Daniel Haslinger

Daniel Haslinger
Fachhochschule Sankt Pölten | FH St. Pölten · Institute of IT Security Research

Engineer's degree / Dipl.-Ing.

About

7
Publications
2,334
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
15
Citations
Additional affiliations
March 2013 - present
Fachhochschule Sankt Pölten
Position
  • Lecturer
March 2012 - March 2013
Fachhochschule Sankt Pölten
Position
  • Research Assistant
April 2009 - February 2012
Fachhochschule Sankt Pölten
Position
  • Laboratory Assistant
Education
September 2011 - August 2013
Fachhochschule Sankt Pölten
Field of study
  • Information Security
September 2008 - August 2011
Fachhochschule Sankt Pölten
Field of study
  • IT Security

Publications

Publications (7)
Conference Paper
Computer science and cyber security curricula are divided in various domains (e.g. operating systems, networking, software engineering, …) to provide knowledge about the fundamentals. As the duration of the study progresses, knowledge is deepened in those domains and increasingly connections are formed between the individual topics. However, due t...
Presentation
Full-text available
Deception technologies are nothing new in the realm of computer security. In this talk we are going to give a deep insight into the current state.
Conference Paper
Full-text available
Der Studiengang IT-Security führt am Ende des Studiums im Rahmen einer abschließenden Lehrveranstaltung ein Planspiel durch, welches dazu konzipiert wurde, die Kernfertigkeiten eines Bachelor Absolventen zu wiederholen und zu festigen. Der Fokus liegt nicht auf der Vermittlung von Inhalten, sondern der Anwendung bereits erlernter Fähigkeiten. Aus d...
Conference Paper
Full-text available
The huge volume of data to be analyzed in the course of child pornography investigations puts special demands on tools and methods for automated classification, often used by law enforcement and prosecution. The need for a clear distinction between pornographic material and inoffensive pictures with a large amount of skin, like people wearing bikin...
Conference Paper
Full-text available
Mobile devices nowadays contain a variety of personal or even business-related information that is worth being protected from unauthorized access. Owners of such devices should use a passcode or unlock pattern to secure such important assets, but since these techniques are being perceived as annoying barriers, locked devices are not standard. But e...
Thesis
Full-text available
Industrial process automation (ICS / SCADA) systems are constant companions in modern networks that control complex automation processes in critical environments like nuclear- and hydro power plants, oil- and gas pipelines, water facilities or transport systems. Ubiquity and interconnectedness, often paired with insufficient security measures of in...
Thesis
Full-text available
The era of information, starting in the late 70ies, drives the world wide demand for fast and ubiquituous communication. Reams of networks got connected together and formed what we today call the Internet, providing a valuable foundation for business and information-related industries, as well as an integral part of most individuals daily life. In...

Network

Cited By

Projects

Project (1)