Edgar Weippl
Privatdoz. Mag.rer.soc.oec. Dipl.-Ing. Dr.techn.
Research Areas
- IT-Security, E-Learning
Role
-
Affiliated
Software Engineering, E194-01
Courses
2022W
- Digital Forensics / 188.922 / VU
- Privacy Enhancing Technologies / 188.982 / VU
- Project in Computer Science 1 / 192.075 / PR
- Research seminar for PhD students / 188.081 / SE
2023S
- Bachelor Thesis / 188.919 / PR
- Project in Computer Science / 194.079 / PR
- Project in Computer Science 1 / 192.075 / PR
- Project in Computer Science 2 / 192.076 / PR
- Project in Computer Science 2 / 194.080 / PR
- Research seminar for PhD students / 188.081 / SE
- Selected Topics in Information Security / 188.985 / VU
- Seminar: Literature-work for PhD students / 188.082 / SE
Projects
-
Christian Doppler - Laboratory for Software Engineering Integration for Flexible Automation Systems
2010 – 2016 / Christian Doppler Research Association (CDG) -
HardObfuscation - Hardware-assisted software obfuscation for ERM
2010 – 2015 / Austrian Research Promotion Agency (FFG) -
Female Academy for Mentoring, Opportunities and Self-Development
2010 – 2014 / Austrian Research Promotion Agency (FFG) -
Secure 2.0 - Securing the Information Sharing on Web 2.0
2009 – 2014 / Austrian Research Promotion Agency (FFG) / Publications: 56982, 56983, 56984 -
Female Intrapreneurship Career Academy
2009 – 2012 / Austrian Research Promotion Agency (FFG) -
Austrian Grid: Grid Computing Infrastructure Initiative for Austria
2008 – 2010 / Federal Ministry of Science and Research (bm:wf) -
DynamOnt Methodology for Dynamic Ontology Creation
2005 – 2007 / Austrian Research Promotion Agency (FFG) / Publication: 55354
Publications
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.
2022
- User-Perceived Privacy in Blockchain / Ghesmati, S., Fdhila, W., & Weippl, E. (2022). User-Perceived Privacy in Blockchain. Cryptology ePrint Archive. / Project: CDL-SQI
- How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2022). How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. In WWW ’22: Companion Proceedings of the Web Conference 2022 (pp. 467–477). ACM. https://doi.org/10.1145/3487553.3524627 / Project: CDL-SQI
2021
- Unnecessary Input Heuristics and PayJoin Transactions / Ghesmati, S., Kern, A., Judmayer, A., Stifter, N., & Weippl, E. (2021). Unnecessary Input Heuristics and PayJoin Transactions. In HCI International 2021 - Posters (pp. 416–424). https://doi.org/10.1007/978-3-030-78642-7_56 / Project: CDL-SQI
- SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies / Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 507–532). Springer. https://doi.org/10.1007/978-3-662-63958-0_38 / Project: CDL-SQI
- Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies / Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 533–549). Springer. https://doi.org/10.1007/978-3-662-63958-0_39 / Project: CDL-SQI
- RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness / Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., & Weippl, E. (2021). RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In Proceedings 2021 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium (NDSS), USA, Non-EU. Internet Society. https://doi.org/10.14722/ndss.2021.24116
- Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI / Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In Machine Learning and Knowledge Extraction (pp. 1–20). Springer. http://hdl.handle.net/20.500.12708/55662
2020
- User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach / Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., & Krombholz, K. (2020). User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 341–358). USENIX Association. / Project: CDL-SQI
- Automated Security Risk Identification Using AutomationML-based Engineering Data / Eckhart, M., Ekelhart, A., & Weippl, E. (2020). Automated Security Risk Identification Using AutomationML-based Engineering Data. IEEE Transactions on Dependable and Secure Computing, 19(3), 1655–1672. https://doi.org/10.1109/tdsc.2020.3033150
- HydRand: Efficient Continuous Distributed Randomness / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, Non-EU. https://doi.org/10.1109/sp40000.2020.00003
2019
- From Hack to Elaborate Technique-A Survey on Binary Rewriting / Wenzl, M., Merzdovnik, G., Ullrich, J., & Weippl, E. (2019). From Hack to Elaborate Technique-A Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 1–37. https://doi.org/10.1145/3316415
- Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges / Eckhart, M., Brenner, B., Ekelhart, A., & Weippl, E. (2019). Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. Journal of Internet Services and Information Security (JISIS), 9(3), 52–73. https://doi.org/10.22667/JISIS.2019.08.31.052
- Measuring Cookies and Web Privacy in a Post-GDPR World / Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117
- Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process / Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. In IEEE (pp. 3012–3017). IEEE. http://hdl.handle.net/20.500.12708/58116
- Security Development Lifecycle for Cyber-Physical Production Systems / Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., & Weippl, E. (2019). Security Development Lifecycle for Cyber-Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal, EU. IEEE. http://hdl.handle.net/20.500.12708/58114
- Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins / Eckhart, M., Ekelhart, A., & Weippl, E. (2019). Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. https://doi.org/10.1109/etfa.2019.8869197
- Security Related Technical Debt in Cyber Physical Production Systems / Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in Cyber Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal, Portugal, EU. IEEE. http://hdl.handle.net/20.500.12708/58105
- "Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems" / Stifter, N., Eckhart, M., Brenner, B., & Weippl, E. (2019). “Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.” In Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. http://hdl.handle.net/20.500.12708/58103
- Distributed Key Generation with Ethereum Smart Contracts / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherland, EU. Springer. http://hdl.handle.net/20.500.12708/58084
