2017 |
Sicherheit in der Industrie 4.0 H. Lampesberger, E. Hermann, R. Kolmhofer - Sicherheit in der Industrie 4.0 - Trauner Verlag Linz, 2017, pp. 164 |
2013 |
Entwicklung eines Sicherheitsmodells für offene verteilte Web Services-Anwendungen E. Hermann - Entwicklung eines Sicherheitsmodells für offene verteilte Web Services-Anwendungen - Trauner Verlag Linz, 2013, pp. 238 |
2013 |
Statistical Modeling of Web Requests for Anomaly Detection in Web Applications H. Lampesberger, M. Zeilinger, E. Hermann - Statistical Modeling of Web Requests for Anomaly Detection in Web Applications in Advances in IT early warning (Editors: M. Zeilinger, P. Schoo, E. Hermann) - Fraunhofer Verlag, 2013, pp. 91-101 |
2013 |
The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems E. Hermann, R. Grimm - The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems - Proceedings of the 2013 International Conference on Availability, Reliability and Security (ARES), Regensburg, Deutschland, 2013, pp. 208-217 |
2013 |
The Many Facets of IT Early Warning - Open Issues, Current Research M. Zeilinger, P. Schoo, E. Hermann - The Many Facets of IT Early Warning - Open Issues, Current Research in Advances in IT early warning (Editors: M. Zeilinger, P. Schoo, E. Hermann) - Fraunhofer Verlag, 2013, pp. 1-8 |
2012 |
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking E. Hermann, U. Litschauer, J. Fuß - A Formal Equivalence Classes Based Method for Security Policy Conformance Checking - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7465, No. 1234567890, 2012, pp. 146-160 |
2012 |
Das Principal-Agent-Problem im Kontext Unternehmensübergreifender Geschäftsprozesse E. Freihofner, C. Meinhart, M. Oggolder, J. Edler, E. Hermann - Das Principal-Agent-Problem im Kontext Unternehmensübergreifender Geschäftsprozesse - lex:itec, Vol. 50, No. 50, 2012 |
2012 |
Prototypische Implementierung des Limes-Sicherheitsmodells E. Hermann, C. Meinhart - Prototypische Implementierung des Limes-Sicherheitsmodells - Tagungsband des 6. Forschungsforums der österreichischen Fachhochschulen, Graz, Österreich, 2012 |
2011 |
A Security Policy Model for Agent Based Service-Oriented Architectures E. Hermann - A Security Policy Model for Agent Based Service-Oriented Architectures - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 6908, No. 6908, 2011, pp. 13-25 |
2011 |
An On-Line Learning Statistical Model to Detect Malicious Web Requests H. Lampesberger, P. Winter, M. Zeilinger, E. Hermann - An On-Line Learning Statistical Model to Detect Malicious Web Requests - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 96, No. 96, 2011, pp. 19-38 |
2011 |
Anomalieerkennung in Computernetzen P. Winter, H. Lampesberger, M. Zeilinger, E. Hermann - Anomalieerkennung in Computernetzen - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 235-239 |
2011 |
Blick in die Glaskugel E. Hermann, D. Fox - Blick in die Glaskugel - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 231 |
2011 |
Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines P. Winter, E. Hermann, M. Zeilinger - Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines - 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, Frankreich, 2011, pp. 1-5 |
2011 |
IT Frühwarnung E. Hermann, M. Zeilinger - IT Frühwarnung - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 285 |
2011 |
On Detecting Abrupt Changes in Network Entropy Time Series P. Winter, H. Lampesberger, M. Zeilinger, E. Hermann - On Detecting Abrupt Changes in Network Entropy Time Series - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7025, No. 7025, 2011, pp. 194-205 |
2011 |
Rihamark: Perceptual Image Hash Benchmarking M. Steinebach , C. Zauner, E. Hermann - Rihamark: Perceptual Image Hash Benchmarking - Proceeding of Electronic Imaging 2011 - Media Watermarking, Security and Forensics XIII, San Francisco, San Francisco, Österreich, 2011 |
2011 |
The Limes Security Model for Information Flow Control E. Hermann - The Limes Security Model for Information Flow Control - Proceedings of the 2011 Sixth IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Österreich, 2011, pp. 573-580 |
2010 |
Stealthware – Eine neue Bedrohung, Teil 1 E. Hermann - Stealthware – Eine neue Bedrohung, Teil 1 - lex:itec, Vol. 2010, No. 2, 2010 |
2010 |
Stealthware – Eine neue Bedrohung, Teil 3 E. Hermann - Stealthware – Eine neue Bedrohung, Teil 3 - lex:itec, Vol. 2010, No. 5, 2010 |
2009 |
Schutz kritischer Infrastrukturen mittels IT-Frühwarnung E. Hermann, M. Zeilinger - Schutz kritischer Infrastrukturen mittels IT-Frühwarnung - Datenschutz und Datensicherheit, Vol. 33, No. 1, 2009, pp. 42-46 |
2009 |
Virtual machine based rootkits E. Hermann, R. Kolmhofer, G. Kremsner, M. Laggner, M. Lehner, R. Riedmüller, D. Vymazal - Virtual machine based rootkits - Trauner Verlag Linz, 2009, pp. 263 |
2007 |
Trusted Infrastructures for Identities B. Fichtinger, E. Hermann, N. Kuntze, A. Schmidt - Trusted Infrastructures for Identities - 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 3rd International ODRL Workshop, Koblenz, Deutschland, 2007, pp. 169-181 |
2007 |
Virtualisierende Rootkits, die fast perfekte Tarnung E. Hermann, M. Laggner - Virtualisierende Rootkits, die fast perfekte Tarnung - Datenschutz und Datensicherheit, Vol. 31, No. 11, 2007, pp. 822-826 |
2006 |
Auffinden von verschleierter Malware E. Hermann, M. Lehner - Auffinden von verschleierter Malware - Datenschutz und Datensicherheit, Vol. 30, No. 12, 2006, pp. 768-772 |
2005 |
XML Signatures in an Enterprise Service Bus Environment E. Hermann, D. Kessler - XML Signatures in an Enterprise Service Bus Environment - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 3677, No. 2005, 2005, pp. 339-347 |