Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP. M Petraschek, T Hoeher, O Jung, H Hlavacs, WN Gansterer J. Univers. Comput. Sci. 14 (5), 673-692, 2008 | 47 | 2008 |
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services O Jorns, G Quirchmayr, O Jung Proceedings of the fifth Australasian symposium on ACSW frontiers-Volume 68 …, 2007 | 37 | 2007 |
Encryption with statistical self-synchronization in synchronous broadband networks O Jung, C Ruland Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999 | 37 | 1999 |
Towards a collaborative framework to improve urban grid resilience O Jung, S Bessler, A Ceccarelli, T Zoppi, A Vasenev, L Montoya, T Clarke, ... 2016 IEEE International Energy Conference (ENERGYCON), 1-6, 2016 | 23 | 2016 |
A privacy enhancing service architecture for ticket-based mobile applications O Jorns, O Jung, G Quirchmayr The Second International Conference on Availability, Reliability and …, 2007 | 22 | 2007 |
Anomaly Detection in Smart Grids based on Software Defined Networks. O Jung, P Smith, J Magin, L Reuter SMARTGREENS, 157-164, 2019 | 18 | 2019 |
Transaction pseudonyms in mobile environments O Jorns, O Jung, G Quirchmayr Journal in Computer Virology 3, 185-194, 2007 | 18 | 2007 |
Neural network based anomaly detection for SCADA systems L Reuter, O Jung, J Magin 2020 23rd Conference on Innovation in Clouds, Internet and Networks and …, 2020 | 13 | 2020 |
Energy management in microgrids with flexible and interruptible loads S Bessler, O Jung 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2016 | 11 | 2016 |
Using SIP identity to prevent man-in-the-middle attacks on ZRTP O Jung, M Petraschek, T Hoeher, I Gojmerac 2008 1st IFIP Wireless Days, 1-5, 2008 | 11 | 2008 |
Internet security meets the IP multimedia subsystem: an overview A Berger, I Gojmerac, O Jung Security and communication networks 3 (2‐3), 185-206, 2010 | 10 | 2010 |
A privacy enhancement mechanism for location based service architectures using transaction pseudonyms O Jorns, O Jung, J Gross, S Bessler International Conference on Trust, Privacy and Security in Digital Business …, 2005 | 10 | 2005 |
Smart grid reference architecture, an approach on a secure and model-driven implementation S Wilker, M Meisel, E Piatkowska, T Sauter, O Jung 2018 IEEE 27th international symposium on industrial electronics (ISIE), 74-79, 2018 | 9 | 2018 |
Intrusion detection in IMS: Experiences with a Hellinger distance-based flooding detector C Hecht, P Reichl, A Berger, O Jung, I Gojmerac 2009 First International Conference on Evolving Internet, 65-70, 2009 | 9 | 2009 |
Toward applying the iec 62443 in the uas for secure civil applications AM Shaaban, O Jung, MA Fas Millan International Data Science Conference, 45-52, 2021 | 7 | 2021 |
The impact of virtualisation techniques on power system control networks F Kupzog, A Veichtlbauer, A Heinisch, F von Tüllenburg, O Langthaler, ... Electronics 9 (9), 1433, 2020 | 7 | 2020 |
Enhanced modes of operation for the encryption in high-speed networks and their impact on QoS O Jung, S Kuhn, C Ruland, K Wollenweber Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001 | 7 | 2001 |
A platform for the development of location-based mobile applications with privacy protection O Jorns, O Jung, G Quirchmayr 2008 3rd International Conference on Communication Systems Software and …, 2008 | 5 | 2008 |
Outage response in microgrids using demand side management S Bessler, D Hovie, O Jung 2016 IEEE international smart cities conference (ISC2), 1-6, 2016 | 4 | 2016 |
Quantitative safety and security analysis from a communication perspective B Malinowsky, HP Schwefel, O Jung 8th International Conference on Performance Evaluation Methodologies and …, 2014 | 4 | 2014 |