- A versatile Security Layer for AutomationML / Brenner, B., Ekelhart, A., & Weippl, E. (2019). A versatile Security Layer for AutomationML. In Proceedings of INDIN 2019. 17th IEEE International Conference on Industrial Informatics (INDIN 2019), Helsinki, Finland, EU. IEEE. http://hdl.handle.net/20.500.12708/58078
- Echoes of the Past: Recovering Blockchain Metrics from Merged mining / Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, Non-EU. Springer. http://hdl.handle.net/20.500.12708/58072
- Securing Information against Manipulation in the Production Systems Engineering Process / Kieseberg, P., & Weippl, E. (2019). Securing Information against Manipulation in the Production Systems Engineering Process. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30203
- Security Analysis / Brenner, B., & Weippl, E. (2019). Security Analysis. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30202
- Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering (pp. 497–507). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_18
- Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies / Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189
- Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30184
- Security and Quality in Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (Eds.). (2019). Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/24652
2018
- On Security Research towards Future Mobile Network Generations / Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728
- Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. E & i Elektrotechnik Und Informationstechnik, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3
- Machine Learning and Knowledge Extraction / Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2018). Machine Learning and Knowledge Extraction. In Lecture Notes in Computer Science. International Cross-Domain Conference, CD-Make 2018, Hamburg, EU. Sprinter Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-319-99740-7
- A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678
- Structural Limitations of B+-Tree forensics / Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. In Proceedings of the Central European Cybersecurity Conference 2018. Central European Cybersecurity Conference 2018, Ljubljana, Slowenia, EU. ACM Digital Library. https://doi.org/10.1145/3277570.3277579
- USBlock: Blocking USB-Based Keypress Injection Attacks / Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C., & Weippl, E. (2018). USBlock: Blocking USB-Based Keypress Injection Attacks. In Data and Applications Security and Privacy XXXII (pp. 278–295). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57497
- Security Challenges in Cyber-Physical Production Systems / Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Physical Production Systems. In Software Quality: Methods and Tools for Better Software and Systems (pp. 3–16). Springer Lecture Notes in Business Information Processing. http://hdl.handle.net/20.500.12708/57496
- Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491
- Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447
- A Framework for Monitoring Net Neutrality / Mayer, W., Schreiber, T., & Weippl, E. (2018). A Framework for Monitoring Net Neutrality. In The 13th International Conference on Availability, Reliability and Security (ARES 2018). The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, EU. ACM International Conference Proceeding Series. http://hdl.handle.net/20.500.12708/57445
- Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. / Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference (pp. 1–8). Springer. http://hdl.handle.net/20.500.12708/58777
2017
- A Risk Management Framework for Cloud Migration Decision Support / Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010
- Network-Based Secret Communication in Clouds: A Survey / Ullrich, J., Zseby, T., Fabini, J., & Weippl, E. (2017). Network-Based Secret Communication in Clouds: A Survey. IEEE Communications Surveys and Tutorials, 19(2), 1112–1144. https://doi.org/10.1109/comst.2017.2659646
- Real-time forensics through endpoint visibility / Kieseberg, P., Neuner, S., Schrittwieser, S., Schmiedecker, M., & Weippl, E. (2017). Real-time forensics through endpoint visibility. In Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic, EU. LNICST SpringerLink Digital Library. http://hdl.handle.net/20.500.12708/57200
- Grid Shock: Coordinated Load-Changing Attacks on Power Grids / Dabrowski, A., Ullrich, J., & Weippl, E. (2017). Grid Shock: Coordinated Load-Changing Attacks on Power Grids. In Proceedings of the 2017 Annual Computer Security Applications Conference. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/57199
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974
- Lightweight Address Hopping for Defending the IPv6 IoT / Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56973
- Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS / Neuner, S., Voyiatzis, A. G., Schmiedecker, M., & Weippl, E. (2017). Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56971
- I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS / Krombholz, K., Mayer, W., Mulazzani, M., & Weippl, E. (2017). I Have No Idea What I’m Doing - On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Security Symposium. 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada, Non-EU. http://hdl.handle.net/20.500.12708/56967
- PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks / Machida, S., Dabrowski, A., Weippl, E., & Echizen, I. (2017). PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. In I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability (pp. 261–275). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57198
2016
- Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners / Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103
- Effectiveness of file‐based deduplication in digital forensics / Neuner, S., Schmiedecker, M., & Weippl, E. (2016). Effectiveness of file‐based deduplication in digital forensics. Security and Communication Networks, 9(15), 2876–2885. http://hdl.handle.net/20.500.12708/150121
