Blog
People
Research
Publications
Contact
Contact Us
Impressum
Privacy Policy
Light
Dark
Automatic
2
An extended view on measuring tor AS-level adversaries
Gabriel K Gegenhuber
,
Markus Maier
,
Florian Holzbauer
,
Wilfried Mayer
,
Georg Merzdovnik
,
Edgar Weippl
,
Johanna Ullrich
Automated Security Risk Identification Using AutomationML-based Engineering Data
Matthias Eckhart
,
Andreas Ekelhart
,
Edgar R. Weippl
Autohoney(I)IoT - Automated device Independent honeypot Generation of IoT and Industrial IoT devices
Christian Kudera
,
Georg Merzdovnik
,
Edgar R. Weippl
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges
Matthias Eckhart
,
Bernhard Brenner
,
Andreas Ekelhart
,
Edgar Weippl
Securing the testing process for industrial automation software
Matthias Eckhart
,
Kristof Meixner
,
Dietmar Winkler
,
Andreas Ekelhart
URL
From Hack to Elaborate Technique—A Survey on Binary Rewriting
Matthias Wenzl
,
Georg Merzdovnik
,
Johanna Ullrich
,
Edgar Weippl
u'smile-Secure Mobile Environments.
Georg Merzdovnik
,
Damjan Buhov
,
Artemios G Voyiatzis
,
Edgar R Weippl
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
Sebastian Schrittwieser
,
Stefan Katzenbeisser
,
Johannes Kinder
,
Georg Merzdovnik
,
Edgar Weippl
Enter Sandbox: Android Sandbox Comparison
Sebastian Neuner
,
Victor Van Der Veen
,
Martina Lindorfer
,
Markus Huber
,
Georg Merzdovnik
,
Martin Mulazzani
,
Edgar R. Weippl
Cite
×