


default search action
Edgar R. Weippl
Person information
- affiliation: University of Vienna, Austria
- affiliation: SBA Research, Austria
- affiliation: Vienna University of Technology, Institute of Software Technology and Interactive Systems
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i46]Manuel Kern, Florian Skopik, Max Landauer, Edgar R. Weippl:
Towards Improving IDS Using CTF Events. CoRR abs/2501.11685 (2025) - 2024
- [j65]Manuel Kern
, Max Landauer
, Florian Skopik
, Edgar R. Weippl:
A logging maturity and decision model for the selection of intrusion detection cyber security solutions. Comput. Secur. 141: 103844 (2024) - [j64]Elias Bou-Harb, Edgar R. Weippl, Chadi Assi, Martin Husák, Jiangshan Yu, Katherine A. Flanigan:
Guest Editorial: IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure. IEEE Internet Things Mag. 7(6): 10-12 (2024) - [c192]Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. EuroS&P Workshops 2024: 1 - [c191]Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. EuroS&P 2024: xi - [c190]Gabriel K. Gegenhuber
, Philipp É. Frenzel
, Edgar R. Weippl
:
Why E.T. Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi. MobiSys 2024: 183-195 - [c189]Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl:
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. SECRYPT 2024: 323-333 - [c188]Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl:
Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. SECRYPT 2024: 560-567 - [c187]Gabriel Karl Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar R. Weippl, Adrian Dabrowski:
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments. USENIX Security Symposium 2024 - [i45]Gabriel Karl Gegenhuber, Wilfried Mayer, Edgar R. Weippl:
Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European MNOs. CoRR abs/2403.08066 (2024) - [i44]Gabriel Karl Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski:
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. CoRR abs/2403.08507 (2024) - [i43]Gabriel Karl Gegenhuber, Markus Maier, Florian Holzbauer, Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl, Johanna Ullrich:
An Extended View on Measuring Tor AS-level Adversaries. CoRR abs/2403.08517 (2024) - [i42]Gabriel Karl Gegenhuber, Philipp É. Frenzel, Edgar R. Weippl:
Why E.T. Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi. CoRR abs/2403.11759 (2024) - [i41]Gabriel Karl Gegenhuber, Philipp É. Frenzel, Edgar R. Weippl:
Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments. CoRR abs/2406.12348 (2024) - [i40]Gabriel Karl Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar R. Weippl, Adrian Dabrowski:
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments. CoRR abs/2407.19556 (2024) - 2023
- [j63]Gabriel K. Gegenhuber
, Markus Maier
, Florian Holzbauer
, Wilfried Mayer, Georg Merzdovnik
, Edgar R. Weippl
, Johanna Ullrich
:
An extended view on measuring tor AS-level adversaries. Comput. Secur. 132: 103302 (2023) - [j62]Edgar R. Weippl, Andreas Holzinger
, Peter Kieseberg
:
Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2020". Mach. Learn. Knowl. Extr. 5(1): 173-174 (2023) - [j61]Matthias Eckhart
, Andreas Ekelhart
, Stefan Biffl
, Arndt Lüder
, Edgar R. Weippl
:
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Trans. Ind. Informatics 19(4): 5870-5881 (2023) - [c186]Peter Kieseberg
, Edgar R. Weippl
, A Min Tjoa, Federico Cabitza, Andrea Campagner, Andreas Holzinger
:
Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? CD-MAKE 2023: 1-12 - [c185]Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger
, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl:
Modeling Obfuscation Stealth Through Code Complexity. ESORICS Workshops (2) 2023: 392-408 - [c184]Patrick Kochberger
, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl
:
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. SECRYPT 2023: 7-19 - [c183]Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski:
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. USENIX Security Symposium 2023: 3493-3510 - [e33]Andreas Holzinger
, Peter Kieseberg
, Federico Cabitza
, Andrea Campagner
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 - September 1, 2023, Proceedings. Lecture Notes in Computer Science 14065, Springer 2023, ISBN 978-3-031-40836-6 [contents] - [i39]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Analyzing UTXO-Based Blockchain Privacy Threats. IACR Cryptol. ePrint Arch. 2023: 1862 (2023) - 2022
- [j60]Matthias Eckhart
, Andreas Ekelhart
, Edgar R. Weippl
:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1655-1672 (2022) - [c182]Simin Ghesmati, Walid Fdhila
, Edgar R. Weippl
:
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques. ARES 2022: 5:1-5:14 - [c181]Katja Bühler
, Cornelia Travnicek
, Veronika Nowak
, Edgar R. Weippl
, Lukas Fischer
, Rudolf Ramler
, Robert Wille
:
Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers. DEXA Workshops 2022: 155-166 - [c180]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl
:
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork. ESORICS (1) 2022: 46-66 - [c179]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl
:
Estimating (Miner) Extractable Value is Hard, Let's Go Shopping! Financial Cryptography Workshops 2022: 74-92 - [c178]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. Financial Cryptography Workshops 2022: 164-194 - [c177]Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl
:
Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European MNOs. GLOBECOM 2022: 203-208 - [c176]Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl
, Katharina Krombholz:
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). HCI (32) 2022: 42-61 - [c175]Alexandra Mai, Oliver Schedler, Edgar R. Weippl
, Katharina Krombholz:
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations. HCI (32) 2022: 173-193 - [c174]Sebastian Schrittwieser
, Patrick Kochberger
, Michael Pucher
, Caroline Lawitschka, Philip König
, Edgar R. Weippl
:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. NordSec 2022: 273-291 - [c173]Manuel Kern, Florian Skopik, Max Landauer, Edgar R. Weippl
:
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach. SAC 2022: 1656-1665 - [c172]Katharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz:
