Seguir
Peter Frühwirt
Peter Frühwirt
Dirección de correo verificada de broadcom.com
Título
Citado por
Citado por
Año
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
1542012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
1132014
InnoDB Database Forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
Advanced Information Networking and Applications (AINA), 2010 24th IEEE …, 2010
772010
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
5th International Workshop on Digital Forensic, 2012
70*2012
A tamper-proof audit and control system for the doctor in the loop
P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger
Brain Informatics 3 (4), 269-279, 2016
362016
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation 11 (4), 336-348, 2014
352014
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
342015
Witnesses for the doctor in the loop
P Kieseberg, J Schantl, P Frühwirt, E Weippl, A Holzinger
International Conference on Brain Informatics and Health, 369-378, 2015
272015
The role and security of firewalls in cyber-physical cloud computing
J Ullrich, J Cropper, P Frühwirt, E Weippl
EURASIP Journal on Information Security 2016 (1), 1-20, 2016
212016
Security and privacy of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
International Journal of Pervasive Computing and Communications, 2015
162015
The role and security of firewalls in iaas cloud computing
J Cropper, J Ullrich, P Frühwirt, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
142015
What's new with whatsapp & co.? revisiting the security of smartphone messaging applications
R Mueller, S Schrittwieser, P Fruehwirt, P Kieseberg, E Weippl
Proceedings of the 16th International Conference on Information Integration …, 2014
142014
Using machine learning techniques for traffic classification and preliminary surveying of an attacker’s profile
P Frühwirt, S Schrittwieser, ER Weippl
6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), 2014
102014
Using internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding
P Fruhwirt, P Kieseberg, E Weippl
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference …, 2015
72015
Security tests for mobile applications - Why using TLS/SSL is not enough
P Kieseberg, P Fruhwirt, S Schrittwieser, E Weippl
Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE …, 2015
62015
Genie in a Model? Why Model Driven Security will not secure your Web Application.
C Hochreiner, P Frühwirt, Z Ma, P Kieseberg, S Schrittwieser, ER Weippl
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (3), 44-62, 2014
42014
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective
P Kieseberg, S Schrittwieser, P Frühwirt, E Weippl
2019 International Conference on Software Security and Assurance (ICSSA), 46-51, 2019
22019
Security testing for mobile applications
P Kieseberg, P Fruhwirt, S Schrittwieser
ERCIM News 109, 2017
12017
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles
P Frühwirt, P Kieseberg, C Hochreiner, S Schrittwieser, E Weippl
12014
A tamper-proof audit and control system for the doctor in the loop
PKBMP Frühwirt, EWA Holzinger
2016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20