ERCIM News
    @ARTICLE{Simos2016Split,
       author = {Dimitris Simos},
       title = {Split: Security protocol interaction testing in practice},
       journal = {ERCIM News},
       year = {2016},
       pdf = {https://ercim-news.ercim.eu/en106/special/split-security-protocol-interaction-testing-in-practice},
    }
  • Error-Correcting Codes as Source for Decoding Ambiguity (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl
    • LangSec Workshop at IEEE Security & Privacy
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
       author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
       title = {Error-Correcting Codes as Source for Decoding Ambiguity},
       booktitle = {LangSec Workshop at IEEE Security & Privacy},
       year = {2015},
       month = {21},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ecc.pdf},
       volume = {10},
    }
  • Privacy and Data Protection in Smartphone Messengers (2015)
    • INPROCEEDINGS--
    • Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser
    • Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)
    @INPROCEEDINGS{Rottermanner2015Privacy,
       author = {Christoph Rottermanner and Peter Kieseberg and Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser},
       title = {Privacy and Data Protection in Smartphone Messengers},
       booktitle = {Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)},
       year = {2015},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/paper_drafthp.pdf},
    }
  • Software Quality. The Future of Software Quality: Proceedings of the 8th International Conference, SWQD 2016 (2015)
    • BOOK--
    • Dietmar Winkler and Stefan Biffl and Johannes Bergsmann
    • -
    @BOOK{Winkler2015Software,
       author = {Dietmar Winkler and Stefan Biffl and Johannes Bergsmann},
       title = {Software Quality. The Future of Software Quality: Proceedings of the 8th International Conference,
       SWQD 2016},
       booktitle = {8th Software Quality Days},
       year = {2015},
       month = {12},
    }
  • Server Sounds and Network Noises (2015)
    • INPROCEEDINGS--
    • Tobias Hildebrandt and Stefanie Rinderle-Ma
    • 6th IEEE Conference on Cognitive Infocommunications (CogInfoCom 2015)
    @INPROCEEDINGS{Hildebrandt2015Server,
       author = {Tobias Hildebrandt and Stefanie Rinderle-Ma},
       title = {Server Sounds and Network Noises},
       booktitle = {6th IEEE Conference on Cognitive Infocommunications (CogInfoCom 2015)},
       year = {2015},
       month = {10},
       pdf = {http://eprints.cs.univie.ac.at/4499/1/authors_copy.pdf},
    }
  • Repeatability and Re-Usability in Scientific Processes: Process Context, Data Identification and Verification. (2015)
    • INPROCEEDINGS--
    • Andreas Rauber and Tomasz Miksa and Rudolf Mayer and Stefan Proell
    • 17th International Conference on Data Analytics and Management in Data Intensive Domains (DAMDID 2015)
    @INPROCEEDINGS{Rauber2015Repeatability,
       author = {Andreas Rauber and Tomasz Miksa and Rudolf Mayer and Stefan Proell},
       title = {Repeatability and Re-Usability in Scientific Processes: Process Context,
       Data Identification and Verification.},
       booktitle = {17th International Conference on Data Analytics and Management in Data Intensive Domains (DAMDID 2015)},
       year = {2015},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DAMDID_150623.pdf},
    }
  • A Structured Approach to Defence Simulation Training (2015)
    • ARTICLE--
    • Peter Kieseberg
    • ERCIM News
    @ARTICLE{Kieseberg2015Structured,
       author = {Peter Kieseberg},
       title = {A Structured Approach to Defence Simulation Training},
       journal = {ERCIM News},
       year = {2015},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Scudo.pdf},
    }
  • A Modbus TCP Fuzzer for Testing Internetworked Industrial Systems (2015)
    • INPROCEEDINGS--
    • Artemios G. Voyiatzis and Konstantinos Katsigiannis and Stavros Koubias
    • 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015)
    @INPROCEEDINGS{Voyiatzis2015ModbusTCP,
       author = {{Artemios G.} Voyiatzis and Konstantinos Katsigiannis and Stavros Koubias},
       title = {A Modbus TCP Fuzzer for Testing Internetworked Industrial Systems},
       booktitle = {20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015)},
       year = {2015},
       month = {9},
    }
  • A taxonomy for privacy enhancing technologies (2015)
    • ARTICLE--
    • Johannes Heurix and Peter Zimmermann and Thomas Neubauer and Stefan Fenz
    • Computers and Security
    @ARTICLE{Heurix2015taxonomy,
       author = {Johannes Heurix and Peter Zimmermann and Thomas Neubauer and Stefan Fenz},
       title = {A taxonomy for privacy enhancing technologies},
       journal = {Computers and Security},
       year = {2015},
       month = {9},
       pdf = {http://www.sciencedirect.com/science/article/pii/S0167404815000668},
    }
  • Witnesses for the Doctor in the Loop (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • 2015 International Conference on Brain Informatics & Health (BIH)
    @INPROCEEDINGS{Kieseberg2015Witnesses,
       author = {Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Witnesses for the Doctor in the Loop},
       booktitle = {2015 International Conference on Brain Informatics & Health (BIH)},
       year = {2015},
       month = {9},
       pdf = {https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=1151817&pCurrPk=85962},
    }
  • Using Content Analysis for Privacy Requirement Extraction and Policy Formalization (2015)
    • INPROCEEDINGS--
    • Stefanie Rinderle-Ma and Zhendong Ma and Bernhard Madlmayr
    • 6th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)
    @INPROCEEDINGS{RinderleMa2015Using,
       author = {Stefanie Rinderle-Ma and Zhendong Ma and Bernhard Madlmayr},
       title = {Using Content Analysis for Privacy Requirement Extraction and Policy Formalization},
       booktitle = {6th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)},
       year = {2015},
       month = {9},
       pdf = {http://eprints.cs.univie.ac.at/4429/1/EMISA_RMM15.pdf},
    }
  • An Efficient and Generic Event-based Profiler Framework for Dynamic Languages (2015)
    • INPROCEEDINGS--
    • Gülfem Savrun-Yeniçeri and Michael L. Van de Vanter and Per Larsen and Stefan Brunthaler and Michael Franz
    • Principles and Practices of Programming on The Java Platform (PPPJ 2015)
    @INPROCEEDINGS{SavrunYeniceri2015Efficient,
       author = {Gülfem Savrun-Yeniçeri and {Michael L.} {Van de Vanter} and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {An Efficient and Generic Event-based Profiler Framework for Dynamic Languages},
       booktitle = {Principles and Practices of Programming on The Java Platform (PPPJ 2015)},
       year = {2015},
       month = {9},
       pdf = {http://dl.acm.org/citation.cfm?doid=2807426.2807435},
    }
  • Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems (2015)
    • INPROCEEDINGS--
    • Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Fadai2015Trust,
       author = {Tariq Fadai and Sebastian Schrittwieser and Peter Kieseberg and Martin Schmiedecker},
       title = {Trust me,
       I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/SSL.pdf},
    }
  • Gradually Improving the Forensic Process (2015)
    • INPROCEEDINGS--
    • Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • International Workshop on Cyber Crime (IWCC)
    @INPROCEEDINGS{Neuner2015Gradually,
       author = {Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Gradually Improving the Forensic Process},
       booktitle = {International Workshop on Cyber Crime (IWCC)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
    }
  • QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl
    • 2015 International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Krombholz2015Code,
       author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
       title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
       booktitle = {2015 International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {http://ieeexplore.ieee.org/document/7299920/},
    }
  • Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing (2015)
    • INPROCEEDINGS--
    • Josip Bozic and Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler and Franz Wotawa
    • IEEE International Conference on Software Quality, Reliability and Security 2015
    @INPROCEEDINGS{Bozic2015Attack,
       author = {Josip Bozic and Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler and Franz Wotawa},
       title = {Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing},
       booktitle = {IEEE International Conference on Software Quality,
       Reliability and Security 2015},
       year = {2015},
       month = {8},
       pdf = {http://ieeexplore.ieee.org/document/7272934/},
    }
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach (2015)
    • INPROCEEDINGS--
    • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
       author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PID3762727.pdf},
    }
  • A quantitative study on the re-executability of publicly shared scientific workflows (2015)
    • INPROCEEDINGS--
    • Rudolf Mayer and Andreas Rauber
    • 11th International Conference on e-Science
    @INPROCEEDINGS{Mayer2015quantitative,
       author = {Rudolf Mayer and Andreas Rauber},
       title = {A quantitative study on the re-executability of publicly shared scientific workflows},
       booktitle = {11th International Conference on e-Science},
       year = {2015},
       month = {8},
       pdf = {http://ieeexplore.ieee.org/document/7304314/},
    }
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner
    • USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015
    @INPROCEEDINGS{Dabrowski2015Leveraging,
       author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
       title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
       booktitle = {USENIX Summit on Gaming,
       Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
       year = {2015},
       month = {8},
       pdf = {https://www.usenix.org/system/files/conference/3gse15/3gse15-dabrowski.pdf},
    }
  • The Role and Security of Firewall in IaaS Cloud Computing (2015)
    • INPROCEEDINGS--
    • Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and Edgar R. Weippl
    • Tenth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Cropper2015Role,
       author = {Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and {Edgar R.} Weippl},
       title = {The Role and Security of Firewall in IaaS Cloud Computing},
       booktitle = {Tenth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PID3762737.pdf},
    }
  • Network Security Challenges in Android Applications (2015)
    • INPROCEEDINGS--
    • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl and Vesna Dimitrova
    • 10th International Conference on Availability, Reliability and Security (ARES 2015)
    @INPROCEEDINGS{Buhov2015Network,
       author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl and Vesna Dimitrova},
       title = {Network Security Challenges in Android Applications},
       booktitle = {10th International Conference on Availability,
       Reliability and Security (ARES 2015)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Network_Security_Preprint.pdf},
    }
  • Data Access and Reproducibility in Privacy Sensitive eScience Domains (2015)
    • INPROCEEDINGS--
    • Stefan Proell and Rudolf Mayer and Andreas Rauber
    • 11th IEEE International Conference on eScience
    @INPROCEEDINGS{Proell8Data,
       author = {Stefan Proell and Rudolf Mayer and Andreas Rauber},
       title = {Data Access and Reproducibility in Privacy Sensitive eScience Domains},
       booktitle = {11th IEEE International Conference on eScience},
       year = {2015},
       month = {8},
       pdf = {http://www.ifs.tuwien.ac.at/~mayer/publications/pdf/pro_15escience.pdf},
    }
  • CLAPP: Characterizing Loops in Android Applications (2015)
    • INPROCEEDINGS--
    • Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna
    • 10th Joint Meeting of the European Software Engineering Conference and the ACM Symposium on the Foundations of Software Engineering (ESEC FSE)
    @INPROCEEDINGS{Fratantonio2015CLAPP,
       author = {Yanick Fratantonio and Aravind Machiry and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna},
       title = {CLAPP: Characterizing Loops in Android Applications},
       booktitle = {10th Joint Meeting of the European Software Engineering Conference and the ACM Symposium on the Foundations of Software Engineering (ESEC FSE)},
       year = {2015},
       month = {8},
       pdf = {http://cs.ucsb.edu/~yanick/publications/2015_fse_clapp.pdf},
    }
  • Meerkat: Detecting Website Defacements through Image-based Object Recognition (2015)
    • INPROCEEDINGS--
    • Kevin Borgolte and Christopher Kruegel and Giovanni Vigna
    • 24th Usenix Security Symposium
    @INPROCEEDINGS{Borgolte2015Meerkat,
       author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna},
       title = {Meerkat: Detecting Website Defacements through Image-based Object Recognition},
       booktitle = {24th Usenix Security Symposium},
       year = {2015},
       month = {8},
       pdf = {https://seclab.cs.ucsb.edu/media/uploads/papers/sec2015-meerkat.pdf},
    }
  • ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities (2015)
    • INPROCEEDINGS--
    • Michael Weissbacher and William Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna
    • 24th Usenix Security Symposium
    @INPROCEEDINGS{Weissbacher2015ZigZag,
       author = {Michael Weissbacher and William Robertson and Engin Kirda and Christopher Kruegel and Giovanni Vigna},
       title = {ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities},
       booktitle = {24th Usenix Security Symposium},
       year = {2015},
       month = {8},
       pdf = {http://seclab.ccs.neu.edu/static/publications/sec2015zigzag.pdf},
    }
  • EvilCohort: Detecting Communities of Malicious Accounts on Online Services (2015)
    • INPROCEEDINGS--
    • Gianluca Stringhini and Pierre Mourlanne and Gregoire Jacob and Manuel Egele and Christopher Kruegel and Giovanni Vigna
    • 24th Usenix Security Symposium
    @INPROCEEDINGS{Stringhini2015EvilCohort,
       author = {Gianluca Stringhini and Pierre Mourlanne and Gregoire Jacob and Manuel Egele and Christopher Kruegel and Giovanni Vigna},
       title = {EvilCohort: Detecting Communities of Malicious Accounts on Online Services},
       booktitle = {24th Usenix Security Symposium},
       year = {2015},
       month = {8},
       pdf = {http://www0.cs.ucl.ac.uk/staff/G.Stringhini/papers/evilcohort-usenix2015.pdf},
    }
  • Cloud Security Audit for Migration and Continuous Monitoring (2015)
    • INPROCEEDINGS--
    • Umar Mukhtar Ismail and Shareeful Islam and Haralambos Mouratidis
    • 5th IEEE International Symposium on Trust and Security in Cloud Computing
    @INPROCEEDINGS{Ismail2015Cloud,
       author = {{Umar Mukhtar} Ismail and Shareeful Islam and Haralambos Mouratidis},
       title = {Cloud Security Audit for Migration and Continuous Monitoring},
       booktitle = {5th IEEE International Symposium on Trust and Security in Cloud Computing},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Symposium Paper SUBMITTED_Vr1.pdf},
    }
  • Towards a CERT-Communication Model as Basis to Software Assurance (2015)
    • INPROCEEDINGS--
    • Gerald Quirchmayr and Otto Hellwig and Edith Huber and Markus Huber and Timo Mischitz
    • 10th International Conference on Availability, Reliability and Security (ARES), 2015
    @INPROCEEDINGS{Quirchmayr2015Towards,
       author = {Gerald Quirchmayr and Otto Hellwig and Edith Huber and Markus Huber and Timo Mischitz},
       title = {Towards a CERT-Communication Model as Basis to Software Assurance},
       booktitle = {10th International Conference on Availability,
       Reliability and Security (ARES),
       2015},
       year = {2015},
       month = {8},
       pdf = {https://www.researchgate.net/profile/Edith_Huber2/publication/280232144_Towards_a_CERT-Communication_Model_as_Basis_to_Software_Assurance/links/55dec1fd08ae79830bb59139.pdf},
    }
  • Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis (2015)
    • INPROCEEDINGS--
    • Martina Lindorfer and Matthias Neugschwandtner and Christian Platzer
    • Proceedings of the 39th Annual International Computers, Software and Applications Conference (COMPSAC)
    @INPROCEEDINGS{Lindorfer2015Marvin,
       author = {Martina Lindorfer and Matthias Neugschwandtner and Christian Platzer},
       title = {Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis},
       booktitle = {Proceedings of the 39th Annual International Computers,
       Software and Applications Conference (COMPSAC)},
       year = {2015},
       month = {7},
       pdf = {http://iseclab.org/papers/marvin_compsac15.pdf},
    }
  • Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl
    • Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015
    @INPROCEEDINGS{Krombholz2015Privacy,
       author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
       title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
       booktitle = {Workshop on Inclusive Privacy and Security (WIPS),
       Symposium On Usable Privacy and Security 2015},
       year = {2015},
       month = {7},
       pdf = {https://www.ifs.tuwien.ac.at/node/17062},
    }
  • CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism (2015)
    • ARTICLE--
    • Peter Kieseberg and Olga E. Segou and Fabio Roli
    • ERCIM News
    @ARTICLE{Kieseberg2015CyberROAD,
       author = {Peter Kieseberg and {Olga E.} Segou and Fabio Roli},
       title = {CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism},
       journal = {ERCIM News},
       year = {2015},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/CyberRoad-Excerpt.pdf},
    }
  • \'Nice Boots!\': A Large-Scale Analysis of Bootkits and New Ways to Stop Them (2015)
    • INPROCEEDINGS--
    • Bernhard Grill and Andrei Bacs and Christian Platzer and Herbert Bos
    • International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
    @INPROCEEDINGS{Grill2015Nice,
       author = {Bernhard Grill and Andrei Bacs and Christian Platzer and Herbert Bos},
       title = {\'Nice Boots!\': A Large-Scale Analysis of Bootkits and New Ways to Stop Them},
       booktitle = {International Conference on Detection of Intrusions and Malware,
       and Vulnerability Assessment (DIMVA)},
       year = {2015},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/bootcamp_dimva_2015.pdf},
    }
  • Raising resilience of web service dependent repository systems (2015)
    • ARTICLE--
    • Tomasz Miksa and Rudolf Mayer and Andreas Rauber
    • International Journal of Web Information Systems
    @ARTICLE{Miksa2015Raising,
       author = {Tomasz Miksa and Rudolf Mayer and Andreas Rauber},
       title = {Raising resilience of web service dependent repository systems},
       journal = {International Journal of Web Information Systems},
       year = {2015},
       month = {7},
       pdf = {http://www.ifs.tuwien.ac.at/~mayer/publications/pdf/mik_15IJWIS.pdf},
    }
  • A Cross-Layer Security Analysis for Process-Aware Information Systems (2015)
    • TECHREPORT--
    • Maria Leitner and Zhendong Ma and Stefanie Rinderle-Ma
    • -
    @TECHREPORT{Leitner2015CrossLayer,
       author = {Maria Leitner and Zhendong Ma and Stefanie Rinderle-Ma},
       title = {A Cross-Layer Security Analysis for Process-Aware Information Systems},
       booktitle = {arxiv.org},
       year = {2015},
       month = {7},
       pdf = {http://arxiv.org/pdf/1507.03415v1.pdf},
    }
  • On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users (2015)
    • INPROCEEDINGS--
    • Yanick Fratantonio and Antonio Bianchi and William Robertson and Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna
    • 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
    @INPROCEEDINGS{Fratantonio2015Security,
       author = {Yanick Fratantonio and Antonio Bianchi and William Robertson and Manuel Egele and Christopher Kruegel and Engin Kirda and Giovanni Vigna},
       title = {On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users},
       booktitle = {12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)},
       year = {2015},
       month = {7},
       pdf = {http://seclab.ccs.neu.edu/static/publications/dimva2015android.pdf},
    }
  • CyPhySec: Defending Cyber-Physical Systems  (2015)
    • ARTICLE--
    • Johanna Ullrich and Edgar R. Weippl
    • ERCIM News 102
    @ARTICLE{Ullrich2015CyPhySec,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       title = {CyPhySec: Defending Cyber-Physical Systems },
       journal = {ERCIM News 102},
       year = {2015},
       month = {7},
       pdf = {https://ercim-news.ercim.eu/en102/special/cyphysec-defending-cyber-physical-systems},
    }
  • Stakeholder-oriented energy planning support in cities (2015)
    • INPROCEEDINGS--
    • Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and A Min Tjoa
    • 6th International Building Physics Conference, IBPC 2015
    @INPROCEEDINGS{Ouhajjou2015Stakeholderoriented,
       author = {Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and {A Min} Tjoa},
       title = {Stakeholder-oriented energy planning support in cities},
       booktitle = {6th International Building Physics Conference,
       IBPC 2015},
       year = {2015},
       month = {6},
    }
  • Multi-objective evolutionary optimization of computation-intensive simulations - The case of security control selection (2015)
    • INPROCEEDINGS--
    • Bernhard Grill and Andreas Ekelhart and Elmar Kiesling and Christine Strauss and Christian Stummer
    • Proceedings of the 11th Metaheuristics International Conference (MIC)
    @INPROCEEDINGS{Kiesling2015Multiobjective,
       author = {Bernhard Grill and Andreas Ekelhart and Elmar Kiesling and Christine Strauss and Christian Stummer},
       title = {Multi-objective evolutionary optimization of computation-intensive simulations - The case of security control selection},
       booktitle = {Proceedings of the 11th Metaheuristics International Conference (MIC)},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/optimizing_metaheuristics_mic_final.pdf},
    }
  • Constructing Orthogonal Designs in Powers of Two: Groebner Bases Meet Equational Unification (2015)
    • INPROCEEDINGS--
    • Ilias Kotsireas and Temur Kutsia and Dimitris Simos
    • 26th International Conference on Rewriting Techniques and Applications (RTA 2015)
    @INPROCEEDINGS{Simos2015Constructing,
       author = {Ilias Kotsireas and Temur Kutsia and Dimitris Simos},
       title = {Constructing Orthogonal Designs in Powers of Two: Groebner Bases Meet Equational Unification},
       booktitle = {26th International Conference on Rewriting Techniques and Applications (RTA 2015)},
       year = {2015},
       month = {6},
       pdf = {http://drops.dagstuhl.de/opus/volltexte/2015/5200/pdf/20.pdf},
    }
  • Security and privacy of smartphone messaging applications (2015)
    • ARTICLE--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • International Journal of Pervasive Computing and Communications
    @ARTICLE{Mueller2015Security,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Security and privacy of smartphone messaging applications},
       journal = {International Journal of Pervasive Computing and Communications},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Draft.pdf},
       volume = {11},
    }
  • Privacy-preserving Routing in Delay Tolerant Networks based on Bloom Filters (2015)
    • INPROCEEDINGS--
    • Evangelos Papapetrou and Vasileios Bourgos and Artemios G. Voyiatzis
    • 16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2015)
    @INPROCEEDINGS{Papapetrou2015Privacypreserving,
       author = {Evangelos Papapetrou and Vasileios Bourgos and {Artemios G.} Voyiatzis},
       title = {Privacy-preserving Routing in Delay Tolerant Networks based on Bloom Filters},
       booktitle = {16th IEEE International Symposium on a World of Wireless,
       Mobile and Multimedia Networks (IEEE WoWMoM 2015)},
       year = {2015},
       month = {6},
       pdf = {http://www.researchgate.net/profile/Evangelos_Papapetrou/publication/275330512_Privacy-preserving_Routing_in_Delay_Tolerant_Networks_based_on_Bloom_Filters/links/55377c0d0cf2058efdeabfdd.pdf},
    }
  • High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm (2015)
    • INPROCEEDINGS--
    • Lenos Ioannou and Harris E. Michail and Artemios G. Voyiatzis
    • 4th Mediterranean Conference on Embedded Computing
    @INPROCEEDINGS{Ioannou2015High,
       author = {Lenos Ioannou and {Harris E.} Michail and {Artemios G.} Voyiatzis},
       title = {High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm},
       booktitle = {4th Mediterranean Conference on Embedded Computing},
       year = {2015},
       month = {6},
       pdf = {https://dl.dropboxusercontent.com/u/56966369/meco2015.pdf},
    }
  • A Semantic Region Growing Algorithm: Extraction of Urban Settings (2015)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Amin Abdalla and Paolo Fogliaroni and Andrew U. Frank
    • Geographic Information Science as an Enabler of Smarter Cities and Communities (AGILE) 2015
    @INPROCEEDINGS{Hobel2015Semantic,
       author = {Heidelinde Hobel and Amin Abdalla and Paolo Fogliaroni and {Andrew U.} Frank},
       title = {A Semantic Region Growing Algorithm: Extraction of Urban Settings},
       booktitle = {Geographic Information Science as an Enabler of Smarter Cities and Communities (AGILE) 2015},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Heidelinde Hobel - A Semantic Region Growing Algorithm.pdf},
    }
  • Implementing Naive Geography via Qualitative Spatial Relation Queries (2015)
    • INPROCEEDINGS--
    • Paolo Fogliaroni and Heidelinde Hobel
    • Geographic Information Science as an Enabler of Smarter Cities and Communities (AGILE 2015)
    @INPROCEEDINGS{Fogliaroni2015Implementing,
       author = {Paolo Fogliaroni and Heidelinde Hobel},
       title = {Implementing Naive Geography via Qualitative Spatial Relation Queries},
       booktitle = {Geographic Information Science as an Enabler of Smarter Cities and Communities (AGILE 2015)},
       year = {2015},
       month = {6},
       pdf = {http://www.agile-online.org/Conference_Paper/cds/agile_2015/shortpapers/91/91_Paper_in_PDF.pdf},
    }
  • Smart Privacy Visor: Bridging the Privacy Gap (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen
    • Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)
    @INPROCEEDINGS{Dabrowski2015Smart,
       author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
       title = {Smart Privacy Visor: Bridging the Privacy Gap},
       booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
    }
  • Integrating attacker behavior in IT security analysis: a discrete-event simulation approach (2015)
    • ARTICLE--
    • Andreas Ekelhart and Elmar Kiesling and Bernhard Grill and Christine Strauss and Christian Stummer
    • Information Technology and Management
    @ARTICLE{Ekelhart2015Integrating,
       author = {Andreas Ekelhart and Elmar Kiesling and Bernhard Grill and Christine Strauss and Christian Stummer},
       title = {Integrating attacker behavior in IT security analysis: a discrete-event simulation approach},
       journal = {Information Technology and Management},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/article/10.1007/s10799-015-0232-6},
    }
  • Recognition and pseudonymisation of medical records for secondary use (2015)
    • ARTICLE--
    • Johannes Heurix and Stefan Fenz and Antonio Rella and Thomas Neubauer
    • Medical and Biological Engineering and Computing
    @ARTICLE{Heurix2015Recognition,
       author = {Johannes Heurix and Stefan Fenz and Antonio Rella and Thomas Neubauer},
       title = {Recognition and pseudonymisation of medical records for secondary use},
       journal = {Medical and Biological Engineering and Computing},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/article/10.1007/s11517-015-1322-7},
    }
  • Portrait of a Privacy Invasion - Detecting Relationships Through Large-scale Photo Analysis (2015)
    • INPROCEEDINGS--
    • Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna
    • 15th Privacy Enhancing Technologies Symposium (PETS)
    @INPROCEEDINGS{Shoshitaishvili2015Portrait,
       author = {Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna},
       title = {Portrait of a Privacy Invasion - Detecting Relationships Through Large-scale Photo Analysis},
       booktitle = {15th Privacy Enhancing Technologies Symposium (PETS)},
       year = {2015},
       month = {6},
       pdf = {https://www.cs.ucsb.edu/~chris/research/doc/pets15_creepic.pdf},
    }
  • Large-scale Automated Software Diversity - Program Evolution Redux (2015)
    • ARTICLE--
    • Andrei Homescu and Todd Jackson and Stephen Crane and Stefan Brunthaler and Per Larsen and Michael Franz
    • IEEE Transactions on Dependable and Secure Computing
    @ARTICLE{Homescu2015Largescale,
       author = {Andrei Homescu and Todd Jackson and Stephen Crane and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Large-scale Automated Software Diversity - Program Evolution Redux},
       journal = {IEEE Transactions on Dependable and Secure Computing},
       year = {2015},
       month = {6},
       pdf = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7122891},
    }
  • Safe and efficient hybrid memory management for Java (2015)
    • INPROCEEDINGS--
    • Codruţ Stancu and Christian Wimmer and Stefan Brunthaler and Per Larsen and Michael Franz
    • 2015 ACM SIGPLAN International Symposium on Memory Management (ISMM 2015)
    @INPROCEEDINGS{Stancu2015Safe,
       author = {Codruţ Stancu and Christian Wimmer and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Safe and efficient hybrid memory management for Java},
       booktitle = {2015 ACM SIGPLAN International Symposium on Memory Management (ISMM 2015)},
       year = {2015},
       month = {6},
       pdf = {http://dl.acm.org/citation.cfm?doid=2754169.2754185},
    }
  • How to increase the inventory efficiency in information security risk and compliance management (2015)
    • INPROCEEDINGS--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer
    • European Conference on Information Systems (ECIS) 2015
    @INPROCEEDINGS{Fenz2015increase,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer},
       title = {How to increase the inventory efficiency in information security risk and compliance management},
       booktitle = {European Conference on Information Systems (ECIS) 2015},
       year = {2015},
       month = {5},
    }
  • Multi-Actor Urban Energy Planning Support: Building refurbishment and Building-integrated Solar PV (2015)
    • INBOOK--
    • Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and A Min Tjoa
    • -
    @INBOOK{Ouhajjou2015MultiActor,
       author = {Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and {A Min} Tjoa},
       title = {Multi-Actor Urban Energy Planning Support: Building refurbishment and Building-integrated Solar PV},
       booktitle = {Multi-Actor Urban Energy Planning Support: Building refurbishment and Building-integrated Solar PV},
       year = {2015},
       month = {5},
    }
  • MySQL 5.7: Das umfassende Handbuch (2015)
    • BOOK--
    • Stefan Proell and Eva Zangerle and Wolfgang Gassler
    • Rheinwerk Computing
    @BOOK{Proell2015MySQL,
       author = {Stefan Proell and Eva Zangerle and Wolfgang Gassler},
       title = {MySQL 5.7: Das umfassende Handbuch},
       booktitle = {Galileo Computing},
       year = {2015},
       month = {5},
       publisher = {Rheinwerk Computing},
    }
  • Achieving human and machine accessibility of cited data in scholarly publications (2015)
    • ARTICLE--
    • Joan Starr and Eleni Castro and Merce Crosas and Michel Dumontier and Robert R. Downs and Ruth Duerr and Laurel Haak and Melissa Haendel and Ivan Herman and Simon Hodson and Joe Hourcle and John Ernest Kratz and Jennifer Lin and Lars Holm Nielsen and Amy Nurnberger and Stefan Proell and Andreas Rauber and Simone Sacchi and Arthur P. Smith and Michael Taylor and Tim Clark
    • PeerJ PeerJ PrePrints
    @ARTICLE{Starr2015Achieving,
       author = {Joan Starr and Eleni Castro and Merce Crosas and Michel Dumontier and {Robert R.} Downs and Ruth Duerr and Laurel Haak and Melissa Haendel and Ivan Herman and Simon Hodson and Joe Hourcle and {John Ernest} Kratz and Jennifer Lin and {Lars Holm} Nielsen and Amy Nurnberger and Stefan Proell and Andreas Rauber and Simone Sacchi and {Arthur P.} Smith and Michael Taylor and Tim Clark},
       title = {Achieving human and machine accessibility of cited data in scholarly publications},
       journal = {PeerJ PeerJ PrePrints },
       year = {2015},
       month = {5},
       pdf = {https://peerj.com/articles/cs-1/},
    }
  • Protection through Isolation: Virtues and Pitfalls (2015)
    • INBOOK--
    • Johanna Ullrich and Edgar R. Weippl
    • -
    @INBOOK{Ullrich2015Protection,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       title = {Protection through Isolation: Virtues and Pitfalls},
       booktitle = {The Cloud Security Ecosystem},
       year = {2015},
       month = {5},
       pdf = {https://www.safaribooksonline.com/library/view/the-cloud-security/9780128017807/B9780128015957000069.xhtml},
    }
  • A Large-Scale Study of Mobile Web App Security (2015)
    • INPROCEEDINGS--
    • Patrick Mutchler and Adam Doupé and John Mitchell and Christopher Kruegel and Giovanni Vigna
    • Mobile Security Technologies Workshop (MoST)
    @INPROCEEDINGS{Mutchler2015LargeScale,
       author = {Patrick Mutchler and Adam Doupé and John Mitchell and Christopher Kruegel and Giovanni Vigna},
       title = {A Large-Scale Study of Mobile Web App Security},
       booktitle = {Mobile Security Technologies Workshop (MoST)},
       year = {2015},
       month = {5},
       pdf = {http://ieee-security.org/TC/SPW2015/MoST/papers/s2p3.pdf},
    }
  • What the App is That? Deception and Countermeasures in the Android User Interface (2015)
    • INPROCEEDINGS--
    • Antonio Bianchi and Jacopo Corbetta and Luca Invernizzi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna
    • IEEE Symposium on Security and Privacy
    @INPROCEEDINGS{Bianchi2015What,
       author = {Antonio Bianchi and Jacopo Corbetta and Luca Invernizzi and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna},
       title = {What the App is That? Deception and Countermeasures in the Android User Interface},
       booktitle = {IEEE Symposium on Security and Privacy},
       year = {2015},
       month = {5},
       pdf = {https://www.cs.ucsb.edu/~chris/research/doc/oakland15_uideception.pdf},
    }
  • Readactor: Practical Code Randomization Resilient to Memory Disclosure (2015)
    • INPROCEEDINGS--
    • Stephen Crane and Christopher Liebchen and Andrei Homescu and Lucas Davi and Per Larsen and Ahmad-Reza Sadeghi and Stefan Brunthaler and Michael Franz
    • 2015 IEEE Symposium on Security and Privacy
    @INPROCEEDINGS{Crane2015Readactor,
       author = {Stephen Crane and Christopher Liebchen and Andrei Homescu and Lucas Davi and Per Larsen and Ahmad-Reza Sadeghi and Stefan Brunthaler and Michael Franz},
       title = {Readactor: Practical Code Randomization Resilient to Memory Disclosure},
       booktitle = {2015 IEEE Symposium on Security and Privacy},
       year = {2015},
       month = {5},
       pdf = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7163059},
    }
  • Wissensmanagement bei CERTs – eine europäische Herausforderung, in Risiken kennen, Herausforderungen annehmen, Lösungen gestalten (2015)
    • INPROCEEDINGS--
    • Edith Huber and Gerald Quirchmayr and Otto Hellwig
    • 14. Deutscher IT-Sicherheitskongress des BSI
    @INPROCEEDINGS{Huber2015Wissensmanagement,
       author = {Edith Huber and Gerald Quirchmayr and Otto Hellwig},
       title = {Wissensmanagement bei CERTs – eine europäische Herausforderung,
       in Risiken kennen,
       Herausforderungen annehmen,
       Lösungen gestalten},
       booktitle = {14. Deutscher IT-Sicherheitskongress des BSI},
       year = {2015},
       month = {5},
    }
  • Instant Messaging und Presence Security – Analyse von Maßnahmen für sichere und anonyme Kommunikation (2015)
    • THESIS--
    • Christoph Mahrl
    • -
    @THESIS{Mahrl2015Instant,
       author = {Christoph Mahrl},
       title = {Instant Messaging und Presence Security – Analyse von Maßnahmen für sichere und anonyme Kommunikation},
       booktitle = {Bachelor Thesis},
       year = {2015},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Mahrl_Christoph_BIS.PDF},
    }
  • Data Citation of Evolving Data (2015)
    • ARTICLE--
    • Andreas Rauber and Ari Asmi and Dieter van Uytvanck and Stefan Proell
    • Recommendations of the Working Group on Data Citation (WGDC)
    @ARTICLE{Rauber2015Data,
       author = {Andreas Rauber and Ari Asmi and Dieter {van Uytvanck} and Stefan Proell},
       title = {Data Citation of Evolving Data},
       journal = {Recommendations of the Working Group on Data Citation (WGDC)},
       year = {2015},
       month = {5},
       pdf = {https://www.rd-alliance.org/system/files/documents/RDA-DC-Recommendations_150609.pdf},
    }
  • Evaluation of the IPO-Family algorithms for test case generation in web security testing (2015)
    • INPROCEEDINGS--
    • Josip Bozic and Bernhard Garn and Dimitris Simos and Franz Wotawa
    • IEEE 8th International Conference on Software Testing, Verification and Validation
    @INPROCEEDINGS{Bozic2015Evaluation,
       author = {Josip Bozic and Bernhard Garn and Dimitris Simos and Franz Wotawa},
       title = {Evaluation of the IPO-Family algorithms for test case generation in web security testing},
       booktitle = {IEEE 8th International Conference on Software Testing,
       Verification and Validation},
       year = {2015},
       month = {4},
       pdf = {http://ieeexplore.ieee.org/document/7107436/},
    }
  • Using Ontologies to Capture the Semantics of a (Business) Process for Digital Preservation (2015)
    • ARTICLE--
    • Rudolf Mayer and Gonccalo Antunes and Artur Caetano and Marzieh Bakhshandeh and Andreas Rauber and Jose Borbinha
    • International Journal of Digital Libraries (IJDL)
    @ARTICLE{Mayer2015Using,
       author = {Rudolf Mayer and Gonccalo Antunes and Artur Caetano and Marzieh Bakhshandeh and Andreas Rauber and Jose Borbinha},
       title = {Using Ontologies to Capture the Semantics of a (Business) Process for Digital Preservation},
       journal = {International Journal of Digital Libraries (IJDL)},
       year = {2015},
       month = {4},
       pdf = {http://www.ifs.tuwien.ac.at/~Emayer/publications/pdf/may_ijdl15_contextmodel.pdf},
       volume = {15},
       pages = {129--152},
    }
  • Security tests for mobile applications - Why using TLS SSL is not enough (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    @INPROCEEDINGS{Kieseberg2015Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Security tests for mobile applications - Why using TLS SSL is not enough},
       booktitle = {2015 IEEE Eighth International Conference on Software Testing,
       Verification and Validation Workshops (ICSTW)},
       year = {2015},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ASQT2015_cameraready_wo1stpage.pdf},
    }
  • The BORG: Nanoprobing Binaries for Buffer Overreads (2015)
    • INPROCEEDINGS--
    • Matthias Neugschwandtner and Paolo Milani Comparetti and Istvan Haller and Herbert Bos
    • ACM Conference on Data and Application Security and Privacy (CODASPY)
    @INPROCEEDINGS{Neugschwandtner2015BORG,
       author = {Matthias Neugschwandtner and Paolo Milani Comparetti and Istvan Haller and Herbert Bos},
       title = {The BORG: Nanoprobing Binaries for Buffer Overreads},
       booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)},
       year = {2015},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neugschwandtner borg.pdf},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2015)
    • ARTICLE--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • Magdeburger Journal zur Sicherheitsforschung
    @ARTICLE{Ullrich2015IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       journal = {Magdeburger Journal zur Sicherheitsforschung},
       year = {2015},
       month = {3},
       pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
       volume = {1},
    }
  • The Role of ICT in a Low Carbon Society (2015)
    • ARTICLE--
    • M. Koenigsmayr and Thomas Neubauer
    • IEEE Technology and Society Magazine
    @ARTICLE{Koenigsmayr2015Role,
       author = {M. Koenigsmayr and Thomas Neubauer},
       title = {The Role of ICT in a Low Carbon Society},
       journal = {IEEE Technology and Society Magazine},
       year = {2015},
       month = {3},
       volume = {34},
       pages = {39--44},
    }
  • Anforderungen an die Modellierung der Kommunikation von CERTs (2015)
    • INBOOK--
    • Otto Hellwig
    • Springer
    @INBOOK{Hellwig2015Anforderungen,
       author = {Otto Hellwig},
       title = {Anforderungen an die Modellierung der Kommunikation von CERTs},
       booktitle = {Sicherheit in Cyber-Netzwerken - Computer Emergency Response Teams und ihre Kommunikation},
       year = {2015},
       month = {3},
       publisher = {Springer},
       note = {ISBN 978-3-658-09058-6},
    }
  • Organisation, Rahmenbedingungen und Kommunikation bei CERTs (2015)
    • INBOOK--
    • Otto Hellwig
    • Springer
    @INBOOK{Hellwig2015Organisation,
       author = {Otto Hellwig},
       title = {Organisation,
       Rahmenbedingungen und Kommunikation bei CERTs},
       booktitle = {Sicherheit in Cyber-Netzwerken - Computer Emergency Response Teams und ihre Kommunikation},
       year = {2015},
       month = {3},
       publisher = {Springer},
       note = {ISBN 978-3-658-09058-6},
    }
  • Reproducible Database Queries in Privacy Sensitive Applications (2015)
    • INPROCEEDINGS--
    • Stefan Proell and Rudolf Mayer and Andreas Rauber
    • MATHMOD 2015
    @INPROCEEDINGS{Proell2015Reproducible,
       author = {Stefan Proell and Rudolf Mayer and Andreas Rauber},
       title = {Reproducible Database Queries in Privacy Sensitive Applications},
       booktitle = {MATHMOD 2015},
       year = {2015},
       month = {2},
       pdf = {http://www.sciencedirect.com/science/article/pii/S2405896315002037},
    }
  • Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels (2015)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Lisa Madlberger and Andreas Thoeni and Stefan Fenz
    • Workshop on Social Media and Linked Data for Emergency Response at ESWC2014 (SMILE)
    @INPROCEEDINGS{Hobel2015Visualisation,
       author = {Heidelinde Hobel and Lisa Madlberger and Andreas Thoeni and Stefan Fenz},
       title = { Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels},
       booktitle = {Workshop on Social Media and Linked Data for Emergency Response at ESWC2014 (SMILE)},
       year = {2015},
       month = {2},
       pdf = {http://linkedscience.org/wp-content/uploads/2014/05/smile2014_submission_2.pdf},
    }
  • Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity (2015)
    • INPROCEEDINGS--
    • Stephen Crane and Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz
    • 22nd Annual Network and Distributed System Security Symposium (NDSS 2015)
    @INPROCEEDINGS{Crane2015Thwarting,
       author = {Stephen Crane and Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity},
       booktitle = {22nd Annual Network and Distributed System Security Symposium (NDSS 2015)},
       year = {2015},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ndss15b.pdf},
    }
  • Opaque control-flow integrity (2015)
    • INPROCEEDINGS--
    • Vishwath Mohan and Per Larsen and Stefan Brunthaler and Kevin W. Hamlen and Michael Franz
    • Network and Distributed System Security Symposium
    @INPROCEEDINGS{Mohan2015Opaque,
       author = {Vishwath Mohan and Per Larsen and Stefan Brunthaler and {Kevin W.} Hamlen and Michael Franz},
       title = {Opaque control-flow integrity},
       booktitle = {Network and Distributed System Security Symposium},
       year = {2015},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ndss15a.pdf},
    }
  • A Catalog of Reusable Design Decisions for Developing UML/MOF-based Domain-specific Modeling Languages (2015)
    • TECHREPORT--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • -
    @TECHREPORT{Hoisl2015Catalog,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {A Catalog of Reusable Design Decisions for Developing UML/MOF-based Domain-specific Modeling Languages},
       booktitle = {Technical Reports (Institute for Information Systems and New Media,
       WU Vienna)},
       year = {2015},
       month = {2},
       pdf = {http://nm.wu.ac.at/nm/file/catalog-post-study.pdf?m=download},
       volume = {108},
    }
  • Protocol for a Systematic Literature Review on Design Decisions for UML-based DSMLs (2015)
    • TECHREPORT--
    • Stefan Sobernig and Bernhard Hoisl and Mark Strembeck
    • -
    @TECHREPORT{Sobernig2015Protocol,
       author = {Stefan Sobernig and Bernhard Hoisl and Mark Strembeck},
       title = {Protocol for a Systematic Literature Review on Design Decisions for UML-based DSMLs},
       booktitle = {Technical Reports (Institute for Information Systems and New Media,
       WU Vienna)},
       year = {2015},
       month = {2},
       pdf = {http://nm.wu.ac.at/nm/file/protocol.pdf?m=download},
    }
  • Asking the Right Questions - Query-Based Data Citation to Precisely Identify Subsets of Data (2015)
    • ARTICLE--
    • Stefan Proell and Andreas Rauber
    • ERCIM News
    @ARTICLE{Proell2015Asking,
       author = {Stefan Proell and Andreas Rauber},
       title = {Asking the Right Questions - Query-Based Data Citation to Precisely Identify Subsets of Data},
       journal = {ERCIM News},
       year = {2015},
       month = {1},
       pdf = {http://ercim-news.ercim.eu/images/stories/EN100/EN100-web.pdf},
    }
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • 1st Workshop on Wearable Security and Privacy
    @INPROCEEDINGS{Krombholz2015Glass,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Ok Glass,
       Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
       booktitle = {1st Workshop on Wearable Security and Privacy},
       year = {2015},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ok Glass.pdf},
    }
  • Beyond Data: Process Sharing and Reuse (2015)
    • ARTICLE--
    • Tomasz Miksa and Andreas Rauber
    • ERCIM News
    @ARTICLE{Miksa2015Beyond,
       author = {Tomasz Miksa and Andreas Rauber},
       title = {Beyond Data: Process Sharing and Reuse},
       journal = {ERCIM News},
       year = {2015},
       month = {1},
       pdf = {https://ercim-news.ercim.eu/en100/special/beyond-data-process-sharing-and-reuse},
       volume = {10},
       pages = {70--81},
       publisher = {Inderscience Publishers},
    }
  • SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization (2015)
    • ARTICLE--
    • Ulrich Pont and Neda Ghiassi and Stefan Fenz and Johannes Heurix and Ardeshir Mahdavi
    • Journal of Information Technology in Construction
    @ARTICLE{Pont2015SEMERGY,
       author = {Ulrich Pont and Neda Ghiassi and Stefan Fenz and Johannes Heurix and Ardeshir Mahdavi},
       title = {SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization},
       journal = {Journal of Information Technology in Construction},
       year = {2015},
       volume = {20},
       pages = {107--120},
    }
  • Ensuring sustainability of web services dependent processes (2015)
    • ARTICLE--
    • Tomasz Miksa and Rudolf Mayer and Andreas Rauber
    • International Journal of Computational Science and Engineering (IJCSE)
    @ARTICLE{_Ensuring_sustainability_of_web_2013,
       author = {Tomasz Miksa and Rudolf Mayer and Andreas Rauber},
       title = {Ensuring sustainability of web services dependent processes},
       journal = {International Journal of Computational Science and Engineering (IJCSE)},
       year = {2015},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/IJCSE1001_0205 MIKSA.pdf},
       volume = {10},
       pages = {70--81},
       publisher = {Inderscience Publishers},
    }
  • Studie Informationssicherheit in Deutschland, Österreich und der Schweiz 2015 (2015)
    • THESIS--
    • Philipp Reisinger
    • -
    @THESIS{Reisinger2015Studie,
       author = {Philipp Reisinger},
       title = {Studie Informationssicherheit in Deutschland,
       Österreich und der Schweiz 2015},
       booktitle = {Studie Informationssicherheit in Deutschland,
       Österreich und der Schweiz 2015},
       year = {2015},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/https://www.fhstp.ac.at/de/mediathek/pdfs/news/studie-informationssicherheit.pdf/@@download/file/Studie Informationssicherheit.pdf},
    }
  • Genetic Algorithms for the Construction of {2^2} and {2^3}-Level Response Surface Designs (2015)
    • INBOOK--
    • Dimitris Simos
    • -
    @INBOOK{Simos2015Genetic,
       author = {Dimitris Simos},
       title = {Genetic Algorithms for the Construction of {2^2} and {2^3}-Level Response Surface Designs},
       booktitle = {Engineering and Applied Sciences Optimization,
       Computational Methods in Applied Sciences},
       year = {2015},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-18320-6_11},
       volume = {38},
    }
  • Resilient Web Services for Timeless Business Processes (2014)
    • INPROCEEDINGS--
    • Tomasz Miksa and Rudolf Mayer and Marco Unterberger and Andreas Rauber
    • 16th International Conference on Information Integration and Web-based Applications and Services (iiWAS2014)
    @INPROCEEDINGS{Miksa2014Resilient,
       author = {Tomasz Miksa and Rudolf Mayer and Marco Unterberger and Andreas Rauber},
       title = {Resilient Web Services for Timeless Business Processes},
       booktitle = {16th International Conference on Information Integration and Web-based Applications and Services (iiWAS2014)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Miksa_iiwas14 Resilient Web Services.pdf},
    }
  • Windows Installer Security (2014)
    • INPROCEEDINGS--
    • Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and Edgar R. Weippl
    • Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)
    @INPROCEEDINGS{Kadluba2014Windows,
       author = {Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and {Edgar R.} Weippl},
       title = {Windows Installer Security},
       booktitle = {Sixth ASE International Conference on Privacy,
       Security,
       Risk and Trust (PASSAT 2014)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Sebastian Neuner msiInstaller.pdf},
    }
  • Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • International Conference on Privacy, Security, Risk and Trust
    @INPROCEEDINGS{Fruehwirt2014Using,
       author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
       booktitle = {International Conference on Privacy,
       Security,
       Risk and Trust},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/using machine learning_paper.pdf},
    }
  • What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications (2014)
    • INPROCEEDINGS--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • iiWas 2014
    @INPROCEEDINGS{Mueller2014Whats,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
       booktitle = {iiWas 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WhatsApp-iiwas-paper_cameraready.pdf},
    }
  • A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives (2014)
    • INPROCEEDINGS--
    • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz
    • IIWAS 2014
    @INPROCEEDINGS{Islam2014Decision,
       author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
       title = {A Decision Framework Model for Migration into Cloud: Business,
       Application,
       Security and Privacy Perspectives},
       booktitle = {IIWAS 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/09_iiwas_46.pdf},
    }
  • TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links (2014)
    • INPROCEEDINGS--
    • Sevtap Duman and Kaan Onarlioglu and Ali Osman Ulusoy and William Robertson and Engin Kirda
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{Duman2014TrueClick,
       author = {Sevtap Duman and Kaan Onarlioglu and {Ali Osman} Ulusoy and William Robertson and Engin Kirda},
       title = {TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2014},
       month = {12},
       pdf = {https://wkr.io/assets/publications/acsac2014trueclick.pdf},
    }
  • QR - Inception: Barcode in Barcode Attacks (2014)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl
    • 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
    @INPROCEEDINGS{Dabrowski2014Inception,
       author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
       title = {QR - Inception: Barcode in Barcode Attacks},
       booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
       year = {2014},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/qrinception.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
    }
  • SEMERGY.net: automatically identifying and optimizing energy-efficient building designs (2014)
    • ARTICLE--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer and A Min Tjoa and Neda Ghiassi and Ulrich Pont and Ardeshir Mahdavi
    • Computer Science - Research and Development
    @ARTICLE{Fenz2014SEMERGYnet,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and {A Min} Tjoa and Neda Ghiassi and Ulrich Pont and Ardeshir Mahdavi},
       title = {SEMERGY.net: automatically identifying and optimizing energy-efficient building designs},
       journal = {Computer Science - Research and Development},
       year = {2014},
       month = {11},
    }
  • Software Profiling Options and Their Effects on Security Based Diversification (2014)
    • INPROCEEDINGS--
    • Mark Murphy and Per Larsen and Stefan Brunthaler and Michael Franz
    • 1st ACM Workshop on Moving Target Defense (MTD 2014)
    @INPROCEEDINGS{Murphy2014Software,
       author = {Mark Murphy and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Software Profiling Options and Their Effects on Security Based Diversification},
       booktitle = {1st ACM Workshop on Moving Target Defense (MTD 2014)},
       year = {2014},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/mtd14.pdf},
    }
  • Dynamic Data Citation (2014)
    • ARTICLE--
    • Stefan Proell
    • Bulletin of IEEE Technical Committee on Digital Libraries
    @ARTICLE{Proell2014Dynamic,
       author = {Stefan Proell},
       title = {Dynamic Data Citation},
       journal = {Bulletin of IEEE Technical Committee on Digital Libraries},
       year = {2014},
       month = {11},
       pdf = {http://www.ieee-tcdl.org/Bulletin/v10n1/papers/proll.pdf},
    }
  • Sustainable eScience processes and systems (2014)
    • ARTICLE--
    • Tomasz Miksa
    • Bulletin of IEEE Technical Committee on Digital Libraries
    @ARTICLE{Miksa2014Sustainable,
       author = {Tomasz Miksa},
       title = {Sustainable eScience processes and systems},
       journal = {Bulletin of IEEE Technical Committee on Digital Libraries},
       year = {2014},
       month = {11},
       pdf = {http://www.ieee-tcdl.org/Bulletin/v10n1/papers/miksa.pdf},
    }
  • Tag Detection for Preventing Unauthorized Face Image Processing (2014)
    • INPROCEEDINGS--
    • Alberto Escalada Jimenez and Adrian Dabrowski and Juan M. Montero Martinez and Isao Echizen
    • Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)
    @INPROCEEDINGS{Jimenez2014Detection,
       author = {{Alberto Escalada} Jimenez and Adrian Dabrowski and {Juan M.} {Montero Martinez} and Isao Echizen},
       title = {Tag Detection for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)},
       year = {2014},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/judmayer_KNX_wfcs2014.pdf},
    }
  • Ontologies for describing the context of scientific experiment processes (2014)
    • INPROCEEDINGS--
    • Rudolf Mayer and Tomasz Miksa and Andreas Rauber
    • 10th International Conference on e-Science
    @INPROCEEDINGS{Mayer2014Ontologies,
       author = {Rudolf Mayer and Tomasz Miksa and Andreas Rauber},
       title = {Ontologies for describing the context of scientific experiment processes},
       booktitle = {10th International Conference on e-Science},
       year = {2014},
       month = {10},
       pdf = {http://www.ifs.tuwien.ac.at/~mayer/publications/pdf/may_escience14.pdf},
    }
  • Risk driven selection of preservation activities for increasing sustainability of open source systems and workflows (2014)
    • INPROCEEDINGS--
    • Tomasz Miksa and Rudolf Mayer and Stephan Strodl and Andreas Rauber and Ricardo Vieira and Goncalo Antunes
    • The 11th International Conference on Digital Preservation (iPres 2014)
    @INPROCEEDINGS{Miksa2014Risk,
       author = {Tomasz Miksa and Rudolf Mayer and Stephan Strodl and Andreas Rauber and Ricardo Vieira and Goncalo Antunes},
       title = {Risk driven selection of preservation activities for increasing sustainability of open source systems and workflows},
       booktitle = {The 11th International Conference on Digital Preservation (iPres 2014)},
       year = {2014},
       month = {10},
       pdf = {http://www.ifs.tuwien.ac.at/~mayer/publications/pdf/mik_ipres14-riskDriven.pdf},
    }
  • Automatic discovery of preservation alternatives supported by community maintained knowledge bases (2014)
    • INPROCEEDINGS--
    • Rudolf Mayer and Johannes Binder and Stephan Strodl and Andreas Rauber
    • 11th International Conference on Digital Preservation (iPres 2014)
    @INPROCEEDINGS{Mayer2014Automatic,
       author = {Rudolf Mayer and Johannes Binder and Stephan Strodl and Andreas Rauber},
       title = {Automatic discovery of preservation alternatives supported by community maintained knowledge bases},
       booktitle = {11th International Conference on Digital Preservation (iPres 2014)},
       year = {2014},
       month = {10},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/may_ipres14-preservationAlternatives.pdf},
    }
  • Model-driven Specification and Enforcement of RBAC Break-Glass Policies for Process-Aware Information Systems (2014)
    • ARTICLE--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • Information and Software Technology (IST)
    @ARTICLE{Wenzl2014Modeldriven,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Model-driven Specification and Enforcement of RBAC Break-Glass Policies for Process-Aware Information Systems},
       journal = {Information and Software Technology (IST)},
       year = {2014},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Model driven specification and enforcement of RBAC break-glass policies ist-v56n10-oct-2014.pdf},
       volume = {56},
    }
  • Exploiting Linked Spatial Data and Granularity Transformations (2014)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Andrew U. Frank
    • Workshop on Geographic Information Observatories 2014
    @INPROCEEDINGS{Hobel2014Exploiting,
       author = {Heidelinde Hobel and {Andrew U.} Frank},
       title = {Exploiting Linked Spatial Data and Granularity Transformations},
       booktitle = {Workshop on Geographic Information Observatories 2014},
       year = {2014},
       month = {10},
       pdf = {http://ceur-ws.org/Vol-1273/paper2.pdf},
    }
  • VPlan - Ontology for Collection of Process Verification Data (2014)
    • INPROCEEDINGS--
    • Tomasz Miksa and Ricardo Vieira and Jose Barateiro and Andreas Rauber
    • International Conference on Digital Preservation
    @INPROCEEDINGS{Miksa2014VPlan,
       author = {Tomasz Miksa and Ricardo Vieira and Jose Barateiro and Andreas Rauber},
       title = {VPlan - Ontology for Collection of Process Verification Data},
       booktitle = {International Conference on Digital Preservation},
       year = {2014},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ontology for collection-ipres2014.pdf},
    }
  • Accelerating iterators in optimizing AST interpreters (2014)
    • INPROCEEDINGS--
    • Wei Zhang and Per Larsen and Stefan Brunthaler and Michael Franz
    • 2014 ACM International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA 2014)
    @INPROCEEDINGS{Zhang2014Accelerating,
       author = {Wei Zhang and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Accelerating iterators in optimizing AST interpreters},
       booktitle = {2014 ACM International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA 2014)},
       year = {2014},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/oopsla14.pdf},
    }
  • Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV (2014)
    • INPROCEEDINGS--
    • Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and A Min Tjoa
    • 28th EnviroInfo Conference
    @INPROCEEDINGS{Ouhajjou2014MultiActor,
       author = {Najd Ouhajjou and Wolfgang Loibl and Stefan Fenz and {A Min} Tjoa},
       title = {Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV},
       booktitle = {28th EnviroInfo Conference},
       year = {2014},
       month = {9},
    }
  • Comparing Three Notations for Defining Scenario-based Model Tests: A Controlled Experiment (2014)
    • INPROCEEDINGS--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • 9th International Conference on the Quality of Information and Communications Technology
    @INPROCEEDINGS{Hoisl2014Comparing,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {Comparing Three Notations for Defining Scenario-based Model Tests: A Controlled Experiment},
       booktitle = {9th International Conference on the Quality of Information and Communications Technology},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Comparing three notations.pdf},
       pages = {41-52},
       publisher = {ACM},
    }
  • Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices (2014)
    • INPROCEEDINGS--
    • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl
    • SINCONF 2014 (Conference on Security of Information and Networks)
    @INPROCEEDINGS{Hochreiner2014Towards,
       author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
       title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
       booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sinconf_preprint.pdf},
    }
  • Genie in a Model? Why Model Driven Security will not secure your Web Application (2014)
    • ARTICLE--
    • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
    @ARTICLE{Hochreiner2014Genie,
       author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
       journal = {Journal of Wireless Mobile Networks,
       Ubiquitous Computing,
       and Dependable Applications (JoWUA)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jowua-v5n3-4.pdf},
       volume = {5},
       pages = {44-62},
    }
  • AES-SEC: Improving software obfuscation through hardware-assistance (2014)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl
    • ARES 2014
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
       title = {AES-SEC: Improving software obfuscation through hardware-assistance },
       booktitle = {ARES 2014},
       year = {2014},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/6980281/},
    }
  • Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • ASQT
    @INPROCEEDINGS{Fruehwirt2014Testen,
       author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
       booktitle = {ASQT},
       year = {2014},
       month = {9},
    }
  • Kaskadierender Widerruf von Delegationen in prozessbasierten Informationssystemen (2014)
    • INPROCEEDINGS--
    • David Hopfmueller and Sigrid Schefer Wenzl and Mark Strembeck
    • 44. Jahrestagung der Gesellschaft für Informatik (GI)
    @INPROCEEDINGS{Hopfmueller2014Kaskadierender,
       author = {David Hopfmueller and Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Kaskadierender Widerruf von Delegationen in prozessbasierten Informationssystemen},
       booktitle = {44. Jahrestagung der Gesellschaft für Informatik (GI)},
       year = {2014},
       month = {9},
       pdf = {http://wi.wu.ac.at/home/mark/publications/informatik14-extended.pdf},
    }
  • Analysing supplier locations using social and semantic data: a case study based on indonesian factories (2014)
    • INPROCEEDINGS--
    • Lisa Madlberger and Heidelinde Hobel and Andreas Thoeni and A Min Tjoa
    • 14th International Conference on Knowledge Management and Data-driven Business
    @INPROCEEDINGS{Madlberger2014Analysing,
       author = {Lisa Madlberger and Heidelinde Hobel and Andreas Thoeni and {A Min} Tjoa},
       title = {Analysing supplier locations using social and semantic data: a case study based on indonesian factories},
       booktitle = {14th International Conference on Knowledge Management and Data-driven Business},
       year = {2014},
       month = {9},
       pdf = {http://dl.acm.org/citation.cfm?id=2638418},
    }
  • Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel (2014)
    • INPROCEEDINGS--
    • Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kruegel and Giovanni Vigna and Yan Chen
    • 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
    @INPROCEEDINGS{Cao2014Protecting,
       author = {Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kruegel and Giovanni Vigna and Yan Chen},
       title = {Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel},
       booktitle = {17th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID)},
       year = {2014},
       month = {9},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-11379-1_14},
    }
  • 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (2014)
    • INPROCEEDINGS--
    • Jacopo Corbetta and Luca Invernizzi and Christopher Kruegel and Giovanni Vigna
    • Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection
    @INPROCEEDINGS{Corbetta201417th,
       author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
       title = {17th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID)},
       booktitle = {Eyes of a Human,
       Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection},
       year = {2014},
       month = {9},
       pdf = {https://www.cs.ucsb.edu/~vigna/publications/2014_RAID_EagleEye.pdf},
    }
  • Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors (2014)
    • INPROCEEDINGS--
    • Martina Lindorfer and Matthias Neugschwandtner and Lukas Weichselbaum and Yanick Fratantonio and Victor Van der Veen and Christian Platzer
    • Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
    @INPROCEEDINGS{Lindorfer2014Andrubis,
       author = {Martina Lindorfer and Matthias Neugschwandtner and Lukas Weichselbaum and Yanick Fratantonio and Victor {Van der Veen} and Christian Platzer},
       title = {Andrubis - 1,
      000,
      000 Apps Later: A View on Current Android Malware Behaviors},
       booktitle = {Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)},
       year = {2014},
       month = {9},
       pdf = {http://iseclab.org/papers/andrubis_badgers14.pdf},
    }
  • Process Migration Framework - Virtualising and Documenting Business Processes (2014)
    • INPROCEEDINGS--
    • Johannes Binder and Stephan Strodl and Andreas Rauber
    • 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, (EDOCW 2014)
    @INPROCEEDINGS{Binder2014Process,
       author = {Johannes Binder and Stephan Strodl and Andreas Rauber},
       title = {Process Migration Framework - Virtualising and Documenting Business Processes},
       booktitle = {18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations,
       (EDOCW 2014)},
       year = {2014},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6975390},
    }
  • Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection (2014)
    • INPROCEEDINGS--
    • Jacopo Corbetta and Luca Invernizzi and Christopher Kruegel and Giovanni Vigna
    • 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
    @INPROCEEDINGS{Corbetta2014Eyes,
       author = {Jacopo Corbetta and Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
       title = {Eyes of a Human,
       Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection},
       booktitle = {17th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID)},
       year = {2014},
       month = {9},
       pdf = {https://www.cs.ucsb.edu/~vigna/publications/2014_RAID_EagleEye.pdf},
    }
  • Some Cryptanalysis of the Block Cipher BCMPQ (2014)
    • INPROCEEDINGS--
    • Vesna Dimitrova and M. Kostadinovski and Z. Trajcheska and M. Petkovska and Damjan Buhov
    • ICT Innovations 2014
    @INPROCEEDINGS{Dimitrova2014Some,
       author = {Vesna Dimitrova and M. Kostadinovski and Z. Trajcheska and M. Petkovska and Damjan Buhov},
       title = {Some Cryptanalysis of the Block Cipher BCMPQ},
       booktitle = {ICT Innovations 2014},
       year = {2014},
       month = {9},
       pdf = {http://proceedings.ictinnovations.org/attachment/paper/306/some-cryptanalysis-of-the-block-cipher-bcmpq.pdf},
    }
  • Comparing points-to static analysis with runtime recorded profiling data (2014)
    • INPROCEEDINGS--
    • Codruţ Stancu and Christian Wimmer and Stefan Brunthaler and Per Larsen and Michael Franz
    • International Conference on Principles and Practices of Programming on the Java platform Virtual machines, Languages, and Tools (PPPJ 2014)
    @INPROCEEDINGS{Stancu2014Comparing,
       author = {Codruţ Stancu and Christian Wimmer and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Comparing points-to static analysis with runtime recorded profiling data},
       booktitle = {International Conference on Principles and Practices of Programming on the Java platform Virtual machines,
       Languages,
       and Tools (PPPJ 2014)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/pppj14.pdf},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2014)
    • INPROCEEDINGS--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • 8th USENIX Workshop on Offensive Technologies (WOOT)
    @INPROCEEDINGS{Ullrich2014IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
       year = {2014},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Johanna IPv6.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
    }
  • A Scalable Framework for Dynamic Data Citation of Arbitrary Structured Data (2014)
    • INPROCEEDINGS--
    • Stefan Proell and Andreas Rauber
    • 3rd International Conference on Data Management Technologies and Applications (DATA2014)
    @INPROCEEDINGS{Proell2014Scalable,
       author = {Stefan Proell and Andreas Rauber},
       title = {A Scalable Framework for Dynamic Data Citation of Arbitrary Structured Data},
       booktitle = {3rd International Conference on Data Management Technologies and Applications (DATA2014)},
       year = {2014},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Scalable Framework_paper.pdf},
    }
  • Modellierungsunterstützung für die rollenbasierte Delegation in prozessgestützten Informationssystemen (2014)
    • ARTICLE--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • Wirtschaftsinformatik
    @ARTICLE{Wenzl2014Modellierungsuntersttzung,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Modellierungsunterstützung für die rollenbasierte Delegation in prozessgestützten Informationssystemen},
       journal = {Wirtschaftsinformatik},
       year = {2014},
       month = {8},
       pdf = {http://link.springer.com/article/10.1007/s11576-014-0433-3},
       volume = {56},
    }
  • Modeling Support for Role-Based Delegation in Process-Aware Information Systems (2014)
    • ARTICLE--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • Business & Information Systems Engineering (BISE)
    @ARTICLE{Wenzl2014Modeling,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Modeling Support for Role-Based Delegation in Process-Aware Information Systems},
       journal = {Business & Information Systems Engineering (BISE)},
       year = {2014},
       month = {8},
       pdf = {http://link.springer.com/article/10.1007/s12599-014-0343-3},
       volume = {6},
    }
  • On the Importance of Flow Direction in Business Process Models (2014)
    • INPROCEEDINGS--
    • Kathrin Figl and Mark Strembeck
    • 9th International Conference on Software Engineering and Applications (ICSOFT-EA)
    @INPROCEEDINGS{Figl2014Importance,
       author = {Kathrin Figl and Mark Strembeck},
       title = {On the Importance of Flow Direction in Business Process Models},
       booktitle = {9th International Conference on Software Engineering and Applications (ICSOFT-EA)},
       year = {2014},
       month = {8},
       pdf = {http://wi.wu-wien.ac.at/home/mark/publications/icsoft-ea14.pdf},
    }
  • A Look at Targeted Attacks through the Lense of an NGO (2014)
    • INPROCEEDINGS--
    • Stevens Le Blond and Adina Uritesc and Cedric Gilbert and Zheng Leong Chua and Prateek Saxena and Engin Kirda
    • USENIX Security Symposium
    @INPROCEEDINGS{LeBlond2014Look,
       author = {Stevens {Le Blond} and Adina Uritesc and Cedric Gilbert and {Zheng Leong} Chua and Prateek Saxena and Engin Kirda},
       title = {A Look at Targeted Attacks through the Lense of an NGO},
       booktitle = {USENIX Security Symposium},
       year = {2014},
       month = {8},
       pdf = {https://www.mpi-sws.org/~stevens/pubs/sec14.pdf},
    }
  • Hulk: Eliciting Malicious Behavior in Browser Extensions (2014)
    • INPROCEEDINGS--
    • Alexandros Kapravelos and Chris Grier and Neha Chachra and Christopher Kruegel and Giovanni Vigna and Vern Paxson
    • 23rd Usenix Security Symposium
    @INPROCEEDINGS{Kapravelos2014Hulk,
       author = {Alexandros Kapravelos and Chris Grier and Neha Chachra and Christopher Kruegel and Giovanni Vigna and Vern Paxson},
       title = {Hulk: Eliciting Malicious Behavior in Browser Extensions},
       booktitle = {23rd Usenix Security Symposium},
       year = {2014},
       month = {8},
       pdf = {http://www.icir.org/vern/papers/hulk-usesec14.pdf},
    }
  • AndRadar: Fast Discovery of Android Applications in Alternative Markets (2014)
    • INPROCEEDINGS--
    • Martina Lindorfer and Stamatis Volanis and Alessandro Sisto and Matthias Neugschwandtner and Elias Athanasopoulos and Federico Maggi and Christian Platzer and Stefano Zanero and Sotiris Ioannidis
    • DetectionProceedings of the 11th Conference on of Intrusions and Malware & Vulnerability Assessment (DIMVA)
    @INPROCEEDINGS{Lindorfer2014AndRadar,
       author = {Martina Lindorfer and Stamatis Volanis and Alessandro Sisto and Matthias Neugschwandtner and Elias Athanasopoulos and Federico Maggi and Christian Platzer and Stefano Zanero and Sotiris Ioannidis},
       title = {AndRadar: Fast Discovery of Android Applications in Alternative Markets},
       booktitle = {DetectionProceedings of the 11th Conference on of Intrusions and Malware & Vulnerability Assessment (DIMVA)},
       year = {2014},
       month = {7},
       pdf = {http://iseclab.org/papers/andradar_dimva14.pdf},
    }
  • Spoiled Onions: Exposing Malicious Tor Exit Relays (2014)
    • INPROCEEDINGS--
    • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl
    • The 14th Privacy Enhancing Technologies Symposium (PETS)
    @INPROCEEDINGS{Winter2014Spoiled,
       author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
       title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
       booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
       year = {2014},
       month = {7},
       pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
    }
  • On the applicability of combinatorial testing to web application security testing: A case study (2014)
    • INPROCEEDINGS--
    • Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler
    • 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing
    @INPROCEEDINGS{Garn2014applicability,
       author = {Bernhard Garn and Ioannis Kapsalis and Dimitris Simos and Severin Winkler},
       title = {On the applicability of combinatorial testing to web application security testing: A case study},
       booktitle = { 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing},
       year = {2014},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/combinatorial testing 4pentesteval_jamaica_2014.pdf},
    }
  • PExy: The other side of Exploit Kits (2014)
    • INPROCEEDINGS--
    • Giancarlo De Maio and Alexandros Kapravelos and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna
    • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
    @INPROCEEDINGS{DeMaio2014PExy,
       author = {Giancarlo {De Maio} and Alexandros Kapravelos and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna},
       title = {PExy: The other side of Exploit Kits},
       booktitle = {Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)},
       year = {2014},
       month = {7},
       pdf = {http://cs.ucsb.edu/~kapravel/publications/dimva14_pexy.pdf},
    }
  • Andrubis: Android Malware Under The Magnifying Glass (2014)
    • TECHREPORT--
    • Lukas Weichselbaum and Matthias Neugschwandtner and Martina Lindorfer and Yanick Fratantonio and Victor Van der Veen and Christian Platzer
    • -
    @TECHREPORT{Weichselbaum2014Andrubis,
       author = {Lukas Weichselbaum and Matthias Neugschwandtner and Martina Lindorfer and Yanick Fratantonio and Victor {Van der Veen} and Christian Platzer},
       title = {Andrubis: Android Malware Under The Magnifying Glass},
       booktitle = {Technical Report},
       year = {2014},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iseclab.org/papers/andrubis_techreport.pdf},
    }
  • Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images (2014)
    • INPROCEEDINGS--
    • Christian Platzer and Martin Stuetz and Martina Lindorfer
    • iProceedings of the 2nd International Workshop on Securty and Forensics in Communication Systems (ASIACCS SFCS)
    @INPROCEEDINGS{Platzer2014Skin,
       author = {Christian Platzer and Martin Stuetz and Martina Lindorfer},
       title = {Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images},
       booktitle = {iProceedings of the 2nd International Workshop on Securty and Forensics in Communication Systems (ASIACCS SFCS)},
       year = {2014},
       month = {6},
       pdf = {http://iseclab.org/people/cplatzer/papers/sfcs05-platzer.pdf},
    }
  • Retaining consistency for knowledge-based security testing (2014)
    • INPROCEEDINGS--
    • Andreas Bernauer and Josip Bozic and Dimitris Simos and Severin Winkler and Franz Wotawa
    • 27th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems
    @INPROCEEDINGS{Bernauer2014Retaining,
       author = {Andreas Bernauer and Josip Bozic and Dimitris Simos and Severin Winkler and Franz Wotawa},
       title = {Retaining consistency for knowledge-based security testing},
       booktitle = {27th International Conference on Industrial,
       Engineering & Other Applications of Applied Intelligent Systems},
       year = {2014},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ieaaie2014_kb.pdf},
    }
  • Virtual Worlds as Settings for Avatar-Based Innovation Processes (2014)
    • ARTICLE--
    • Niina Maarit Novak and A. Mladenow and Christine Strauss
    • Journal of Service Science Research
    @ARTICLE{Novak2014Virtual,
       author = {Niina Maarit Novak and A. Mladenow and Christine Strauss},
       title = {Virtual Worlds as Settings for Avatar-Based Innovation Processes},
       journal = {Journal of Service Science Research},
       year = {2014},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Virtual Worlds-PrintVERSION.pdf},
    }
  • Optical Delusions: A Study of Malicious QR Codes in the Wild (2014)
    • INPROCEEDINGS--
    • Amin Kharraz and Engin Kirda and William Robertson and Davide Balzarotti and Aurelien Francillon
    • International Conference on Dependable Systems and Networks (DSN)
    @INPROCEEDINGS{Kharraz2014Optical,
       author = {Amin Kharraz and Engin Kirda and William Robertson and Davide Balzarotti and Aurelien Francillon},
       title = {Optical Delusions: A Study of Malicious QR Codes in the Wild},
       booktitle = {International Conference on Dependable Systems and Networks (DSN)},
       year = {2014},
       month = {6},
       pdf = {http://s3.eurecom.fr/docs/dsn14_amin.pdf},
    }
  • VirtualSwindle: An Automated Attack Against In-App Billing on Android (2014)
    • INPROCEEDINGS--
    • Collin Mulliner and William Robertson and Engin Kirda
    • ACM Symposium on Information, Computer and Communications Security (ASIACCS)
    @INPROCEEDINGS{Mulliner2014VirtualSwindle,
       author = {Collin Mulliner and William Robertson and Engin Kirda},
       title = {VirtualSwindle: An Automated Attack Against In-App Billing on Android},
       booktitle = {ACM Symposium on Information,
       Computer and Communications Security (ASIACCS)},
       year = {2014},
       month = {6},
       pdf = {http://www.mulliner.org/collin/academic/publications/asia226-mulliner.pdf},
    }
  • The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape (2014)
    • INPROCEEDINGS--
    • Gianluca Stringhini and Oliver Hohlfeld and Christopher Kruegel and Giovanni Vigna
    • ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS)
    @INPROCEEDINGS{Stringhini2014Harvester,
       author = {Gianluca Stringhini and Oliver Hohlfeld and Christopher Kruegel and Giovanni Vigna},
       title = {The Harvester,
       the Botmaster,
       and the Spammer: On the Relations Between the Different Actors in the Spam Landscape},
       booktitle = {ACM Symposium on InformAtion,
       Computer and Communications Security (ASIACCS)},
       year = {2014},
       month = {6},
       pdf = {http://cs.ucsb.edu/~gianluca/papers/harvesters-asiaccs2014.pdf},
    }
  • How to assess confidentiality requirements of corporate assets? (2014)
    • INPROCEEDINGS--
    • Gabriela Varona Cervantes and Stefan Fenz
    • 29th IFIP TC 11 International Conference (IFIP SEC 2014)
    @INPROCEEDINGS{Cervantes2014assess,
       author = {{Gabriela Varona} Cervantes and Stefan Fenz},
       title = {How to assess confidentiality requirements of corporate assets?},
       booktitle = {29th IFIP TC 11 International Conference (IFIP SEC 2014)},
       year = {2014},
       month = {6},
    }
  • Robustness Against Data Availability Problems in Urban Energy Planning Support Software (2014)
    • INPROCEEDINGS--
    • Najd Ouhajjou and Wolfgang Loibl and Peter Palensky and Amin Anjomshoaa and Stefan Fenz and A Min Tjoa
    • IEEE Eighth International Conference on Research Challenges in Information Science
    @INPROCEEDINGS{Ouhajjou2014Robustness,
       author = {Najd Ouhajjou and Wolfgang Loibl and Peter Palensky and Amin Anjomshoaa and Stefan Fenz and {A Min} Tjoa},
       title = {Robustness Against Data Availability Problems in Urban Energy Planning Support Software},
       booktitle = {IEEE Eighth International Conference on Research Challenges in Information Science},
       year = {2014},
       month = {5},
    }
  • Enter Sandbox: Android Sandbox Comparison (2014)
    • INPROCEEDINGS--
    • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)
    @INPROCEEDINGS{Neuner2014Enter,
       author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Enter Sandbox: Android Sandbox Comparison},
       booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
       year = {2014},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/mostAndroid.pdf},
       publisher = {IEEE},
       link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
    }
  • Attack pattern-based combinatorial testing (2014)
    • INPROCEEDINGS--
    • Josip Bozic and Dimitris Simos and Franz Wotawa
    • 9th International Workshop on Automation of Software Test (AST 2014)
    @INPROCEEDINGS{Bozic2014Attack,
       author = {Josip Bozic and Dimitris Simos and Franz Wotawa},
       title = {Attack pattern-based combinatorial testing},
       booktitle = { 9th International Workshop on Automation of Software Test (AST 2014)},
       year = {2014},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/AST2014.pdf},
    }
  • A Review of Delegation and Break-Glass Models for Flexible Access Control Management (2014)
    • INPROCEEDINGS--
    • Sigrid Schefer Wenzl and Helena Bukvova and Mark Strembeck
    • 6th Workshop on Applications of Knowledge-Based Technologies in Business (AKTB)
    @INPROCEEDINGS{Wenzl2014Review,
       author = {Sigrid Schefer Wenzl and Helena Bukvova and Mark Strembeck},
       title = {A Review of Delegation and Break-Glass Models for Flexible Access Control Management},
       booktitle = {6th Workshop on Applications of Knowledge-Based Technologies in Business (AKTB)},
       year = {2014},
       month = {5},
       pdf = {http://wi.wu.ac.at/home/mark/publications/aktb14.pdf},
    }
  • Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces (2014)
    • INPROCEEDINGS--
    • Collin Mulliner and William Robertson and Engin Kirda
    • IEEE Symposium on Security and Privacy (S&P)
    @INPROCEEDINGS{Mulliner2014Hidden,
       author = {Collin Mulliner and William Robertson and Engin Kirda},
       title = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces},
       booktitle = {IEEE Symposium on Security and Privacy (S&P)},
       year = {2014},
       month = {5},
       pdf = {http://seclab.ccs.neu.edu/static/publications/sp2014gemminer.pdf},
       link_slides = {http://mulliner.org/collin/academic/publications/hiddengems.pdf},
    }
  • The Tricks of the Trade: What Makes Spam Campaigns Successful? (2014)
    • INPROCEEDINGS--
    • Jane Iedemska and Gianluca Stringhini and Richard Kemmerer and Christopher Kruegel and Giovanni Vigna
    • International Workshop on Cyber Crime (IWCC)
    @INPROCEEDINGS{Iedemska2014Tricks,
       author = {Jane Iedemska and Gianluca Stringhini and Richard Kemmerer and Christopher Kruegel and Giovanni Vigna},
       title = {The Tricks of the Trade: What Makes Spam Campaigns Successful?},
       booktitle = {International Workshop on Cyber Crime (IWCC)},
       year = {2014},
       month = {5},
       pdf = {http://www0.cs.ucl.ac.uk/staff/G.Stringhini/papers/cutwail-iwcc.pdf},
       link_slides = {http://de.slideshare.net/gianlucastringhini/iwcc-2014},
    }
  • SoK: Automated Software Diversity (2014)
    • INPROCEEDINGS--
    • Per Larsen and Andrei Homescu and Stefan Brunthaler and Michael Franz
    • 2014 IEEE Symposium on Security and Privacy
    @INPROCEEDINGS{Larsen2014SoK,
       author = {Per Larsen and Andrei Homescu and Stefan Brunthaler and Michael Franz},
       title = {SoK: Automated Software Diversity},
       booktitle = {2014 IEEE Symposium on Security and Privacy},
       year = {2014},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sp14b.pdf},
    }
  • Evaluation criteria for cloud computing based on the upcoming European data protection regulation (2014)
    • INPROCEEDINGS--
    • Manfred Halper and Stefan Fenz and J. Goellner and Gerald Quirchmayr
    • 2014 Civilisation at the Crossroads Response and Responsibility of the Systems Sciences
    @INPROCEEDINGS{Halper2014Evaluation,
       author = {Manfred Halper and Stefan Fenz and J. Goellner and Gerald Quirchmayr},
       title = {Evaluation criteria for cloud computing based on the upcoming European data protection regulation},
       booktitle = {2014 Civilisation at the Crossroads Response and Responsibility of the Systems Sciences},
       year = {2014},
       month = {4},
    }
  • A Practical Approach for Generic Bootkit Detection and Prevention (2014)
    • INPROCEEDINGS--
    • Bernhard Grill and Christian Platzer and Juergen Eckel
    • EuroSec 2014
    @INPROCEEDINGS{Grill2014Practical,
       author = {Bernhard Grill and Christian Platzer and Juergen Eckel},
       title = {A Practical Approach for Generic Bootkit Detection and Prevention},
       booktitle = {EuroSec 2014},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Bootkit_EuroSec_2014.pdf},
    }
  • EXPOSURE: A Passive DNS Analysis Service to Detect and Report Malicious Domains (2014)
    • ARTICLE--
    • Leyla Bilge and Sevil Sen and Davide Balzarotti and Engin Kirda and Christopher Kruegel
    • ACM Transactions on Information and System Security
    @ARTICLE{Bilge2014EXPOSURE,
       author = {Leyla Bilge and Sevil Sen and Davide Balzarotti and Engin Kirda and Christopher Kruegel},
       title = {EXPOSURE: A Passive DNS Analysis Service to Detect and Report Malicious Domains},
       journal = {ACM Transactions on Information and System Security},
       year = {2014},
       month = {4},
       pdf = {http://seclab.ccs.neu.edu/static/publications/tissec14_exposure.pdf},
    }
  • Rippler: Delay Injection for Service Dependency Detection (2014)
    • INPROCEEDINGS--
    • Ali Zand and Giovanni Vigna and Richard Kemmerer and Christopher Kruegel
    • IEEE International Conference on Computer Communications (INFOCOM)
    @INPROCEEDINGS{Zand2014Rippler,
       author = {Ali Zand and Giovanni Vigna and Richard Kemmerer and Christopher Kruegel},
       title = {Rippler: Delay Injection for Service Dependency Detection},
       booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
       year = {2014},
       month = {4},
    }
  • Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services (2014)
    • INPROCEEDINGS--
    • Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero
    • International World Wide Web Conference (WWW)
    @INPROCEEDINGS{Nikiforakis2014Stranger,
       author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and {M. Zubair} Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero},
       title = {Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services},
       booktitle = {International World Wide Web Conference (WWW)},
       year = {2014},
       month = {4},
    }
  • Block Cipher Defined By Matrix Presentation of Quasigroups (2014)
    • INPROCEEDINGS--
    • Damjan Buhov and S. Markovski and Vesna Dimitrova and Z. Trajcheska and M. Petkovska and M. Kostadinovski
    • 11th Conference for Informatics and Information Technology (CIIT 2014)
    @INPROCEEDINGS{Buhov2014Block,
       author = {Damjan Buhov and S. Markovski and Vesna Dimitrova and Z. Trajcheska and M. Petkovska and M. Kostadinovski},
       title = {Block Cipher Defined By Matrix Presentation of Quasigroups},
       booktitle = {11th Conference for Informatics and Information Technology (CIIT 2014)},
       year = {2014},
       month = {4},
    }
  • InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl
    • GI Sicherheit 2014
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
       author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
       booktitle = {GI Sicherheit 2014 },
       year = {2014},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
    }
  • A systematic review on security in Process-Aware Information Systems: Constitution, challenges, and future directions (2014)
    • ARTICLE--
    • Maria Leitner and Stefanie Rinderle-Ma
    • Information and Software Technology
    @ARTICLE{Leitner2014systematic,
       author = {Maria Leitner and Stefanie Rinderle-Ma},
       title = {A systematic review on security in Process-Aware Information Systems: Constitution,
       challenges,
       and future directions},
       journal = {Information and Software Technology},
       year = {2014},
       month = {3},
    }
  • Eris: A tool for combinatorial testing of the linux system call interface (2014)
    • INPROCEEDINGS--
    • Bernhard Garn and Dimitris Simos
    • 2014 IEEE International Conference on Software Testing, Verification, and Validation Workshops
    @INPROCEEDINGS{Garn2014Eris,
       author = {Bernhard Garn and Dimitris Simos},
       title = {Eris: A tool for combinatorial testing of the linux system call interface},
       booktitle = {2014 IEEE International Conference on Software Testing,
       Verification,
       and Validation Workshops},
       year = {2014},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/CT-Eris_ICSTW_2014.pdf},
    }
  • Extracting Probable Command and Control Signatures for Detecting Botnets (2014)
    • INPROCEEDINGS--
    • Ali Zand and Giovanni Vigna and Xifeng Yan and Christopher Kruegel
    • ACM Symposium on Applied Computing (SAC)
    @INPROCEEDINGS{Zand2014Extracting,
       author = {Ali Zand and Giovanni Vigna and Xifeng Yan and Christopher Kruegel},
       title = {Extracting Probable Command and Control Signatures for Detecting Botnets},
       booktitle = {ACM Symposium on Applied Computing (SAC)},
       year = {2014},
       month = {3},
    }
  • Security through Diversity: Are We There Yet? (2014)
    • ARTICLE--
    • Per Larsen and Stefan Brunthaler and Michael Franz
    • IEEE Security and Privacy
    @ARTICLE{Larsen2014Security,
       author = {Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Security through Diversity: Are We There Yet?},
       journal = {IEEE Security and Privacy},
       year = {2014},
       month = {3},
       pdf = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6617633},
       volume = {12/2},
    }
  • Poster NDSS 2014: Hardware Trojans--Detect and React? (2014)
    • ARTICLE--
    • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl
    • Network and Distributed System Security (NDSS) Symposium 2014
    @ARTICLE{Dabrowski2014Poster,
       author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
       title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
       journal = {Network and Distributed System Security (NDSS) Symposium 2014},
       year = {2014},
       month = {2},
    }
  • Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications (2014)
    • INPROCEEDINGS--
    • Sebastian Poeplau and Yanick Fratantonio and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna
    • Usenix Network and Distributed System Security Symposium (NDSS)
    @INPROCEEDINGS{Poeplau2014Execute,
       author = {Sebastian Poeplau and Yanick Fratantonio and Antonio Bianchi and Christopher Kruegel and Giovanni Vigna},
       title = {Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications},
       booktitle = {Usenix Network and Distributed System Security Symposium (NDSS)},
       year = {2014},
       month = {2},
    }
  • Nazca: Detecting Malware Distribution in Large-Scale Networks (2014)
    • INPROCEEDINGS--
    • Luca Invernizzi and Stanislav Miskovic and Ruben Torres and Sabyasachi Saha and Sung-Ju Lee and Marco Mellia and Christopher Kruegel and Giovanni Vigna
    • Usenix Network and Distributed System Security Symposium (NDSS)
    @INPROCEEDINGS{Invernizzi2014Nazca,
       author = {Luca Invernizzi and Stanislav Miskovic and Ruben Torres and Sabyasachi Saha and Sung-Ju Lee and Marco Mellia and Christopher Kruegel and Giovanni Vigna},
       title = {Nazca: Detecting Malware Distribution in Large-Scale Networks},
       booktitle = {Usenix Network and Distributed System Security Symposium (NDSS)},
       year = {2014},
       month = {2},
    }
  • Efficient hosted interpreters on the JVM (2014)
    • ARTICLE--
    • Gülfem Savrun-Yeniçeri and Wei Zhang and Huahan Zhang and Eric Seckler and Chen Li and Stefan Brunthaler and Per Larsen and Michael Franz
    • ACM Transactions on Architecture and Code Optimization
    @ARTICLE{SavrunYeniceri2014Efficient,
       author = {Gülfem Savrun-Yeniçeri and Wei Zhang and Huahan Zhang and Eric Seckler and Chen Li and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Efficient hosted interpreters on the JVM},
       journal = {ACM Transactions on Architecture and Code Optimization},
       year = {2014},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/taco14.pdf},
       volume = {11/1},
    }
  • Towards Fully Automated Digital Alibis with Social Interaction (2014)
    • INPROCEEDINGS--
    • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{ifip119_2014_alibi,
       author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {Towards Fully Automated Digital Alibis with Social Interaction},
       booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/alibigenerator_preprint.pdf},
       link_source = {https://github.com/mmulazzani/alibiFramework},
       link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
    }
  • Storyboard Augmentation of Process Model Grammars for Stakeholder Communication (2014)
    • INPROCEEDINGS--
    • Nardella Kathleen and Brown Ross and Simone Kriglstein
    • In Proceedings of IVAPP 2014 International Conference on Information Visualization Theory and Applications
    @INPROCEEDINGS{Kathleen_Storyboard_Augmentation_of_Pro_2014,
       author = {Nardella Kathleen and Brown Ross and Simone Kriglstein},
       title = {Storyboard Augmentation of Process Model Grammars for Stakeholder Communication},
       booktitle = {In Proceedings of IVAPP 2014 International Conference on Information Visualization Theory and Applications},
       year = {2014},
       month = {1},
    }
  • Evolving Secure Information Systems through Attack Simulation (2014)
    • INPROCEEDINGS--
    • Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christian Stummer and Christine Strauss
    • 47th Hawaii International Conference on System Science
    @INPROCEEDINGS{Kiesling2014Evolving,
       author = {Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christian Stummer and Christine Strauss},
       title = {Evolving Secure Information Systems through Attack Simulation},
       booktitle = {47th Hawaii International Conference on System Science},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/HICSS46_Submission_final.pdf},
    }
  • Automated Analysis of Underground Marketplaces (2014)
    • INPROCEEDINGS--
    • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl
    • Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Hudic2014Automated,
       author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
       title = {Automated Analysis of Underground Marketplaces},
       booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/undergroundmarketplaces.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
    }
  • Natural-Language Scenario Descriptions for Testing Core Language Models of Domain-specific Languages (2014)
    • INPROCEEDINGS--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)
    @INPROCEEDINGS{Hoisl2014NaturalLanguage,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {Natural-Language Scenario Descriptions for Testing Core Language Models of Domain-specific Languages},
       booktitle = {2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)},
       year = {2014},
       month = {1},
    }
  • Research objects for audio processing:capturing semantics for reproducibility (2014)
    • INPROCEEDINGS--
    • Kevin R. Page and Raul Palma and Piotr Holubowicz and Graham Klyne and Stian Soiland-Reyes and Daniel Garijo and Khalid Belhajjame and Rudolf Mayer
    • 53rd AES International Conference on Semantic Audio (AES 2014)
    @INPROCEEDINGS{Page2014Research,
       author = {{Kevin R.} Page and Raul Palma and Piotr Holubowicz and Graham Klyne and Stian Soiland-Reyes and Daniel Garijo and Khalid Belhajjame and Rudolf Mayer},
       title = {Research objects for audio processing:capturing semantics for reproducibility},
       booktitle = {53rd AES International Conference on Semantic Audio (AES 2014)},
       year = {2014},
       month = {1},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/pag_aes14.pdf},
    }
  • A Structured Comparison of Security Standard (2014)
    • INPROCEEDINGS--
    • Kristian Beckers and Isabelle Cote and Stefan Fenz and Denis Hatebur and Maritta Heisel
    • Advances in Engineering Secure Future Internet Services and Systems
    @INPROCEEDINGS{Beckers2014Structured,
       author = {Kristian Beckers and Isabelle Cote and Stefan Fenz and Denis Hatebur and Maritta Heisel},
       title = {A Structured Comparison of Security Standard},
       booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
       year = {2014},
    }
  • Appropriate Obfuscation of Location Information on an Application Level for Mobile Devices (2014)
    • THESIS--
    • Christoph Hochreiner
    • -
    @THESIS{Hochreiner2014Appropriate,
       author = {Christoph Hochreiner},
       title = {Appropriate Obfuscation of Location Information on an Application Level for Mobile Devices},
       booktitle = {Master's thesis},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2014 - Christoph_Hochreiner_thesis.pdf},
    }
  • Protecting Anonymity in Data-Driven Biomedical Science (2014)
    • INBOOK--
    • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger
    • -
    @INBOOK{Kieseberg2014Protecting,
       author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Protecting Anonymity in Data-Driven Biomedical Science},
       booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/1v0_KIESEBERG_bookchapter.pdf},
       pages = {301--316},
    }
  • Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement (2014)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Bernhard Grill and Elmar Kiesling and Christine Strauss and Christian Stummer
    • Lecture Notes in Informatics {GI-Edition}
    @INPROCEEDINGS{Ekelhart2014Komplexe,
       author = {Andreas Ekelhart and Bernhard Grill and Elmar Kiesling and Christine Strauss and Christian Stummer},
       title = {Komplexe Systeme,
       heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement},
       booktitle = {Lecture Notes in Informatics {GI-Edition}},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Main.pdf},
    }
  • New challenges in digital forensics: online storage and anonymous communication (2014)
    • TECHREPORT--
    • Martin Schmiedecker
    • -
    @TECHREPORT{Mulazzani2014challenges,
       author = {Martin Schmiedecker},
       title = {New challenges in digital forensics: online storage and anonymous communication},
       booktitle = {PhD Thesis},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/dissertation_Mulazzani.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/presentation-diss},
    }
  • QR Code Security: A Survey of Attacks and Challenges for Usable Security (2014)
    • INBOOK--
    • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl
    • Springer
    @INBOOK{Krombholz2014Code,
       author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
       title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
       booktitle = {Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/llncs.pdf},
       pages = {79--90},
       publisher = {Springer},
       link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
    }
  • Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations (2014)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • Digital Investigation
    @ARTICLE{Fruehwirt2014Towards,
       author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
       journal = {Digital Investigation},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a forensic aware_paper.pdf},
       volume = {11},
       pages = {336-348},
    }
  • Towards Co-Evolution in Model-driven Development via Bidirectional Higher-Order Transformation (2014)
    • INBOOK--
    • Bernhard Hoisl and Zhenjiang Hu and Soichiro Hidaka
    • -
    @INBOOK{Hoisl2014Towards,
       author = {Bernhard Hoisl and Zhenjiang Hu and Soichiro Hidaka},
       title = {Towards Co-Evolution in Model-driven Development via Bidirectional Higher-Order Transformation},
       booktitle = {Communications in Computer and Information Science},
       year = {2014},
       pdf = {http://nm.wu-wien.ac.at/nm/file/MODELSWARD2014-PP.pdf?m=download},
    }
  • Real-time screen watermarking using overlaying layer (2014)
    • INPROCEEDINGS--
    • Maciej Piec and Andreas Rauber
    • International Workshop on Digital Forensics (WSDF)
    @INPROCEEDINGS{Piec2014Realtime,
       author = {Maciej Piec and Andreas Rauber},
       title = {Real-time screen watermarking using overlaying layer},
       booktitle = {International Workshop on Digital Forensics (WSDF)},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Piec2014Realtime.pdf},
    }
  • Advanced social engineering attacks (2014)
    • ARTICLE--
    • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl
    • Journal of Information Security and Applications
    @ARTICLE{Krombholz2014Advanced,
       author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
       title = {Advanced social engineering attacks},
       journal = {Journal of Information Security and Applications},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jisa_revised.pdf},
    }
  • Supersaturated plans for variable selection in large databases (2014)
    • ARTICLE--
    • Christina Parpoula and Christos Koukouvinos and Dimitris Simos and Stella Stylianou
    • Statistics, Optimization and Information Computing
    @ARTICLE{Parpoul2014Supersaturated,
       author = {Christina Parpoula and Christos Koukouvinos and Dimitris Simos and Stella Stylianou},
       title = {Supersaturated plans for variable selection in large databases},
       journal = {Statistics,
       Optimization and Information Computing},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/SupersaturatedPlans.SOIC.2014.pdf},
    }
  • E-voting authentication with QR-codes (2014)
    • INPROCEEDINGS--
    • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl
    • 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust
    @INPROCEEDINGS{Falkner2014Evoting,
       author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
       title = {E-voting authentication with QR-codes},
       booktitle = {2nd International Conference on Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/evoting_final_HCI_2014.pdf},
    }
  • Current challenges in information security risk management (2014)
    • ARTICLE--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer and Fabian Pechstein
    • Information Management and Computer Security
    @ARTICLE{Fenz2014Current,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and Fabian Pechstein},
       title = {Current challenges in information security risk management},
       journal = {Information Management and Computer Security},
       year = {2014},
       volume = {22},
       pages = {410--430},
    }
  • De-identification of unstructured paper-based health records for privacy-preserving secondary use (2014)
    • ARTICLE--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer and Antonio Rella
    • Journal of Medical Engineering and Technology
    @ARTICLE{Fenz2014Deidentification,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and Antonio Rella},
       title = {De-identification of unstructured paper-based health records for privacy-preserving secondary use},
       journal = {Journal of Medical Engineering and Technology},
       year = {2014},
       volume = {38},
       pages = {260--268},
    }
  • Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe (2014)
    • INBOOK--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer and A Min Tjoa and Gerald Quirchmayr and Alexander Schatten and E. Neuhold and J. Goellner and C. Meurers and W. Hitz
    • -
    @INBOOK{Fenz2014CloudSicherheit,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer and {A Min} Tjoa and Gerald Quirchmayr and Alexander Schatten and E. Neuhold and J. Goellner and C. Meurers and W. Hitz},
       title = {Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe},
       booktitle = {Schriftenreihe der Landesverteidigungsakademie,
       Landesverteidigungsakademie},
       year = {2014},
       pdf = {http://www.bundesheer.at/pdf_pool/publikationen/08_cs.pdf},
    }
  • Take a Bite - Finding the Worm in the Apple (2013)
    • INPROCEEDINGS--
    • Martina Lindorfer and Bernhard Miller and Matthias Neugschwandtner and Christian Platzer
    • Proceedings of the 9th International Conference on Information, Communications and Signal Processing (ICICS)
    @INPROCEEDINGS{Lindorfer2013Take,
       author = {Martina Lindorfer and Bernhard Miller and Matthias Neugschwandtner and Christian Platzer},
       title = {Take a Bite - Finding the Worm in the Apple},
       booktitle = {Proceedings of the 9th International Conference on Information,
       Communications and Signal Processing (ICICS)},
       year = {2013},
       month = {12},
       pdf = {http://iseclab.org/people/mlindorfer/macmal_icics13.pdf},
    }
  • Security and Privacy in Business Processes: A Posteriori Analysis Techniques (2013)
    • ARTICLE--
    • Mark Strembeck and Stefanie Rinderle-Ma
    • Information Technology
    @ARTICLE{Strembeck2013Security,
       author = {Mark Strembeck and Stefanie Rinderle-Ma},
       title = {Security and Privacy in Business Processes: A Posteriori Analysis Techniques},
       journal = {Information Technology},
       year = {2013},
       month = {12},
    }
  • Information flow tracking meets just-in-time compilation (2013)
    • ARTICLE--
    • Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz
    • ACM Transactions on Architecture and Code Optimization
    @ARTICLE{Kerschbaumer2013Information,
       author = {Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Information flow tracking meets just-in-time compilation},
       journal = {ACM Transactions on Architecture and Code Optimization},
       year = {2013},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/taco13.pdf},
       volume = {10/4},
    }
  • Enforcement of Entailment Constraints in Distributed Service-Based Business Processes (2013)
    • ARTICLE--
    • Waldemar Hummer and Patrick Gaubatz and Mark Strembeck and Uwe Zdun and Schahram Dustdar
    • Information and Software Technology (IST)
    @ARTICLE{Hummer_Enforcement_of_Entailment_Cons_2013,
       author = {Waldemar Hummer and Patrick Gaubatz and Mark Strembeck and Uwe Zdun and Schahram Dustdar},
       title = {Enforcement of Entailment Constraints in Distributed Service-Based Business Processes},
       journal = {Information and Software Technology (IST)},
       year = {2013},
       month = {11},
    }
  • Social engineering attacks on the knowledge worker (2013)
    • INPROCEEDINGS--
    • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl
    • Proceedings of the 6th International Conference on Security of Information and Networks
    @INPROCEEDINGS{Krombholz2013Social,
       author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
       title = {Social engineering attacks on the knowledge worker},
       booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
       year = {2013},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sig-alternate.pdf},
       pages = {28--35},
       publisher = {ACM},
    }
  • Hardware Malware (2013)
    • ARTICLE--
    • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Krieg2013Hardware,
       author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Hardware Malware},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2013},
       month = {11},
       volume = {4},
       pages = {1-115},
    }
  • An Experimental Study on the Design and Modeling of Security Concepts in Business Processes (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck
    • 6th {IFIP} {WG} 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM)
    @INPROCEEDINGS{Leitner2013Experimental,
       author = {Maria Leitner and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck},
       title = {An Experimental Study on the Design and Modeling of Security Concepts in Business Processes},
       booktitle = {6th {IFIP} {WG} 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM)},
       year = {2013},
       month = {11},
    }
  • CrowdFlow: Efficient Information Flow Security (2013)
    • INPROCEEDINGS--
    • Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz
    • 16th Information Security Conference (ISC 2013)
    @INPROCEEDINGS{Kerschbaumer2013CrowdFlow,
       author = {Christoph Kerschbaumer and Eric Hennigan and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {CrowdFlow: Efficient Information Flow Security},
       booktitle = {16th Information Security Conference (ISC 2013)},
       year = {2013},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/isc13.pdf},
    }
  • SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment (2013)
    • INPROCEEDINGS--
    • Dawid Wolosiuk and Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and A Min Tjoa
    • enviBUILD 2013 - Buildings and Environment
    @INPROCEEDINGS{Wolosiuk2013SEMERGY,
       author = {Dawid Wolosiuk and Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and {A Min} Tjoa},
       title = {SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment},
       booktitle = {enviBUILD 2013 - Buildings and Environment},
       year = {2013},
       month = {10},
    }
  • Developing a Domain-specific Language for Scheduling in the European Energy Sector (2013)
    • INPROCEEDINGS--
    • Stefan Sobernig and Mark Strembeck and A. Beck
    • 6th International Conference on Software Language Engineering (SLE)
    @INPROCEEDINGS{Sobernig2013Developing,
       author = {Stefan Sobernig and Mark Strembeck and A. Beck},
       title = {Developing a Domain-specific Language for Scheduling in the European Energy Sector},
       booktitle = {6th International Conference on Software Language Engineering (SLE)},
       year = {2013},
       month = {10},
    }
  • Scalable Data Citation in Dynamic Large Databases: Model and Reference Implementation (2013)
    • INPROCEEDINGS--
    • Stefan Proell and Andreas Rauber
    • IEEE International Conference on Big Data 2013 (IEEE BigData 2013)
    @INPROCEEDINGS{proellBigData,
       author = {Stefan Proell and Andreas Rauber},
       title = {Scalable Data Citation in Dynamic Large Databases: Model and Reference Implementation},
       booktitle = {IEEE International Conference on Big Data 2013 (IEEE BigData 2013)},
       year = {2013},
       month = {10},
    }
  • Appinspect: large-scale evaluation of social networking apps (2013)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the first ACM conference on Online social networks
    @INPROCEEDINGS{huber2013appinspect,
       author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Appinspect: large-scale evaluation of social networking apps},
       booktitle = {Proceedings of the first ACM conference on Online social networks},
       year = {2013},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/AppInspect_peprint.pdf},
       pages = {143--154},
       publisher = {ACM},
       link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
    }
  • Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing (2013)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen
    • Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)
    @INPROCEEDINGS{Dabrowski2013Framework,
       author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
       title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 2013 IEEE International Conference on Systems,
       Man,
       and Cybernetics (SMC2013)},
       year = {2013},
       month = {10},
    }
  • Digital Preservation of a Process and its Application to e-Science Experiments (2013)
    • INPROCEEDINGS--
    • Stephan Strodl and Rudolf Mayer and D. Draws and Andreas Rauber and Gonccalo Antunes
    • Proceedings of the 10th International Conference on Preservation of Digital Objects (IPRES 2013)
    @INPROCEEDINGS{Strodl_Digital_Preservation_of_a_Proc_2013,
       author = {Stephan Strodl and Rudolf Mayer and D. Draws and Andreas Rauber and Gonccalo Antunes},
       title = {Digital Preservation of a Process and its Application to e-Science Experiments },
       booktitle = {Proceedings of the 10th International Conference on Preservation of Digital Objects (IPRES 2013)},
       year = {2013},
       month = {9},
    }
  • A Framework for Automated Verification in Software Escrow (2013)
    • INPROCEEDINGS--
    • Elisabeth Weigl and Johannes Binder and Stephan Strodl and D. Draws and Andreas Rauber
    • Proceedings of the 10th International Conference on Preservation of Digital Objects (IPRES 2013)
    @INPROCEEDINGS{Weigl_A_Framework_for_Automated_Veri_2013,
       author = {Elisabeth Weigl and Johannes Binder and Stephan Strodl and D. Draws and Andreas Rauber},
       title = {A Framework for Automated Verification in Software Escrow },
       booktitle = {Proceedings of the 10th International Conference on Preservation of Digital Objects (IPRES 2013)},
       year = {2013},
       month = {9},
    }
  • A modular methodology for the development of urban energy planning support software (2013)
    • INPROCEEDINGS--
    • Najd Ouhajjou and Peter Palensky and M. Stifter and J. Page and Stefan Fenz and A Min Tjoa
    • 39th Annual Conference of the IEEE Industrial Electronics Society (IECON 2013)
    @INPROCEEDINGS{Ouhajjou2013modular,
       author = {Najd Ouhajjou and Peter Palensky and M. Stifter and J. Page and Stefan Fenz and {A Min} Tjoa},
       title = {A modular methodology for the development of urban energy planning support software},
       booktitle = { 39th Annual Conference of the IEEE Industrial Electronics Society (IECON 2013)},
       year = {2013},
       month = {9},
    }
  • SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting (2013)
    • INPROCEEDINGS--
    • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{ARES_SHPF_short_2013,
       author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
       booktitle = {Proceedings of the Eighth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/shpf_extendedPreprint.pdf},
       link_source = {https://github.com/mmulazzani/shpf},
       link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
    }
  • Framework for Verification of Preserved and Redeployed Processes (2013)
    • INPROCEEDINGS--
    • Tomasz Miksa and Ricardo Vieira and Andreas Rauber and Stefan Proell and Stephan Strodl and Rose Barateiro
    • Proceedings of the 10th International Conference on Digital Preservation (iPRES2013).
    @INPROCEEDINGS{verification2013,
       author = {Tomasz Miksa and Ricardo Vieira and Andreas Rauber and Stefan Proell and Stephan Strodl and Rose Barateiro},
       title = {Framework for Verification of Preserved and Redeployed Processes},
       booktitle = {Proceedings of the 10th International Conference on Digital Preservation (iPRES2013). },
       year = {2013},
       month = {9},
    }
  • Ethik in der Sicherheitsforschung (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl and Sandra Panhans
    • DACH Security 2013
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl and Sandra Panhans},
       title = {Ethik in der Sicherheitsforschung},
       booktitle = {DACH Security 2013},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DACH-Camera Ready.pdf},
    }
  • An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Michelle Miller and Stefanie Rinderle-Ma
    • 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Leitner2013Analysis,
       author = {Maria Leitner and Michelle Miller and Stefanie Rinderle-Ma},
       title = {An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation},
       booktitle = {2013 Eighth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2013},
       month = {9},
    }
  • A Generation Method of Cryptographic Keys for Enterprise Communication Systems (2013)
    • INPROCEEDINGS--
    • Aleksandar Hudic and E. Revell and Dimitris Simos
    • Proceedings of the 8th International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2013), held in conjuction with ARES 2013: 8th International Conference on Availability, Reliability and Security
    @INPROCEEDINGS{Hudic2013Generation,
       author = {Aleksandar Hudic and E. Revell and Dimitris Simos},
       title = {A Generation Method of Cryptographic Keys for Enterprise Communication Systems},
       booktitle = {Proceedings of the 8th International Workshop on Frontiers in Availability,
       Reliability,
       and Security (FARES 2013),
       held in conjuction with ARES 2013: 8th International Conference on Availability,
       Reliability and Security},
       year = {2013},
       month = {9},
    }
  • Evaluation of preserved scientific processes (2013)
    • INPROCEEDINGS--
    • Rudolf Mayer and Mark Guttenbrunner and Andreas Rauber
    • 17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)
    @INPROCEEDINGS{Mayer2014Evaluation,
       author = {Rudolf Mayer and Mark Guttenbrunner and Andreas Rauber},
       title = {Evaluation of preserved scientific processes},
       booktitle = {17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)},
       year = {2013},
       month = {9},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/may_tpdl13.pdf},
    }
  • Tutorial From Preserving Data to Preserving Research: Curation of Process and Context (2013)
    • INPROCEEDINGS--
    • Rudolf Mayer and Stefan Proell and Andreas Rauber and Raul Palma and Daniel Garijo
    • 17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)
    @INPROCEEDINGS{Mayer2014Tutorial,
       author = {Rudolf Mayer and Stefan Proell and Andreas Rauber and Raul Palma and Daniel Garijo},
       title = {Tutorial From Preserving Data to Preserving Research: Curation of Process and Context},
       booktitle = {17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)},
       year = {2013},
       month = {9},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/may_tpdl13tutorial.pdf},
    }
  • A modular ontology for the enterprise architecture domain (2013)
    • INPROCEEDINGS--
    • Marzieh Bakhshandeh and Goncalo Antunes and Rudolf Mayer and Jose Borbinha and Artur Caetano
    • 8th International Workshop on Vocabularies, Ontologies and Rules for the Enterprise and Beyond (VORTE 2013)
    @INPROCEEDINGS{Bakhshandeh2013modular,
       author = {Marzieh Bakhshandeh and Goncalo Antunes and Rudolf Mayer and Jose Borbinha and Artur Caetano},
       title = {A modular ontology for the enterprise architecture domain},
       booktitle = {8th International Workshop on Vocabularies,
       Ontologies and Rules for the Enterprise and Beyond (VORTE 2013)},
       year = {2013},
       month = {9},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/bak_vorte13.pdf},
    }
  • Framework for verification of preserved and redeployed processes (2013)
    • INPROCEEDINGS--
    • Tomasz Miksa and Stefan Proell and Rudolf Mayer and Stephan Strodl and Ricardo Vieira and Jose Barateiro and Andreas Rauber
    • 10th International Conference on Preservation of Digital Objects (IPRES2013)
    @INPROCEEDINGS{Miksa2013Framework,
       author = {Tomasz Miksa and Stefan Proell and Rudolf Mayer and Stephan Strodl and Ricardo Vieira and Jose Barateiro and Andreas Rauber},
       title = {Framework for verification of preserved and redeployed processes},
       booktitle = {10th International Conference on Preservation of Digital Objects (IPRES2013)},
       year = {2013},
       month = {9},
    }
  • A comprehensive building model for performance-guided decision support (2013)
    • INPROCEEDINGS--
    • Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and Thomas Neubauer and A Min Tjoa
    • 2nd Central European Symposium on Building Physics (CESBP 2013)
    @INPROCEEDINGS{Ghiassi2013comprehensive,
       author = {Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and Thomas Neubauer and {A Min} Tjoa},
       title = {A comprehensive building model for performance-guided decision support},
       booktitle = {2nd Central European Symposium on Building Physics (CESBP 2013)},
       year = {2013},
       month = {9},
    }
  • Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit (2013)
    • INPROCEEDINGS--
    • Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and Thomas Neubauer and A Min Tjoa
    • 2nd Central European Symposium on Building Physics (CESBP 2013)
    @INPROCEEDINGS{Ghiassi2013Multiobjective,
       author = {Neda Ghiassi and Ulrich Pont and Ferial Shayeganfar and Ardeshir Mahdavi and Stefan Fenz and Johannes Heurix and Amin Anjomshoaa and Thomas Neubauer and {A Min} Tjoa},
       title = {Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit},
       booktitle = {2nd Central European Symposium on Building Physics (CESBP 2013)},
       year = {2013},
       month = {9},
    }
  • Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment (2013)
    • INPROCEEDINGS--
    • Ulrich Pont and Ferial Shayeganfar and Neda Ghiassi and Mahnameh Taheri and Christian Sustr and Ardeshir Mahdavi and Johannes Heurix and Stefan Fenz and Amin Anjomshoaa and Thomas Neubauer and A Min Tjoa
    • Proceedings of the 2nd Central European Symposium on Building Physics
    @INPROCEEDINGS{Pont2013Recent,
       author = {Ulrich Pont and Ferial Shayeganfar and Neda Ghiassi and Mahnameh Taheri and Christian Sustr and Ardeshir Mahdavi and Johannes Heurix and Stefan Fenz and Amin Anjomshoaa and Thomas Neubauer and {A Min} Tjoa},
       title = {Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment},
       booktitle = {Proceedings of the 2nd Central European Symposium on Building Physics},
       year = {2013},
       month = {9},
    }
  • Booby trapping software (2013)
    • INPROCEEDINGS--
    • Stephen Crane and Per Larsen and Stefan Brunthaler and Michael Franz
    • 2013 New security paradigms Workshop (NSPW 2013)
    @INPROCEEDINGS{Crane2013Booby,
       author = {Stephen Crane and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Booby trapping software},
       booktitle = {2013 New security paradigms Workshop (NSPW 2013)},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/nspw13.pdf},
    }
  • librando: Transparent Code Randomization for Just-in-Time Compilers (2013)
    • INPROCEEDINGS--
    • Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz
    • 2013 ACM SIGSAC Conference on Computer and Communications Security (CSS 2013)
    @INPROCEEDINGS{Homescu2013librando,
       author = {Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {librando: Transparent Code Randomization for Just-in-Time Compilers},
       booktitle = {2013 ACM SIGSAC Conference on Computer and Communications Security (CSS 2013)},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ccs13.pdf},
    }
  • Efficient interpreter optimizations for the JVM (2013)
    • INPROCEEDINGS--
    • Gülfem Savrun-Yeniçeri and Wei Zhang and Huahan Zhang and Chen Li and Stefan Brunthaler and Per Larsen and Michael Franz
    • International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools
    @INPROCEEDINGS{SavrunYeniceri2013Efficient,
       author = {Gülfem Savrun-Yeniçeri and Wei Zhang and Huahan Zhang and Chen Li and Stefan Brunthaler and Per Larsen and Michael Franz},
       title = {Efficient interpreter optimizations for the JVM},
       booktitle = {International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines,
       Languages,
       and Tools},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/pppj13.pdf},
    }
  • An ontology-aided Optimization Approach to Eco-Efficient Building Design (2013)
    • INPROCEEDINGS--
    • Ferial Shayeganfar and Amin Anjomshoaa and Johannes Heurix and Christian Sustr and Neda Ghiassi and Ulrich Pont and Stefan Fenz and Thomas Neubauer and A Min Tjoa and Ardeshir Mahdavi
    • 13th International Conference of the International Building Performance Simulation Association
    @INPROCEEDINGS{Shayeganfar2013ontologyaided,
       author = {Ferial Shayeganfar and Amin Anjomshoaa and Johannes Heurix and Christian Sustr and Neda Ghiassi and Ulrich Pont and Stefan Fenz and Thomas Neubauer and {A Min} Tjoa and Ardeshir Mahdavi},
       title = {An ontology-aided Optimization Approach to Eco-Efficient Building Design},
       booktitle = {13th International Conference of the International Building Performance Simulation Association},
       year = {2013},
       month = {8},
    }
  • Security Engineering for Cloud Computing: Approaches and Tools (2013)
    • INBOOK--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Information Science Reference
    @INBOOK{_Security_Engineering_for_Cloud_2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {Security Engineering for Cloud Computing: Approaches and Tools},
       year = {2013},
       month = {8},
       chapter = {A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud- Based System},
       pages = {98--123},
       publisher = {Information Science Reference},
    }
  • A Grobner Bases Method for Complementary Sequences (2013)
    • INPROCEEDINGS--
    • Christos Koukouvinos and Dimitris Simos and Zafeirakis Zafeirakopoulos
    • Proceedings of the 19th Conference on Applications of Computer Algebra
    @INPROCEEDINGS{KSZ2013ACA,
       author = {Christos Koukouvinos and Dimitris Simos and Zafeirakis Zafeirakopoulos},
       title = {A Grobner Bases Method for Complementary Sequences},
       booktitle = {Proceedings of the 19th Conference on Applications of Computer Algebra},
       year = {2013},
       month = {7},
       pages = {255--259},
    }
  • Simulation-based optimization of information security controls: An adversary-centric approach (2013)
    • INPROCEEDINGS--
    • Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer
    • Proceedings of the Winter Simulation Conference 2013
    @INPROCEEDINGS{Kiesling_Simulation_based_optimization__2013,
       author = {Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer},
       title = {Simulation-based optimization of information security controls: An adversary-centric approach},
       booktitle = {Proceedings of the Winter Simulation Conference 2013},
       year = {2013},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WSC_2013_Moses3 - final.pdf},
       publisher = {R. Pasupathy and S.-H. Kim and A. Tolk and R. Hill and M.E. Kuhl},
    }
  • Requirements driven Testing of Domain-specific Core Language Models using Scenarios (2013)
    • INPROCEEDINGS--
    • Stefan Sobernig and Bernhard Hoisl and Mark Strembeck
    • Proceedings of the 13th International Conference on Quality Software
    @INPROCEEDINGS{Sobernig_Requirements_driven_Testing_of_2013,
       author = {Stefan Sobernig and Bernhard Hoisl and Mark Strembeck},
       title = {Requirements driven Testing of Domain-specific Core Language Models using Scenarios},
       booktitle = {Proceedings of the 13th International Conference on Quality Software},
       year = {2013},
       month = {7},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Requirements driven testing.pdf},
    }
  • Multi objective decision support for IT security control selection (2013)
    • INPROCEEDINGS--
    • Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer
    • 26th European Conference on Operational Research (EURO 2013)
    @INPROCEEDINGS{_Multi_objective_decision_suppo_2013,
       author = {Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer},
       title = {Multi objective decision support for IT security control selection},
       booktitle = {26th European Conference on Operational Research (EURO 2013)},
       year = {2013},
       month = {7},
    }
  • Citable by Design A Model for Making Data in Dynamic Environments Citable (2013)
    • INPROCEEDINGS--
    • Stefan Proell and Andreas Rauber
    • 2nd International Conference on Data Management Technologies and Applications (DATA2013)
    @INPROCEEDINGS{proellData2013,
       author = {Stefan Proell and Andreas Rauber},
       title = {Citable by Design A Model for Making Data in Dynamic Environments Citable},
       booktitle = {2nd International Conference on Data Management Technologies and Applications (DATA2013)},
       year = {2013},
       month = {7},
    }
  • Towards Security-Enhanced and Privacy-Preserving Mashup Compositions (2013)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl
    • Security and Privacy Protection in Information Processing Systems
    @INPROCEEDINGS{hobel2013towards,
       author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
       title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions},
       booktitle = {Security and Privacy Protection in Information Processing Systems},
       year = {2013},
       month = {7},
       pages = {286--299},
       publisher = {Springer},
    }
  • On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs (2013)
    • INPROCEEDINGS--
    • T. Quirchmayr and Mark Strembeck
    • 10th International Workshop on Security in Information Systems (WOSIS)
    @INPROCEEDINGS{Quirchmayr2013Impact,
       author = {T. Quirchmayr and Mark Strembeck},
       title = {On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs},
       booktitle = {10th International Workshop on Security in Information Systems (WOSIS)},
       year = {2013},
       month = {7},
    }
  • Supporting Customized Views for Enforcing Access Control Constraints in Real-time Collaborative Web Applications (2013)
    • INPROCEEDINGS--
    • Patrick Gaubatz and Waldemar Hummer and Uwe Zdun and Mark Strembeck
    • 13th International Conference on Web Engineering (ICWE)
    @INPROCEEDINGS{Gaubatz2013Supporting,
       author = {Patrick Gaubatz and Waldemar Hummer and Uwe Zdun and Mark Strembeck},
       title = {Supporting Customized Views for Enforcing Access Control Constraints in Real-time Collaborative Web Applications},
       booktitle = {13th International Conference on Web Engineering (ICWE)},
       year = {2013},
       month = {7},
    }
  • The Hardness of Code Equivalence over Fq and its Application to Code-based Cryptography (2013)
    • INPROCEEDINGS--
    • Nicolas Sendrier and Dimitris Simos
    • Post quantum cryptography PQCrypto
    @INPROCEEDINGS{_The_Hardness_of_Code_Equivalen_2013,
       author = {Nicolas Sendrier and Dimitris Simos},
       title = {The Hardness of Code Equivalence over Fq and its Application to Code-based Cryptography},
       booktitle = {Post quantum cryptography PQCrypto},
       year = {2013},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/codeqapp3_pqcrypto_fin.pdf},
    }
  • Evaluating a UML-based Modeling Framework for Process-related Security Properties: A Qualitative Multi-Method Study (2013)
    • INPROCEEDINGS--
    • Sigrid Schefer Wenzl and Stefan Sobernig and Mark Strembeck
    • 21st European Conference on Information Systems (ECIS)
    @INPROCEEDINGS{Wenzl2013Evaluating,
       author = {Sigrid Schefer Wenzl and Stefan Sobernig and Mark Strembeck},
       title = {Evaluating a UML-based Modeling Framework for Process-related Security Properties: A Qualitative Multi-Method Study},
       booktitle = {21st European Conference on Information Systems (ECIS)},
       year = {2013},
       month = {6},
    }
  • The Influence of Notational Deficiencies on Process Model Comprehension (2013)
    • ARTICLE--
    • Kathrin Figl and Jan Mendling and Mark Strembeck
    • Journal of the Association for Information Systems (JAIS)
    @ARTICLE{Figl2013Influence,
       author = {Kathrin Figl and Jan Mendling and Mark Strembeck},
       title = {The Influence of Notational Deficiencies on Process Model Comprehension},
       journal = {Journal of the Association for Information Systems (JAIS)},
       year = {2013},
       month = {6},
    }
  • Using ontologies to integrate multiple enterprise architecture domains (2013)
    • INPROCEEDINGS--
    • Goncalo Antunes and Artur Caetano and Marzieh Bakhshandeh and Rudolf Mayer and Jose Borbinha
    • the 4th Workshop on Business and IT Alignment (BITA 2013)
    @INPROCEEDINGS{Antunes2013Using,
       author = {Goncalo Antunes and Artur Caetano and Marzieh Bakhshandeh and Rudolf Mayer and Jose Borbinha},
       title = {Using ontologies to integrate multiple enterprise architecture domains},
       booktitle = {the 4th Workshop on Business and IT Alignment (BITA 2013)},
       year = {2013},
       month = {6},
       pdf = {http://www.ifs.tuwien.ac.at/%7Emayer/publications/pdf/ant_bita13.pdf},
    }
  • FORISK: Formalizing Information Security Risk and Compliance Management (2013)
    • INPROCEEDINGS--
    • Stefan Fenz and Thomas Neubauer and Rafael Accorsi and Thomas Koslowski
    • International Conference on Dependable Systems and Networks (DSN 2013)
    @INPROCEEDINGS{Fenz2013FORISK,
       author = {Stefan Fenz and Thomas Neubauer and Rafael Accorsi and Thomas Koslowski},
       title = {FORISK: Formalizing Information Security Risk and Compliance Management},
       booktitle = {International Conference on Dependable Systems and Networks (DSN 2013)},
       year = {2013},
       month = {6},
    }
  • Towards web-based information security knowledge sharing (2013)
    • ARTICLE--
    • Daniel Feledi and Stefan Fenz and Lukas Lechner
    • Information Security Technical Report
    @ARTICLE{Feledi_Towards_web_based_information__2013,
       author = {Daniel Feledi and Stefan Fenz and Lukas Lechner},
       title = {Towards web-based information security knowledge sharing},
       journal = {Information Security Technical Report},
       year = {2013},
       month = {5},
       volume = {17},
       number = {4},
       pages = {199-209},
    }
  • Ethics in Security Research - Which Lines Should Not Be Crossed? (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)
    @INPROCEEDINGS{schrittwieser-ethics-2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
       booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/creds2013_preprint.pdf},
    }
  • Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl
    • Web 2.0 Workshop on Security and Privacy (W2SP)
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
       author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
       booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jsfingerprinting.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
    }
  • Bridging the Gap between Role Mining and Role Engineering via Migration Guides (2013)
    • INBOOK--
    • Anne Baumgrass and Mark Strembeck
    • -
    @INBOOK{Baumgrass_Bridging_the_Gap_between_Role__2013,
       author = {Anne Baumgrass and Mark Strembeck},
       title = {Bridging the Gap between Role Mining and Role Engineering via Migration Guides},
       booktitle = {Information Security Technical Report (ISTR)},
       year = {2013},
       month = {5},
    }
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
       booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information ,
       Computer and Communications Security (ASIACCS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p529-schrittwieser.pdf},
    }
  • How easy is code equivalence over Fq (2013)
    • INPROCEEDINGS--
    • Nicolas Sendrier and Dimitris Simos
    • Proceedings of the 8th International Workshop on Coding Theory and Cryptography WCC 2013
    @INPROCEEDINGS{_How_easy_is_code_equivalence_o_2013,
       author = {Nicolas Sendrier and Dimitris Simos},
       title = {How easy is code equivalence over Fq},
       booktitle = {Proceedings of the 8th International Workshop on Coding Theory and Cryptography WCC 2013},
       year = {2013},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/codeq3_wccfin.pdf},
       pages = {80--92},
    }
  • InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs (2013)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Information Security Technical Report (ISTR), Special Issue: ARES
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
       journal = {Information Security Technical Report (ISTR),
       Special Issue: ARES},
       year = {2013},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES2012_Journal.pdf},
    }
  • Simulation based optimization of IT security controls: Initial experiences with metaheuristic solution procedures (2013)
    • INPROCEEDINGS--
    • Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer
    • 14th EU ME Workshop
    @INPROCEEDINGS{_Simulation_based_optimization__2013,
       author = {Elmar Kiesling and Andreas Ekelhart and Bernhard Grill and Christine Strauss and Christian Stummer},
       title = {Simulation based optimization of IT security controls: Initial experiences with metaheuristic solution procedures},
       booktitle = {14th EU ME Workshop},
       year = {2013},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/EU-ME Extended Abstract.pdf},
    }
  • A rule-based transformation system for converting semi-structured medical documents (2013)
    • ARTICLE--
    • Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer
    • Health and Technology
    @ARTICLE{_A_rule_based_transformation_sy_2013,
       author = {Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer},
       title = {A rule-based transformation system for converting semi-structured medical documents},
       journal = {Health and Technology},
       year = {2013},
       month = {3},
       pages = {1-13},
       publisher = {Springer},
    }
  • Generic Support for RBAC Break-Glass Policies in Process-Aware Information Systems (2013)
    • INPROCEEDINGS--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • ACM Symposium on Applied Computing (SAC)
    @INPROCEEDINGS{_Generic_Support_for_RBAC_Break_2013,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Generic Support for RBAC Break-Glass Policies in Process-Aware Information Systems},
       booktitle = {ACM Symposium on Applied Computing (SAC)},
       year = {2013},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sac13.pdf},
    }
  • BoF Session on Data Citation (2013)
    • INPROCEEDINGS--
    • Stefan Proell and Andreas Rauber
    • -
    @INPROCEEDINGS{Proll2013BoF,
       author = {Stefan Proell and Andreas Rauber},
       title = {BoF Session on Data Citation},
       year = {2013},
       month = {3},
       note = {Research Data Alliance - Launch and First Plenary},
    }
  • Malware in Hardware Infrastructure Components (2013)
    • INBOOK--
    • Christian Krieg and Edgar R. Weippl
    • Fraunhofer AISEC
    @INBOOK{_Malware_in_Hardware_Infrastruc_2013,
       author = {Christian Krieg and {Edgar R.} Weippl},
       title = {Malware in Hardware Infrastructure Components},
       booktitle = {Advances in IT Early Warning},
       year = {2013},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/weippl_chapter.pdf},
       chapter = {Malware in Hardware Infrastructure Components},
       publisher = {Fraunhofer AISEC},
       note = {ISBN 978-3-8396-0474-8},
    }
  • Higher-Order Rewriting of Model-to-Text Templates for Integrating Domain-specific Modeling Languages (2013)
    • INPROCEEDINGS--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • International Conference on Model-Driven Engineering and Software Development (MODELSWARD)
    @INPROCEEDINGS{_Higher_Order_Rewriting_of_Mode_2013,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {Higher-Order Rewriting of Model-to-Text Templates for Integrating Domain-specific Modeling Languages},
       booktitle = {International Conference on Model-Driven Engineering and Software Development (MODELSWARD)},
       year = {2013},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/modelsward13.pdf},
    }
  • Delta Analysis of Role-based Access Control Models (2013)
    • INPROCEEDINGS--
    • Maria Leitner
    • 14th International Conference on Computer Aided Systems Theory (EUROCAST 2013)
    @INPROCEEDINGS{Leitner2013Delta,
       author = {Maria Leitner},
       title = {Delta Analysis of Role-based Access Control Models},
       booktitle = {14th International Conference on Computer Aided Systems Theory (EUROCAST 2013)},
       year = {2013},
       month = {2},
    }
  • Profile-guided automated software diversity (2013)
    • INPROCEEDINGS--
    • Andrei Homescu and Steven Neisius and Per Larsen and Stefan Brunthaler and Michael Franz
    • 2013 IEEE ACM International Symposium on Code Generation and Optimization (CGO)
    @INPROCEEDINGS{Homescu2013Profileguided,
       author = {Andrei Homescu and Steven Neisius and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Profile-guided automated software diversity},
       booktitle = {2013 IEEE ACM International Symposium on Code Generation and Optimization (CGO)},
       year = {2013},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/cgo13.pdf},
    }
  • A Rule Based Transformation System for Converting Semi Structured Medical Documents (2013)
    • ARTICLE--
    • Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer
    • Health and Technology
    @ARTICLE{Heurix_A_Rule_Based_Transformation_Sy_2013,
       author = {Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer},
       title = {A Rule Based Transformation System for Converting Semi Structured Medical Documents},
       journal = {Health and Technology},
       year = {2013},
       month = {1},
       volume = {3},
       number = {1},
    }
  • Quantifying Windows File Slack in Size and Stability (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
       author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Quantifying Windows File Slack in Size and Stability},
       booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2013},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSlack_2013_preprint.pdf},
       link_data = {http://128.130.204.91/slackspaceDataset.7z},
       link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
    }
  • A Case Study on the Suitability of Process Mining to Produce Current-State {RBAC} Models (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Anne Baumgrass and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck
    • BPM Business Process Management Workshops
    @INPROCEEDINGS{leitner_case_2013,
       author = {Maria Leitner and Anne Baumgrass and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck},
       title = {A Case Study on the Suitability of Process Mining to Produce Current-State {RBAC} Models},
       booktitle = {BPM Business Process Management Workshops},
       year = {2013},
       month = {1},
       abstract = {Role based access control RBAC is commonly used to implement authorization procedures in Process aware information systems PAIS. Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of realworld processes.},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Leitner_SBP2012.pdf},
       number = {132},
       pages = {719-724},
       publisher = {Springer Berlin Heidelberg},
    }
    Role based access control RBAC is commonly used to implement authorization procedures in Process aware information systems PAIS. Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of realworld processes.
  • TOWARDS TESTING THE INTEGRATION OF MOF UML BASED DOMAIN SPECIFIC MODELING LANGUAGES (2013)
    • INPROCEEDINGS--
    • Bernhard Hoisl
    • Proceedings of the 8th IASTED International Conference on Advances in Computer Science
    @INPROCEEDINGS{Hoisl_TOWARDS_TESTING_THE_INTEGRATIO_2013,
       author = {Bernhard Hoisl},
       title = {TOWARDS TESTING THE INTEGRATION OF MOF UML BASED DOMAIN SPECIFIC MODELING LANGUAGES},
       booktitle = {Proceedings of the 8th IASTED International Conference on Advances in Computer Science},
       year = {2013},
       pages = {314-323},
       publisher = {ACTA Press},
    }
  • Mixed-level Response Surface Designs via a Hybrid Genetic Algorithm (2013)
    • ARTICLE--
    • Christos Koukouvinos and C. Parpoul and Dimitris Simos
    • to appear in J. Stat. Appl. Prob.
    @ARTICLE{Koukouvinos_Mixed_level_Response_Surface_D_2013,
       author = {Christos Koukouvinos and C. Parpoul and Dimitris Simos},
       title = {Mixed-level Response Surface Designs via a Hybrid Genetic Algorithm},
       journal = {to appear in J. Stat. Appl. Prob.},
       year = {2013},
    }
  • Modeling Context-Aware RBAC Models for Mobile Business Processes (2013)
    • ARTICLE--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • International Journal of Wireless and Mobile Computing (IJWMC)
    @ARTICLE{Wenzl2013Modeling,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {Modeling Context-Aware RBAC Models for Mobile Business Processes},
       journal = {International Journal of Wireless and Mobile Computing (IJWMC)},
       year = {2013},
    }
  • Supporting Customized Views for Enforcing Access Control Constraints in Real Time Collaborative Web Applications (2013)
    • ARTICLE--
    • Patrick Gaubatz and Waldemar Hummer and Uwe Zdun and Mark Strembeck
    • ICWE
    @ARTICLE{Gaubatz_Supporting_Customized_Views_fo_2013,
       author = {Patrick Gaubatz and Waldemar Hummer and Uwe Zdun and Mark Strembeck},
       title = {Supporting Customized Views for Enforcing Access Control Constraints in Real Time Collaborative Web Applications },
       journal = {ICWE},
       year = {2013},
       pages = {201-215},
    }
  • A Visualization Approach for Difference Analysis of Process Models and Instance Traffic (2013)
    • INPROCEEDINGS--
    • Simone Kriglstein and Stefanie Rinderle-Ma and Günter Wallner
    • Int l Conference on Business Process Management (BPM)
    @INPROCEEDINGS{Kriglstein_A_Visualization_Approach_for_D_2013,
       author = {Simone Kriglstein and Stefanie Rinderle-Ma and Günter Wallner},
       title = {A Visualization Approach for Difference Analysis of Process Models and Instance Traffic},
       booktitle = {Int l Conference on Business Process Management (BPM)},
       year = {2013},
       publisher = {Springer},
    }
  • Visualising Process Model Hierarchies (2013)
    • INPROCEEDINGS--
    • Kathrin Figl and Agnes Koschmider and Simone Kriglstein
    • European Conference on Information Systems (ECIS)
    @INPROCEEDINGS{Figl_Visualising_Process_Model_Hier_2013,
       author = {Kathrin Figl and Agnes Koschmider and Simone Kriglstein},
       title = {Visualising Process Model Hierarchies},
       booktitle = {European Conference on Information Systems (ECIS)},
       year = {2013},
       publisher = {Springer},
    }
  • Investigations on User Preferences of the Alignment of Process Activities (2013)
    • INPROCEEDINGS--
    • Agnes Koschmider and Simone Kriglstein and Meike Ullrich
    • 21st International Conference on Cooperative Information Systems (CoopIS)
    @INPROCEEDINGS{Koschmider_Investigations_on_User_Prefere_2013,
       author = {Agnes Koschmider and Simone Kriglstein and Meike Ullrich},
       title = {Investigations on User Preferences of the Alignment of Process Activities},
       booktitle = {21st International Conference on Cooperative Information Systems (CoopIS)},
       year = {2013},
       publisher = {Springer},
    }
  • Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science (2013)
    • INBOOK--
    • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • -
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
       author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Privacy,
       Anonymity,
       Pseudonymity and Data Disclosure in Data-Driven Science},
       booktitle = {Encyclopedia of Business Analytics and Optimization},
       year = {2013},
    }
  • An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model (2013)
    • ARTICLE--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Proceedings of the Winter Simulation Conference 2013
    @ARTICLE{Islam_An_Empirical_Study_on_the_Impl_2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model},
       journal = {Proceedings of the Winter Simulation Conference 2013},
       year = {2013},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/empiricalstudy 1.pdf},
    }
  • Evaluating a UML based Modeling Framework for Process-related Security Properties: A Qualitative Multi Method Study (2013)
    • ARTICLE--
    • Stefan Sobernig and Mark Strembeck and Sigrid Schefer Wenzl
    • Proceedings of the 21st European Conference on Information Systems (ECIS)
    @ARTICLE{Schefer-Wenzl_Evaluating_a_UML_based_Modelin_2013,
       author = {Stefan Sobernig and Mark Strembeck and Sigrid Schefer Wenzl},
       title = {Evaluating a UML based Modeling Framework for Process-related Security Properties: A Qualitative Multi Method Study},
       journal = {Proceedings of the 21st European Conference on Information Systems (ECIS)},
       year = {2013},
    }
  • A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System (2013)
    • INPROCEEDINGS--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Security Engineering for Cloud Computing: Approaches and Tools
    @INPROCEEDINGS{Islam_A_Goal_Driven_Risk_Management__2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System},
       booktitle = {Security Engineering for Cloud Computing: Approaches and Tools},
       year = {2013},
    }
  • On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs (2013)
    • INPROCEEDINGS--
    • T. Quirchmayr
    • Proceedings of the 10th International Workshop on Security in Information Systems (WOSIS)
    @INPROCEEDINGS{Quirchmayr_On_the_Impact_of_Concurrency_f_2013,
       author = {T. Quirchmayr},
       title = {On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs},
       booktitle = {Proceedings of the 10th International Workshop on Security in Information Systems (WOSIS)},
       year = {2013},
    }
  • Natural-Language Scenario Descriptions for DSML Core Language Model Testing (2013)
    • INPROCEEDINGS--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • Proceedings of the 25th IFIP International Conference on Testing Software and Systems
    @INPROCEEDINGS{Hoisl_Natural_Language_Scenario_Desc_2013,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {Natural-Language Scenario Descriptions for DSML Core Language Model Testing},
       booktitle = {Proceedings of the 25th IFIP International Conference on Testing Software and Systems},
       year = {2013},
    }
  • Multidisciplinary Research and Practice for Information Systems, IFIP International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2013 (2013)
    • INPROCEEDINGS--
    • P. Angelopoulos and Christos Koukouvinos and Dimitris Simos and A. Skountzou
    • Lecture Notes in Computer Science (LNCS)
    @INPROCEEDINGS{Angelopoulos_Multidisciplinary_Research_and_2013,
       author = {P. Angelopoulos and Christos Koukouvinos and Dimitris Simos and A. Skountzou},
       title = {Multidisciplinary Research and Practice for Information Systems,
       IFIP International Cross Domain Conference and Workshop on Availability,
       Reliability and Security,
       CD-ARES 2013},
       booktitle = {Lecture Notes in Computer Science (LNCS)},
       year = {2013},
    }
  • Genetic Algorithm and Data Mining Techniques for Design Selection in Databases (2013)
    • INPROCEEDINGS--
    • Christos Koukouvinos and C. Parpoul and Dimitris Simos
    • RAMSS 13 Proceedings of the 1st International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi state Systems, to be held in conjuction with ARES 13 8th International Conference on Availability, Reliability and Secur
    @INPROCEEDINGS{Koukouvinos_Genetic_Algorithm_and_Data_Min_2013,
       author = {Christos Koukouvinos and C. Parpoul and Dimitris Simos},
       title = {Genetic Algorithm and Data Mining Techniques for Design Selection in Databases},
       booktitle = {RAMSS 13 Proceedings of the 1st International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi state Systems,
       to be held in conjuction with ARES 13 8th International Conference on Availability,
       Reliability and Secur},
       year = {2013},
    }
  • An Approach to Penetration Testing via Combinational Designs (2013)
    • INPROCEEDINGS--
    • Dimitris Simos and Severin Winkler
    • ASQT 13 Proceedings of the 11th User Conference for Software Quality, Test and Innovation, Austrian Computer Society (OCG)
    @INPROCEEDINGS{Simos_An_Approach_to_Penetration_Tes_2013,
       author = {Dimitris Simos and Severin Winkler},
       title = {An Approach to Penetration Testing via Combinational Designs},
       booktitle = {ASQT 13 Proceedings of the 11th User Conference for Software Quality,
       Test and Innovation,
       Austrian Computer Society (OCG)},
       year = {2013},
    }
  • Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. (2013)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl
    • SEC
    @INPROCEEDINGS{hobel2013a,
       author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
       title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.},
       booktitle = {SEC},
       year = {2013},
       volume = {405},
       pages = {286-299},
       publisher = {Springer},
       note = {The original publication is available at www.springerlink.com},
    }
  • Modeling and Enforcing Secure Object Flows in Process-driven SOAs: An Integrated Model-driven Approach (2013)
    • ARTICLE--
    • Bernhard Hoisl and Stefan Sobernig and Mark Strembeck
    • Software and Systems Modeling (SoSyM)
    @ARTICLE{Hoisl2013Modeling,
       author = {Bernhard Hoisl and Stefan Sobernig and Mark Strembeck},
       title = {Modeling and Enforcing Secure Object Flows in Process-driven SOAs: An Integrated Model-driven Approach},
       journal = {Software and Systems Modeling (SoSyM)},
       year = {2013},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Hoisl Modeling and Enforcing paper.pdf},
    }
  • Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013 (2013)
    • INPROCEEDINGS--
    • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu
    • Lecture Notes in Computer Science
    @INPROCEEDINGS{Cuzzocrea2013Availability,
       author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
       title = {Availability,
       Reliability,
       and Security in Information Systems and HCI,
       IFIP WG 8.4,
       8.9,
       TC 5 International Cross-Domain Conference,
       CD-ARES 2013},
       booktitle = {Lecture Notes in Computer Science},
       year = {2013},
    }
  • Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD (2013)
    • INPROCEEDINGS--
    • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu
    • Lecture Notes in Computer Science
    @INPROCEEDINGS{Cuzzocrea2013Security,
       author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
       title = {Security Engineering and Intelligence Informatics,
       CD-ARES 2013 Workshops: MoCrySEn and SeCIHD},
       booktitle = {Lecture Notes in Computer Science},
       year = {2013},
    }
  • Studie zur Informationssicherheit in Österreich, 2013 (2013)
    • THESIS--
    • Philipp Reisinger
    • -
    @THESIS{Reisinger2013Studie,
       author = {Philipp Reisinger},
       title = {Studie zur Informationssicherheit in Österreich,
       2013},
       booktitle = {Studie zur Informationssicherheit in Österreich,
       2013},
       year = {2013},
       link_slides = {http://itsecx.fhstp.ac.at/wp-content/uploads/2013/11/ITSECX_IS_Studie.pdf},
    }
  • Thinking Inside the Box: Compartmentalized Garbage Collection (2013)
    • ARTICLE--
    • Gregor Wagner and Per Larsen and Stefan Brunthaler and Michael Franz
    • ACM Transactions on Programming Languages and Systems (TOPLAS)
    @ARTICLE{WagnerThinking,
       author = {Gregor Wagner and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Thinking Inside the Box: Compartmentalized Garbage Collection},
       journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)},
       year = {2013},
    }
  • Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model (2012)
    • ARTICLE--
    • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl
    • Journal of Service Science Research
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
       author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
       title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
       journal = {Journal of Service Science Research},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/krombholzetal2012.pdf},
    }
  • BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection (2012)
    • INPROCEEDINGS--
    • Florian Tegeler and Xiaoming Fu and Christopher Kruegel and Giovanni Vigna
    • International Conference on emerging Networking EXperiments and Technologies
    @INPROCEEDINGS{_BotFinder_Finding_Bots_in_Netw_2012,
       author = {Florian Tegeler and Xiaoming Fu and Christopher Kruegel and Giovanni Vigna},
       title = {BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection},
       booktitle = {International Conference on emerging Networking EXperiments and Technologies},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/conext12_botfinder.pdf},
    }
  • Jarhead: Analysis and Detection of Malicious Java Applets (2012)
    • INPROCEEDINGS--
    • Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna
    • Annual Computer Security Applications
    @INPROCEEDINGS{_Jarhead_Analysis_and_Detection_2012,
       author = {Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna},
       title = {Jarhead: Analysis and Detection of Malicious Java Applets},
       booktitle = {Annual Computer Security Applications},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/acsac12_jarhead.pdf},
    }
  • Disclosure: Detecting Botnet Command and Control Servers Through Large Scale NetFlow Analysis (2012)
    • INPROCEEDINGS--
    • Leyla Bilge and Davide Balzarotti and William K Robertson and Christopher Kruegel and Engin Kirda
    • Annual Computer Security Applications
    @INPROCEEDINGS{_Disclosure_Detecting_Botnet_Co_2012,
       author = {Leyla Bilge and Davide Balzarotti and William K Robertson and Christopher Kruegel and Engin Kirda},
       title = {Disclosure: Detecting Botnet Command and Control Servers Through Large Scale NetFlow Analysis},
       booktitle = {Annual Computer Security Applications},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/acsac12_disclosure.pdf},
    }
  • INMOTOS: Extending the ROPE-methodology (2012)
    • INPROCEEDINGS--
    • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl
    • 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)
    @INPROCEEDINGS{Zechner2012INMOTOS,
       author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
       title = {INMOTOS: Extending the ROPE-methodology},
       booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p272zechner.pdf},
    }
  • Digital Forensics for Enterprise Rights Management (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
       author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Digital Forensics for Enterprise Rights Management},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/16_schrittwieser.pdf},
    }
  • Definition and Enactment of Instance-spanning Process Constraints (2012)
    • INPROCEEDINGS--
    • Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma
    • Web Information System Engineering - {WISE} 2012 - 13th International Conference
    @INPROCEEDINGS{leitner_definition_2012,
       author = {Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {Definition and Enactment of Instance-spanning Process Constraints},
       booktitle = {Web Information System Engineering - {WISE} 2012 - 13th International Conference},
       year = {2012},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Leitner_WISE2012.pdf},
       publisher = {Springer},
       note = {(accepted)},
    }
  • Towards a Systematic Integration of MOF UML-based Domain-specific Modeling Languages (2012)
    • INPROCEEDINGS--
    • Bernhard Hoisl and Mark Strembeck and Stefan Sobernig
    • Proceedings of the 16th IASTED International Conference on Software Engineering and Applications
    @INPROCEEDINGS{Hoisl2012e,
       author = {Bernhard Hoisl and Mark Strembeck and Stefan Sobernig},
       title = {Towards a Systematic Integration of MOF UML-based Domain-specific Modeling Languages},
       booktitle = {Proceedings of the 16th IASTED International Conference on Software Engineering and Applications},
       year = {2012},
       month = {11},
       pages = {337-344},
       publisher = {ACTA Press},
    }
  • Digital Preservation of Business Processes with TIMBUS Architecture (2012)
    • INPROCEEDINGS--
    • Mykola Galushka and Philip Taylor and Wasif Gilani and John Thomson and Stephan Strodl and M. Neumann
    • Proceedings of the 9th International Conference on Preservation of Digital Objects IPRES2012
    @INPROCEEDINGS{_Digital_Preservation_of_Busine_2012,
       author = {Mykola Galushka and Philip Taylor and Wasif Gilani and John Thomson and Stephan Strodl and M. Neumann},
       title = {Digital Preservation of Business Processes with TIMBUS Architecture},
       booktitle = {Proceedings of the 9th International Conference on Preservation of Digital Objects IPRES2012},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iPres2012_Digital_Preservation_Of_Business_Processes_with_TIMBUS_Architecture.pdf},
       pages = {117-125},
    }
  • Business Process Preservation How to capture, document and evaluate (2012)
    • INPROCEEDINGS--
    • Stephan Strodl and D. Draws and Gonccalo Antunes and Andreas Rauber
    • Proceedings of the 9th International Conference on Preservation of Digital Objects IPRES2012
    @INPROCEEDINGS{_Business_Process_Preservation__2012,
       author = {Stephan Strodl and D. Draws and Gonccalo Antunes and Andreas Rauber},
       title = {Business Process Preservation How to capture,
       document and evaluate},
       booktitle = {Proceedings of the 9th International Conference on Preservation of Digital Objects IPRES2012},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/IPRES 2012_strodl_paper_10.pdf},
    }
  • Towards a Decision Support Architecture for Digital Preservation of Business Processes (2012)
    • INPROCEEDINGS--
    • M. Neumann and Hossein Miri and John Thomson and Gonccalo Antunes and Rudolf Mayer and Michael Beigl
    • Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)
    @INPROCEEDINGS{_Towards_a_Decision_Support_Arc_2012,
       author = {M. Neumann and Hossein Miri and John Thomson and Gonccalo Antunes and Rudolf Mayer and Michael Beigl},
       title = {Towards a Decision Support Architecture for Digital Preservation of Business Processes},
       booktitle = {Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/neu_ipres12-reasoning.pdf},
    }
  • On the Applicability of Workflow Management Systems for the Preservation of Business Processes (2012)
    • INPROCEEDINGS--
    • Rudolf Mayer and Stefan Proell and Andreas Rauber
    • Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)
    @INPROCEEDINGS{_On_the_Applicability_of_Workfl_2012,
       author = {Rudolf Mayer and Stefan Proell and Andreas Rauber},
       title = {On the Applicability of Workflow Management Systems for the Preservation of Business Processes},
       booktitle = {Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/may_ipres12-workflows.pdf},
    }
  • Towards Time-resilient MIR processes (2012)
    • INPROCEEDINGS--
    • Rudolf Mayer and Andreas Rauber
    • Proceedings of the 13th International Society for Music Information Retrieval Conference (ISMIR 2012) to appear
    @INPROCEEDINGS{_Towards_Time_resilient_MIR_pro_2012,
       author = {Rudolf Mayer and Andreas Rauber},
       title = {Towards Time-resilient MIR processes},
       booktitle = {Proceedings of the 13th International Society for Music Information Retrieval Conference (ISMIR 2012) to appear},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/337-ismir-2012.pdf},
    }
  • Who is Who: On Visualizing Organizational Models in Collaborative Systems (2012)
    • INPROCEEDINGS--
    • Simone Kriglstein and Juergen Mangler and Stefanie Rinderle-Ma
    • 8th IEEE International Conference onCollaborativeComputing Networking
    @INPROCEEDINGS{_Who_is_Who_On_Visualizing_Orga_2012,
       author = {Simone Kriglstein and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {Who is Who: On Visualizing Organizational Models in Collaborative Systems},
       booktitle = {8th IEEE International Conference onCollaborativeComputing Networking},
       year = {2012},
       month = {10},
       pages = {279-288},
       publisher = {IEEE},
    }
  • Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds (2012)
    • INPROCEEDINGS--
    • Antonio Bianchi and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna
    • ACM Conference on Computer and Communications Security (CCS)
    @INPROCEEDINGS{_Blacksheep_Detecting_Compromis_2012,
       author = {Antonio Bianchi and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna},
       title = {Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds},
       booktitle = {ACM Conference on Computer and Communications Security (CCS)},
       year = {2012},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ccs12_blacksheep.pdf},
    }
  • Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation (2012)
    • INPROCEEDINGS--
    • Andreas Kronabeter and Stefan Fenz
    • 2012 CloudComp Conference
    @INPROCEEDINGS{Kronabeter2012Cloud,
       author = {Andreas Kronabeter and Stefan Fenz},
       title = {Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation},
       booktitle = {2012 CloudComp Conference},
       year = {2012},
       month = {9},
    }
  • On the Complexity of Process Preservation: A Case Study on an E-Science Experiment (2012)
    • INPROCEEDINGS--
    • Rudolf Mayer and Stephan Strodl and Andreas Rauber
    • Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)
    @INPROCEEDINGS{_On_the_Complexity_of_Process_P_2012,
       author = {Rudolf Mayer and Stephan Strodl and Andreas Rauber},
       title = {On the Complexity of Process Preservation: A Case Study on an E-Science Experiment},
       booktitle = {Proceedings of the 9th International Conference on Digital Preservation (iPres 2012)},
       year = {2012},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ipres2012-Poster_CaseStudy-EscienceExperiment.pdf},
    }
  • INMOTOS Project (2012)
    • INPROCEEDINGS--
    • Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner
    • International Conference on Critical Information Infrastructures Security (CRITIS 12)
    @INPROCEEDINGS{_INMOTOS_Project_2012,
       author = {Manuele Barbieri and Ivan Cibrario Bertolotti and Manuel Cheminod and Ioannis Christou and Luca Durante and Sofoklis Efremidis and Giorgio Gentile and Peter Kieseberg and Steen Lehmann and Paolo Paci and Micol Pesce and Andreas Ronge and Michal Tanas and Craig Taverner and Lorenz Zechner},
       title = {INMOTOS Project},
       booktitle = {International Conference on Critical Information Infrastructures Security (CRITIS 12)},
       year = {2012},
       month = {9},
    }
  • Towards a Unified Penetration Testing Taxonomy (2012)
    • INPROCEEDINGS--
    • Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and Edgar R. Weippl
    • International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012)
    @INPROCEEDINGS{_Towards_a_Unified_Penetration__2012,
       author = {Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and {Edgar R.} Weippl},
       title = {Towards a Unified Penetration Testing Taxonomy},
       booktitle = {International Conference on Information Privacy,
       Security,
       Risk and Trust (PASSAT 2012)},
       year = {2012},
       month = {9},
    }
  • Timeline Visualization for Documenting Process Model Change (2012)
    • INPROCEEDINGS--
    • Sonja Kabicher Fuchs and Simone Kriglstein and Kathrin Figl
    • 5th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA 2012)
    @INPROCEEDINGS{kabicher_timeline,
       author = {Sonja Kabicher Fuchs and Simone Kriglstein and Kathrin Figl},
       title = {Timeline Visualization for Documenting Process Model Change },
       booktitle = {5th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA 2012)},
       year = {2012},
       month = {9},
    }
  • Preserving Scientific Processes from Design to Publication (2012)
    • INPROCEEDINGS--
    • Rudolf Mayer and Andreas Rauber and M. Neumann and John Thomson and Gonccalo Antunes
    • Proceedings of the 15th International Conference on Theory and Practice of Digital Libraries ({TPDL} 2012)
    @INPROCEEDINGS{_Preserving_Scientific_Processe_2012,
       author = {Rudolf Mayer and Andreas Rauber and M. Neumann and John Thomson and Gonccalo Antunes},
       title = {Preserving Scientific Processes from Design to Publication},
       booktitle = {Proceedings of the 15th International Conference on Theory and Practice of Digital Libraries ({TPDL} 2012)},
       year = {2012},
       month = {9},
       volume = {7489},
       publisher = {Springer},
    }
  • A UML Extension for Modeling Break-Glass Policies (2012)
    • INPROCEEDINGS--
    • Sigrid Schefer Wenzl and Mark Strembeck
    • 5th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)
    @INPROCEEDINGS{_A_UML_Extension_for_Modeling_B_2012,
       author = {Sigrid Schefer Wenzl and Mark Strembeck},
       title = {A UML Extension for Modeling Break-Glass Policies},
       booktitle = {5th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)},
       year = {2012},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/emisa12.pdf},
    }
  • Malicious Pixels Using QR Codes as Attack Vector (2012)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha
    • Trustworthy Ubiquitous Computing
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
       title = {Malicious Pixels Using QR Codes as Attack Vector},
       booktitle = {Trustworthy Ubiquitous Computing},
       year = {2012},
       month = {9},
       pages = {21-38},
    }
  • An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems (2012)
    • INPROCEEDINGS--
    • Peter Paul Beran and Elisabeth Vinek and Erich Schikuta and Maria Leitner
    • ACM IEEE 13th International Conference on Grid Computing
    @INPROCEEDINGS{_An_Adaptive_Heuristic_Approach_2012,
       author = {Peter Paul Beran and Elisabeth Vinek and Erich Schikuta and Maria Leitner},
       title = {An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems},
       booktitle = {ACM IEEE 13th International Conference on Grid Computing},
       year = {2012},
       month = {9},
       pages = {66-75},
    }
  • Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions (2012)
    • INPROCEEDINGS--
    • Xin Song and Lei Huang and Stefan Fenz
    • Internet of Things - Proceedings of the International Workshop, IOT 2012
    @INPROCEEDINGS{Song2012Internet,
       author = {Xin Song and Lei Huang and Stefan Fenz},
       title = {Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions},
       booktitle = {Internet of Things - Proceedings of the International Workshop,
       IOT 2012},
       year = {2012},
       month = {8},
    }
  • InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs (2012)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • The Fifth International Workshop on Digital Forensics (WSDF)
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
       booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WSDF2012_InnoDB.pdf},
    }
  • Challenges of Web-based Information Security Knowledge Sharing (2012)
    • INPROCEEDINGS--
    • Daniel Feledi and Stefan Fenz
    • Seventh International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Feledi2012,
       author = {Daniel Feledi and Stefan Fenz},
       title = {Challenges of Web-based Information Security Knowledge Sharing},
       booktitle = {Seventh International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2012},
       month = {8},
    }
  • Recognition and Privacy Preservation of Paper-based Health Records (2012)
    • INPROCEEDINGS--
    • Stefan Fenz and Johannes Heurix and Thomas Neubauer
    • Quality of Life through Quality of Information - Proceedings of MIE2012
    @INPROCEEDINGS{_Recognition_and_Privacy_Preser_2012,
       author = {Stefan Fenz and Johannes Heurix and Thomas Neubauer},
       title = {Recognition and Privacy Preservation of Paper-based Health Records},
       booktitle = {Quality of Life through Quality of Information - Proceedings of MIE2012},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2012 - Fenz - Recognition and Privacy Preservation of Paper-based Health Records.pdf},
       pages = {751-755},
       publisher = {European Federation for Medical Informatics and IOS Press},
    }
  • Automated Transformation of Semi-Structured Text Elements (2012)
    • INPROCEEDINGS--
    • Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer
    • AMCIS 2012 Proceedings
    @INPROCEEDINGS{_Automated_Transformation_of_Se_2012,
       author = {Johannes Heurix and Antonio Rella and Stefan Fenz and Thomas Neubauer},
       title = {Automated Transformation of Semi-Structured Text Elements},
       booktitle = {AMCIS 2012 Proceedings},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2012 - Heurix - Automated Transformation of Semi-Structured Text Elements.pdf},
       pages = {1-11},
    }
  • Enhancing Ontology-based Antipattern Detection using Bayesian Networks (2012)
    • ARTICLE--
    • Dimitrios Settas and Antonio Cerone and Stefan Fenz
    • Expert Systems with Applications
    @ARTICLE{_Enhancing_Ontology_based_Antip_2012,
       author = {Dimitrios Settas and Antonio Cerone and Stefan Fenz},
       title = {Enhancing Ontology-based Antipattern Detection using Bayesian Networks},
       journal = {Expert Systems with Applications},
       year = {2012},
       month = {8},
       volume = {39},
       number = {10},
       pages = {9041-9053},
    }
  • An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides (2012)
    • INPROCEEDINGS--
    • Anne Baumgrass and Mark Strembeck
    • 7th International Conference on Availability Reliability and Security (ARES)
    @INPROCEEDINGS{_An_Approach_to_Bridge_the_Gap__2012,
       author = {Anne Baumgrass and Mark Strembeck},
       title = {An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides},
       booktitle = {7th International Conference on Availability Reliability and Security (ARES)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ares12.pdf},
    }
  • Babel: Leveraging Email Delivery for Spam Mitigation (2012)
    • INPROCEEDINGS--
    • Gianluca Stringhini and Manuel Egele and Apostolis Zarras and Thorsten Holz and Christopher Kruegel and Giovanni Vigna
    • 21st Usenix Security Symposium
    @INPROCEEDINGS{_Babel_Leveraging_Email_Deliver_2012,
       author = {Gianluca Stringhini and Manuel Egele and Apostolis Zarras and Thorsten Holz and Christopher Kruegel and Giovanni Vigna},
       title = {Babel: Leveraging Email Delivery for Spam Mitigation},
       booktitle = {21st Usenix Security Symposium},
       year = {2012},
       month = {8},
       abstract = {usenix12_babel.pdf},
    }
    usenix12_babel.pdf
  • PUBCRAWL: Protecting Users and Businesses from CRAWLers (2012)
    • INPROCEEDINGS--
    • Gregoire Jacob and Engin Kirda and Christopher Kruegel and Giovanni Vigna
    • 21st Usenix Security Symposium
    @INPROCEEDINGS{_PUBCRAWL_Protecting_Users_and__2012,
       author = {Gregoire Jacob and Engin Kirda and Christopher Kruegel and Giovanni Vigna},
       title = {PUBCRAWL: Protecting Users and Businesses from CRAWLers},
       booktitle = {21st Usenix Security Symposium},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/usenix12_pubcrawl.pdf},
    }
  • Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner (2012)
    • INPROCEEDINGS--
    • Adam Doupe and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna
    • 21st Usenix Security Symposium
    @INPROCEEDINGS{_Enemy_of_the_State_A_State_Awa_2012,
       author = {Adam Doupe and Ludovico Cavedon and Christopher Kruegel and Giovanni Vigna},
       title = {Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner},
       booktitle = {21st Usenix Security Symposium},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/usenix12_statecrawl.pdf},
    }
  • A multi objective decision support framework for simulation based security control selection (2012)
    • INPROCEEDINGS--
    • Elmar Kiesling and Christine Strauss and Christian Stummer
    • ARES
    @INPROCEEDINGS{_A_multi_objective_decision_sup_2012,
       author = {Elmar Kiesling and Christine Strauss and Christian Stummer},
       title = {A multi objective decision support framework for simulation based security control selection},
       booktitle = {ARES},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Moses3 ARES OSA 2012.pdf},
    }
  • Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming (2012)
    • INPROCEEDINGS--
    • Andrei Homescu and Michael Stewart and Per Larsen and Stefan Brunthaler and Michael Franz
    • 6th Workshop on Offensive Technologies (WOOT 2012)
    @INPROCEEDINGS{Homescu2012Microgadgets,
       author = {Andrei Homescu and Michael Stewart and Per Larsen and Stefan Brunthaler and Michael Franz},
       title = {Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming},
       booktitle = {6th Workshop on Offensive Technologies (WOOT 2012)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/woot12.pdf},
    }
  • Model Based Process to Support Security and Privacy Requirements Engineering (2012)
    • ARTICLE--
    • Shareeful Islam and Haralambos Mouratidis and Christos Kalloniatis and Aleksandar Hudic and Lorenz Zechner
    • International Journal of Secure Software Engineering (IJSSE)