Replication: Stories as Informal Lessons about Security. SOUPS @ USENIX Security Symposium 2022: 1-18 - [c171]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl
:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. WWW (Companion Volume) 2022: 467-477 - [e32]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23-26, 2022, Proceedings. Lecture Notes in Computer Science 13480, Springer 2022, ISBN 978-3-031-14462-2 [contents] - [e31]Steven Furnell, Paolo Mori
, Edgar R. Weippl, Olivier Camp:
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1545, Springer 2022, ISBN 978-3-030-94899-3 [contents] - [i38]Alvaro A. Cárdenas-Mora, Simin Nadjm-Tehrani, Edgar R. Weippl
, Matthias Eckhart
:
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171). Dagstuhl Reports 12(4): 54-71 (2022) - [i37]Patrick Kochberger, Sebastian Schrittwieser, Edgar R. Weippl:
Meta-framework for Automating Static Malware Analysis. ERCIM News 2022(129): 0 (2022) - [i36]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. IACR Cryptol. ePrint Arch. 2022: 285 (2022) - [i35]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2022: 287 (2022) - [i34]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. IACR Cryptol. ePrint Arch. 2022: 359 (2022) - [i33]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics & PayJoin Transactions. IACR Cryptol. ePrint Arch. 2022: 589 (2022) - 2021
- [j59]Peter Kieseberg
, Sebastian Schrittwieser
, Edgar R. Weippl
:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [j58]Paolo Mori, Wolfgang Prinz, Laura Ricci, Edgar R. Weippl:
Editorial for Special Issue on Block Chain Technology and its Applications. Pervasive Mob. Comput. 71: 101351 (2021) - [c170]Patrick Kochberger
, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg
, Edgar R. Weippl
:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - [c169]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl
:
Studying Bitcoin Privacy Attacks and Their Impact on Bitcoin-Based Identity Methods. BPM (Blockchain and RPA Forum) 2021: 85-101 - [c168]Adrian Dabrowski
, Katharina Pfeffer, Markus Reichel, Alexandra Mai, Edgar R. Weippl, Michael Franz:
Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure. DeFi@CCS 2021: 1-8 - [c167]Andreas Holzinger
, Edgar R. Weippl
, A Min Tjoa
, Peter Kieseberg
:
Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. CD-MAKE 2021: 1-20 - [c166]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl
:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c165]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [c164]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl
:
Unnecessary Input Heuristics and PayJoin Transactions. HCI (38) 2021: 416-424 - [c163]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. NDSS 2021 - [c162]Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. USENIX Security Symposium 2021: 37-54 - [p11]Isabel Ramos
, Dale Mackrell
, Alta van der Merwe, Jan Pries-Heje, Jolita Ralyté, Janis Stirna, John Krogstie
, Matthew Jones, Benjamin Mueller
, Frédéric Adam, Bettina Jaber, Edgar R. Weippl
, Marijn Janssen, Amany R. Elbanna, Banita Lal, Pierluigi Plebani
, Allen C. Johnston, Li Da Xu:
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems). IFIP's Exciting First 60+ Years 2021: 333-360 - [e30]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12844, Springer 2021, ISBN 978-3-030-84059-4 [contents] - [i32]Simon Dejung, Mingyan Liu, Arndt Lüder, Edgar R. Weippl:
Managing Industrial Control Systems Security Risks for Cyber Insurance (Dagstuhl Seminar 21451). Dagstuhl Reports 11(10): 36-56 (2021) - [i31]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Bitcoin Privacy - A Survey on Mixing Techniques. IACR Cryptol. ePrint Arch. 2021: 629 (2021) - [i30]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods. IACR Cryptol. ePrint Arch. 2021: 1088 (2021) - [i29]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork. IACR Cryptol. ePrint Arch. 2021: 1182 (2021) - [i28]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Estimating (Miner) Extractable Value is Hard, Letâs Go Shopping! IACR Cryptol. ePrint Arch. 2021: 1231 (2021) - 2020
- [j57]Lotfi Ben Othmane, Doug Jacobson
, Edgar R. Weippl:
Editorial: Special issue on security and privacy in smart cyber-physical systems. Comput. Secur. 88 (2020) - [c161]Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. SEC 2020: 234-247 - [c160]Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar R. Weippl, Katharina Krombholz:
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. SOUPS @ USENIX Security Symposium 2020: 341-358 - [c159]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl
:
HydRand: Efficient Continuous Distributed Randomness. SP 2020: 73-89 - [e29]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings. Lecture Notes in Computer Science 12279, Springer 2020, ISBN 978-3-030-57320-1 [contents] - [e28]Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5 [contents] - [e27]Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis
, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12395, Springer 2020, ISBN 978-3-030-58985-1 [contents] - [i27]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. IACR Cryptol. ePrint Arch. 2020: 942 (2020) - [i26]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [j56]Lotfi Ben Othmane, Doug Jacobson
, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. Comput. Secur. 87 (2019) - [j55]Matthias Wenzl
, Georg Merzdovnik
, Johanna Ullrich
, Edgar R. Weippl:
From Hack to Elaborate Technique - A Survey on Binary Rewriting. ACM Comput. Surv. 52(3): 49:1-49:37 (2019) - [j54]Matthias Eckhart
, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9(3): 52-73 (2019) - [c158]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg
, Edgar R. Weippl
, Alessio Bertone
:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. DPM/CBT@ESORICS 2019: 39-48 - [c157]Matthias Eckhart
, Andreas Ekelhart
, Edgar R. Weippl:
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. ETFA 2019: 1222-1225 - [c156]Nicholas Stifter, Matthias Eckhart
, Bernhard Brenner, Edgar R. Weippl:
Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems. ETFA 2019: 1623-1626 - [c155]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. Financial Cryptography 2019: 527-549 - [c154]Peter Kieseberg
, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c153]Peter Kieseberg
, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [c152]Matthias Eckhart
, Andreas Ekelhart
, Arndt Lüder, Stefan Biffl, Edgar R. Weippl:
Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019: 3004-3011 - [c151]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart
:
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. IECON 2019: 3012-3017 - [c150]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
A Versatile Security Layer for AutomationML. INDIN 2019: 358-364 - [c149]Adrian Dabrowski
, Georg Merzdovnik
, Johanna Ullrich
, Gerald Sendera, Edgar R. Weippl
:
Measuring Cookies and Web Privacy in a Post-GDPR World. PAM 2019: 258-270 - [p10]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Introduction to Security and Quality Improvement in Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 1-29 - [p9]Bernhard Brenner, Edgar R. Weippl:
Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks. Security and Quality in Cyber-Physical Systems Engineering 2019: 305-334 - [p8]Peter Kieseberg, Edgar R. Weippl:
Securing Information Against Manipulation in the Production Systems Engineering Process. Security and Quality in Cyber-Physical Systems Engineering 2019: 335-356 - [p7]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. Security and Quality in Cyber-Physical Systems Engineering 2019: 471-495 - [p6]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 497-507 - [e26]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Security and Quality in Cyber-Physical Systems Engineering, With Forewords by Robert M. Lee and Tom Gilb. Springer 2019, ISBN 978-3-030-25311-0 [contents] - [e25]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11713, Springer 2019, ISBN 978-3-030-29725-1 [contents] - [e24]Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11711, Springer 2019, ISBN 978-3-030-27812-0 [contents] - [i25]Christian Kudera, Georg Merzdovnik, Edgar R. Weippl:
AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices. ERCIM News 2019(119) (2019) - [i24]Matthias Wenzl, Georg Merzdovnik, Edgar R. Weippl:
ISaFe - Injecting Security Features into Constrained Embedded Firmware. ERCIM News 2019(119) (2019) - [i23]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - [i22]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 985 (2019) - 2018
- [j53]David Rupprecht
, Adrian Dabrowski
, Thorsten Holz
, Edgar R. Weippl, Christina Pöpper
:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [j52]Adrian Dabrowski
, Johanna Ullrich
, Edgar R. Weippl:
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid. Elektrotech. Informationstechnik 135(3): 250-255 (2018) - [c148]Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl:
A Framework for Monitoring Net Neutrality. ARES 2018: 17:1-17:10 - [c147]Andreas Holzinger
, Peter Kieseberg
, Edgar R. Weippl, A Min Tjoa
:
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. CD-MAKE 2018: 1-8 - [c146]Peter Kieseberg
, Sebastian Schrittwieser
, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c145]Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. DBSec 2018: 278-295 - [c144]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper). DPM/CBT@ESORICS 2018: 197-206 - [c143]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). Financial Cryptography Workshops 2018: 31-42 - [c142]Johanna Ullrich
, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski
, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. RAID 2018: 184-203 - [c141]Peter Kieseberg
, Edgar R. Weippl:
Security Challenges in Cyber-Physical Production Systems. SWQD 2018: 3-16 - [e23]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27-30, 2018, Proceedings. Lecture Notes in Computer Science 11015, Springer 2018, ISBN 978-3-319-99739-1 [contents] - [i21]Foteini Baldimtsi, Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152). Dagstuhl Reports 8(4): 20-31 (2018) - [i20]Edgar R. Weippl, Benjamin Sanderse:
Digital Twins - Introduction to the Special Theme. ERCIM News 2018(115) (2018) - [i19]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. IACR Cryptol. ePrint Arch. 2018: 87 (2018) - [i18]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Practical Continuous Distributed Randomness. IACR Cryptol. ePrint Arch. 2018: 319 (2018) - [i17]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar R. Weippl:
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. IACR Cryptol. ePrint Arch. 2018: 400 (2018) - [i16]Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. IACR Cryptol. ePrint Arch. 2018: 415 (2018) - [i15]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. IACR Cryptol. ePrint Arch. 2018: 836 (2018) - [i14]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining. IACR Cryptol. ePrint Arch. 2018: 1134 (2018) - 2017
- [b3]Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01224-2 - [j51]Aleksandar Hudic, Paul Smith, Edgar R. Weippl:
Security assurance assessment methodology for hybrid clouds. Comput. Secur. 70: 723-743 (2017) - [j50]Johanna Ullrich
, Tanja Zseby, Joachim Fabini, Edgar R. Weippl:
Network-Based Secret Communication in Clouds: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1112-1144 (2017) - [j49]Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl:
Securing the Internet, One HTTP 200 OK at a Time. login Usenix Mag. 42(4) (2017) - [c140]Aljosha Judmayer, Johanna Ullrich
, Georg Merzdovnik
, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. ARES 2017: 20:1-20:10 - [c139]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. ARES 2017: 33:1-33:6 - [c138]Adrian Dabrowski
, Johanna Ullrich
, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ACSAC 2017: 303-314 - [c137]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse or Cure? DPM/CBT@ESORICS 2017: 316-333 - [c136]Aljosha Judmayer, Georg Merzdovnik
, Johanna Ullrich
, Artemios G. Voyiatzis, Edgar R. Weippl:
A Performance Assessment of Network Address Shuffling in IoT Systems. EUROCAST (1) 2017: 197-204 - [c135]Georg Merzdovnik
, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. EuroS&P 2017: 319-333 - [c134]Shimon Machida, Adrian Dabrowski
, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [c133]Peter Kieseberg
, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [c132]Edgar R. Weippl:
