default search action
Andreas Berger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Marc Kanzian, Giovanni Dalla Colletta, Nicolò Zilio, Andreas Berger, Matteo Agostinelli:
Online Feedback Region Detection and Flying Capacitor Balancing Technique for Multi-Level Converters. ISCAS 2023: 1-5 - [c15]Nicolò Zilio, Andreas Berger, Sofia Luddi, Giovanni Dalla Colletta, Matteo Agostinelli:
A 28V-to-3.3V, 2 A, Fully Monolithic 3-Level Hybrid Converter in 130 nm HV-CMOS. ISCAS 2023: 1-5 - 2020
- [j7]Harald Gietler, Marc Kanzian, Christoph Unterrieder, Andreas Berger, Robert Priewasser, Mario Huemer, Hubert Zangl:
on-Time Mismatch Based System Identification Technique for Buck Converters. IEEE Trans. Ind. Electron. 67(9): 7898-7908 (2020) - [c14]Mario Kahlhofer, Michael Hölzl, Andreas Berger:
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires. EICC 2020: 11:1-11:2 - [i1]Mario Kahlhofer, Michael Hölzl, Andreas Berger:
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires. CoRR abs/2009.12115 (2020)
2010 – 2019
- 2016
- [j6]Andreas Berger, Alessandro D'Alconzo, Wilfried N. Gansterer, Antonio Pescapè:
Mining agile DNS traffic using graph analysis for cybercrime detection. Comput. Networks 100: 28-44 (2016) - 2015
- [j5]Matija Stevanovic, Jens Myrup Pedersen, Alessandro D'Alconzo, Stefan Ruehrup, Andreas Berger:
On the ground truth problem of malicious DNS traffic analysis. Comput. Secur. 55: 142-158 (2015) - [c13]Andreas Berger, Matteo Agostinelli, Robert Priewasser, Stefano Marsili, Mario Huemer:
Unified digital sliding mode control with inductor current ripple reconstruction for DC-DC converters. ISCAS 2015: 213-216 - 2013
- [c12]Andreas Berger, Stefan Ruehrup, Wilfried N. Gansterer, Oliver Jung:
Locality matters: Reducing Internet traffic graphs using location analysis. DSN 2013: 1-12 - [c11]Andreas Berger, Wilfried N. Gansterer:
Modeling DNS agility with DNSMap. INFOCOM Workshops 2013: 387-392 - [c10]Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo:
Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs. INFOCOM Workshops 2013: 435-440 - [c9]Andreas Berger, Wilfried N. Gansterer:
Modeling DNS agility with DNSMap. INFOCOM 2013: 3153-3158 - [c8]Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo:
Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs. INFOCOM 2013: 3393-3398 - 2012
- [c7]Andreas Berger, Eduard Natale:
Assessing the Real-World Dynamics of DNS. TMA 2012: 1-14 - 2011
- [c6]Andreas Berger, Jacopo Cesareo, Alessandro D'Alconzo:
Collaborative Network Defense with Minimum Disclosure. GLOBECOM 2011: 1-6 - [c5]Jacopo Cesareo, Andreas Berger, Alessandro D'Alconzo:
COMINDIS - COllaborative Monitoring with MINimum DISclosure (Poster). TMA 2011: 189-192 - 2010
- [j4]Oliver Jung, Andreas Berger, Michael Hirschbichler, Ivan Gojmerac, Hans Lippitsch, Mario Tscherwenka, Klaus Umschaden:
IMS security and what we should learn from the Internet. Elektrotech. Informationstechnik 127(5): 116-120 (2010) - [j3]Andreas Berger, Ivan Gojmerac, Oliver Jung:
Internet security meets the IP multimedia subsystem: an overview. Secur. Commun. Networks 3(2-3): 185-206 (2010)
2000 – 2009
- 2009
- [c4]Michael Hirschbichler, Christoph Egger, Othmar Pasteka, Andreas Berger:
Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call. ICDS 2009: 254-259 - 2008
- [c3]Arian Bär, Andreas Berger, Sebastian Egger, Raimund Schatz:
A Lightweight Mobile TV Recommender. EuroITV 2008: 143-147 - [c2]Raimund Schatz, Arian Bär, Andreas Berger:
Matching Content to the Mobile User - Smart Recommendations for Pervasive TV and Video. FIS (Posters & Demos) 2008 - [c1]Andreas Berger, Lorenzo Pallara, Raimund Schatz:
An open source software framework for DVB-* transmission. ACM Multimedia 2008: 1093-1096 - 2001
- [p2]Andreas Berger:
Sicherheit von Daten und Kommunikation. CSCW-Kompendium 2001: 108-116
1990 – 1999
- 1999
- [j2]Andreas Berger:
Signatur-Interoperabilitätsspezifikation: Zertifikate und Dokumentenformate. Datenschutz und Datensicherheit 23(4) (1999) - 1998
- [j1]Andreas Berger:
Privacy Protection for Public Directory Services. Comput. Networks 30(16-18): 1521-1529 (1998) - 1997
- [p1]Ute Faltin, Petra Glöckner, Ursula Viebeg, Andreas Berger, Harald Giehl, Detlef Hühnlein, Stephan Kolletzki, Thomas Surkau:
On the development of a security toolkit for open networks - New security features in SECUDE. Verläßliche IT-Systeme 1997: 113-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint