explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 125-139
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association of Computing Machinery, 0-0
Leitold H., Kö A., Leitner C., Prosser A.
, Springer, (LNCS)
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 563-583
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, (Advances in Information Security, Privacy, and Ethics (AISPE))
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation, International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 108-127, (Lecture Notes in Computer Science)
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 181-195, (Lecture notes in computer science)
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 43-57, (Lecture notes in computer science)
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 928 - 933, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8044 LNCS)
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 360-372
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies, 9th International Conference on Web Information Systems and Technologies, 325-334
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security, Arbeitskonferenz DACH Security, 225-236
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, 13th European Conference on E-Government, 508-516
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4)
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 28-39
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 1-9
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET, IADIS International Conference WWW/INTERNET, 219-226