Stefan Kraxberger
Stefan Kraxberger
secinto GmbH
Verified email at - Homepage
Cited by
Cited by
Android security permissions–can we trust them?
C Orthacker, P Teufl, S Kraxberger, G Lackner, M Gissing, A Marsalek, ...
Security and Privacy in Mobile Information and Communication Systems: Third …, 2012
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
P Teufl, M Ferk, A Fitzek, D Hein, S Kraxberger, C Orthacker
Security and communication networks 9 (5), 389-419, 2016
Passive RFID technology for the Internet of Things
S Dominikus, M Aigner, S Kraxberger
2010 International Conference for Internet Technology and Secured …, 2010
Android market analysis with activation patterns
P Teufl, S Kraxberger, C Orthacker, G Lackner, M Gissing, A Marsalek, ...
Security and Privacy in Mobile Information and Communication Systems: Third …, 2012
Extracting semantic knowledge from twitter
P Teufl, S Kraxberger
Electronic Participation: Third IFIP WG 8.5 International Conference, ePart …, 2011
Secure communication with RFID tags in the Internet of Things
S Dominikus, S Kraxberger
Security and Communication Networks 7 (12), 2639-2653, 2014
A process to facilitate automated automotive cybersecurity testing
S Marksteiner, N Marko, A Smulders, S Karagiannis, F Stahl, ...
2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 1-7, 2021
Wlan location determination without active client collaboration
S Kraxberger, G Lackner, U Payer
Proceedings of the 6th International Wireless Communications and Mobile …, 2010
Trusted identity management for overlay networks
S Kraxberger, R Toegl, M Pirker, EP Guijarro, GG Millan
Information Security Practice and Experience: 9th International Conference …, 2013
Security concept for peer-to-peer systems
S Kraxberger, U Payer
Proceedings of the 2009 International Conference on Wireless Communications …, 2009
IPv6 label switching on IEEE 802.15. 4
U Payer, S Kraxberger, P Holzer
2009 Third International Conference on Sensor Technologies and Applications …, 2009
Massive data mining for polymorphic code detection
U Payer, P Teufl, S Kraxberger, M Lamberger
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
Polymorphic code detection with GA optimized markov models
U Payer, S Kraxberger
Communications and Multimedia Security: 9th IFIP TC-6 TC-11International …, 2005
Cost-effective routing for a greener internet
B Bergler, C Preschern, A Reiter, S Kraxberger
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
General security concept for embedded P2P systems
S Kraxberger, U Payer, S Tillich
Proceedings of the 5th Annual International Conference on Mobile and …, 2008
Low-cost RFID tags as IPv6 nodes in the Internet of Things
S Dominikus, H Gross, M Aigner, S Kraxberger
Radio Frequency Identification System Security, 114-128, 2011
An autonomous attestation token to secure mobile agents in disaster response
DM Hein, R Toegl, S Kraxberger
Security and communication networks 3 (5), 421-438, 2010
Secure multi-agent system for multi-hop environments
S Kraxberger, P Danner, D Hein
Computer Network Security: 5th International Conference on Mathematical …, 2010
Secure routing approach for unstructured p2p systems
S Kraxberger, U Payer
2009 Third International Conference on Emerging Security Information …, 2009
Securing emergency response operations using distributed trust decisions
P Danner, D Hein, S Kraxberger
2010 Fourth International Conference on Network and System Security, 62-69, 2010
The system can't perform the operation now. Try again later.
Articles 1–20