If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Article
2014

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

2013

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Teufl, P., Ferk, M., Fitzek, A. G., Hein, D., Orthacker, C. & Kraxberger, S., 2013, In : Security and communication networks. p. 0-0

Research output: Contribution to journalArticleResearchpeer-review

2011

Knowledge Extraction from RDF Data with Activation Patterns

Teufl, P. & Lackner, G., 2011, In : Journal of Universal Computer Science . 17, 7, p. 983-1004

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services

Zefferer, T. & Teufl, P., 2011, (Submitted) In : Megatrends in eGovernment.

Research output: Contribution to journalArticleResearch

2009

Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods

Lackner, G., Payer, U. & Teufl, P., 2009, In : International journal of network security. Vol. 9, No. 2, p. 164-172

Research output: Contribution to journalArticleResearch