Folgen
Oliver Jung
Oliver Jung
Bestätigte E-Mail-Adresse bei ait.ac.at
Titel
Zitiert von
Zitiert von
Jahr
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP.
M Petraschek, T Hoeher, O Jung, H Hlavacs, WN Gansterer
J. Univers. Comput. Sci. 14 (5), 673-692, 2008
462008
Encryption with statistical self-synchronization in synchronous broadband networks
O Jung, C Ruland
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
361999
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
O Jorns, G Quirchmayr, O Jung
Proceedings of the fifth Australasian symposium on ACSW frontiers-Volume 68 …, 2007
352007
Towards a collaborative framework to improve urban grid resilience
O Jung, S Bessler, A Ceccarelli, T Zoppi, A Vasenev, L Montoya, T Clarke, ...
2016 IEEE International Energy Conference (ENERGYCON), 1-6, 2016
232016
A privacy enhancing service architecture for ticket-based mobile applications
O Jorns, O Jung, G Quirchmayr
The Second International Conference on Availability, Reliability and …, 2007
222007
Anomaly Detection in Smart Grids based on Software Defined Networks.
O Jung, P Smith, J Magin, L Reuter
SMARTGREENS, 157-164, 2019
182019
Transaction pseudonyms in mobile environments
O Jorns, O Jung, G Quirchmayr
Journal in Computer Virology 3, 185-194, 2007
182007
Neural network based anomaly detection for SCADA systems
L Reuter, O Jung, J Magin
2020 23rd Conference on Innovation in Clouds, Internet and Networks and …, 2020
132020
Energy management in microgrids with flexible and interruptible loads
S Bessler, O Jung
2016 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2016
112016
Using SIP identity to prevent man-in-the-middle attacks on ZRTP
O Jung, M Petraschek, T Hoeher, I Gojmerac
2008 1st IFIP Wireless Days, 1-5, 2008
112008
Internet security meets the IP multimedia subsystem: an overview
A Berger, I Gojmerac, O Jung
Security and communication networks 3 (2‐3), 185-206, 2010
102010
A privacy enhancement mechanism for location based service architectures using transaction pseudonyms
O Jorns, O Jung, J Gross, S Bessler
International Conference on Trust, Privacy and Security in Digital Business …, 2005
102005
Smart grid reference architecture, an approach on a secure and model-driven implementation
S Wilker, M Meisel, E Piatkowska, T Sauter, O Jung
2018 IEEE 27th international symposium on industrial electronics (ISIE), 74-79, 2018
92018
Intrusion detection in IMS: Experiences with a Hellinger distance-based flooding detector
C Hecht, P Reichl, A Berger, O Jung, I Gojmerac
2009 First International Conference on Evolving Internet, 65-70, 2009
92009
Enhanced modes of operation for the encryption in high-speed networks and their impact on QoS
O Jung, S Kuhn, C Ruland, K Wollenweber
Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001
72001
Toward applying the iec 62443 in the uas for secure civil applications
AM Shaaban, O Jung, MA Fas Millan
Data Science–Analytics and Applications: Proceedings of the 4th …, 2022
62022
The impact of virtualisation techniques on power system control networks
F Kupzog, A Veichtlbauer, A Heinisch, F von Tüllenburg, O Langthaler, ...
Electronics 9 (9), 1433, 2020
52020
A platform for the development of location-based mobile applications with privacy protection
O Jorns, O Jung, G Quirchmayr
2008 3rd International Conference on Communication Systems Software and …, 2008
52008
Outage response in microgrids using demand side management
S Bessler, D Hovie, O Jung
2016 IEEE international smart cities conference (ISC2), 1-6, 2016
42016
Quantitative safety and security analysis from a communication perspective
B Malinowsky, HP Schwefel, O Jung
8th International Conference on Performance Evaluation Methodologies and …, 2014
42014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20