- A Framework for Security Transparency in Cloud Computing / Ismail, U. M., Islam, S., Ouedraogo, M., & Weippl, E. (2016). A Framework for Security Transparency in Cloud Computing. Future Internet, 8(1). http://hdl.handle.net/20.500.12708/150120
- The and security of firewalls in cyber-physical cloud computing / Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The and security of firewalls in cyber-physical cloud computing. EURASIP Journal on Information Security, 2016:18(18). http://hdl.handle.net/20.500.12708/150117
- A tamper-proof audit and control system for the doctor in the loop / Kieseberg, P., Malle, B., Frühwirt, P., Holzinger, A., & Weippl, E. (2016). A tamper-proof audit and control system for the doctor in the loop. Brain Informatics, 3(4), 269–279. http://hdl.handle.net/20.500.12708/150119
- Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? / Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., & Weippl, E. (2016). Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1), 1–37. https://doi.org/10.1145/2886012
- The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection / Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202
- The beauty or the beast? Attacking rate limits of the xen hypervisor / Ullrich, J., & Weippl, E. (2016). The beauty or the beast? Attacking rate limits of the xen hypervisor. In Computer Security - ESORICS 2016, Part II (pp. 493–512). http://hdl.handle.net/20.500.12708/57203
- Availability, Reliability, and Security in Information Systems / Availability, Reliability, and Security in Information Systems. (2016). In A. M. Tjoa, E. Weippl, P. Kieseberg, A. Holzinger, & F. Buccafurri (Eds.), Lecture Notes in Computer Science. Springer LNCS 9817. https://doi.org/10.1007/978-3-319-45507-5
2015
- Advanced social engineering attacks / Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005
- Network Security Challenges in Android Applications / Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236
- Gradually Improving the Forensic Process / Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually Improving the Forensic Process. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 404–410). IEEE. http://hdl.handle.net/20.500.12708/56235
- Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210
- Error-Correcting Codes as Source for Decoding Ambiguity / Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209
- Smart Privacy Visor: Bridging the Privacy Gap / Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208
- On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / Ullrich, J., Kieseberg, P., Krombholz, K., & Weippl, E. (2015). On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 186–192). IEEE. http://hdl.handle.net/20.500.12708/56202
- QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201
- Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / Krombholz, K., Frauenberger, C., & Weippl, E. (2015). Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology. In SOUPS ’15 Full Proceedings. Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada, Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56200
- Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198
- Privacy is Not an Option: Attacking the IPv6 Privacy Extension / Ullrich, J., & Weippl, E. (2015). Privacy is Not an Option: Attacking the IPv6 Privacy Extension. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 448–468). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/56173
2014
- QR Code Security: A Survey of Attacks and Challenges for Usable Security / Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8
- An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets, 24(2), 113–124. https://doi.org/10.1007/s12525-014-0154-x
- Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations / Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885
- Genie in a Model? Why Model Driven Security will not secure your Web Application / Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875
- Enter Sandbox: Android Sandbox Comparison / Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124
- Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE / Khue, V. S., Anjomshoaa, A., & Tjoa, A. M. (2014). Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE. In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Availability, Reliability, and Security in Information Systems (pp. 138–154). Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6_10
- Hardware Trojans - Detect and React? / Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238
- E-voting authentication with QR-codes / Falkner, S., Kieseberg, P., Simos, D. E., Traxler, C., & Weippl, E. (2014). E-voting authentication with QR-codes. In Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 149–159). Springer. http://hdl.handle.net/20.500.12708/56197
- Towards a Hardware Trojan Detection Cycle / Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977
- Windows Installer Security / Kadluba, C., Mulazzani, M., Zechner, L., Neuner, S., & Weippl, E. (2014). Windows Installer Security. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55975
- Using Model Driven Security Approaches in Web Application Development / Hochreiner, C., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Using Model Driven Security Approaches in Web Application Development. In Asian Conference on Availability, Reliability and Security. AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia, Non-EU. http://hdl.handle.net/20.500.12708/55972
- Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile / Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970
- Automated Analysis of Underground Marketplaces / Hudic, A., Krombholz, K., Otterbein, T., Platzer, C., & Weippl, E. (2014). Automated Analysis of Underground Marketplaces. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55966
- Towards Fully Automated Digital Alibis with Social Interaction / Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965
- Spoiled Onions: Exposing Malicious Tor Exit Relays / Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959
- QR - Inception: Barcode in Barcode Attacks / Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952
- InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles / Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951
- IMSI-Catch Me If You Can: IMSI-Catcher-Catchers / Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950
- IPv6 Security: Attacks and Countermeasures in a Nutshell / Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399
- Protecting Anonymity in Data-Driven Biomedical Science / Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., & Holzinger, A. (2014). Protecting Anonymity in Data-Driven Biomedical Science. In A. Holzinger & I. Jurisica (Eds.), Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 301–316). Springer-Verlag. https://doi.org/10.1007/978-3-662-43968-5_17
- Availability, Reliability, and Security in Information Systems / Availability, Reliability, and Security in Information Systems. (2014). In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Lecture Notes in Computer Science. Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6
2013
- Information and Communicatiaon Technology / Mustofa, K., Neuhold, E., Tjoa, A. M., Weippl, E., & You, I. (Eds.). (2013). Information and Communicatiaon Technology: Vol. LNCS 7804. Springer. https://doi.org/10.1007/978-3-642-36818-9
- Hardware Malware / Krieg, C., Dabrowski, A., Hobel, H., Krombholz, K., & Weippl, E. (2013). Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, 4(2), 1–115. https://doi.org/10.2200/s00530ed1v01y201308spt006
- Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714
- Ethics in Security Research - Which Lines Should Not Be Crossed? / Schrittwieser, S., Weippl, E., & Mulazzani, M. (2013). Ethics in Security Research - Which Lines Should Not Be Crossed? Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85712
- Accounting and Management Information Systems: A Semantic Integration / Schwaiger, W., & Abmayer, M. (2013). Accounting and Management Information Systems: A Semantic Integration. In G. Kotsis, E. Weippl, M. Steinbauer, I. Khalil, & M. Indrawan-Santiago (Eds.), iiWAS2013; (pp. 346–352). The Association for Computing Machinery. http://hdl.handle.net/20.500.12708/66873
- Towards Security-Enhanced and Privacy-Preserving Mashup Compositions / Hobel, H., Heurix, J., Anjomshoaa, A., & Weippl, E. (2013). Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. In Security and Privacy Protection in Information Processing Systems (pp. 286–299). Springer-Verlag GmbH. https://doi.org/10.1007/978-3-642-39218-4_22
- Cloudoscopy: Services Discovery and Topology Mapping / Herzberg, A., Shulman, H., Ullrich, J., & Weippl, E. (2013). Cloudoscopy: Services Discovery and Topology Mapping. In Fifth ACM cloud computing security workshop (CCSW 2013) (pp. 113–122). http://hdl.handle.net/20.500.12708/54996
- Covert Computation - Hiding Code in Code for Obfuscation Purposes / Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990
- Quantifying Windows File Slack in Size and Stability / Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989
- Ethik in der Sicherheitsforschung / Schrittwieser, S., Mulazzani, M., Weippl, E., & Panhans, S. (2013). Ethik in der Sicherheitsforschung. In D-A-CH Security 2013. DACH Security 2013, Nürnberg, EU. http://hdl.handle.net/20.500.12708/54988
- Appinspect: large-scale evaluation of social networking apps / Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987
- SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985
- Securing a Space-Based Service Architecture with Coordination-Driven Access Control / Craß, S., Dönz, T., Joskowicz, G., Kühn, E., & Marek, A. (2013). Securing a Space-Based Service Architecture with Coordination-Driven Access Control. In E. Weippl, A. M. Tjoa, & S. Tjoa (Eds.), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Issue on Frontiers in Security and Dependability (p. 22). Innovative Information Science & Technology Research Group (ISYOU). http://hdl.handle.net/20.500.12708/54974
- A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System / Islam, S., Mouratidis, H., & Weippl, E. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing: Approaches and Tools (pp. 97–122). IGI Global. http://hdl.handle.net/20.500.12708/55063
- Malware in Hardware Infrastructure Components / Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197
2012
- Self-Monitoring in Social Networks / Anjomshoaa, A., Khue, V. S., Tahamtan, A., Tjoa, A. M., & Weippl, E. (2012). Self-Monitoring in Social Networks. International Journal of Intelligent Information and Database Systems, 6(4), 363. https://doi.org/10.1504/ijiids.2012.049110
- Digital Forensics for Enterprise Rights Management Systems / Schrittwieser, S., Kieseberg, P., & Weippl, E. (2012). Digital Forensics for Enterprise Rights Management Systems. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (p. 10). ACM. http://hdl.handle.net/20.500.12708/54523
- InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs / Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520
- Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications / Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519
- Malicious Pixels: Using QR Codes as Attack Vector / Kieseberg, P., Schrittwieser, S., Leithner, M., Mulazzani, M., Weippl, E., Munroe, L., & Sinha, M. (2012). Malicious Pixels: Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing (pp. 21–38). Atlantic Press. http://hdl.handle.net/20.500.12708/27834
- QMHE2012 / Avasilcai, S., Tjoa, A. M., Hutu, C. A., & Weippl, E. (Eds.). (2012). QMHE2012. OCG (Österreichische Computer Gesellschaft). http://hdl.handle.net/20.500.12708/23672
2011
- A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems / Schwarzl, C., & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering, 2(1), 40–83. https://doi.org/10.4018/jsse.2011010103
- Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843
- Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219
- Trees Cannot Lie: Using Data Structures for Forensics Purposes / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934
- Cloud Speicherdienste als Angriffsvektoren / Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931
- Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930
- Social Snapshots: Digital Forensics for Online Social Networks / Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929
- An Algorithm for k-anonymity-based Fingerprinting / Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., & Weippl, E. (2011). An Algorithm for k-anonymity-based Fingerprinting. In Proceedings of the 10th International Workshop on Digital-forensics and Watermarking. International Workshop on Digital-forensics and Watermarking, Atlantic City, USA, Non-EU. http://hdl.handle.net/20.500.12708/53927
- Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926
2010
- Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System / Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270
- Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten / Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. E & i Elektrotechnik Und Informationstechnik, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2
- Exploiting Ontology for Software License Agreements / Asfand-E-Yar, M., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). Exploiting Ontology for Software License Agreements. International Journal of Software and Informatics, 4(1), 89–100. http://hdl.handle.net/20.500.12708/167084
- Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. Interaction Design and Architecture(s) Journal, 9–10, 85–103. http://hdl.handle.net/20.500.12708/168194
- Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems. In Proceedings of 10th IEEE International Conference on Advanced Learning Technologies (pp. 734–735). http://hdl.handle.net/20.500.12708/53736
- Tor HTTP usage and information leakage / Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521
- A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC) / Racz, N., Seufert, A., & Weippl, E. (2010). A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC). In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53520
- A process model for integrated IT governance, risk, and compliance management / Racz, N., Seufert, A., & Weippl, E. (2010). A process model for integrated IT governance, risk, and compliance management. In Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010) (pp. 155–170). http://hdl.handle.net/20.500.12708/53519
- Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites / Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518
- Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments / Farman, A. K., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments. In Proceedings of EDMEDIA 2010. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/53507
- Questioning the need for separate IT risk management frameworks / Racz, N., Seufert, A., & Weippl, E. (2010). Questioning the need for separate IT risk management frameworks. In Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2. Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig, EU. Springer LNI. http://hdl.handle.net/20.500.12708/53506
- Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises / Racz, N., Panitz, J., Amberg, M., Weippl, E., & Seufert, A. (2010). Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises. In Proceedings of the 21st Australasian Conference on Information Systems (ACIS). ACIS 2010, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53504
- A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: / Tahamtan, A., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: In Knowledge Science, Engineering & Management (pp. 412–423). Springer. http://hdl.handle.net/20.500.12708/53315 / Project: Secure2.0
- Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects / Sunindyo, W. D., Biffl, S., Frühwirth, C., Mordinyi, R., Moser, T., Schatten, A., Schrittwieser, S., Weippl, E., & Winkler, D. (2010). Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session (pp. 1–2). COREP Vauban. http://hdl.handle.net/20.500.12708/53214
- Addressing misalignment between information security metrics and business-driven security objectives / Fruehwirth, C., Biffl, S., Tabatabai, M., & Weippl, E. (2010). Addressing misalignment between information security metrics and business-driven security objectives. In G. Succi, M. Morisio, & N. Nagappan (Eds.), Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec ’10. https://doi.org/10.1145/1853919.1853927
- Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform / Frühwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., & Sunindyo, W. D. (2010). Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session (pp. 1–2). http://hdl.handle.net/20.500.12708/53188
- InnoDB Database Forensics / Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981
- Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop / Ahmed, M., & Weippl, E. (2010). Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52979
- Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case / Anjomshoaa, A., Khue, V. S., Tjoa, A. M., Weippl, E., & Michael, H. (2010). Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010) (pp. 180–189). Springer. http://hdl.handle.net/20.500.12708/52975
- An event-based empirical process analysis framework / Sunindyo, W. D., Biffl, S., Mordinyi, R., Moser, T., Schatten, A., Tabatabai, M., Wahyudin, D., Weippl, E., & Winkler, D. (2010). An event-based empirical process analysis framework. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM ’10. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy, EU. https://doi.org/10.1145/1852786.1852867
- Social Engineering / Böck, B., & Weippl, E. (2010). Social Engineering. In The Handbook of Technology Management. John Wiley & Sons Ltd. http://hdl.handle.net/20.500.12708/26599
2009
- Automation Of Post-Exploitation / Tabatabai Irani, M., & Weippl, E. (2009). Automation Of Post-Exploitation. International Journal of Web Information Systems (IJWIS), 5(4), 518–536. http://hdl.handle.net/20.500.12708/166271
- Can End-to-End Verifiable E-Voting be Explained Easily? / Kalchgruber, P., & Weippl, E. (2009). Can End-to-End Verifiable E-Voting be Explained Easily? In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009). IIWAS, Austria. ACM Press. http://hdl.handle.net/20.500.12708/52980
- Automation of Post-exploitation / Irani, M. T., & Weippl, E. R. (2009). Automation of Post-exploitation. In Security Technology (pp. 250–257). Springer LNCS. https://doi.org/10.1007/978-3-642-10847-1_31
