#Malware Analysis

The analysis of malware improves IT security, protects privacy and supports the defence against IT attacks.

Projects

Josef Ressel Center for Blockchain-Technologies & Security Management

The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...

Josef Ressel Center for Unified Threat Intelligence on Targeted Attacks (TARGET)

The Josef Ressel Center for Unified Threat Intelligence on Targeted Attacks (TARGET) is a research institution operated by the St. Pölten University of Applied Sciences. Its mission is to explore nov...

upribox 2 - Usable Privacy Box 2

The usable privacy box (upribox) is a network tool that filters ads on all connected devices such as smartphones or laptops and ultimately protects the user’s privacy. The upribox 2.0 is even easier...

Smartphone Security

This research project focuses on more or less neglected topics of cyber security (IT security) concerning smartphones, tablet-PCs and BYOD (bring your own device).

Publications

Gromann, D., Lardelli, M., Spiel, K., Burtscher, S., Klausner, L. D., Mettinger, A., Miladinovic, I., Schefer-Wenzl, S., Duh, D., & Bühn, K. (2023). Participatory Research as a Path to Community-Informed, Gender-Fair Machine Translation. Proceedings of the First Workshop on Gender-Inclusive Translation Technologies, 49–59. https://aclanthology.org/2023.gitt-1.5/
Burtscher, S., Spiel, K., Klausner, L. D., Lardelli, M., & Gromann, D. (2022). „Es geht um Respekt, nicht um Technologie“: Erkenntnisse aus einem Interessensgruppen-übergreifenden Workshop zu genderfairer Sprache und Sprachtechnologie. Tagungsband Der Mensch Und Computer 2022, 106–1118. https://doi.org/10.1145/3543758.3544213
Aigner, W. (2021, March 23). Visual Analytics for Time-Oriented Data [Invited Talk]. ERFA Industrial Data & Analytics - Zeitreihenanalyse, Kremsmünster, Austria.
König, L., Korobeinikova, Y., Kieseberg, P., & Tjoa, S. (2020). Comparing Blockchain Standards and Recommendations. Future Internet 2020, Future Internet 2020. https://doi.org/10.3390/fi12120222
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
König, L., Unger, S., Kieseberg, P., & Tjoa, S. (2020). The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks. Journal of Internet Services and Information Security (JISIS), Volume: 10, Number: 3, Volume 10, 110–127. https://doi.org/10.22667/JISIS.2020.08.31.110
Eresheim, S. (2020). Cybersecurity Containment Agent. Machine Learning Prague 2020.
Luh, R., & Schrittwieser, S. (2019). Advanced threat intelligence: detection and classification of anomalous behavior in system processes. E \& i Elektrotechnik Und Informationstechnik, Springer, 1–7.
Pirker, M. (2019, November 22). More Data - More Security? [Invited Talk]. TOP Alumni Club, TU Wien. https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141
Pirker, M. (2019, October 23). Digitale Probleme....für Alle! PrivacyWeek, Wien. https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-

News