Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ... IEEE European Symposium on Security and Privacy (EuroS&P), 2017 | 196 | 2017 |
On the State of ECN and TCP Options on the Internet M Kühlewind, S Neuner, B Trammell International conference on passive and active network measurement, 135-144, 2013 | 76 | 2013 |
Enter Sandbox: Android Sandbox Comparison S Neuner, V Van der Veen, M Lindorfer, M Huber, G Merzdovnik, ... Mobile Security Technologies (MoST) 2014, 2014 | 75 | 2014 |
Time is on my side: Steganography in filesystem metadata S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ... Digital Investigation 18 (7), 76-86, 2016 | 56 | 2016 |
USBlock: Blocking USB-Based Keypress Injection Attacks S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl IFIP Annual Conference on Data and Applications Security and Privacy, 278-295, 2018 | 26 | 2018 |
Effectiveness of file‐based deduplication in digital forensics S Neuner, M Schmiedecker, E Weippl Security and Communication Networks 9 (15), 2876-2885, 2016 | 19 | 2016 |
Gradually Improving the Forensic Process S Neuner, M Mulazzani, S Schrittwieser, E Weippl 10th International Conference on Availability, Reliability and Security (ARES), 2015 | 17 | 2015 |
Quantifying windows file slack size and stability M Mulazzani, S Neuner, P Kieseberg, M Huber, S Schrittwieser, E Weippl Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013 | 12 | 2013 |
Real-time Forensics through Endpoint Visibility P Kieseberg, S Neuner, S Schrittwieser, M Schmiedecker, E Weippl International Conference on Digital Forensics & Cyber Crime, 2017 | 8 | 2017 |
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS S Neuner, AG Voyiatzis, M Schmiedecker, ER Weippl 12th International Conference on Availability, Reliability and Security, 2017 | 7 | 2017 |
PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics S Neuner, M Schmiedecker, E Weippl Digital Investigation 18 (7), 149-156, 2016 | 7 | 2016 |
Windows installer security C Kadluba, M Mulazzani, L Zechner, S Neuner, E Weippl Sixth ASE International Conference on Privacy, Security, Risk and Trust …, 2014 | 1 | 2014 |
Efficient and effective response to computer security incidents and cybercrime - system-level defenses against USB-based attacks S Neuner TU Wien, 2019 | | 2019 |
On Reducing Bottlenecks in Digital forensics M Schmiedecker, S Neuner ERCIM NEWS, 2016 | | 2016 |
Ethics in IT Security Research S Neuner, M Mulazzani, S Schrittwieser MDPI AG, 2015 | | 2015 |