- An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System / Farman, A. K., & Weippl, E. (2009). An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System. In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009). IIWAS, Austria. ACM. http://hdl.handle.net/20.500.12708/52977
- Blending the Sketched Use Case Scenario with License Agreements Using Semantics / Asfand-e-yar, M., Anjomshoaa, A., Weippl, E. R., & Tjoa, A. M. (2009). Blending the Sketched Use Case Scenario with License Agreements Using Semantics. In Knowledge Science, Engineering and Management (pp. 275–284). Springer, LNAI. https://doi.org/10.1007/978-3-642-10488-6_28
- Screen Recording for E-Learning / Weippl, E., & Schnabl, S. (2009). Screen Recording for E-Learning. In Proceedings of ED-MEDIA 2009 (pp. 1271–1277). http://hdl.handle.net/20.500.12708/52671
- Integrated Approach for the Detection of Learning Styles & Affective States / Weippl, E., Tjoa, A. M., Graf, S., & Farman, A. K. (2009). Integrated Approach for the Detection of Learning Styles & Affective States. In Proceedings of ED-MEDIA 2009 (pp. 753–761). http://hdl.handle.net/20.500.12708/52670
- Security in Data Warehouses / Weippl, E. (2009). Security in Data Warehouses. In Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (pp. 272–279). IGI Global. http://hdl.handle.net/20.500.12708/26598
2008
- XML Security - A Comparative Literature Review / Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763 / Project: SecOnt
- Cyber Attacks and the article 5 of the Treaty of NATO / Weippl, E. (2008). Cyber Attacks and the article 5 of the Treaty of NATO. Euro Atlantic Quartely, 3(4), 22. http://hdl.handle.net/20.500.12708/171290
- Chair’s Message / Weippl, E. (2008). Chair’s Message. In Proceedings of the The Third International Conference on Availability, Security, and Reliability ARES 2008. IEEE Computer Society Press. https://doi.org/10.1109/ARES.2008.4
- Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other / Obermüller, E., & Krameritsch, J. (2008). Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (p. 8). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77782
- Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity / Reichl, F., Csanyi, G., Herbst, I., Hruska, A., Obermüller, E., Fröhlich, J., Michalek, C.-R., & Spiegl, A. (2008). Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (pp. 465–473). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77769
- The Learning Process According to the Brain / Csanyi, G. (2008). The Learning Process According to the Brain. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 2342–2347). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77759
- Fortification of IT Security by Automatic Security Advisory Processing / Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69 / Project: SecOnt
- Semantic Potential of existing Security Advisory Standards / Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160 / Project: SecOnt
- Massive "Multiplayer" E-Learning / Purgathofer, P., & Reinthaler, W. (2008). Massive “Multiplayer” E-Learning. In E. Weippl & J. Luca (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2008 (p. 9). AACE. http://hdl.handle.net/20.500.12708/52509
- Security, Trust and Privacy on Mobile Devices and Multimedia Applications / Weippl, E., & Riedl, B. (2008). Security, Trust and Privacy on Mobile Devices and Multimedia Applications. In Handbook of Research on Mobile Multimedia, Second Edition (pp. 115–131). Information Science Reference. http://hdl.handle.net/20.500.12708/26600
- Improving Storage Concepts for Semantic Models and Ontologies / Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370
- ED-MEDIA Conference Proceedings 2008 / Weippl, E., & Luca, J. (Eds.). (2008). ED-MEDIA Conference Proceedings 2008. AACE. http://hdl.handle.net/20.500.12708/23011
2007
- Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
- Dependability in e-assessment / Weippl, E. (2007). Dependability in e-assessment. International Journal on E-Learning, 6(2), 293–302. http://hdl.handle.net/20.500.12708/169623
- Forschung und Praxis der Informationssicherheit / Weippl, E. (2007). Forschung und Praxis der Informationssicherheit. University meets Public, Vienna, Austria. http://hdl.handle.net/20.500.12708/84576
- Security Ontologies: Improving Quantitative Risk Analysis / Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 / Project: SecOnt
- Ontological Mapping of Common Criteria's Security Assurance Requirements / Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164
- Formal Threat Descriptions for Enhancing Governmental Risk Assessment / Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161
- Security Issues for the Use of Semantic Web in E-Commerce / Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1 / Project: SecOnt
- Comparative Literature Review on RFID Security and Privacy / Riedl, B., Goluch, G., Pöchlinger, S., & Weippl, E. (2007). Comparative Literature Review on RFID Security and Privacy. In Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007). 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien, Non-EU. Österreichische Computer Gesellschaft. http://hdl.handle.net/20.500.12708/51858
- Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard / Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29 / Project: SecOnt
- Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse / Weippl, E., Latif, K., & Tjoa, A. M. (2007). Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. In IEEE International Conference on Information Reuse and Integration (pp. 170–176). http://hdl.handle.net/20.500.12708/51807
- Security Ontologies: How to Improve Understanding of Complex Relationships / Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804 / Project: SecOnt
- Security Aspects In Semantic Web Services Filtering / Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916 / Project: SecOnt
- Database Security and Statistical Database Security / Weippl, E. (2007). Database Security and Statistical Database Security. In J. Wang (Ed.), Encyclopedia of Data Warehousing and Mining. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25405
- Business Requirements of Backup Systems / Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394
- Social Engineering / Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393
2006
- Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure / Weippl, E. (2006). Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure. Information Systems Control Journal, 4(10). http://hdl.handle.net/20.500.12708/173392
- Security Aspects of Ubiquitious Computing in Health Care / Weippl, E., & Tjoa, A. M. (2006). Security Aspects of Ubiquitious Computing in Health Care. Elektrotechnik Und Informationstechnik, 123(4), 156–161. http://hdl.handle.net/20.500.12708/173391
- Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF / Neubauer, T., Weippl, E., & Biffl, S. (2006). Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 723–731). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51391
- Workshop-based multiobjective security safeguard selection / Neubauer, T., Stummer, C., & Weippl, E. (2006). Workshop-based multiobjective security safeguard selection. In First International Conference on Availability, Reliability and Security (ARES’06). First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria. IEEE Computer Society. https://doi.org/10.1109/ares.2006.144
- Digitale PDF-Signaturen mit der Bürgerkarte / Weippl, E. (2006). Digitale PDF-Signaturen mit der Bürgerkarte. In Proceedings of D-A-CH 2006. D-A-CH 2006, Duesseldorf, EU. http://hdl.handle.net/20.500.12708/51426
- Nichtabstreitbarkeit und Audits in ELearning / Weippl, E., & Goluch, G. (2006). Nichtabstreitbarkeit und Audits in ELearning. In IRIS 2006. IRIS, Salzburg, Austria, Austria. http://hdl.handle.net/20.500.12708/51425
- Security Ontology: Simulating Threats to Corporate Assets / Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 / Project: SecOnt
- Workshop-based Multiobjective Security Safeguard Selection / Neubauer, T., & Weippl, E. (2006). Workshop-based Multiobjective Security Safeguard Selection. In Proceedings of ARES 2006. IEEE Computer Society, Vienna, Austria. http://hdl.handle.net/20.500.12708/51424
- Addressing the Weakest Link: How to improve teaching of IT security / Weippl, E. (2006). Addressing the Weakest Link: How to improve teaching of IT security. In Proceedings of EDMEDIA 2006 (pp. 223–227). http://hdl.handle.net/20.500.12708/51422
- Ontology-based IT-Security planning / Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421 / Project: SecOnt
- Implementing IT Security for Small and Medium-Sized Enterprises / Weippl, E., & Klemen, M. (2006). Implementing IT Security for Small and Medium-Sized Enterprises. In Enterprise Information Systems Assurance and System Managerial and Technical Issues. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25386
- Securing Mobile Communication: RADIUS in a Windows Environment / Weippl, E. (2006). Securing Mobile Communication: RADIUS in a Windows Environment. In Mobile Multimedia: Communication Engineering Perspective (pp. 22–37). Nova Science Publishers. http://hdl.handle.net/20.500.12708/25385
- Computer Security in the Context of E-Learning / Weippl, E. (2006). Computer Security in the Context of E-Learning. In Encyclopedia of E-Commerce, E-Government and Mobile Commerce (pp. 135–141). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25371
- Security and Trust in Mobile Multimedia / Weippl, E. (2006). Security and Trust in Mobile Multimedia. In Handbook of Research on Mobile Multimedia (pp. 22–37). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25369
2005
- Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing / Nguyen, M. T., Tjoa, A. M., Weippl, E., & Brezany, P. (2005). Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. International Journal of Data Warehousing and Mining, IDEA GROUP(Vol. 1-4), 22–55. http://hdl.handle.net/20.500.12708/173340
- Security in e-learning / Weippl, E. (2005). Security in e-learning. ACM ELearn, 2005, 3. http://hdl.handle.net/20.500.12708/173360
- Privacy in e-learning: Anonymity, pseudonyms and authenticated usage / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: Anonymity, pseudonyms and authenticated usage. Interactive Technology and Smart Education (ITSE), 2005(2), 247–256. http://hdl.handle.net/20.500.12708/173359
- E-Learning without Text and Language: A Language-Free Learning Model / Kalinyaprak, H., Futschek, G., Blaha, G., & Weippl, E. (2005). E-Learning without Text and Language: A Language-Free Learning Model. In ED-MEDIA 2005. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/51032
- Privacy in e-learning: How to implement anonymity / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: How to implement anonymity. In Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC). International Workshop on e-Learning Online Communities - eLOC 2005, Cairo, Non-EU. IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/51217
- The semantic desktop: A semantic personal information management system based on rdf and topic maps / Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216
- Dependability in e-assessment / Weippl, E. (2005). Dependability in e-assessment. In Proceedings of EDMEDIA 2005 (pp. 1674–1679). AACE. http://hdl.handle.net/20.500.12708/51215
- On cooperatively creating dynamic ontologies / Gahleitner, E., Palkoska, J., & Weippl, E. (2005). On cooperatively creating dynamic ontologies. In Proceedings of the 16th ACM Conference on Hypertext and Hypermedia. Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg, Austria. http://hdl.handle.net/20.500.12708/51214
- Semantic storage: A report on performance and flexibility / Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213
- Non-repudiation and audits in e-learning / Weippl, E. (2005). Non-repudiation and audits in e-learning. In Proceedings of E-Learn 2005 (pp. 1785–1790). http://hdl.handle.net/20.500.12708/51212
- Security in E-Learning / Weippl, E. (2005). Security in E-Learning. In The Handbook of Information Security. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25372
- Security in E-Learning / Weippl, E. (2005). Security in E-Learning. Springer. http://hdl.handle.net/20.500.12708/22294
2004
- Content-basierte Zugriffsrechte in E-Learning Systemen / Weippl, E., & Klemen, M. (2004). Content-basierte Zugriffsrechte in E-Learning Systemen. ÖGAI Journal, 23(4), 24–29. http://hdl.handle.net/20.500.12708/174838
Supervisions
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.
2023
- Ethereum Attack Simulator. A Discrete Event Simulation Engine for Attacks against the Ethereum Blockchain / Maitz, A. (2023). Ethereum Attack Simulator. A Discrete Event Simulation Engine for Attacks against the Ethereum Blockchain [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.102026
- Mental Models of Cryptographic Protocols from Different Stakeholder Perspectives / Mai, A. (2023). Mental Models of Cryptographic Protocols from Different Stakeholder Perspectives [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.110704
- Graph-theoretic Analysis of the IPv4/IPv6 Routing Infrastructure / Fodor, T. B. (2023). Graph-theoretic Analysis of the IPv4/IPv6 Routing Infrastructure [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.105646
- Bitcoin Network Topology Discovery Using Timing Analysis / Klonowski, T. (2023). Bitcoin Network Topology Discovery Using Timing Analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.104666
- Privacy-Preserving Collaborative Anomaly Detection / Arfaoui, G. (2023). Privacy-Preserving Collaborative Anomaly Detection [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.102061
2022
- Advances in distributed randomness / Schindler, P. (2022). Advances in distributed randomness [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.107310
- Power Consumption of TLS / Causevic, A. (2022). Power Consumption of TLS [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.78581
- Automated stitching for scanning electron microscopy images of integrated circuits / Burian, D. (2022). Automated stitching for scanning electron microscopy images of integrated circuits [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.83154
2021
- Measuring privacy-enhancing technologies / Mayer, W. (2021). Measuring privacy-enhancing technologies [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.100322
- Identification of obfuscated function clones in binaries using machine learning / Pucher, M. (2021). Identification of obfuscated function clones in binaries using machine learning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.87962
- On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approach / Schachenhofer, B. (2021). On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approach [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.86556
- Smart home privacy leaks / Treiber, S. (2021). Smart home privacy leaks [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.79860
- Race to the door - A Goldfinger attack on proof of work cryptocurrencies / Rosegger, A. (2021). Race to the door - A Goldfinger attack on proof of work cryptocurrencies [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.90805
- Privacy-preserving remote attestation protocol / George, D. R. (2021). Privacy-preserving remote attestation protocol [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.86825
- Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network Operators / Gegenhuber, G. K. (2021). Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network Operators [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.81341
- A bionic view on complex software systems and the consequences for digital sustainability / Tomic, V. (2021). A bionic view on complex software systems and the consequences for digital sustainability [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.82584
- Investigating router misconfigurations on the IPv6 internet / Maier, M. (2021). Investigating router misconfigurations on the IPv6 internet [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.77442
- Comparison and evaluation of the attacks and defenses against adversarial attacks / Jankovic, A. (2021). Comparison and evaluation of the attacks and defenses against adversarial attacks [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.73829
- Backdoor defenses / Milakovic, A. (2021). Backdoor defenses [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.73830
- Object capabilities and their benefits for web application security / Koppmann, M. (2021). Object capabilities and their benefits for web application security [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.80738
2020
- Security and privacy of secure messaging services : a case study of wire / Boll, A. (2020). Security and privacy of secure messaging services : a case study of wire [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.41015
- On Hardware-based security in embedded systems : evaluating potential use of secure hardware in C-ITS stations / Hechenberger, G. (2020). On Hardware-based security in embedded systems : evaluating potential use of secure hardware in C-ITS stations [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.67806
- Semantic approaches to detect file system log events for analyzing data exfiltration / Fröschl, A. (2020). Semantic approaches to detect file system log events for analyzing data exfiltration [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.59160
- IoT guard: usable transparency and control over smart home IoT devices / Victora, S. (2020). IoT guard: usable transparency and control over smart home IoT devices [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.53900
- Opcode coverage-guided virtualization deobfuscation based on symbolic execution / Tatzer, C. (2020). Opcode coverage-guided virtualization deobfuscation based on symbolic execution [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79934
- Hashiko: a generative hybrid password manager for android : design, implementation and security analysis / Jofen, P. (2020). Hashiko: a generative hybrid password manager for android : design, implementation and security analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/78420
- Towards a scalable secure element cluster : a recommendation on hardware configuration / Hinterleitner, T. (2020). Towards a scalable secure element cluster : a recommendation on hardware configuration [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.72905
2019
- Mitigating return address leaks with software diversity / Berlakovich, F. (2019). Mitigating return address leaks with software diversity [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.57687
- Ein Multi-Architektur Decompiler / Wagner, T. (2019). Ein Multi-Architektur Decompiler [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.58400
- Automatic identification of cross-container side-channels / Baumgartner, J. (2019). Automatic identification of cross-container side-channels [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.60810
- Efficient and effective response to computer security incidents and cybercrime : system-level defenses against USB-based attacks / Neuner, S. (2019). Efficient and effective response to computer security incidents and cybercrime : system-level defenses against USB-based attacks [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.66290
- Evaluation and improvement of ethereum light clients / Weißkirchner, P. (2019). Evaluation and improvement of ethereum light clients [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.72202
- Human assisted information extraction through Bluetooth low energy on android / Szivos, G. Z. (2019). Human assisted information extraction through Bluetooth low energy on android [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.53964
2018
- Efficient algorithms and tools for practical combinatorial testing / Kleine, K. (2018). Efficient algorithms and tools for practical combinatorial testing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.55567
- Security and privacy in large-scale Infrastructure / Dabrowski, A. M. (2018). Security and privacy in large-scale Infrastructure [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.58883
2016
- IPv6 high performance scanning / Kukovic, C. (2016). IPv6 high performance scanning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.35201
2015
- Straightjacket: tightening process execution policies at runtime / Gadllah, A. (2015). Straightjacket: tightening process execution policies at runtime [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.27913
2012
- Context-aware security analysis of mashups / Hobel, H. (2012). Context-aware security analysis of mashups [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-57186
2010
- Privacy enhanced role based access control model in object oriented environments with multiple frameworks / Richtsfeld, M. (2010). Privacy enhanced role based access control model in object oriented environments with multiple frameworks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159863
2008
- Digital rights management / Freund, W. (2008). Digital rights management [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-25051
Awards
-
Award for the 2nd highest CISA exam (2005) score in Europe and Africa.
2006 / USA
And more…
Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.
Until then, please visit Edgar Weippl’s research profile in TISS .