Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation, International Conference on Verification, Model Checking, and Abstract Interpretation, 108-127, (Lecture Notes in Computer Science
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification, 1-2
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, (Lecture Notes in Business Information Processing
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, 288-309, (Advances in Information Security, Privacy, and Ethics (AISPE)
Stranacher K., Krnjic V., Zefferer T.
eGovernment review, Vol. 11, 30-31
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 360-372
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies, Proceedings of the 9th International Conference on Web Information Systems and Technologies, 325-334
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government, International Conference on e-Business and e-Government, 124-132
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security, Arbeitskonferenz DACH Security, 225-236
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 140-151
Zefferer T.
IADIS International Conference e-Society 2013, IADIS International Conference e-Society, 275-282
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, European Conference on E-Government, 508-516
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(2), 107-118
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, Information Security Solutions Europe Conference, 45-57
Leitold H., Kö A., Leitner C., Prosser A.
, (LNCS
Zwattendorfer B., Tauber A.
International journal of distributed systems and technologies, Vol. 4(4), 1-14
Tauber A., Kustor P., Karning B.
Computer law & security review, Vol. 29(1), 28-39
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, 46-70, (Advances in Information Security, Privacy, and Ethics (AISPE)