TU Wien Informatics

20 Years

Role

2023W

2024S

 

2023

  • Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? / Kieseberg, P., Weippl, E., Tjoa, A. M., Cabitza, F., Campagner, A., & Holzinger, A. (2023). Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? In A. Holzinger, P. Kieseberg, & F. Cabitza (Eds.), Machine Learning and Knowledge Extraction : 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings (pp. 1–12). Springer. https://doi.org/10.1007/978-3-031-40837-3_1

2022

2021

2020

  • User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach / Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., & Krombholz, K. (2020). User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 341–358). USENIX Association. http://hdl.handle.net/20.500.12708/153349
    Project: CDL-SQI (2018–2024)
  • HydRand: Efficient Continuous Distributed Randomness / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, United States of America (the). https://doi.org/10.1109/sp40000.2020.00003
  • Automated Security Risk Identification Using AutomationML-based Engineering Data / Eckhart, M., Ekelhart, A., & Weippl, E. (2020). Automated Security Risk Identification Using AutomationML-based Engineering Data. IEEE Transactions on Dependable and Secure Computing, 19(3), 1655–1672. https://doi.org/10.1109/tdsc.2020.3033150

2019

2018

  • Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3
  • Machine Learning and Knowledge Extraction / Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2018). Machine Learning and Knowledge Extraction. In Lecture Notes in Computer Science. International Cross-Domain Conference, CD-Make 2018, Hamburg, EU. Sprinter Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-319-99740-7
  • Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. / Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference (pp. 1–8). Springer. http://hdl.handle.net/20.500.12708/58777
  • On Security Research Towards Future Mobile Network Generations / Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research Towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728
  • A Framework for Monitoring Net Neutrality / Mayer, W., Schreiber, T., & Weippl, E. (2018). A Framework for Monitoring Net Neutrality. In The 13th International Conference on Availability, Reliability and Security (ARES 2018). The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, EU. ACM International Conference Proceeding Series. http://hdl.handle.net/20.500.12708/57445
  • A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678
  • Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447
  • Structural Limitations of B+-Tree forensics / Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. In Proceedings of the Central European Cybersecurity Conference 2018. Central European Cybersecurity Conference 2018, Ljubljana, Slowenia, EU. ACM Digital Library. https://doi.org/10.1145/3277570.3277579
  • USBlock: Blocking USB-Based Keypress Injection Attacks / Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C., & Weippl, E. (2018). USBlock: Blocking USB-Based Keypress Injection Attacks. In Data and Applications Security and Privacy XXXII (pp. 278–295). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57497
  • Security Challenges in Cyber-Physical Production Systems / Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Physical Production Systems. In Software Quality: Methods and Tools for Better Software and Systems (pp. 3–16). Springer Lecture Notes in Business Information Processing. http://hdl.handle.net/20.500.12708/57496

2017

  • I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS / Krombholz, K., Mayer, W., Mulazzani, M., & Weippl, E. (2017). I Have No Idea What I’m Doing - On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Security Symposium. 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada, Canada. http://hdl.handle.net/20.500.12708/56967
  • Real-time forensics through endpoint visibility / Kieseberg, P., Neuner, S., Schrittwieser, S., Schmiedecker, M., & Weippl, E. (2017). Real-time forensics through endpoint visibility. In Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic, EU. LNICST SpringerLink Digital Library. http://hdl.handle.net/20.500.12708/57200
  • Grid Shock: Coordinated Load-Changing Attacks on Power Grids / Dabrowski, A., Ullrich, J., & Weippl, E. (2017). Grid Shock: Coordinated Load-Changing Attacks on Power Grids. In Proceedings of the 2017 Annual Computer Security Applications Conference. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/57199
  • Lightweight Address Hopping for Defending the IPv6 IoT / Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56973
  • Network-Based Secret Communication in Clouds: A Survey / Ullrich, J., Zseby, T., Fabini, J., & Weippl, E. (2017). Network-Based Secret Communication in Clouds: A Survey. IEEE Communications Surveys and Tutorials, 19(2), 1112–1144. https://doi.org/10.1109/comst.2017.2659646
  • A Risk Management Framework for Cloud Migration Decision Support / Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010
  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974
  • Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS / Neuner, S., Voyiatzis, A. G., Schmiedecker, M., & Weippl, E. (2017). Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56971
  • PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks / Machida, S., Dabrowski, A., Weippl, E., & Echizen, I. (2017). PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. In I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability (pp. 261–275). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57198

2016

2015

  • Advanced social engineering attacks / Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210
  • Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / Krombholz, K., Frauenberger, C., & Weippl, E. (2015). Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology. In SOUPS ’15 Full Proceedings. Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada, Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56200
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / Ullrich, J., Kieseberg, P., Krombholz, K., & Weippl, E. (2015). On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 186–192). IEEE. http://hdl.handle.net/20.500.12708/56202
  • QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201
  • Privacy is Not an Option: Attacking the IPv6 Privacy Extension / Ullrich, J., & Weippl, E. (2015). Privacy is Not an Option: Attacking the IPv6 Privacy Extension. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 448–468). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/56173
  • Network Security Challenges in Android Applications / Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236
  • Gradually Improving the Forensic Process / Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually Improving the Forensic Process. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 404–410). IEEE. http://hdl.handle.net/20.500.12708/56235
  • Error-Correcting Codes as Source for Decoding Ambiguity / Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209
  • Smart Privacy Visor: Bridging the Privacy Gap / Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198

2014

  • QR Code Security: A Survey of Attacks and Challenges for Usable Security / Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8
  • Protecting Anonymity in Data-Driven Biomedical Science / Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., & Holzinger, A. (2014). Protecting Anonymity in Data-Driven Biomedical Science. In A. Holzinger & I. Jurisica (Eds.), Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 301–316). Springer-Verlag. https://doi.org/10.1007/978-3-662-43968-5_17
  • Hardware Trojans - Detect and React? / Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009
  • Towards a Hardware Trojan Detection Cycle / Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers / Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950
  • InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles / Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951
  • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets, 24(2), 113–124. https://doi.org/10.1007/s12525-014-0154-x
  • Genie in a Model? Why Model Driven Security will not secure your Web Application / Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875
  • Spoiled Onions: Exposing Malicious Tor Exit Relays / Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959
  • Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile / Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970
  • Using Model Driven Security Approaches in Web Application Development / Hochreiner, C., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Using Model Driven Security Approaches in Web Application Development. In Asian Conference on Availability, Reliability and Security. AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia, Non-EU. http://hdl.handle.net/20.500.12708/55972
  • Towards Fully Automated Digital Alibis with Social Interaction / Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965
  • QR - Inception: Barcode in Barcode Attacks / Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952
  • IPv6 Security: Attacks and Countermeasures in a Nutshell / Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399
  • Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238
  • Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations / Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885
  • Enter Sandbox: Android Sandbox Comparison / Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124
  • Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE / Khue, V. S., Anjomshoaa, A., & Tjoa, A. M. (2014). Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE. In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Availability, Reliability, and Security in Information Systems (pp. 138–154). Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6_10
  • E-voting authentication with QR-codes / Falkner, S., Kieseberg, P., Simos, D. E., Traxler, C., & Weippl, E. (2014). E-voting authentication with QR-codes. In Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 149–159). Springer. http://hdl.handle.net/20.500.12708/56197
  • Windows Installer Security / Kadluba, C., Mulazzani, M., Zechner, L., Neuner, S., & Weippl, E. (2014). Windows Installer Security. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55975
  • Automated Analysis of Underground Marketplaces / Hudic, A., Krombholz, K., Otterbein, T., Platzer, C., & Weippl, E. (2014). Automated Analysis of Underground Marketplaces. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55966
  • Availability, Reliability, and Security in Information Systems / Availability, Reliability, and Security in Information Systems. (2014). In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Lecture Notes in Computer Science. Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6

