@misc{pirker_digitale_2019, address = {Wien}, title = {Digitale {Probleme}....für {Alle}!}, url = {https://media.ccc.de/v/pw19-256-digitale-probleme-fr-alle-}, abstract = {Diese Vortrag bringt einen bunten Querschnitt von Nachrichten aus der IT-Sicherheitswelt, die in "normalen" Nachrichtenfeeds wohl kaum auftauchen, oder nicht wahrgenommen werden, die aber auf Grund der fortschreitenden Digitalisierung unserer Alltagswelt eigentlich Sicherheits- und Datenprivacy-Auswirkungen auf uns alle haben (könnten). Dieser Vortrag soll motivieren sich mit den eingesetzten modernen "digitalen" und "cloudigen" Tools etwas tiefergehend auseinanderzusetzen, anstatt reflexartig überall "Ja" bei der Installation zu klicken und ein "ist ja gratis" und ein "ich habe ja nichts zu verbergen" verhindert jede weitere Reflektion.}, author = {Pirker, Martin}, month = oct, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @incollection{gawrock_ongoing_2009, address = {Wiesbaden}, title = {An ongoing {Game} of {Tetris}: {Integrating} {Trusted} {Computing} in {Java}, block-by-block}, isbn = {978-3-8348-0794-6 978-3-8348-9324-6}, shorttitle = {An ongoing {Game} of {Tetris}}, url = {https://link.springer.com/chapter/10.1007/978-3-8348-9324-6_7}, language = {en}, urldate = {2019-01-24}, booktitle = {Future of {Trust} in {Computing}}, publisher = {Vieweg+Teubner}, author = {Toegl, Ronald and Pirker, Martin}, editor = {Gawrock, David and Reimer, Helmut and Sadeghi, Ahmad-Reza and Vishik, Claire}, year = {2009}, doi = {10.1007/978-3-8348-9324-6_7}, keywords = {Extern}, pages = {60--67}, } @article{dietrich_can_2007, title = {Can you {Really} {Trust} your {Computer} {Today}?}, volume = {3}, number = {3}, journal = {ENISA quarterly}, author = {Dietrich, Kurt and Vedjda, Tobias and Tögl, Ronald and Pirker, Martin and Lipp, Peter}, year = {2007}, keywords = {Extern, ⛔ No DOI found}, } @article{balogh_agent-based_2014, title = {Agent-{Based} {Cloud} {Resource} {Management} for {Secure} {Cloud} {Infrastructures}}, volume = {33}, url = {https://cai.type.sk/content/2014/6/agent-based-cloud-resource-management-for-secure-cloud-infrastructures/}, language = {en}, journal = {Computing and Informatics}, author = {Balogh, Zoltn and Gatial, Emil and Hluch, Ladislav and Tögl, Ronald and Pirker, Martin and Hein, Daniel}, year = {2014}, keywords = {Extern, ⛔ No DOI found}, pages = {1333--1355}, } @article{gatial_securing_2012, title = {Securing {Agents} {Using} {Secure} {Docking} {Module}}, volume = {No. 15(1) 2012}, url = {http://www.uwm.edu.pl/wnt/technicalsc/tech_15_1/B08.pdf}, journal = {Technical Sciences}, author = {Gatial, Emil and Tögl, Ronald and Pirker, Martin}, year = {2012}, keywords = {Extern, peer-reviewed, ⛔ No DOI found}, } @misc{pirker_trusted_2018, address = {Finse}, title = {Trusted {Computing} {Basics}\&{Overview}}, author = {Pirker, Martin}, month = may, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @inproceedings{pirker_lightweight_2012, address = {Porto, Portugal}, title = {Lightweight {Distributed} {Attestation} {For} {The} {Cloud}}, isbn = {978-989-8565-05-1}, url = {http://www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0003929105800585}, doi = {10/gh376r}, urldate = {2019-01-24}, booktitle = {Proceedings of the 2nd {International} {Conference} on {Cloud} {Computing} and {Services} {Science}}, publisher = {SciTePress - Science and and Technology Publications}, author = {Pirker, Martin and Winter, Johannes and Tögl, Ronald}, year = {2012}, keywords = {Extern}, pages = {580--585}, } @inproceedings{pirker_framework_2012, address = {Liverpool, United Kingdom}, title = {A {Framework} for {Privacy}-{Preserving} {Mobile} {Payment} on {Security} {Enhanced} {ARM} {TrustZone} {Platforms}}, isbn = {978-1-4673-2172-3 978-0-7695-4745-9}, url = {http://ieeexplore.ieee.org/document/6296107/}, doi = {10/gh376q}, urldate = {2019-01-24}, booktitle = {2012 {IEEE} 11th {International} {Conference} on {Trust}, {Security} and {Privacy} in {Computing} and {Communications}}, publisher = {IEEE}, author = {Pirker, Martin and Slamanig, Daniel}, month = jun, year = {2012}, keywords = {Extern}, pages = {1155--1160}, } @article{pirker_towards_2010, title = {Towards a {Virtual} {Trusted} {Platform}}, issn = {0948695X}, url = {http://www.jucs.org/jucs_16_4/towards_a_virtual_trusted/jucs_16_04_0531_0542_pirker.pdf}, doi = {10/gh376p}, language = {eng}, number = {4}, urldate = {2019-01-24}, journal = {JUCS - Journal of Universal Computer Science}, author = {Pirker, Martin and Toegl, Ronald}, month = feb, year = {2010}, keywords = {Extern}, } @inproceedings{hein_securing_2012, address = {Raleigh, North Carolina, USA}, title = {Securing mobile agents for crisis management support}, isbn = {978-1-4503-1662-0}, url = {http://dl.acm.org/citation.cfm?doid=2382536.2382550}, doi = {10/gh376m}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the seventh {ACM} workshop on {Scalable} trusted computing - {STC} '12}, publisher = {ACM Press}, author = {Hein, Daniel M. and Toegl, Ronald and Pirker, Martin and Gatial, Emil and Balogh, Zoltán and Brandl, Hans and Hluchý, Ladislav}, year = {2012}, keywords = {Extern}, pages = {85}, } @inproceedings{pammer_security_2014, address = {Graz, Austria}, title = {Security concepts for a distributed architecture for activity logging and analysis}, isbn = {978-1-4503-2769-5}, url = {http://dl.acm.org/citation.cfm?doid=2637748.2638426}, doi = {10/gh376n}, language = {en}, urldate = {2019-01-24}, booktitle = {Proceedings of the 14th {International} {Conference} on {Knowledge} {Technologies} and {Data}-driven {Business} - i-{KNOW} '14}, publisher = {ACM Press}, author = {Pammer, Viktoria and Stern, Hermann and Edler, Stefan and Hein, Daniel and Pirker, Martin and Bloem, Roderick and Wertner, Alfred}, year = {2014}, keywords = {Extern}, pages = {1--6}, } @inproceedings{pirker_assessment_2016, title = {Assessment of {Server} {State} via {Inter}-{Clone} {Differences}}, doi = {10/gh375j}, publisher = {IEEE}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{pirker_work-flow_2016, series = {{WWW} '16 {Companion}}, title = {A {Work}-{Flow} for {Empirical} {Exploration} of {Security} {Events}}, url = {http://www2016.net/proceedings/companion/p477.pdf}, doi = {10/gh375h}, booktitle = {25th {International} {Conference} {Companion} on {World} {Wide} {Web}}, publisher = {ACM}, author = {Pirker, Martin and Nusser, Andreas}, year = {2016}, note = {Projekt: TARGET}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @inproceedings{valicek_creation_2017, address = {Altoona, PA}, title = {Creation and {Integration} of {Remote} {High} {Interaction} {Honeypots}}, isbn = {978-1-5386-4808-7}, url = {https://ieeexplore.ieee.org/document/8392617/}, doi = {10/gh375g}, urldate = {2019-01-24}, booktitle = {2017 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA})}, publisher = {IEEE}, author = {Valicek, Martin and Schramm, Gregor and Pirker, Martin and Schrittwieser, Sebastian}, month = jul, year = {2017}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung}, pages = {50--55}, } @inproceedings{pirker_behavioural_2018, address = {Hamburg, Deutschland}, title = {Behavioural {Comparison} of {Systems} for {Anomaly} {Detection}}, doi = {10/gh3734}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, author = {Pirker, Martin and Kochberger, Patrick and Schwandter, Stefan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Josef Ressel Zentrum TARGET, Publikationstyp Schriftpublikation, peer-reviewed}, } @misc{pirker_robustes_2019, address = {Wien}, title = {Robustes {Parsen} von {Inputdaten}}, url = {https://sec4dev.io/sessions/robustes-parsen-von-inputdaten}, abstract = {In unserer digitalen Welt kommunizieren unterschiedlichste Programme mit Hilfe von vielerlei Datenformaten miteinander. Oft werden Standardformate verwendet (z.B. XML oder JSON) weil diese in den Bibliotheken der gängigen Programmiersprachen leicht verfügbar sind. Mit der Annahme und weiteren Verarbeitung von Daten unbekannter Herkunft (z.B. "von irgendwoher" aus dem Internet) stellt sich auch immer die Sicherheitsfrage: Könnten geschickt manipulierte Daten in meiner Verarbeitung Probleme verursachen? Dieser Vortrag beschäftigt sich mit der Frage wie man Daten robust und sicher ins eigene Programm importieren kann. Oder anders formuliert, mit wieviel Aufwand kann man wie komplexe Daten einlesen und was kann man über die Sicherheit dieses exponierten Programmcodes dann noch aussagen?}, author = {Pirker, Martin}, month = feb, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_trusted_2018-1, address = {Finse}, title = {Trusted {Computing} – {Basics} and {Overview}}, author = {Pirker, Martin}, month = oct, year = {2018}, keywords = {FH SP Cyber Security, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, Vortrag}, } @misc{pirker_more_2019, address = {TU Wien}, type = {Invited {Talk}}, title = {More {Data} - {More} {Security}?}, url = {https://www.eventbrite.com/e/ai-among-us-todays-use-cases-of-applied-ai-tickets-78776670141}, abstract = {Viel mehr Daten, viel mehr Sicherheit? Im Vortrag werden die verschiedenen Stadien der Lösung und Umsetzung eines konkreten ML/AI Problems beleuchtet:Martin Pirker und sein Team wollen die folgende Forschungsfrage beantworten: „könnte man mit Anomaliedetektion neuartige Einbrüche erkennen?“. Dazu werden viele Daten benötigt - hierbei muss die Problematik der persönlichen Daten besonders berücksichtigt werden. Ist dies geschafft, werden die riesigen Datenberge durchforstet und entsprechend organisiert. Eine weitere Hürde ist das Implementierungs-Trade-Offzwischen der Speicher- und Prozessorleistung und den Deployment-Kosten.Am Ende der Entwicklung steht die Integration im kommerziellen Produkt und der "Explainability"der Ergebnisse und Bedienbarkeit für den Kunden}, author = {Pirker, Martin}, month = nov, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_big_2019, address = {Wien}, type = {Invited {Talk}}, title = {({Big}) {Data} ({Science}) für {Security}}, url = {https://www.meetup.com/de-DE/Vienna-Data-Science-Group-Meetup/events/259922553/}, author = {Pirker, Martin}, month = mar, year = {2019}, note = {Projekt: TARGET}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science}, } @incollection{barthe_practical_2008, address = {Berlin, Heidelberg}, title = {A {Practical} {Approach} for {Establishing} {Trust} {Relationships} between {Remote} {Platforms} {Using} {Trusted} {Computing}}, volume = {4912}, isbn = {978-3-540-78662-7 978-3-540-78663-4}, url = {http://link.springer.com/10.1007/978-3-540-78663-4_12}, language = {en}, urldate = {2019-01-24}, booktitle = {Trustworthy {Global} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Dietrich, Kurt and Pirker, Martin and Vejda, Tobias and Toegl, Ronald and Winkler, Thomas and Lipp, Peter}, editor = {Barthe, Gilles and Fournet, Cédric}, year = {2008}, doi = {10.1007/978-3-540-78663-4_12}, keywords = {Extern}, pages = {156--168}, } @incollection{lee_management_2011, address = {Berlin, Heidelberg}, title = {Management of {Integrity}-{Enforced} {Virtual} {Applications}}, volume = {187}, isbn = {978-3-642-22364-8 978-3-642-22365-5}, url = {http://link.springer.com/10.1007/978-3-642-22365-5_17}, urldate = {2019-01-24}, booktitle = {Secure and {Trust} {Computing}, {Data} {Management}, and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Gissing, Michael and Toegl, Ronald and Pirker, Martin}, editor = {Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R.}, year = {2011}, doi = {10.1007/978-3-642-22365-5_17}, keywords = {Extern}, pages = {138--145}, } @incollection{hutchison_trusted_2013, title = {Trusted {Identity} {Management} for {Overlay} {Networks}}, volume = {7863}, isbn = {978-3-642-38032-7 978-3-642-38033-4}, url = {http://link.springer.com/10.1007/978-3-642-38033-4_2}, urldate = {2019-01-24}, booktitle = {Information {Security} {Practice} and {Experience}}, publisher = {Springer Berlin Heidelberg}, author = {Kraxberger, Stefan and Toegl, Ronald and Pirker, Martin and Guijarro, Elisa Pintado and Millan, Guillermo Garcia}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Deng, Robert H. and Feng, Tao}, year = {2013}, doi = {10.1007/978-3-642-38033-4_2}, keywords = {Extern}, pages = {16--30}, } @incollection{hutchison_practical_2012, address = {Berlin, Heidelberg}, title = {Practical {Privacy} {Preserving} {Cloud} {Resource}-{Payment} for {Constrained} {Clients}}, volume = {7384}, isbn = {978-3-642-31679-1 978-3-642-31680-7}, url = {http://link.springer.com/10.1007/978-3-642-31680-7_11}, urldate = {2019-01-24}, booktitle = {Privacy {Enhancing} {Technologies}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Slamanig, Daniel and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Fischer-Hübner, Simone and Wright, Matthew}, year = {2012}, doi = {10.1007/978-3-642-31680-7_11}, keywords = {Extern}, pages = {201--220}, } @incollection{hutchison_dynamic_2010, address = {Berlin, Heidelberg}, title = {Dynamic {Enforcement} of {Platform} {Integrity}}, volume = {6101}, isbn = {978-3-642-13868-3 978-3-642-13869-0}, url = {http://link.springer.com/10.1007/978-3-642-13869-0_18}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Gissing, Michael}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Acquisti, Alessandro and Smith, Sean W. and Sadeghi, Ahmad-Reza}, year = {2010}, doi = {10.1007/978-3-642-13869-0_18}, keywords = {Extern}, pages = {265--272}, } @incollection{chen_privacyca_2009, address = {Berlin, Heidelberg}, title = {A {PrivacyCA} for {Anonymity} and {Trust}}, volume = {5471}, isbn = {978-3-642-00586-2 978-3-642-00587-9}, url = {http://link.springer.com/10.1007/978-3-642-00587-9_7}, urldate = {2019-01-24}, booktitle = {Trusted {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Toegl, Ronald and Hein, Daniel and Danner, Peter}, editor = {Chen, Liqun and Mitchell, Chris J. and Martin, Andrew}, year = {2009}, doi = {10.1007/978-3-642-00587-9_7}, keywords = {Extern}, pages = {101--119}, } @incollection{hutchison_semi-automated_2013, address = {Berlin, Heidelberg}, title = {Semi-automated {Prototyping} of a {TPM} v2 {Software} and {Hardware} {Simulation} {Platform}}, volume = {7904}, isbn = {978-3-642-38907-8 978-3-642-38908-5}, url = {http://link.springer.com/10.1007/978-3-642-38908-5_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Huth, Michael and Asokan, N. and Čapkun, Srdjan and Flechais, Ivan and Coles-Kemp, Lizzie}, year = {2013}, doi = {10.1007/978-3-642-38908-5_8}, keywords = {Extern}, pages = {106--114}, } @incollection{hutchison_lightweight_2012, address = {Berlin, Heidelberg}, title = {Lightweight {Distributed} {Heterogeneous} {Attested} {Android} {Clouds}}, volume = {7344}, isbn = {978-3-642-30920-5 978-3-642-30921-2}, url = {http://link.springer.com/10.1007/978-3-642-30921-2_8}, urldate = {2019-01-24}, booktitle = {Trust and {Trustworthy} {Computing}}, publisher = {Springer Berlin Heidelberg}, author = {Pirker, Martin and Winter, Johannes and Toegl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Katzenbeisser, Stefan and Weippl, Edgar and Camp, L. Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen}, year = {2012}, doi = {10.1007/978-3-642-30921-2_8}, keywords = {Extern}, pages = {122--141}, } @incollection{chen_actvsm:_2011, address = {Berlin, Heidelberg}, title = {{acTvSM}: {A} {Dynamic} {Virtualization} {Platform} for {Enforcement} of {Application} {Integrity}}, volume = {6802}, isbn = {978-3-642-25282-2 978-3-642-25283-9}, shorttitle = {{acTvSM}}, url = {http://link.springer.com/10.1007/978-3-642-25283-9_22}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Pirker, Martin and Gissing, Michael}, editor = {Chen, Liqun and Yung, Moti}, year = {2011}, doi = {10.1007/978-3-642-25283-9_22}, keywords = {Extern}, pages = {326--345}, } @incollection{hutchison_waltzing_2013, address = {Berlin, Heidelberg}, title = {Waltzing the {Bear}, or: {A} {Trusted} {Virtual} {Security} {Module}}, volume = {7868}, isbn = {978-3-642-40011-7 978-3-642-40012-4}, shorttitle = {Waltzing the {Bear}, or}, url = {http://link.springer.com/10.1007/978-3-642-40012-4_10}, urldate = {2019-01-24}, booktitle = {Public {Key} {Infrastructures}, {Services} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Toegl, Ronald and Reimair, Florian and Pirker, Martin}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and De Capitani di Vimercati, Sabrina and Mitchell, Chris}, year = {2013}, doi = {10.1007/978-3-642-40012-4_10}, keywords = {Extern}, pages = {145--160}, } @incollection{lipp_towards_2008, address = {Berlin, Heidelberg}, title = {Towards {Trust} {Services} for {Language}-{Based} {Virtual} {Machines} for {Grid} {Computing}}, volume = {4968}, isbn = {978-3-540-68978-2 978-3-540-68979-9}, url = {http://link.springer.com/10.1007/978-3-540-68979-9_4}, language = {en}, urldate = {2019-01-24}, booktitle = {Trusted {Computing} - {Challenges} and {Applications}}, publisher = {Springer Berlin Heidelberg}, author = {Vejda, Tobias and Toegl, Ronald and Pirker, Martin and Winkler, Thomas}, editor = {Lipp, Peter and Sadeghi, Ahmad-Reza and Koch, Klaus-Michael}, year = {2008}, doi = {10.1007/978-3-540-68979-9_4}, keywords = {Extern}, pages = {48--59}, } @incollection{hutchison_flexible_2012, address = {Berlin, Heidelberg}, title = {A {Flexible} {Software} {Development} and {Emulation} {Framework} for {ARM} {TrustZone}}, volume = {7222}, isbn = {978-3-642-32297-6 978-3-642-32298-3}, url = {http://link.springer.com/10.1007/978-3-642-32298-3_1}, urldate = {2019-01-24}, booktitle = {Trusted {Systems}}, publisher = {Springer Berlin Heidelberg}, author = {Winter, Johannes and Wiegele, Paul and Pirker, Martin and Tögl, Ronald}, editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Doug and Vardi, Moshe Y. and Weikum, Gerhard and Chen, Liqun and Yung, Moti and Zhu, Liehuang}, year = {2012}, doi = {10.1007/978-3-642-32298-3_1}, keywords = {Extern}, pages = {1--15}, } @misc{pirker_it_2018, title = {{IT} {Security} + {Data} {Science} for {Security}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec Applied Security \& Data Science}, } @misc{pirker_jrz_2018, title = {{JRZ} {Target}}, author = {Pirker, Martin}, month = apr, year = {2018}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Poster, SP IT Sec System \& Application Security}, }