default search action
Peter Kieseberg
Person information
- affiliation: SBA Research, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Simon Tjoa, Melisa Gafic, Peter Kieseberg:
Cyber Resilience Fundamentals. Springer 2024, ISBN 978-3-031-52063-1, pp. 1-124 - [i25]Peter Kieseberg, Simon Tjoa, Andreas Holzinger:
Controllable Artificial Intelligence. ERCIM News 2024(136) (2024) - [i24]Lukas König, Martin Pirker, Simon Tjoa, Peter Kieseberg:
Distributed Information Security Auditing Using Blockchains . ERCIM News 2024(137) (2024) - 2023
- [j19]Edgar R. Weippl, Andreas Holzinger, Peter Kieseberg:
Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2020". Mach. Learn. Knowl. Extr. 5(1): 173-174 (2023) - [c52]Peter Kieseberg, Edgar R. Weippl, A Min Tjoa, Federico Cabitza, Andrea Campagner, Andreas Holzinger:
Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? CD-MAKE 2023: 1-12 - [c51]Torsten Priebe, Peter Kieseberg, Alexander C. Adrowitzer, Oliver Eigner, Fabian Kovac:
Sustainability Effects of Robust and Resilient Artificial Intelligence. CD-MAKE 2023: 188-199 - [c50]Lukas König, Martin Pirker, Herfried Geyer, Michael Feldmann, Simon Tjoa, Peter Kieseberg:
DISA - A Blockchain-Based Distributed Information Security Audit. iiWAS 2023: 27-34 - [e9]Andreas Holzinger, Peter Kieseberg, Federico Cabitza, Andrea Campagner, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 - September 1, 2023, Proceedings. Lecture Notes in Computer Science 14065, Springer 2023, ISBN 978-3-031-40836-6 [contents] - [i23]Johann Steszgal, Peter Kieseberg, Andreas Holzinger:
Food Waste Reduction in Healthcare - Challenges in Integrating Usage Data with Scorings. ERCIM News 2023(132) (2023) - [i22]Peter Kieseberg, Simon Tjoa, Andreas Holzinger:
Procurement of Secure AI - A Practical Guide. ERCIM News 2023(135) (2023) - 2022
- [j18]Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2021. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 1-3 (2022) - [c49]Ferdinand Hönigsberger, Anna Saranti, Alessa Angerschmid, Carl Orge Retzlaff, Christoph Gollob, Sarah Witzmann, Arne Nothdurft, Peter Kieseberg, Andreas Holzinger, Karl Stampfer:
Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations. CD-MAKE 2022: 362-375 - [c48]Peter Kieseberg, Christina Buttinger, Laura Kaltenbrunner, Marlies Temper, Simon Tjoa:
Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems. FUZZ-IEEE 2022: 1-7 - [c47]Melisa Gafic, Simon Tjoa, Peter Kieseberg, Otto Hellwig, Gerald Quirchmayr:
Cyber Exercises in Computer Science Education. ICISSP 2022: 404-411 - [e8]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23-26, 2022, Proceedings. Lecture Notes in Computer Science 13480, Springer 2022, ISBN 978-3-031-14462-2 [contents] - [i21]Jochen Hense, Simon Tjoa, Peter Kieseberg:
Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula. ERCIM News 2022(129): 0 (2022) - [i20]Andreas Holzinger, Karl Stampfer, Arne Nothdurft, Christoph Gollob, Peter Kieseberg:
Challenges in Artificial Intelligence for Smart Forestry. ERCIM News 2022(130) (2022) - 2021
- [j17]Karl Stöger, David Schneeberger, Peter Kieseberg, Andreas Holzinger:
Legal aspects of data cleansing in medical AI. Comput. Law Secur. Rev. 42: 105587 (2021) - [j16]Djordje Slijepcevic, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer:
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers. Comput. Secur. 111: 102488 (2021) - [j15]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [j14]Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2020. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 1-2 (2021) - [c46]Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - [c45]Andreas Holzinger, Edgar R. Weippl, A Min Tjoa, Peter Kieseberg:
Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. CD-MAKE 2021: 1-20 - [c44]Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. CSR 2021: 536-542 - [e7]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12844, Springer 2021, ISBN 978-3-030-84059-4 [contents] - [i19]Djordje Slijepcevic, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer:
k-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers. CoRR abs/2102.04763 (2021) - [i18]Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. CoRR abs/2109.08904 (2021) - [i17]Peter Kieseberg, Simon Tjoa, Herfried Geyer:
Security Management and the Slow Adoption of Blockchains. ERCIM News 2021(125) (2021) - [i16]Peter Kieseberg, Michael Herburger, Alexandra Anderluh:
Security and Resilience Issues in Supply Chains - A Research Perspective. ERCIM News 2021(126) (2021) - 2020
- [j13]Lukas König, Yuliia Korobeinikova, Simon Tjoa, Peter Kieseberg:
Comparing Blockchain Standards and Recommendations. Future Internet 12(12): 222 (2020) - [j12]Lukas König, Stefan Unger, Peter Kieseberg, Simon Tjoa:
The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks. J. Internet Serv. Inf. Secur. 10(3): 110-127 (2020) - [j11]Birger Schacht, Peter Kieseberg:
An Analysis of 5 Million OpenPGP Keys. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(3): 107-140 (2020) - [c43]Luca Longo, Randy Goebel, Freddy Lécué, Peter Kieseberg, Andreas Holzinger:
Explainable Artificial Intelligence: Concepts, Applications, Research Challenges and Visions. CD-MAKE 2020: 1-16 - [c42]Andreas Kolan, Simon Tjoa, Peter Kieseberg:
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects. ICSSA 2020: 1-9 - [c41]Florian Plainer, Klaus Kieseberg, Peter Kieseberg:
Assessing the sovereignty and security of the Austrian internet. ICSSA 2020: 15-25 - [c40]Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser:
Compiling and Analyzing Open Source Malware for Research Purposes. ICSSA 2020: 32-37 - [e6]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings. Lecture Notes in Computer Science 12279, Springer 2020, ISBN 978-3-030-57320-1 [contents] - [e5]Eva Blomqvist, Paul Groth, Victor de Boer, Tassilo Pellegrini, Mehwish Alam, Tobias Käfer, Peter Kieseberg, Sabrina Kirrane, Albert Meroño-Peñuela, Harshvardhan J. Pandit:
Semantic Systems. In the Era of Knowledge Graphs - 16th International Conference on Semantic Systems, SEMANTiCS 2020, Amsterdam, The Netherlands, September 7-10, 2020, Proceedings. Lecture Notes in Computer Science 12378, Springer 2020, ISBN 978-3-030-59832-7 [contents] - [i15]Andreas Holzinger, Peter Kieseberg, Heimo Müller:
KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI. ERCIM News 2020(120) (2020) - [i14]Albert Treytl, Edith Huber, Thilo Sauter, Peter Kieseberg:
Securing Home Automation Systems against Sensor Manipulation. ERCIM News 2020(122) (2020) - [i13]Simon Tjoa, Christina Buttinger, Katharina Holzinger, Peter Kieseberg:
Penetration Testing Artificial Intelligence. ERCIM News 2020(123) (2020)
2010 – 2019
- 2019
- [c39]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg, Edgar R. Weippl, Alessio Bertone:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. DPM/CBT@ESORICS 2019: 39-48 - [c38]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c37]Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [c36]Dietmar Winkler, Felix Rinker, Peter Kieseberg:
Towards a Flexible and Secure Round-Trip-Engineering Process for Production Systems Engineering with Agile Practices. SWQD 2019: 14-30 - [p2]Peter Kieseberg, Edgar R. Weippl:
Securing Information Against Manipulation in the Production Systems Engineering Process. Security and Quality in Cyber-Physical Systems Engineering 2019: 335-356 - [e4]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11713, Springer 2019, ISBN 978-3-030-29725-1 [contents] - [i12]Peter Kieseberg, Lukas Daniel Klausner, Andreas Holzinger:
Distortion in Real-World Analytic Processes. ERCIM News 2019(118) (2019) - 2018
- [j10]Eduard Fosch-Villaronga, Peter Kieseberg, Tiffany Li:
Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten. Comput. Law Secur. Rev. 34(2): 304-313 (2018) - [c35]Andreas Holzinger, Peter Kieseberg, Edgar R. Weippl, A Min Tjoa:
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. CD-MAKE 2018: 1-8 - [c34]Randy Goebel, Ajay Chander, Katharina Holzinger, Freddy Lécué, Zeynep Akata, Simone Stumpf, Peter Kieseberg, Andreas Holzinger:
Explainable AI: The New 42? CD-MAKE 2018: 295-303 - [c33]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c32]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg:
A Machine Learning Approach for Privacy-preservation in E-business Applications. ICETE (2) 2018: 609-618 - [c31]Peter Kieseberg, Edgar R. Weippl:
Security Challenges in Cyber-Physical Production Systems. SWQD 2018: 3-16 - [e3]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27-30, 2018, Proceedings. Lecture Notes in Computer Science 11015, Springer 2018, ISBN 978-3-319-99739-1 [contents] - [i11]Bernd Malle, Nicola Giuliani, Peter Kieseberg, Andreas Holzinger:
The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations. CoRR abs/1802.03707 (2018) - [i10]Katharina Holzinger, Klaus Mak, Peter Kieseberg, Andreas Holzinger:
Can we Trust Machine Learning Results? Artificial Intelligence in Safety-Critical Decision Support. ERCIM News 2018(112) (2018) - 2017
- [c30]Erich Schweighofer, Vinzenz Heussler, Peter Kieseberg:
Privacy by Design Data Exchange Between CSIRTs. APF 2017: 104-119 - [c29]Bernd Malle, Peter Kieseberg, Andreas Holzinger:
DO NOT DISTURB? Classifier Behavior on Perturbed Datasets. CD-MAKE 2017: 155-173 - [c28]Bernd Malle, Nicola Giuliani, Peter Kieseberg, Andreas Holzinger:
The More the Merrier - Federated Learning from Local Sphere Recommendations. CD-MAKE 2017: 367-373 - [c27]Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [c26]Bernd Malle, Peter Kieseberg, Andreas Holzinger:
Interactive Anonymization for Privacy aware Machine Learning. IAL@PKDD/ECML 2017: 15-26 - [e2]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio di Calabria, Italy, August 29 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10410, Springer 2017, ISBN 978-3-319-66807-9 [contents] - [i9]Andreas Holzinger, Bernd Malle, Peter Kieseberg, Peter M. Roth, Heimo Müller, Robert Reihs, Kurt Zatloukal:
Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology. CoRR abs/1712.06657 (2017) - [i8]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i7]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser:
Security Testing for Mobile Applications. ERCIM News 2017(109) (2017) - [i6]Klaus Kieseberg, Peter Kieseberg, Edgar R. Weippl:
Trend Analysis of Underground Marketplaces. ERCIM News 2017(111) (2017) - 2016
- [j9]Peter Kieseberg, Bernd Malle, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
A tamper-proof audit and control system for the doctor in the loop. Brain Informatics 3(4): 269-279 (2016) - [c25]Bernd Malle, Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. CD-ARES 2016: 251-266 - [e1]Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9817, Springer 2016, ISBN 978-3-319-45506-8 [contents] - [i5]Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
Trust for the "Doctor in the Loop". ERCIM News 2016(104) (2016) - [i4]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - [i3]Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger:
Privacy Aware Machine Learning and the "Right to be Forgotten". ERCIM News 2016(107) (2016) - 2015
- [j8]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [c24]Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani:
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems. ARES 2015: 174-179 - [c23]Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. ARES 2015: 186-192 - [c22]Andreas Holzinger, Bernd Malle, Peter Kieseberg, Peter M. Roth, Heimo Müller, Robert Reihs, Kurt Zatloukal:
Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach. BIRS-IMLKE 2015: 13-50 - [c21]Peter Kieseberg, Johannes Schantl, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
Witnesses for the Doctor in the Loop. BIH 2015: 369-378 - [c20]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c19]Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding. IFIP Int. Conf. Digital Forensics 2015: 179-194 - [c18]Christoph Rottermanner, Peter Kieseberg, Markus Huber, Martin Schmiedecker, Sebastian Schrittwieser:
Privacy and data protection in smartphone messengers. iiWAS 2015: 83:1-83:10 - [i2]Peter Kieseberg, Olga E. Segou, Fabio Roli:
CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism. ERCIM News 2015(102) (2015) - [i1]Peter Kieseberg:
A Structured Approach to Defence Simulation Training. ERCIM News 2015(103) (2015) - 2014
- [j7]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [j6]Peter Frühwirt, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4): 336-348 (2014) - [j5]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [j4]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c17]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c16]Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. HCI (24) 2014: 79-90 - [c15]Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar R. Weippl:
E-voting Authentication with QR-codes. HCI (24) 2014: 149-159 - [c14]Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c13]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications. iiWAS 2014: 142-151 - [c12]Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl:
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Sicherheit 2014: 363-374 - [p1]Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar R. Weippl, Andreas Holzinger:
Protecting Anonymity in Data-Driven Biomedical Science. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 301-316 - 2013
- [j3]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar R. Weippl:
Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Comput. Commun. 9(1) (2013) - [j2]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. Int. J. Web Inf. Syst. 9(1): 53-68 (2013) - [j1]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Secur. Tech. Rep. 17(4): 227-238 (2013) - [c11]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c10]Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. IFIP Int. Conf. Digital Forensics 2013: 183-193 - 2012
- [c9]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - [c8]Sebastian Schrittwieser, Peter Kieseberg, Edgar R. Weippl:
Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120 - [c7]Lorenz Zechner, Peter Kieseberg, Edgar R. Weippl:
INMOTOS: extending the ROPE-methodology. iiWAS 2012: 272-277 - [c6]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - 2011
- [c5]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. ARES 2011: 645-649 - [c4]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285 - [c3]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304 - [c2]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - 2010
- [c1]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint