Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Automatic Deobfuscation of Virtualization-protected Applications., , , , and . ARES, page 6:1-6:15. ACM, (2021)Interactive Anonymization for Privacy aware Machine Learning., , and . IAL@PKDD/ECML, volume 1924 of CEUR Workshop Proceedings, page 15-26. CEUR-WS.org, (2017)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , and . NDSS, The Internet Society, (2012)Privacy by Design Data Exchange Between CSIRTs., , and . APF, volume 10518 of Lecture Notes in Computer Science, page 104-119. Springer, (2017)Assessing the sovereignty and security of the Austrian internet., , and . ICSSA, page 15-25. IEEE, (2020)A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations., , , , , , , , , and . CD-MAKE, volume 13480 of Lecture Notes in Computer Science, page 362-375. Springer, (2022)Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI., , , and . CD-MAKE, volume 12844 of Lecture Notes in Computer Science, page 1-20. Springer, (2021)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , and . CD-MAKE, volume 11015 of Lecture Notes in Computer Science, page 1-8. Springer, (2018)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 79-90. Springer, (2014)