2013

  • Towards Security-Enhanced and Privacy-Preserving Mashup Compositions / Hobel, H., Heurix, J., Anjomshoaa, A., & Weippl, E. (2013). Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. In Security and Privacy Protection in Information Processing Systems (pp. 286–299). Springer-Verlag GmbH. https://doi.org/10.1007/978-3-642-39218-4_22
  • Hardware Malware / Krieg, C., Dabrowski, A., Hobel, H., Krombholz, K., & Weippl, E. (2013). Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, 4(2), 1–115. https://doi.org/10.2200/s00530ed1v01y201308spt006
  • Malware in Hardware Infrastructure Components / Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes / Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990
  • SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985
  • Ethics in Security Research - Which Lines Should Not Be Crossed? / Schrittwieser, S., Weippl, E., & Mulazzani, M. (2013). Ethics in Security Research - Which Lines Should Not Be Crossed? Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85712
  • Cloudoscopy: Services Discovery and Topology Mapping / Herzberg, A., Shulman, H., Ullrich, J., & Weippl, E. (2013). Cloudoscopy: Services Discovery and Topology Mapping. In Fifth ACM cloud computing security workshop (CCSW 2013) (pp. 113–122). http://hdl.handle.net/20.500.12708/54996
  • Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Asfand-e-yar, M., & Tjoa, A. M. (2013). Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. In A. M. Tjoa, E. Weippl, K. Mustofa, E. Neuhold, & I. You (Eds.), Lecture Notes in Computer Science (pp. 233–242). Springer LNCS. https://doi.org/10.1007/978-3-642-36818-9_24
  • Information and Communicatiaon Technology / Mustofa, K., Neuhold, E., Tjoa, A. M., Weippl, E., & You, I. (Eds.). (2013). Information and Communicatiaon Technology: Vol. LNCS 7804. Springer. https://doi.org/10.1007/978-3-642-36818-9
  • Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714
  • Accounting and Management Information Systems: A Semantic Integration / Schwaiger, W., & Abmayer, M. (2013). Accounting and Management Information Systems: A Semantic Integration. In G. Kotsis, E. Weippl, M. Steinbauer, I. Khalil, & M. Indrawan-Santiago (Eds.), iiWAS2013; (pp. 346–352). The Association for Computing Machinery. http://hdl.handle.net/20.500.12708/66873
  • Ethik in der Sicherheitsforschung / Schrittwieser, S., Mulazzani, M., Weippl, E., & Panhans, S. (2013). Ethik in der Sicherheitsforschung. In D-A-CH Security 2013. DACH Security 2013, Nürnberg, EU. http://hdl.handle.net/20.500.12708/54988
  • Quantifying Windows File Slack in Size and Stability / Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989
  • Appinspect: large-scale evaluation of social networking apps / Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987
  • Securing a Space-Based Service Architecture with Coordination-Driven Access Control / Craß, S., Dönz, T., Joskowicz, G., Kühn, E., & Marek, A. (2013). Securing a Space-Based Service Architecture with Coordination-Driven Access Control. In E. Weippl, A. M. Tjoa, & S. Tjoa (Eds.), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Issue on Frontiers in Security and Dependability (p. 22). Innovative Information Science & Technology Research Group (ISYOU). http://hdl.handle.net/20.500.12708/54974
  • A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System / Islam, S., Mouratidis, H., & Weippl, E. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing: Approaches and Tools (pp. 97–122). IGI Global. http://hdl.handle.net/20.500.12708/55063

2012

  • A Context-Aware Mashup Integration Guideline for Enterprise 2.0 / Bader, G., Anjomshoaa, A., & Tjoa, A. M. (2012). A Context-Aware Mashup Integration Guideline for Enterprise 2.0. In G. Quirchmayr, J. Basl, I. You, L. Xu, & E. R. Weippl (Eds.), Multidisciplinary Research and Practice for Informations Systems : IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings (pp. 17–30). Lecture Notes in Computer Science (LNCS) / Springer Verlag. https://doi.org/10.1007/978-3-642-32498-7_2
  • Malicious Pixels: Using QR Codes as Attack Vector / Kieseberg, P., Schrittwieser, S., Leithner, M., Mulazzani, M., Weippl, E., Munroe, L., & Sinha, M. (2012). Malicious Pixels: Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing (pp. 21–38). Atlantic Press. http://hdl.handle.net/20.500.12708/27834
  • Self-Monitoring in Social Networks / Anjomshoaa, A., Khue, V. S., Tahamtan, A., Tjoa, A. M., & Weippl, E. (2012). Self-Monitoring in Social Networks. International Journal of Intelligent Information and Database Systems, 6(4), 363. https://doi.org/10.1504/ijiids.2012.049110
  • Digital Forensics for Enterprise Rights Management Systems / Schrittwieser, S., Kieseberg, P., & Weippl, E. (2012). Digital Forensics for Enterprise Rights Management Systems. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (p. 10). ACM. http://hdl.handle.net/20.500.12708/54523
  • InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs / Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520
  • Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications / Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519
  • QMHE2012 / Avasilcai, S., Tjoa, A. M., Hutu, C. A., & Weippl, E. (Eds.). (2012). QMHE2012. OCG (Österreichische Computer Gesellschaft). http://hdl.handle.net/20.500.12708/23672

2011

  • A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems / Schwarzl, C., & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering, 2(1), 40–83. https://doi.org/10.4018/jsse.2011010103
  • Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843
  • Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219
  • Trees Cannot Lie: Using Data Structures for Forensics Purposes / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934
  • Cloud Speicherdienste als Angriffsvektoren / Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931
  • Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930
  • Social Snapshots: Digital Forensics for Online Social Networks / Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929
  • An Algorithm for k-anonymity-based Fingerprinting / Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., & Weippl, E. (2011). An Algorithm for k-anonymity-based Fingerprinting. In Proceedings of the 10th International Workshop on Digital-forensics and Watermarking. International Workshop on Digital-forensics and Watermarking, Atlantic City, USA, Non-EU. http://hdl.handle.net/20.500.12708/53927
  • Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926

2010

  • Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten / Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik : e & i, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2
  • Tor HTTP usage and information leakage / Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521
  • A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC) / Racz, N., Seufert, A., & Weippl, E. (2010). A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC). In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53520
  • Social Engineering / Böck, B., & Weippl, E. (2010). Social Engineering. In The Handbook of Technology Management. John Wiley & Sons Ltd. http://hdl.handle.net/20.500.12708/26599
  • Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. Interaction Design and Architecture(s) Journal, 9–10, 85–103. http://hdl.handle.net/20.500.12708/168194
  • Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems. In Proceedings of 10th IEEE International Conference on Advanced Learning Technologies (pp. 734–735). http://hdl.handle.net/20.500.12708/53736
  • Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop / Ahmed, M., & Weippl, E. (2010). Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52979
  • Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System / Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270
  • Exploiting Ontology for Software License Agreements / Asfand-E-Yar, M., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). Exploiting Ontology for Software License Agreements. International Journal of Software and Informatics, 4(1), 89–100. http://hdl.handle.net/20.500.12708/167084
  • A process model for integrated IT governance, risk, and compliance management / Racz, N., Seufert, A., & Weippl, E. (2010). A process model for integrated IT governance, risk, and compliance management. In Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010) (pp. 155–170). http://hdl.handle.net/20.500.12708/53519
  • Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites / Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518
  • Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments / Farman, A. K., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments. In Proceedings of EDMEDIA 2010. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/53507
  • Questioning the need for separate IT risk management frameworks / Racz, N., Seufert, A., & Weippl, E. (2010). Questioning the need for separate IT risk management frameworks. In Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2. Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig, EU. Springer LNI. http://hdl.handle.net/20.500.12708/53506
  • Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises / Racz, N., Panitz, J., Amberg, M., Weippl, E., & Seufert, A. (2010). Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises. In Proceedings of the 21st Australasian Conference on Information Systems (ACIS). ACIS 2010, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53504
  • A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: / Tahamtan, A., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: In Knowledge Science, Engineering & Management (pp. 412–423). Springer. http://hdl.handle.net/20.500.12708/53315
    Project: Secure2.0 (2009–2014)
  • Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects / Sunindyo, W. D., Biffl, S., Frühwirth, C., Mordinyi, R., Moser, T., Schatten, A., Schrittwieser, S., Weippl, E., & Winkler, D. (2010). Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session (pp. 1–2). COREP Vauban. http://hdl.handle.net/20.500.12708/53214
  • