Stefan Kraxberger

According to our database1, Stefan Kraxberger authored at least 21 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Process to Facilitate Automated Automotive Cybersecurity Testing.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

2016
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play).
Secur. Commun. Networks, 2016

2014
Secure Communication with RFID tags in the Internet of Things.
Secur. Commun. Networks, 2014

2013
Trusted Identity Management for Overlay Networks.
Proceedings of the Information Security Practice and Experience, 2013

2011
Scalable Secure Routing for Heterogeneous Unstructured P2P Networks.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

Android Market Analysis with Activation Patterns.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Android Security Permissions - Can We Trust Them?
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Performance evaluation of IPv6 label switched paths for wireless sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Extracting Semantic Knowledge from Twitter.
Proceedings of the Electronic Participation - Third IFIP WG 8.5 International Conference, 2011

2010
An autonomous attestation token to secure mobile agents in disaster response.
Secur. Commun. Networks, 2010

Securing Emergency Response Operations Using Distributed Trust Decisions.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Secure Multi-Agent System for Multi-Hop Environments.
Proceedings of the Computer Network Security, 2010

A scalable secure overlay framework for heterogeneous embedded systems.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

WLAN location determination without active client collaboration.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Passive RFID technology for the internet of things.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Cost-Effective Routing for a Greener Internet.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Secure Routing Approach for Unstructured P2P Systems.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Security concept for peer-to-peer systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
General security concept for embedded P2P systems.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

2005
Massive Data Mining for Polymorphic Code Detection.
Proceedings of the Computer Network Security, 2005

Polymorphic Code Detection with GA Optimized Markov Models.
Proceedings of the Communications and Multimedia Security, 2005


  Loading...