default search action
Stefan Kraxberger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c18]Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev:
A Process to Facilitate Automated Automotive Cybersecurity Testing. VTC Spring 2021: 1-7 - [i1]Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev:
A Process to Facilitate Automated Automotive Cybersecurity Testing. CoRR abs/2101.10048 (2021)
2010 – 2019
- 2016
- [j3]Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel M. Hein, Stefan Kraxberger, Clemens Orthacker:
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). Secur. Commun. Networks 9(5): 389-419 (2016) - 2014
- [j2]Sandra Dominikus, Stefan Kraxberger:
Secure Communication with RFID tags in the Internet of Things. Secur. Commun. Networks 7(12): 2639-2653 (2014) - 2013
- [c17]Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan:
Trusted Identity Management for Overlay Networks. ISPEC 2013: 16-30 - 2011
- [c16]Peter Teufl, Stefan Kraxberger:
Extracting Semantic Knowledge from Twitter. ePart 2011: 48-59 - [c15]Stefan Kraxberger, Christoph Gratl, Udo Payer:
Performance evaluation of IPv6 label switched paths for wireless sensor networks. IWCMC 2011: 1353-1358 - [c14]Peter Teufl, Stefan Kraxberger, Clemens Orthacker, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber:
Android Market Analysis with Activation Patterns. MobiSec 2011: 1-12 - [c13]Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber:
Android Security Permissions - Can We Trust Them? MobiSec 2011: 40-51 - [c12]Stefan Kraxberger:
Scalable Secure Routing for Heterogeneous Unstructured P2P Networks. PDP 2011: 619-626 - 2010
- [j1]Daniel M. Hein, Ronald Toegl, Stefan Kraxberger:
An autonomous attestation token to secure mobile agents in disaster response. Secur. Commun. Networks 3(5): 421-438 (2010) - [c11]Bernd Bergler, Christopher Preschern, Andreas Reiter, Stefan Kraxberger:
Cost-Effective Routing for a Greener Internet. GreenCom/CPSCom 2010: 276-283 - [c10]Sandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger:
Passive RFID technology for the internet of things. ICITST 2010: 1-8 - [c9]Stefan Kraxberger, Günther Lackner, Udo Payer:
WLAN location determination without active client collaboration. IWCMC 2010: 1188-1192 - [c8]Stefan Kraxberger:
A scalable secure overlay framework for heterogeneous embedded systems. LCN 2010: 236-239 - [c7]Stefan Kraxberger, Peter Danner, Daniel M. Hein:
Secure Multi-Agent System for Multi-Hop Environments. MMM-ACNS 2010: 270-283 - [c6]Peter Danner, Daniel M. Hein, Stefan Kraxberger:
Securing Emergency Response Operations Using Distributed Trust Decisions. NSS 2010: 62-69
2000 – 2009
- 2009
- [c5]Stefan Kraxberger, Udo Payer:
Security concept for peer-to-peer systems. IWCMC 2009: 931-936 - [c4]Stefan Kraxberger, Udo Payer:
Secure Routing Approach for Unstructured P2P Systems. SECURWARE 2009: 210-216 - 2008
- [c3]Stefan Kraxberger, Udo Payer, Stefan Tillich:
General security concept for embedded P2P systems. MobiQuitous 2008 - 2005
- [c2]Udo Payer, Stefan Kraxberger:
Polymorphic Code Detection with GA Optimized Markov Models. Communications and Multimedia Security 2005: 210-219 - [c1]Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger:
Massive Data Mining for Polymorphic Code Detection. MMM-ACNS 2005: 448-453
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint