
Edgar R. Weippl
Person information
- affiliation: SBA Research, Austria
- affiliation: Vienna University of Technology, Institute of Software Technology and Interactive Systems
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j56]Paolo Mori, Wolfgang Prinz, Laura Ricci, Edgar R. Weippl:
Editorial for Special Issue on Block Chain Technology and its Applications. Pervasive Mob. Comput. 71: 101351 (2021) - 2020
- [j55]Lotfi Ben Othmane, Doug Jacobson, Edgar R. Weippl:
Editorial: Special issue on security and privacy in smart cyber-physical systems. Comput. Secur. 88 (2020) - [c160]Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. SEC 2020: 234-247 - [c159]Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar R. Weippl, Katharina Krombholz:
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. SOUPS @ USENIX Security Symposium 2020: 341-358 - [c158]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Efficient Continuous Distributed Randomness. IEEE Symposium on Security and Privacy 2020: 73-89 - [e29]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings. Lecture Notes in Computer Science 12279, Springer 2020, ISBN 978-3-030-57320-1 [contents] - [e28]Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5 [contents] - [e27]Stefanos Gritzalis, Edgar R. Weippl, Gabriele Anderst-Kotsis, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12395, Springer 2020, ISBN 978-3-030-58985-1 [contents] - [i27]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. IACR Cryptol. ePrint Arch. 2020: 942 (2020) - [i26]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [j54]Lotfi Ben Othmane, Doug Jacobson, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. Comput. Secur. 87 (2019) - [j53]Matthias Wenzl, Georg Merzdovnik
, Johanna Ullrich, Edgar R. Weippl:
From Hack to Elaborate Technique - A Survey on Binary Rewriting. ACM Comput. Surv. 52(3): 49:1-49:37 (2019) - [j52]Matthias Eckhart
, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9(3): 52-73 (2019) - [c157]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg, Edgar R. Weippl, Alessio Bertone
:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. DPM/CBT@ESORICS 2019: 39-48 - [c156]Matthias Eckhart
, Andreas Ekelhart, Edgar R. Weippl:
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. ETFA 2019: 1222-1225 - [c155]Nicholas Stifter, Matthias Eckhart
, Bernhard Brenner, Edgar R. Weippl:
Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems. ETFA 2019: 1623-1626 - [c154]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. Financial Cryptography 2019: 527-549 - [c153]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c152]Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [c151]Matthias Eckhart
, Andreas Ekelhart, Arndt Lüder, Stefan Biffl, Edgar R. Weippl:
Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019: 3004-3011 - [c150]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. IECON 2019: 3012-3017 - [c149]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
A Versatile Security Layer for AutomationML. INDIN 2019: 358-364 - [c148]Adrian Dabrowski
, Georg Merzdovnik
, Johanna Ullrich
, Gerald Sendera, Edgar R. Weippl
:
Measuring Cookies and Web Privacy in a Post-GDPR World. PAM 2019: 258-270 - [p10]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Introduction to Security and Quality Improvement in Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 1-29 - [p9]Bernhard Brenner, Edgar R. Weippl:
Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks. Security and Quality in Cyber-Physical Systems Engineering 2019: 305-334 - [p8]Peter Kieseberg, Edgar R. Weippl:
Securing Information Against Manipulation in the Production Systems Engineering Process. Security and Quality in Cyber-Physical Systems Engineering 2019: 335-356 - [p7]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. Security and Quality in Cyber-Physical Systems Engineering 2019: 471-495 - [p6]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 497-507 - [e26]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Security and Quality in Cyber-Physical Systems Engineering, With Forewords by Robert M. Lee and Tom Gilb. Springer 2019, ISBN 978-3-030-25311-0 [contents] - [e25]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11713, Springer 2019, ISBN 978-3-030-29725-1 [contents] - [e24]Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11711, Springer 2019, ISBN 978-3-030-27812-0 [contents] - [i25]Christian Kudera, Georg Merzdovnik, Edgar R. Weippl:
AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices. ERCIM News 2019(119) (2019) - [i24]Matthias Wenzl, Georg Merzdovnik, Edgar R. Weippl:
ISaFe - Injecting Security Features into Constrained Embedded Firmware. ERCIM News 2019(119) (2019) - [i23]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - [i22]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 985 (2019) - 2018
- [j51]David Rupprecht
, Adrian Dabrowski
, Thorsten Holz
, Edgar R. Weippl, Christina Pöpper
:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [j50]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid. Elektrotech. Informationstechnik 135(3): 250-255 (2018) - [c147]Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl:
A Framework for Monitoring Net Neutrality. ARES 2018: 17:1-17:10 - [c146]Andreas Holzinger
, Peter Kieseberg, Edgar R. Weippl, A Min Tjoa
:
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. CD-MAKE 2018: 1-8 - [c145]Peter Kieseberg, Sebastian Schrittwieser
, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c144]Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. DBSec 2018: 278-295 - [c143]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper). DPM/CBT@ESORICS 2018: 197-206 - [c142]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). Financial Cryptography Workshops 2018: 31-42 - [c141]Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. RAID 2018: 184-203 - [c140]Peter Kieseberg, Edgar R. Weippl:
Security Challenges in Cyber-Physical Production Systems. SWQD 2018: 3-16 - [e23]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27-30, 2018, Proceedings. Lecture Notes in Computer Science 11015, Springer 2018, ISBN 978-3-319-99739-1 [contents] - [i21]Foteini Baldimtsi, Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152). Dagstuhl Reports 8(4): 20-31 (2018) - [i20]Edgar R. Weippl, Benjamin Sanderse:
Digital Twins - Introduction to the Special Theme. ERCIM News 2018(115) (2018) - [i19]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. IACR Cryptol. ePrint Arch. 2018: 87 (2018) - [i18]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Practical Continuous Distributed Randomness. IACR Cryptol. ePrint Arch. 2018: 319 (2018) - [i17]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar R. Weippl:
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. IACR Cryptol. ePrint Arch. 2018: 400 (2018) - [i16]Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. IACR Cryptol. ePrint Arch. 2018: 415 (2018) - [i15]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. IACR Cryptol. ePrint Arch. 2018: 836 (2018) - [i14]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining. IACR Cryptol. ePrint Arch. 2018: 1134 (2018) - 2017
- [b3]Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017 - [j49]Aleksandar Hudic, Paul Smith, Edgar R. Weippl:
Security assurance assessment methodology for hybrid clouds. Comput. Secur. 70: 723-743 (2017) - [j48]Johanna Ullrich, Tanja Zseby, Joachim Fabini, Edgar R. Weippl:
Network-Based Secret Communication in Clouds: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1112-1144 (2017) - [j47]Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl:
Securing the Internet, One HTTP 200 OK at a Time. login Usenix Mag. 42(4) (2017) - [c139]Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik
, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. ARES 2017: 20:1-20:10 - [c138]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. ARES 2017: 33:1-33:6 - [c137]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ACSAC 2017: 303-314 - [c136]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse or Cure? DPM/CBT@ESORICS 2017: 316-333 - [c135]Aljosha Judmayer, Georg Merzdovnik
, Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
A Performance Assessment of Network Address Shuffling in IoT Systems. EUROCAST (1) 2017: 197-204 - [c134]Georg Merzdovnik
, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. EuroS&P 2017: 319-333 - [c133]Shimon Machida, Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [c132]Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [c131]Edgar R. Weippl:
Research methods and examples of empirical research in information security. RCIS 2017: 18 - [c130]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke
, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. SACMAT 2017: 119-120 - [c129]Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar R. Weippl:
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS. USENIX Security Symposium 2017: 1339-1356 - [e22]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio di Calabria, Italy, August 29 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10410, Springer 2017, ISBN 978-3-319-66807-9 [contents] - [e21]Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents] - [i13]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research towards Future Mobile Network Generations. CoRR abs/1710.08932 (2017) - [i12]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i11]Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
u'smile - Secure Mobile Environments. ERCIM News 2017(109) (2017) - [i10]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Edgar R. Weippl:
Bitcoin - Cryptocurrencies and Alternative Applications. ERCIM News 2017(110) (2017) - [i9]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
A Holistic Approach to Smart Contract Security. ERCIM News 2017(110) (2017) - [i8]Klaus Kieseberg, Peter Kieseberg, Edgar R. Weippl:
Trend Analysis of Underground Marketplaces. ERCIM News 2017(111) (2017) - [i7]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse of Cure? IACR Cryptol. ePrint Arch. 2017: 791 (2017) - 2016
- [j46]Peter Kieseberg, Bernd Malle, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
A tamper-proof audit and control system for the doctor in the loop. Brain Informatics 3(4): 269-279 (2016) - [j45]Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik
, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49(1): 4:1-4:37 (2016) - [j44]Johanna Ullrich, Jordan Cropper, Peter Frühwirt, Edgar R. Weippl:
The role and security of firewalls in cyber-physical cloud computing. EURASIP J. Inf. Secur. 2016: 18 (2016) - [j43]Umar Mukhtar Ismail, Shareeful Islam, Moussa Ouedraogo, Edgar R. Weippl
:
A Framework for Security Transparency in Cloud Computing. Future Internet 8(1): 5 (2016) - [j42]Shareeful Islam, Stefan Fenz, Edgar R. Weippl, Christos Kalloniatis:
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners. Int. J. Secur. Softw. Eng. 7(3): 44-73 (2016) - [j41]Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Effectiveness of file-based deduplication in digital forensics. Secur. Commun. Networks 9(15): 2876-2885 (2016) - [c128]Bernd Malle, Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger
:
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. CD-ARES 2016: 251-266 - [c127]Georg Merzdovnik
, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. ARES 2016: 365-371 - [c126]Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer
, Edgar R. Weippl:
Hand Dynamics for Behavioral User Authentication. ARES 2016: 389-398 - [c125]Aljosha Judmayer, Edgar R. Weippl:
Condensed Cryptographic Currencies Crash Course (C5). CCS 2016: 1857-1858 - [c124]Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
Secure cyber-physical production systems: Solid steps towards realization. CPPS@CPSWeek 2016: 1-4 - [c123]Georg Merzdovnik
, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl:
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. DBSec 2016: 331-346 - [c122]Johanna Ullrich, Edgar R. Weippl:
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor. ESORICS (2) 2016: 493-511 - [c121]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. Financial Cryptography 2016: 555-580 - [c120]Edgar R. Weippl:
Ethics in Security Research. ICISSP 2016: 9 - [c119]Edgar R. Weippl, Sebastian Schrittwieser, Sylvi Rennert:
Empirical Research and Research Ethics in Information Security. ICISSP (Revised Selected Papers) 2016: 14-22 - [c118]Damjan Buhov, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl:
Pin it! Improving Android network security at runtime. Networking 2016: 297-305 - [c117]Adrian Dabrowski, Georg Petzl, Edgar R. Weippl:
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. RAID 2016: 279-302 - [c116]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. Sicherheit 2016: 137-148 - [c115]Adrian Dabrowski, Georg Merzdovnik
, Nikolaus Kommenda, Edgar R. Weippl:
Browser History Stealing with Captive Wi-Fi Portals. IEEE Symposium on Security and Privacy Workshops 2016: 234-240 - [c114]Aljosha Judmayer, Edgar R. Weippl:
Cryptographic Currencies Crash Course (C4): Tutorial. WWW (Companion Volume) 2016: 1021-1024 - [e20]Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9817, Springer 2016, ISBN 978-3-319-45506-8 [contents] - [e19]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - [e18]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [e17]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba:
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4568-2 [contents] - [e16]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e15]Stefan Katzenbeisser, Edgar R. Weippl, Erik-Oliver Blass, Florian Kerschbaum:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4565-1 [contents] - [e14]Edgar R. Weippl, Stefan Katzenbeisser, Sabrina De Capitani di Vimercati:
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4569-9 [contents] - [i6]Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
Trust for the "Doctor in the Loop". ERCIM News 2016(104) (2016) - [i5]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - [i4]Fabio Martinelli, Edgar R. Weippl:
Cybersecurity - Introduction to the Special Theme. ERCIM News 2016(106) (2016) - 2015
- [j40]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [j39]Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl
:
Advanced social engineering attacks. J. Inf. Secur. Appl. 22: 113-122 (2015) - [c113]Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar R. Weippl:
The Role and Security of Firewalls in IaaS Cloud Computing. ARES 2015: 70-79 - [c112]Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. ARES 2015: 186-192 - [c111]Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl:
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. ARES 2015: 230-237 - [c110]Damjan Buhov, Markus Huber, Georg Merzdovnik
, Edgar R. Weippl, Vesna Dimitrova:
Network Security Challenges in Android Applications. ARES 2015: 327-332 - [c109]Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Gradually Improving the Forensic Process. ARES 2015: 404-410 - [c108]Adrian Dabrowski, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c107]Peter Kieseberg, Johannes Schantl, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger
:
Witnesses for the Doctor in the Loop. BIH 2015: 369-378 - [c106]Katharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Financial Cryptography Workshops 2015: 274-280 - [c105]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c104]Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding. IFIP Int. Conf. Digital Forensics 2015: 179-194 - [c103]Hannes Trunde, Edgar R. Weippl:
WordPress security: an analysis based on publicly available exploits. iiWAS 2015: 81:1-81:7 - [c102]Johanna Ullrich, Edgar R. Weippl:
Privacy is Not an Option: Attacking the IPv6 Privacy Extension. RAID 2015: 448-468 - [c101]Adrian Dabrowski, Isao Echizen, Edgar R. Weippl:
Error-Correcting Codes as Source for Decoding Ambiguity. IEEE Symposium on Security and Privacy Workshops 2015: 99-105 - [p5]Johanna Ullrich, Edgar R. Weippl:
Protection through isolation: Virtues and pitfalls. The Cloud Security Ecosystem 2015: 129-147 - [e13]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e12]