Research methods and examples of empirical research in information security. RCIS 2017: 18 - [c131]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke
, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. SACMAT 2017: 119-120 - [c130]Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar R. Weippl:
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS. USENIX Security Symposium 2017: 1339-1356 - [e22]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio di Calabria, Italy, August 29 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10410, Springer 2017, ISBN 978-3-319-66807-9 [contents] - [e21]Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents] - [i13]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research towards Future Mobile Network Generations. CoRR abs/1710.08932 (2017) - [i12]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i11]Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
u'smile - Secure Mobile Environments. ERCIM News 2017(109) (2017) - [i10]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Edgar R. Weippl:
Bitcoin - Cryptocurrencies and Alternative Applications. ERCIM News 2017(110) (2017) - [i9]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
A Holistic Approach to Smart Contract Security. ERCIM News 2017(110) (2017) - [i8]Klaus Kieseberg, Peter Kieseberg, Edgar R. Weippl:
Trend Analysis of Underground Marketplaces. ERCIM News 2017(111) (2017) - [i7]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse of Cure? IACR Cryptol. ePrint Arch. 2017: 791 (2017) - 2016
- [j48]Peter Kieseberg
, Bernd Malle, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
A tamper-proof audit and control system for the doctor in the loop. Brain Informatics 3(4): 269-279 (2016) - [j47]Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik
, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49(1): 4:1-4:37 (2016) - [j46]Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
PeekaTorrent: Leveraging P2P hash values for digital forensics. Digit. Investig. 18 Supplement: S149-S156 (2016) - [j45]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler
, Stefan Katzenbeisser, Edgar R. Weippl:
Time is on my side: Steganography in filesystem metadata. Digit. Investig. 18 Supplement: S76-S86 (2016) - [j44]Johanna Ullrich
, Jordan Cropper, Peter Frühwirt, Edgar R. Weippl:
The role and security of firewalls in cyber-physical cloud computing. EURASIP J. Inf. Secur. 2016: 18 (2016) - [j43]Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo, Edgar R. Weippl
:
A Framework for Security Transparency in Cloud Computing. Future Internet 8(1): 5 (2016) - [j42]Shareeful Islam, Stefan Fenz
, Edgar R. Weippl, Christos Kalloniatis:
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners. Int. J. Secur. Softw. Eng. 7(3): 44-73 (2016) - [j41]Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Effectiveness of file-based deduplication in digital forensics. Secur. Commun. Networks 9(15): 2876-2885 (2016) - [c129]Bernd Malle, Peter Kieseberg
, Edgar R. Weippl, Andreas Holzinger
:
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. CD-ARES 2016: 251-266 - [c128]Georg Merzdovnik
, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. ARES 2016: 365-371 - [c127]Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer
, Edgar R. Weippl:
Hand Dynamics for Behavioral User Authentication. ARES 2016: 389-398 - [c126]Aljosha Judmayer, Edgar R. Weippl:
Condensed Cryptographic Currencies Crash Course (C5). CCS 2016: 1857-1858 - [c125]Johanna Ullrich
, Artemios G. Voyiatzis, Edgar R. Weippl:
Secure cyber-physical production systems: Solid steps towards realization. CPPS@CPSWeek 2016: 1-4 - [c124]Georg Merzdovnik
, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl:
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. DBSec 2016: 331-346 - [c123]Johanna Ullrich
, Edgar R. Weippl:
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor. ESORICS (2) 2016: 493-511 - [c122]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. Financial Cryptography 2016: 555-580 - [c121]Edgar R. Weippl:
Ethics in Security Research. ICISSP 2016: 9 - [c120]Edgar R. Weippl, Sebastian Schrittwieser, Sylvi Rennert:
Empirical Research and Research Ethics in Information Security. ICISSP (Revised Selected Papers) 2016: 14-22 - [c119]Damjan Buhov, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl:
Pin it! Improving Android network security at runtime. Networking 2016: 297-305 - [c118]Adrian Dabrowski
, Georg Petzl, Edgar R. Weippl:
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. RAID 2016: 279-302 - [c117]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. Sicherheit 2016: 137-148 - [c116]Adrian Dabrowski
, Georg Merzdovnik
, Nikolaus Kommenda, Edgar R. Weippl:
Browser History Stealing with Captive Wi-Fi Portals. IEEE Symposium on Security and Privacy Workshops 2016: 234-240 - [c115]Aljosha Judmayer, Edgar R. Weippl:
Cryptographic Currencies Crash Course (C4): Tutorial. WWW (Companion Volume) 2016: 1021-1024 - [e20]Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9817, Springer 2016, ISBN 978-3-319-45506-8 [contents] - [e19]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - [e18]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [e17]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba
:
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4568-2 [contents] - [e16]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e15]Stefan Katzenbeisser, Edgar R. Weippl, Erik-Oliver Blass, Florian Kerschbaum:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4565-1 [contents] - [e14]Edgar R. Weippl, Stefan Katzenbeisser, Sabrina De Capitani di Vimercati:
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4569-9 [contents] - [i6]Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
Trust for the "Doctor in the Loop". ERCIM News 2016(104) (2016) - [i5]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - [i4]Fabio Martinelli, Edgar R. Weippl:
Cybersecurity - Introduction to the Special Theme. ERCIM News 2016(106) (2016) - 2015
- [j40]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg
, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [j39]Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl
:
Advanced social engineering attacks. J. Inf. Secur. Appl. 22: 113-122 (2015) - [c114]Jordan Cropper, Johanna Ullrich
, Peter Frühwirt, Edgar R. Weippl:
The Role and Security of Firewalls in IaaS Cloud Computing. ARES 2015: 70-79 - [c113]Johanna Ullrich
, Peter Kieseberg
, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. ARES 2015: 186-192 - [c112]Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich
, Edgar R. Weippl:
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. ARES 2015: 230-237 - [c111]Damjan Buhov, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl, Vesna Dimitrova:
Network Security Challenges in Android Applications. ARES 2015: 327-332 - [c110]Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Gradually Improving the Forensic Process. ARES 2015: 404-410 - [c109]Adrian Dabrowski
, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c108]Peter Kieseberg
, Johannes Schantl, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger
:
Witnesses for the Doctor in the Loop. BIH 2015: 369-378 - [c107]Katharina Krombholz, Adrian Dabrowski
, Matthew Smith
, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Financial Cryptography Workshops 2015: 274-280 - [c106]Peter Kieseberg
, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c105]Peter Frühwirt, Peter Kieseberg
, Edgar R. Weippl:
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding. IFIP Int. Conf. Digital Forensics 2015: 179-194 - [c104]Hannes Trunde, Edgar R. Weippl:
WordPress security: an analysis based on publicly available exploits. iiWAS 2015: 81:1-81:7 - [c103]Johanna Ullrich
, Edgar R. Weippl:
Privacy is Not an Option: Attacking the IPv6 Privacy Extension. RAID 2015: 448-468 - [c102]Adrian Dabrowski
, Isao Echizen, Edgar R. Weippl:
Error-Correcting Codes as Source for Decoding Ambiguity. IEEE Symposium on Security and Privacy Workshops 2015: 99-105 - [p5]Johanna Ullrich
, Edgar R. Weippl:
Protection through isolation: Virtues and pitfalls. The Cloud Security Ecosystem 2015: 129-147 - [e13]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e12]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - [e11]Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur:
ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015. SciTePress 2015, ISBN 978-989-758-081-9 [contents] - [e10]Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur:
Information Systems Security and Privacy - First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. Communications in Computer and Information Science 576, Springer 2015, ISBN 978-3-319-27667-0 [contents] - [e9]Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee
:
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015. ACM 2015, ISBN 978-1-4503-3556-0 [contents] - [i3]Johanna Ullrich, Edgar R. Weippl:
CyPhySec: Defending Cyber-Physical Systems. ERCIM News 2015(102) (2015) - 2014
- [j38]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [j37]Martin Kirchner, Edgar R. Weippl
:
Securing Cloud and Mobility. Comput. Secur. 44: 64 (2014) - [j36]Peter Frühwirt, Peter Kieseberg
, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4): 336-348 (2014) - [j35]Peter Kieseberg
, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [j34]Shareeful Islam, Haralambos Mouratidis
, Edgar R. Weippl:
An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Inf. Softw. Technol. 56(2): 117-133 (2014) - [j33]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c101]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik
, Peter Kieseberg
, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c100]Adrian Dabrowski
, Heidelinde Hobel, Johanna Ullrich
, Katharina Krombholz, Edgar R. Weippl:
Towards a Hardware Trojan Detection Cycle. ARES 2014: 287-294 - [c99]Adrian Dabrowski
, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl:
IMSI-catch me if you can: IMSI-catcher-catchers. ACSAC 2014: 246-255 - [c98]Adrian Dabrowski
, Katharina Krombholz, Johanna Ullrich
, Edgar R. Weippl:
QR Inception: Barcode-in-Barcode Attacks. SPSM@CCS 2014: 3-10 - [c97]Aleksandar Hudic, Markus Tauber
, Thomas Lorünser
, Maria Krotsiani, George Spanoudakis, Andreas Mauthe
, Edgar R. Weippl:
A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology. CloudCom 2014: 386-393 - [c96]Katharina Krombholz, Peter Frühwirt, Peter Kieseberg
, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. HCI (24) 2014: 79-90 - [c95]Stefanie Falkner, Peter Kieseberg
, Dimitris E. Simos, Christina Traxler, Edgar R. Weippl:
E-voting Authentication with QR-codes. HCI (24) 2014: 149-159 - [c94]Christoph Hochreiner
, Zhendong Ma, Peter Kieseberg
, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c93]Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar R. Weippl:
Automated Analysis of Underground Marketplaces. IFIP Int. Conf. Digital Forensics 2014: 31-42 - [c92]Stefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
Towards Fully Automated Digital Alibis with Social Interaction. IFIP Int. Conf. Digital Forensics 2014: 297-307 - [c91]Edgar R. Weippl:
Empirical Research in Information Security. iiWAS 2014: 4 - [c90]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg
, Edgar R. Weippl:
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications. iiWAS 2014: 142-151 - [c89]Shareeful Islam, Edgar R. Weippl, Katharina Krombholz:
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. iiWAS 2014: 185-189 - [c88]Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl:
Spoiled Onions: Exposing Malicious Tor Exit Relays. Privacy Enhancing Technologies 2014: 304-331 - [c87]Edgar R. Weippl:
Advanced Persistent Threats & Social Engineering. SECRYPT 2014: IS-13 - [c86]Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl:
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Sicherheit 2014: 363-374 - [c85]Christoph Hochreiner
, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl:
Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. SIN 2014: 17 - [c84]Peter Aufner, Georg Merzdovnik
, Markus Huber, Edgar R. Weippl:
Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. SIN 2014: 434 - [c83]Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar R. Weippl:
IPv6 Security: Attacks and Countermeasures in a Nutshell. WOOT 2014 - [p4]Peter Kieseberg
, Heidelinde Hobel, Sebastian Schrittwieser, Edgar R. Weippl, Andreas Holzinger
:
