Peter Frühwirt
Univ.Lektor Dipl.-Ing. Dr.techn. / BSc BSc
Role
-
External Lecturer
Information Systems Engineering, E194
Courses
Publications
- A tamper-proof audit and control system for the doctor in the loop / Kieseberg, P., Malle, B., Frühwirt, P., Holzinger, A., & Weippl, E. (2016). A tamper-proof audit and control system for the doctor in the loop. Brain Informatics, 3(4), 269–279. http://hdl.handle.net/20.500.12708/150119
- The and security of firewalls in cyber-physical cloud computing / Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The and security of firewalls in cyber-physical cloud computing. EURASIP Journal on Information Security, 2016:18(18). http://hdl.handle.net/20.500.12708/150117
- QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201
- Database forensics : towards a forensic-aware database solution / Frühwirt, P. (2015). Database forensics : towards a forensic-aware database solution [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79876
- QR Code Security: A Survey of Attacks and Challenges for Usable Security / Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8
- Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations / Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885
- Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile / Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970
- InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles / Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951
- Genie in a Model? Why Model Driven Security will not secure your Web Application / Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875
- Defence side reconnaissance: preliminary surveying of an attacker's profile / Frühwirt, P. (2013). Defence side reconnaissance: preliminary surveying of an attacker’s profile [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159717
- Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications / Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519
- InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs / Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520
- InnoDB Database Forensics / Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981
Supervisions
-
Improving the awareness of technology updates by web mining of heterogeneous online sources
/
Schrack, M. (2018). Improving the awareness of technology updates by web mining of heterogeneous online sources [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.47709
Download: PDF (4.34 MB)