Android security permissions–can we trust them? C Orthacker, P Teufl, S Kraxberger, G Lackner, M Gissing, A Marsalek, ... Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 77 | 2012 |
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) P Teufl, M Ferk, A Fitzek, D Hein, S Kraxberger, C Orthacker Security and communication networks 9 (5), 389-419, 2016 | 67 | 2016 |
Qualified mobile server signature C Orthacker, M Centner, C Kittl Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010 | 56 | 2010 |
Android market analysis with activation patterns P Teufl, S Kraxberger, C Orthacker, G Lackner, M Gissing, A Marsalek, ... Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 28 | 2012 |
Minimal-footprint Middleware for the Creation of Qualified Signatures. M Centner, C Orthacker, W Bauer WEBIST (1), 64-69, 2010 | 18 | 2010 |
Patterns to establish a secure communication channel AD Sinnhofer, FJ Oppermann, K Potzmader, C Orthacker, C Steger, ... Proceedings of the 21st European Conference on Pattern Languages of Programs …, 2016 | 11 | 2016 |
Combining business process variability and software variability using traceable links AD Sinnhofer, P Pühringer, FJ Oppermann, K Potzmader, C Orthacker, ... Business Modeling and Software Design: 7th International Symposium, BMSD …, 2018 | 8 | 2018 |
A framework for process driven software configuration AD Sinnhofer, P Pühringer, K Potzmader, C Orthacker, C Steger, ... Proceedings of the Sixth International Symposium on Business Modeling and …, 2016 | 8 | 2016 |
Accessibility challenges in e-Government: an Austrian experience C Orthacker, T Zefferer Proceedings of the Forth International Conference on Internet Technologies …, 2011 | 6 | 2011 |
Software configuration based on order processes AD Sinnhofer, P Pühringer, K Potzmader, C Orthacker, C Steger, ... Business Modeling and Software Design: 6th International Symposium, BMSD …, 2017 | 5 | 2017 |
Method for symbolic execution on constrained devices F Boehl, C Orthacker, KM Potzmader, AD Sinnhofer, C Steger US Patent 10,387,687, 2019 | 4 | 2019 |
Increasing the visibility of requirements based on combined variability management AD Sinnhofer, FJ Oppermann, K Potzmader, C Orthacker, C Steger, ... Business Modeling and Software Design: 8th International Symposium, BMSD …, 2018 | 4 | 2018 |
Combined variability management of business processes and software architectures AD Sinnhofer, A Höller, P Pühringer, K Potzmader, C Orthacker, C Steger, ... Proceedings of the Seventh International Symposium on Business Modeling and …, 2017 | 4 | 2017 |
Seamless eID Integration into Web Portals C Orthacker, B Zwattendorfer na, 2009 | 3 | 2009 |
Method for personalizing a secure element, method for enabling a service, secure element and computer program product D Warnez, C Orthacker US Patent 9,749,303, 2017 | 2 | 2017 |
Minimal-footprint middleware to leverage qualified electronic signatures C Orthacker, M Centner Web Information Systems and Technologies: 6th International Conference …, 2011 | 2 | 2011 |
Open Source Bausteine als Kooperationsgrundlage R Posch, C Orthacker, K Stranacher, A Tauber, T Zefferer, B Zwattendorfer na, 2012 | 1 | 2012 |
Where Do All My Keys Come From? AD Sinnhofer, C Steger, C Kreiner, FJ Oppermann, K Potzmader, ... Research Anthology on Artificial Intelligence Applications in Security, 1715 …, 2021 | | 2021 |
EU-Projekt „eGov-Bus “ COIK Stranacher, IB Zwattendorfer, C Orthacker EU-Dienstleistungsrichtlinie & E-Government, 8, 2008 | | 2008 |
Final detailed architecture and design H Leitold, C Orthacker, W Staniszkis, J Strychowski, II Nemedi, K Subieta ., 2008 | | 2008 |