| | Preview | Author(s) | Title | Type | Issue Date |
| 1 | | Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna ; Weippl, Edgar | From Hack to Elaborate Technique-A Survey on Binary Rewriting | Artikel Article  | 2019 |
| 2 | | Dabrowski, Adrian ; Merzdovnik, Georg ; Ullrich, Johanna ; Sendera, Gerald ; Weippl, Edgar | Measuring Cookies and Web Privacy in a Post-GDPR World | Konferenzbeitrag Inproceedings | 2019 |
| 3 | | Merzdovnik, Georg ; Huber, Markus ; Buhov, Damjan ; Nikiforakis, Nick ; Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar | Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools | Konferenzbeitrag Inproceedings | 2017 |
| 4 | | Judmayer, Aljosha ; Ullrich, Johanna ; Merzdovnik, Georg ; Voyiatzis, Artemios G. ; Weippl, Edgar | Lightweight Address Hopping for Defending the IPv6 IoT | Konferenzbeitrag Inproceedings | 2017 |
| 5 |  | Merzdovnik, Georg | Security and privacy in mobile environments | Thesis Hochschulschrift  | 2017 |
| 6 | | Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kinder, Johannes ; Merzdovnik, Georg ; Weippl, Edgar | Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? | Artikel Article  | 2016 |
| 7 | | Buhov, Damjan ; Huber, Markus ; Merzdovnik, Georg ; Weippl, Edgar ; Dimitrova, Vesna | Network Security Challenges in Android Applications | Konferenzbeitrag Inproceedings | 2015 |
| 8 | | Aufner, Peter ; Merzdovnik, Georg ; Huber, Markus ; Weippl, Edgar | Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations | Konferenzbeitrag Inproceedings | 2014 |
| 9 | | Merzdovnik, Georg | Automated analysis and clustering of Windows shellcodes | Thesis Hochschulschrift | 2012 |