The analysis of malware improves IT security, protects privacy and supports the defence against IT attacks.
The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...
EMRESS develops models to quantify the strength of software protection techniques.
The Josef Ressel Center for Unified Threat Intelligence on Targeted Attacks (TARGET) is a research institution operated by the St. Pölten University of Applied Sciences. Its mission is to explore nov...
Extending SoniControl, the first ultrasonic firewall, that detects and blocks unwanted acoustic tracking on mobile devices.
Integral analysis of privacy and security of online advertising networks
Knowledge-Assisted Visual Analytics Methods for Time-Oriented Data. New methods will take advantage of explicit expert knowledge in the Visual Analytics process of data.
The usable privacy box (upribox) is a network tool that filters ads on all connected devices such as smartphones or laptops and ultimately protects the user’s privacy. The upribox 2.0 is even easier...
The project "usable privacy box" (upribox) developes a software and creates a device that protects internet privacy and ensures data security.
Aigner, W. (2021, March 23). Visual Analytics for Time-Oriented Data [Invited Talk]. ERFA Industrial Data & Analytics - Zeitreihenanalyse, Kremsmünster, Austria.
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Eresheim, S. (2020). Cybersecurity Containment Agent. Machine Learning Prague 2020.
Eresheim, S. (2020). Reinforcement Learning for Incident Protection in IT. First Conference on Mathematics of Data Science (MDS20).
Luh, R., & Schrittwieser, S. (2019). Advanced threat intelligence: detection and classification of anomalous behavior in system processes. E \& i Elektrotechnik Und Informationstechnik, Springer, 1–7.
Pirker, M. (2019, November 22). More Data - More Security? [Invited Talk]. TOP Alumni Club, TU Wien. https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019, October 23). Digitale Probleme....für Alle! PrivacyWeek, Wien. https://fahrplan.privacyweek.at/pw19/talk/N98QNQ/
Schrittwieser, S. (2019, September 26). Sicherheit von Container-Virtualisierung [Invited Talk]. IDC Security Roadshow Vienna, Wien. https://idcitsecurity.com/2019/vienna/
Luh, R. (2019). Advanced Threat Intelligence: Interpretation of Anomalous Behavior in Ubiquitous Kernel Processes [Dissertation]. De Monfort University Leicester. https://dora.dmu.ac.uk/handle/2086/18527
Luh, R., Janicke, H., & Schrittwieser, S. (2019). AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. Computers & Security, 84, 120–147. https://doi.org/10/gh38cc