Markus Donko-Huber
Markus Donko-Huber
Industry since 2017. unmarried name: Markus Huber
Dirección de correo verificada de - Página principal
Citado por
Citado por
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
USENIX Security Symposium, 65-76, 2011
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
2009 International Conference on Computational Science and Engineering 3 …, 2009
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
IEEE European Symposium on Security and Privacy 2017, 2017
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Internet Computing, IEEE 15 (3), 28 - 34, 2011
Friend-in-the-middle attacks
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
Published by the IEEE Computer Society, 1089-7801, 2010
When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging
S Schröder, M Huber, D Wind, C Rottermanner
European Workshop on Usable Security. IEEE, 2016
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
Shpf: Enhancing http (s) session security with browser fingerprinting
T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl
2013 International Conference on Availability, Reliability and Security, 255-261, 2013
SHPF: Enhancing HTTP (S) Session Security with Browser Fingerprinting
M Mulazzani, E Weippl, S Schrittwieser, T Unger, M Huber, P Frühwirt
Proceedings of the Eighth International Conference on Availability …, 2013
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
Proceedings of the IEEE, 0
Social network forensics: Tapping the data pool of social networks
M Mulazzani, M Huber, E Weippl
Eighth Annual IFIP WG 11, 1-20, 2012
Appinspect: large-scale evaluation of social networking apps
M Huber, M Mulazzani, S Schrittwieser, E Weippl
Proceedings of the first ACM conference on Online social networks, 143-154, 2013
Tor HTTP usage and information leakage
M Huber, M Mulazzani, E Weippl
Communications and Multimedia Security, 245-255, 2010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20