Faculty

Research Group Secure Information Systems

In our interconnected and globalized society, the protection of know-how and resources plays an increasingly important role. Therefore, the University of Applied Sciences Upper Austria conducts research in the areas of critical infrastructure protection, computer forensics, the improvement of cryptographic processes, the early recognition of malware and threats on the Internet, as well as risk management and building a secure enterprise organization.
2019
P. Burgstaller, E. Hermann, H. Lampesberger - Künstliche Intelligenz -- Rechtliches und technisches Grundwissen - Manz Verlag, 2019, pp. 108 more
2019
P. Burgstaller, E. Hermann, H. Lampesberger - Beweiskraft von Bilddaten in Anbetracht der Manipulierbarkeit durch Verfahren der künstlichen Intelligenz - Coming Soon - Proceedings - 2019, Linz, Austria, 2019, pp. 221-225 more
2019
E. Hermann, H. Lampesberger, L. Heimberger, M. Altenhuber - Authenticity and integrity of the recording context of pictures - Datenschutz und Datensicherheit, Vol. 43, No. 5, 2019, pp. 281-286 more
2018
H. Lampesberger - The security vulnerabilities Spectre and Meltdown - Information Law Journal, Vol. 2018, No. 1, 2018, pp. 6-7 more
2017
H. Lampesberger, E. Hermann, R. Kolmhofer - Security in Industry 4.0 - Trauner Verlag Linz, 2017, pp. 164 more
2016
H. Lampesberger - Language-Based Anomaly Detection in Client-Cloud Interaction - Phd Thesis, Johannes Kepler Universität - Institut für Anwendungsorientierte Wissensverarbeitung, Austria, 2016, pp. 144 more
2016
H. Lampesberger - An incremental learner for language-based anomaly detection XML - 2016 IEEE Symposium on Security and Privacy Workshops, San Jose, United States of America, 2016 more
2016
H. Lampesberger - Technologies for Web and cloud service interaction: a survey - Service Oriented Computing and Applications, Vol. 10, No. 2, 2016, pp. 71-110 more
2015
H. Lampesberger, M. Rady - Monitoring of Client-Cloud Interaction in Correct Software in Web Applications and Web Services (Editors: Bernhard Thalheim, Klaus-Dieter Schewe, Andreas Prinz, Bruno Buchberger) - Springer Gabler, 2015, pp. 177-228 more
2014
J. Fuß, W. Kastl, B. Greslehner-Nimmervoll, R. Kolmhofer - More efficient brute forcing in a heterogenous cluster with GPUs and FPGAs - ???, Konstanz, Germany, 2014, pp. 127-136 more
2013
M. Zeilinger, P. Schoo, E. Hermann - The Many Facets of IT Early Warning - Open Issues, Current Research in Advances in IT early warning (Editors: M. Zeilinger, P. Schoo, E. Hermann) - Fraunhofer Verlag, 2013, pp. 1-8 more
2013
J. Fuß, P. Winter, T. Pulls - ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - Proceedings of the Workshop on Privacy in the Electronic Society, Berlin, Germany, 2013 more
2013
E. Hermann - Development of a formal security policy model for distributed web services applications - Trauner Verlag Linz, 2013, pp. 238 more
2013
E. Hermann, R. Grimm - The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems - Proceedings of the 2013 International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, 2013, pp. 208-217 more
2013
H. Lampesberger, M. Zeilinger, E. Hermann - Statistical Modeling of Web Requests for Anomaly Detection in Web Applications in Advances in IT early warning (Editors: M. Zeilinger, P. Schoo, E. Hermann) - Fraunhofer Verlag, 2013, pp. 91-101 more
2013
H. Lampesberger - A Grammatical Inference Approach to Language-Based Anomaly Detection in XML - Proceedings of the 2013 International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, 2013, pp. 685-693 more
2012
E. Freihofner, C. Meinhart, M. Oggolder, J. Edler, E. Hermann - The principal agent problem in the context of a organisation crossing business process - lex:itec, Vol. 50, No. 50, 2012 more
2012
E. Hermann, C. Meinhart - Prototyp Implementaion of the Limes Security Model - Proceedings of 6th FFH 2012, Graz, Austria, 2012 more
2012
I. Schaumüller-Bichl - Information technologiy as production factor: potentials and risks - Proceedings FFH 2012, Graz, Austria, 2012, pp. 7-10 more
2011
E. Hermann - The Limes Security Model for Information Flow Control - Proceedings of the 2011 Sixth IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 2011, pp. 573-580 more
2011
G. Schönberger, J. Fuß - GPU-assisted AES encryption using GCM - Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgium, 2011, pp. 178-185 more
2011
M. Steinebach , C. Zauner, E. Hermann - Rihamark: Perceptual Image Hash Benchmarking - Proceeding of Electronic Imaging 2011 - Media Watermarking, Security and Forensics XIII, San Francisco, San Francisco, Austria, 2011 more
2011
H. Lampesberger, P. Winter, M. Zeilinger, E. Hermann - An On-Line Learning Statistical Model to Detect Malicious Web Requests - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 96, No. 96, 2011, pp. 19-38 more
2011
P. Winter, E. Hermann, M. Zeilinger - Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines - 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 2011, pp. 1-5 more
2011
E. Hermann, M. Zeilinger - IT Early Warning - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 285 more
2011
P. Winter, H. Lampesberger, M. Zeilinger, E. Hermann - On Detecting Abrupt Changes in Network Entropy Time Series - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 7025, No. 7025, 2011, pp. 194-205 more
2011
E. Hermann - A Security Policy Model for Agent Based Service-Oriented Architectures - LECTURE NOTES IN COMPUTER SCIENCE, Vol. 6908, No. 6908, 2011, pp. 13-25 more
2011
P. Winter, H. Lampesberger, M. Zeilinger, E. Hermann - Anomaly Detection in Computer Networks - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 235-239 more
2011
K. Schewe, K. Bosa, H. Lampesberger, J. Ma, M. Rady, B. Vleju - Challenges in cloud computing - Scalable Computing: Practice and Experience, Vol. 12, No. 4, 2011 more
2011
E. Hermann, D. Fox - Blick in die Glaskugel - Datenschutz und Datensicherheit, Vol. 35, No. 4, 2011, pp. 231 more
2010
I. Schaumüller-Bichl - Information Security: basis for privacy - OCG Journal, 2010, pp. 6-7 more
2010
E. Hermann - Stealthware – A new Threat, Part 3 - lex:itec, Vol. 2010, No. 5, 2010 more
2010
H. Lampesberger - Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection - Computer Network Defense (EC2ND), 2010 European Conference on, Berlin, Germany, 2010, pp. 63-70 more
2010
E. Hermann - Stealthware – A new Threat, Part 1 - lex:itec, Vol. 2010, No. 2, 2010 more
2009
E. Hermann, M. Zeilinger - Protection of critical infrastructures using it early warning - Datenschutz und Datensicherheit, Vol. 33, No. 1, 2009, pp. 42-46 more
2009
E. Hermann, R. Kolmhofer, G. Kremsner, M. Laggner, M. Lehner, R. Riedmüller, D. Vymazal - Virtual machine based rootkits - Trauner Verlag Linz, 2009, pp. 263 more
2007
B. Fichtinger, E. Hermann, N. Kuntze, A. Schmidt - Trusted Infrastructures for Identities - 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 3rd International ODRL Workshop, Koblenz, Germany, 2007, pp. 169-181 more
2007
E. Hermann, M. Laggner - Virtual Machine based Rootkits, a nearly perfect camaflash - Datenschutz und Datensicherheit, Vol. 31, No. 11, 2007, pp. 822-826 more
2006
A. Gaupmann, C. Schausberger, U. Zehl, J. Ecker - Implementing Zero-Knowledge Authentication in OpenSSH - Sicherheit 2006, Magdeburg, Germany, 2006, pp. 302-305 more
2006
E. Hermann, M. Lehner - Covering Malware - Datenschutz und Datensicherheit, Vol. 30, No. 12, 2006, pp. 768-772 more