Full name Familienname, Vorname
Merzdovnik, Georg
 
Main Affiliation Organisations­zuordnung
 

Results 1-9 of 9 (Search time: 0.001 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna ; Weippl, Edgar From Hack to Elaborate Technique-A Survey on Binary RewritingArtikel Article 2019
2Dabrowski, Adrian ; Merzdovnik, Georg ; Ullrich, Johanna ; Sendera, Gerald ; Weippl, Edgar Measuring Cookies and Web Privacy in a Post-GDPR WorldKonferenzbeitrag Inproceedings2019
3Merzdovnik, Georg ; Huber, Markus ; Buhov, Damjan ; Nikiforakis, Nick ; Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar Block Me If You Can: A Large-Scale Study of Tracker-Blocking ToolsKonferenzbeitrag Inproceedings2017
4Judmayer, Aljosha ; Ullrich, Johanna ; Merzdovnik, Georg ; Voyiatzis, Artemios G. ; Weippl, Edgar Lightweight Address Hopping for Defending the IPv6 IoTKonferenzbeitrag Inproceedings2017
5Merzdovnik Georg - 2017 - Security and privacy in mobile environments.pdf.jpgMerzdovnik, Georg Security and privacy in mobile environmentsThesis Hochschulschrift 2017
6Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kinder, Johannes ; Merzdovnik, Georg ; Weippl, Edgar Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?Artikel Article 2016
7Buhov, Damjan ; Huber, Markus ; Merzdovnik, Georg ; Weippl, Edgar ; Dimitrova, Vesna Network Security Challenges in Android ApplicationsKonferenzbeitrag Inproceedings2015
8Aufner, Peter ; Merzdovnik, Georg ; Huber, Markus ; Weippl, Edgar Plugin in the Middle - Minimising Security Risks in Mobile Middleware ImplementationsKonferenzbeitrag Inproceedings2014
9Merzdovnik, Georg Automated analysis and clustering of Windows shellcodesThesis Hochschulschrift2012

Results 1-8 of 8 (Search time: 0.001 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Stoeger Michael Bernd - 2023 - Scanning for IoT Devices Using a Mobile Android...pdf.jpgStöger, Michael Bernd Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environmentThesis Hochschulschrift 2023
2George Dominik Roy - 2021 - Privacy-preserving remote attestation protocol.pdf.jpgGeorge, Dominik Roy Privacy-preserving remote attestation protocolThesis Hochschulschrift 2021
3Pucher Michael - 2021 - Identification of obfuscated function clones in binaries...pdf.jpgPucher, Michael Identification of obfuscated function clones in binaries using machine learningThesis Hochschulschrift 2021
4Klepp Thomas - 2020 - Cruel intentions enhancing androids intent firewall.pdf.jpgKlepp, Thomas Cruel intentions : enhancing androids intent firewallThesis Hochschulschrift 2020
5Hinterleitner Timo - 2020 - Towards a scalable secure element cluster a...pdf.jpgHinterleitner, Timo Towards a scalable secure element cluster : a recommendation on hardware configurationThesis Hochschulschrift 2020
6Boll Andreas - 2020 - Security and privacy of secure messaging services a case...pdf.jpgBoll, Andreas Security and privacy of secure messaging services : a case study of wireThesis Hochschulschrift 2020
7Szivos Gabor Zoltan - 2019 - Human assisted information extraction through...pdf.jpgSzivos, Gabor Zoltan Human assisted information extraction through Bluetooth low energy on androidThesis Hochschulschrift 2019
8Gadllah Adel - 2015 - Straightjacket tightening process execution policies at...pdf.jpgGadllah, Adel Straightjacket: tightening process execution policies at runtimeThesis Hochschulschrift 2015