Protecting Anonymity in Data-Driven Biomedical Science. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 301-316 - [e8]Stephanie Teufel, A Min Tjoa, Ilsun You, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings. Lecture Notes in Computer Science 8708, Springer 2014, ISBN 978-3-319-10974-9 [contents] - [e7]Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich. LNI P-228, GI 2014, ISBN 978-3-88579-622-0 [contents] - [i2]Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik
, Martin Mulazzani, Edgar R. Weippl:
Enter Sandbox: Android Sandbox Comparison. CoRR abs/1410.7749 (2014) - 2013
- [b2]Christian Krieg, Adrian Dabrowski
, Heidelinde Hobel, Katharina Krombholz, Edgar R. Weippl:
Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627052511, pp. 1-115 - [j32]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar R. Weippl:
Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Comput. Commun. 9(1) (2013) - [j31]Peter Kieseberg
, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber
, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. Int. J. Web Inf. Syst. 9(1): 53-68 (2013) - [j30]Peter Frühwirt, Peter Kieseberg
, Sebastian Schrittwieser, Markus Huber
, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Secur. Tech. Rep. 17(4): 227-238 (2013) - [j29]Edgar R. Weippl, A Min Tjoa, Simon Tjoa:
Frontiers in Security and Dependability. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 1-3 (2013) - [j28]Ilsun You, Edgar R. Weippl:
Information Security. J. Univers. Comput. Sci. 19(16): 2347-2348 (2013) - [c82]Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. ARES 2013: 255-261 - [c81]Amir Herzberg
, Haya Schulmann, Johanna Ullrich
, Edgar R. Weippl:
Cloudoscopy: services discovery and topology mapping. CCSW 2013: 113-122 - [c80]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber
, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c79]Markus Huber
, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Appinspect: large-scale evaluation of social networking apps. COSN 2013: 143-154 - [c78]Martin Mulazzani, Sebastian Neuner, Peter Kieseberg
, Markus Huber
, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. IFIP Int. Conf. Digital Forensics 2013: 183-193 - [c77]Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa
, Edgar R. Weippl:
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. SEC 2013: 286-299 - [c76]Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl:
Social engineering attacks on the knowledge worker. SIN 2013: 28-35 - [c75]Adrian Dabrowski
, Edgar R. Weippl, Isao Echizen:
Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing. SMC 2013: 455-461 - [e6]Alfredo Cuzzocrea
, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu:
Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8127, Springer 2013, ISBN 978-3-642-40510-5 [contents] - [e5]Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu:
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8128, Springer 2013, ISBN 978-3-642-40587-7 [contents] - [e4]Khabib Mustofa
, Erich J. Neuhold, A Min Tjoa
, Edgar R. Weippl, Ilsun You:
Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings. Lecture Notes in Computer Science 7804, Springer 2013, ISBN 978-3-642-36817-2 [contents] - [e3]Edgar R. Weippl, Maria Indrawan-Santiago, Matthias Steinbauer, Gabriele Kotsis, Ismail Khalil:
The 15th International Conference on Information Integration and Web-based Applications & Services, IIWAS '13, Vienna, Austria, December 2-4, 2013. ACM 2013, ISBN 978-1-4503-2113-6 [contents] - [i1]Edgar R. Weippl, Pietro Manzoni:
Mobile Computing - Introduction to the Special Theme. ERCIM News 2013(93) (2013) - 2012
- [j27]Manuel Leithner, Edgar R. Weippl:
Android forensics. Comput. Secur. 31(1): 3 (2012) - [j26]Manuel Leithner, Edgar R. Weippl:
Coding for Penetration Testers. Comput. Secur. 31(2): 252 (2012) - [j25]Aleksandar Hudic, Edgar R. Weippl:
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure. Comput. Secur. 31(4): 629 (2012) - [j24]Edgar R. Weippl, Manuel Leithner:
Enterprise Security for the Executive. Comput. Secur. 31(4): 636 (2012) - [j23]Manuel Leithner, Edgar R. Weippl:
Thor's Microsoft Security Bible. Comput. Secur. 31(4): 638 (2012) - [j22]Manuel Leithner, Edgar R. Weippl:
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts. Comput. Secur. 31(4): 639 (2012) - [j21]Manuel Leithner, Edgar R. Weippl:
Low Tech Hacking. Comput. Secur. 31(5): 738 (2012) - [j20]Amin Anjomshoaa
, Khue Vo Sao, Amirreza Tahamtan, A Min Tjoa
, Edgar R. Weippl:
Self-monitoring in social networks. Int. J. Intell. Inf. Database Syst. 6(4): 363-380 (2012) - [j19]Katharina Krombholz, Dieter Merkl, Edgar R. Weippl:
Fake identities in social media: A case study on the sustainability of the Facebook business model. J. Serv. Sci. Res. 4(2): 175-212 (2012) - [c74]Peter Frühwirt, Peter Kieseberg
, Sebastian Schrittwieser, Markus Huber
, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - [c73]Martin Mulazzani, Markus Huber
, Edgar R. Weippl:
Data Visualization for Social Network Forensics. IFIP Int. Conf. Digital Forensics 2012: 115-126 - [c72]Edgar R. Weippl:
Is security an afterthought when designing apps? iiWAS 2012: 4 - [c71]Sebastian Schrittwieser, Peter Kieseberg
, Edgar R. Weippl:
Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120 - [c70]Lorenz Zechner, Peter Kieseberg
, Edgar R. Weippl
:
INMOTOS: extending the ROPE-methodology. iiWAS 2012: 272-277 - [c69]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - [c68]Aleksandar Hudic, Lorenz Zechner, Shareeful Islam, Christian Krieg, Edgar R. Weippl, Severin Winkler, Richard Hable:
Towards a Unified Penetration Testing Taxonomy. SocialCom/PASSAT 2012: 811-812 - [e2]Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar R. Weippl:
Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings. Lecture Notes in Computer Science 7465, Springer 2012, ISBN 978-3-642-32497-0 [contents] - [e1]Stefan Katzenbeisser, Edgar R. Weippl
, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - 2011
- [j18]Christian Schwarzl, Edgar R. Weippl:
A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. Int. J. Secur. Softw. Eng. 2(1): 40-83 (2011) - [j17]Markus Huber
, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch
:
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Comput. 15(3): 28-34 (2011) - [j16]Edgar R. Weippl, A Min Tjoa, Günther Pernul:
Guest Editorial: Advances in Applied Security. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 1-3 (2011) - [c67]Markus Huber
, Martin Mulazzani, Manuel Leithner
, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl:
Social snapshots: digital forensics for online social networks. ACSAC 2011: 113-122 - [c66]Peter Kieseberg
, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber
, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285 - [c65]Nicolas Racz, Edgar R. Weippl, Andreas Seufert:
Governance, Risk & Compliance (GRC) Software - An Exploratory Study of Software Vendor and Market Research Perspectives. HICSS 2011: 1-10 - [c64]Peter Kieseberg
, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber
, Edgar R. Weippl
:
Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304 - [c63]Sebastian Schrittwieser, Peter Kieseberg
, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - [c62]Nicolas Racz, Edgar R. Weippl, Riccardo Bonazzi:
IT Governance, Risk & Compliance (GRC) Status Quo and Integration: An Explorative Industry Case Study. SERVICES 2011: 429-436 - [c61]Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl:
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. USENIX Security Symposium 2011 - 2010
- [j15]Thomas Neubauer, Johannes Heurix, A Min Tjoa
, Edgar R. Weippl:
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotech. Informationstechnik 127(5): 135-142 (2010) - [j14]Muhammad Asfand-e-yar, Amin Anjomshoaa, Edgar R. Weippl, A Min Tjoa:
Exploiting Ontology for Software License Agreements. Int. J. Softw. Informatics 4(1): 89-100 (2010) - [j13]Farman Ali Khan, Sabine Graf, Edgar R. Weippl, A Min Tjoa:
Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. IxD&A 9-10: 85-103 (2010) - [j12]Rivi Sandhu, A Min Tjoa
, Edgar R. Weippl:
Guest Editorial Foreword to the Special Issue on Availability, Reliability, and Security. IEEE Trans. Syst. Man Cybern. Part C 40(4): 369-371 (2010) - [j11]Martin Mulazzani, Markus Huber
, Edgar R. Weippl:
Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Trans. Syst. Man Cybern. Part C 40(5): 539-546 (2010) - [c60]Amin Anjomshoaa
, Khue Vo Sao, A Min Tjoa
, Edgar R. Weippl, Michael Hollauf:
Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case. ACIIDS (1) 2010: 180-189 - [c59]Nicolas Racz, Johannes C. Panitz, Michael Amberg, Edgar R. Weippl, Andreas Seufert:
Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from A Survey Among Large Enterprises. ACIS 2010 - [c58]Peter Frühwirt, Markus Huber
, Martin Mulazzani, Edgar R. Weippl:
InnoDB Database Forensics. AINA 2010: 1028-1036 - [c57]Nicolas Racz, Edgar R. Weippl, Andreas Seufert:
Integrating IT Governance, Risk, and Compliance Management Processes. DB&IS 2010: 325-338 - [c56]Markus Huber
, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Cheap and automated socio-technical attacks based on social networking sites. AISec 2010: 61-64 - [c55]Markus Huber
, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch
:
Exploiting social networking sites for spam. CCS 2010: 693-695 - [c54]Nicolas Racz, Edgar R. Weippl, Andreas Seufert:
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). Communications and Multimedia Security 2010: 106-117 - [c53]Markus Huber
, Martin Mulazzani, Edgar R. Weippl:
Tor HTTP Usage and Information Leakage. Communications and Multimedia Security 2010: 245-255 - [c52]Wikan Danar Sunindyo
, Stefan Biffl, Richard Mordinyi, Thomas Moser
, Alexander Schatten, Mohammed Tabatabai Irani, Dindin Wahyudin, Edgar R. Weippl, Dietmar Winkler:
An event-based empirical process analysis framework. ESEM 2010 - [c51]Nicolas Racz, Edgar R. Weippl, Andreas Seufert:
Questioning the Need for Separate IT Risk Management Frameworks. GI Jahrestagung (2) 2010: 245-252 - [c50]Farman Ali Khan, Sabine Graf
, Edgar R. Weippl, A Min Tjoa
:
Implementation of Affective States and Learning Styles Tactics in Web-Based Learning Management Systems. ICALT 2010: 734-735 - [c49]Katharina Holzinger, Andreas Holzinger, Christian Safran, Gabriele Koiner-Erath, Edgar R. Weippl:
Use of Wiki Systems in Archaeology - Privacy, Security and Data Protection as Key Problems. ICE-B 2010: 120-123 - [c48]Amirreza Tahamtan, Amin Anjomshoaa
, Edgar R. Weippl, A Min Tjoa
:
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects. KSEM 2010: 412-423 - [c47]Peter Kieseberg
, Manuel Leithner
, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435 - [c46]Markus Huber
, Martin Mulazzani, Edgar R. Weippl:
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. SEC 2010: 80-89 - [c45]Markus Huber
, Martin Mulazzani, Edgar R. Weippl:
Social Networking Sites Security: Quo Vadis. SocialCom/PASSAT 2010: 1117-1122
2000 – 2009
- 2009
- [j10]Mohammad Tabatabai Irani, Edgar R. Weippl:
Automation of post-exploitation. Int. J. Web Inf. Syst. 5(4): 518-536 (2009) - [c44]Mohammad Tabatabai Irani, Edgar R. Weippl:
Automation of Post-exploitation - (Focused on MS-Windows Targets). FGIT-SecTech 2009: 250-257 - [c43]Farman Ali Khan, Sabine Graf
, Edgar R. Weippl, A Min Tjoa
:
An approach for identifying affective states through behavioral patterns in web-based learning management systems. iiWAS 2009: 431-435 - [c42]Peter Kalchgruber, Edgar R. Weippl:
Can end-to-end verifiable e-voting be explained easily? iiWAS 2009: 572-576 - [c41]Muhammad Asfand-e-yar, Amin Anjomshoaa
, Edgar R. Weippl, A Min Tjoa
:
Blending the Sketched Use Case Scenario with License Agreements Using Semantics. KSEM 2009: 275-284 - [p3]Edgar R. Weippl:
Improving Storage Concepts for Semantic Models and Ontologies. The Semantic Web for Knowledge and Data Management 2009: 38-48 - [p2]Edgar R. Weippl:
Database Security and Statistical Database Security. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2100-2108 - [p1]Edgar R. Weippl, Markus D. Klemen, Stefan Raffeiner:
Improving Storage Concepts for Semantic Models and Ontologies. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2348-2358 - [r1]Edgar R. Weippl:
Database Security and Statistical Database Security. Encyclopedia of Data Warehousing and Mining 2009: 610-616 - 2008
- [j9]Andreas Ekelhart
, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl:
XML security - A comparative literature review. J. Syst. Softw. 81(10): 1715-1724 (2008) - [c40]Stefan Fenz, Andreas Ekelhart
, Edgar R. Weippl:
Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582 - 2007
- [j8]Andreas Ekelhart
, Stefan Fenz
, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl:
Architectural approach for handling semi-structured data in a user-centred working environment. Int. J. Web Inf. Syst. 3(3): 198-211 (2007) - [c39]Andreas Ekelhart
, Stefan Fenz
, A Min Tjoa, Edgar R. Weippl:
Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13 - [c38]Andreas Ekelhart
, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156 - [c37]Andreas Ekelhart
, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c36]Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A Min Tjoa, Edgar R. Weippl, Dominik Zyskowski:
Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31 - [c35]Bernhard Riedl, Gernot Goluch, Stefan Pöchlinger, Edgar R. Weippl:
A Comparative Literature Review on RFID Security and Privacy. iiWAS 2007: 213-222 - [c34]Khalid Latif
, Edgar R. Weippl, A Min Tjoa
:
Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. IRI 2007: 170-176 - [c33]Stefan Fenz, Gernot Goluch, Andreas Ekelhart
, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388 - [c32]Andreas Ekelhart
, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 - 2006
- [j7]Edgar R. Weippl, Andreas Holzinger
, A Min Tjoa
:
Security aspects of ubiquitous computing in healthcare. Elektrotech. Informationstechnik 123(4): 156-161 (2006) - [c31]Thomas Neubauer, Christian Stummer
, Edgar R. Weippl
:
Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373 - [c30]Thomas Neubauer, Edgar R. Weippl, Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731 - [c29]Andreas Ekelhart
, Stefan Fenz
, Markus D. Klemen, Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259 - [c28]Edgar R. Weippl:
Do we Really Need Access Control? iiWAS 2006: 493-502 - [c27]Edgar R. Weippl, Markus D. Klemen, Stefan Fenz
, Andreas Ekelhart
, A Min Tjoa
:
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151 - [c26]Andreas Ekelhart
, Stefan Fenz
, Markus D. Klemen, A Min Tjoa
, Edgar R. Weippl:
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48 - [c25]Stefan Fenz, Edgar R. Weippl
:
Ontology based IT-security planning. PRDC 2006: 389-390 - 2005
- [b1]Edgar R. Weippl:
Security in E-Learning. Advances in Information Security 16, Springer 2005, ISBN 978-0-387-24341-2, pp. 1-185 - [j6]Edgar R. Weippl:
Security in e-learning. eLearn Mag. 2005(3): 3 (2005) - [j5]Edgar R. Weippl, A Min Tjoa
:
Privacy in e-learning: anonymity, pseudonyms and authenticated usage. Interact. Technol. Smart Educ. 2(4): 247-256 (2005) - [j4]Tho Manh Nguyen, Peter Brezany, A Min Tjoa
, Edgar R. Weippl:
Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. Int. J. Data Warehous. Min. 1(4): 22-55 (2005) - [c24]Edgar R. Weippl, A Min Tjoa
:
Privacy in E-learning: How to implement anonymity. AICCSA 2005: 840-846 - [c23]Edgar R. Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A Min Tjoa
:
Semantic Storage: A Report on Performance and Flexibility. DEXA 2005: 586-595 - [c22]Eva Gahleitner, Wernher Behrendt, Jürgen Palkoska, Edgar R. Weippl
:
On cooperatively creating dynamic ontologies. Hypertext 2005: 208-210 - 2004
- [j3]Wolfgang Eßmayr, Stefan Probst, Edgar R. Weippl:
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. Electron. Commer. Res. 4(1-2): 127-156 (2004) - [c21]Rudolf Ramler, Klaus Wolfmaier, Edgar R. Weippl:
From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach. ICWE 2004: 287-299 - [c20]Edgar R. Weippl:
Security in E-Learning. iiWAS 2004 - [c19]Edgar R. Weippl, Alexander Schatten, Shuaib Karim, A Min Tjoa
:
SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. PAKM 2004: 365-377 - 2003
- [j2]Edgar R. Weippl, Wolfgang Eßmayr, Ludwig Klug:
A New Approach To Secure Federated Information Bases Using Agent Technology. J. Database Manag. 14(1): 48-68 (2003) - [j1]Edgar R. Weippl, Wolfgang Eßmayr:
Personal Trusted Devices for Web Services: Revisiting Multilevel Security. Mob. Networks Appl. 8(2): 151-157 (2003) - [c18]Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar R. Weippl:
XML-Based OLAP Query Processing in a Federated Data Warehouses. ICEIS (1) 2003: 71-78 - [c17]Reinhard Kronsteiner, Edgar R. Weippl, Ismail Khalil Ibrahim, Gabriele Kotsis:
Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content? iiWAS 2003 - [c16]Edgar R. Weippl:
Security in E-Learning. iiWAS 2003 - 2002
- [c15]Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl:
Reusable Components for Developing Security-Aware Application. ACSAC 2002: 239-248 - [c14]Edgar R. Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker:
Towards authentication using mobile devices. Communications and Multimedia Security 2002: 91-105 - [c13]Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland R. Wagner, Edgar R. Weippl:
CoSMo: An Approach Towards Conceptual Security Modeling. DEXA 2002: 557-566 - 2001
- [c12]Edgar R. Weippl:
An Approach to Secure Distribution of Web-Based Training Courses. ACSC 2001: 199-205 - [c11]Edgar R. Weippl:
Building secure knowledge bases: combining Java agents and DBagents. Agents 2001: 212-213 - [c10]Edgar R. Weippl:
Visualizing Content Based Relations in Texts. AUIC 2001: 34-41 - [c9]Ismail Khalil Ibrahim, Wieland Schwinger, Edgar R. Weippl, Josef Altmann, Werner Winiwarter:
Agent Solutions for E-Business Transactions. DEXA Workshop 2001: 84-86 - [c8]Edgar R. Weippl, Ismail Khalil Ibrahim, Werner Winiwarter:
Content-based Management of Document Access Control. INAP 2001: 78-86 - [c7]Bronson Trevor, Edgar R. Weippl, Werner Winiwarter:
A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content. INAP 2001: 316-330 - [c6]Edgar R. Weippl:
An Approach to Role-Based Access Control for Digital Content. ITCC 2001: 290-294 - 2000
- [c5]Edgar R. Weippl, Wolfgang Eßmayr:
Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. DEXA 2000: 939-948 - [c4]Edgar R. Weippl, Jörn Altmann, Wolfgang Eßmayr:
Mobile Database Agents for Building Data Warehouses. DEXA Workshop 2000: 477-481 - [c3]Edgar R. Weippl, Hans Lohninger:
Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases. EJC 2000: 271-274 - [c2]Edgar R. Weippl:
Coimbra: secure Web access to multimedia content. ACM Multimedia Workshops 2000: 145-148 - [c1]Wolfgang Eßmayr, Edgar R. Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88
Coauthor Index
aka: Gabriel Karl Gegenhuber

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 01:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint