| | Preview | Author(s) | Title | Type | Issue Date |
| 1 | | Holzbauer, Florian ; Ullrich, Johanna ; Lindorfer, Martina ; Fiebig, Tobias | Not that Simple: Email Delivery in the 21st Century | Inproceedings Konferenzbeitrag | Jul-2022 |
| 2 | | Mallinger, Kevin ; Ullrich, Johanna ; Schatten, Alexander | Anforderungen und Potentiale resilienter IoT-Systeme | Article Artikel | 2021 |
| 3 | | Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna Maria Magdalena ; Weippl, Edgar | From Hack to Elaborate Technique—A Survey on Binary Rewriting | Artikel Article | Jun-2019 |
| 4 | | Dabrowski, Adrian ; Merzdovnik, Georg ; Ullrich, Johanna ; Sendera, Gerald ; Weippl, Edgar | Measuring Cookies and Web Privacy in a Post-GDPR World | Konferenzbeitrag Inproceedings | 2019 |
| 5 | | Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar R. | Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid | Artikel Article | 4-Jun-2018 |
| 6 | | Ullrich, Johanna ; Stifter, Nicholas ; Judmayer, Aljosha ; Dabrowski, Adrian ; Weippl, Edgar | Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids | Konferenzbeitrag Inproceedings | 2018 |
| 7 | | Ullrich, Johanna ; Zseby, Tanja ; Fabini, Joachim ; Weippl, Edgar | Network-Based Secret Communication in Clouds: A Survey | Artikel Article | 2017 |
| 8 | | Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar | Grid Shock: Coordinated Load-Changing Attacks on Power Grids | Konferenzbeitrag Inproceedings | 2017 |
| 9 | | Judmayer, Aljosha ; Ullrich, Johanna ; Merzdovnik, Georg ; Voyiatzis, Artemios G. ; Weippl, Edgar | Lightweight Address Hopping for Defending the IPv6 IoT | Konferenzbeitrag Inproceedings | 2017 |
| 10 | | Ullrich, Johanna ; Weippl, Edgar | The beauty or the beast? Attacking rate limits of the xen hypervisor | Konferenzbeitrag Inproceedings | 2016 |
| 11 | | Ullrich, Johanna Maria Magdalena | Geheime Kommunikation im Internet | Thesis Hochschulschrift | 2016 |
| 12 | | Ullrich, Johanna ; Cropper, Jordan ; Frühwirt, Peter ; Weippl, Edgar | The and security of firewalls in cyber-physical cloud computing | Artikel Article | 2016 |
| 13 | | Ullrich, Johanna ; Weippl, Edgar | Privacy is Not an Option: Attacking the IPv6 Privacy Extension | Konferenzbeitrag Inproceedings | 2015 |
| 14 | | Ullrich, Johanna ; Kieseberg, Peter ; Krombholz, Katharina ; Weippl, Edgar | On Reconnaissance with IPv6: A Pattern-Based Scanning Approach | Konferenzbeitrag Inproceedings | 2015 |
| 15 | | Krombholz, Katharina ; Frühwirt, Peter ; Rieder, Thomas ; Kapsalis, Ioannis ; Ullrich, Johanna ; Weippl, Edgar | QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes | Konferenzbeitrag Inproceedings | 2015 |
| 16 | | Ullrich, Johanna ; Krombholz, Katharina ; Hobel, Heidelinde ; Dabrowski, Adrian ; Weippl, Edgar | IPv6 Security: Attacks and Countermeasures in a Nutshell | Konferenzbeitrag Inproceedings | 2014 |
| 17 | | Dabrowski, Adrian ; Krombholz, Katharina ; Ullrich, Johanna ; Weippl, Edgar | QR - Inception: Barcode in Barcode Attacks | Konferenzbeitrag Inproceedings | 2014 |
| 18 | | Dabrowski, Adrian ; Hobel, Heidelinde ; Ullrich, Johanna ; Krombholz, Katharina ; Weippl, Edgar | Towards a Hardware Trojan Detection Cycle | Konferenzbeitrag Inproceedings | 2014 |
| 19 | | Dabrowski, Adrian ; Fejes, Peter ; Ullrich, Johanna ; Krombholz, Katharina ; Hobel, Heidelinde ; Weippl, Edgar | Hardware Trojans - Detect and React? | Präsentation Presentation | 2014 |
| 20 | | Herzberg, Amir ; Shulman, Haya ; Ullrich, Johanna ; Weippl, Edgar | Cloudoscopy: Services Discovery and Topology Mapping | Konferenzbeitrag Inproceedings | 2013 |