
Daniel HaslingerFachhochschule Sankt Pölten | FH St. Pölten · Institute of IT Security Research
Daniel Haslinger
Engineer's degree / Dipl.-Ing.
About
7
Publications
2,334
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
15
Citations
Introduction
Additional affiliations
March 2013 - present
March 2012 - March 2013
April 2009 - February 2012
Education
September 2011 - August 2013
September 2008 - August 2011
Publications
Publications (7)
Computer science and cyber security curricula are divided in various domains (e.g. operating systems, networking, software engineering, …) to provide knowledge about the fundamentals. As the duration of the study progresses, knowledge is deepened in those domains and increasingly connections are formed between the individual topics.
However, due t...
Deception technologies are nothing new in the realm of computer security. In this talk we are going to give a deep insight into the current state.
Der Studiengang IT-Security führt am Ende des Studiums im Rahmen einer abschließenden Lehrveranstaltung ein Planspiel durch, welches dazu konzipiert wurde, die Kernfertigkeiten eines Bachelor Absolventen zu wiederholen und zu festigen. Der Fokus liegt nicht auf der Vermittlung von Inhalten, sondern der Anwendung bereits erlernter Fähigkeiten. Aus d...
The huge volume of data to be analyzed in the course of child pornography investigations puts special demands on tools and methods for automated classification, often used by law enforcement and prosecution. The need for a clear distinction between pornographic material and inoffensive pictures with a large amount of skin, like people wearing bikin...
Mobile devices nowadays contain a variety of personal or even business-related information that is worth being protected from unauthorized access. Owners of such devices should use a passcode or unlock pattern to secure such important assets, but since these techniques are being perceived as annoying barriers, locked devices are not standard. But e...
Industrial process automation (ICS / SCADA) systems are constant companions in modern networks that control complex automation processes in critical environments like nuclear- and hydro power plants, oil- and gas pipelines, water facilities or transport systems. Ubiquity and interconnectedness, often paired with insufficient security measures of in...
The era of information, starting in the late 70ies, drives the world wide demand for fast and ubiquituous communication. Reams of networks got connected together and formed what we today call the Internet, providing a valuable foundation for business and information-related industries, as well as an integral part of most individuals daily life. In...
Projects
Project (1)