No photo of Günther Lackner

Günther Lackner

Dr.

20052019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 9 Conference contribution
  • 1 Other report
  • 1 Article
2012

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 1-12 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 40-51 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2011

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics

Lackner, G. & Teufl, P., 2011, AISC. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Knowledge Extraction from RDF Data with Activation Patterns

Teufl, P. & Lackner, G., 2011, In : Journal of Universal Computer Science . 17, 7, p. 983-1004

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2010

From NLP (Natural Language Processing) to MLP (Machine Language Processing)

Teufl, P., Lackner, G. & Payer, U., 2010, Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings. Springer, Vol. 6258. p. 256-269 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Location Privacy in Kabellosen Netzwerken

Lackner, G. & Teufl, P., 2010, DACH2010. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

RDF Data Analysis with Activation Patterns

Teufl, P. & Lackner, G., 2010, 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria. ., p. 18-18 (Journal of Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

User Tracking based on Behavioral Fingerprints

Lackner, G., Teufl, P. & Weinberger, R., 2010, CANS 2010 Proceedings. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2007

Schutz der Privatsphäre in einem webbasierten Multiuser-System

Lackner, G., Payer, U., Slamanig, D. & Stingl, C., 2007, (Accepted/In press) D • A • CH Security 2007. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2006

POSITIF D7.2: SEM specification, design and implementation

Payer, U., Kraxberger, S. & Lackner, G., 2006, .

Research output: Book/ReportOther reportResearch

WiFi Chipset Fingerprinting

Lackner, G., Lamberger, M., Teufl, P. & Payer, U., 2006, D.A.CH Mobility. ., p. 41-53

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review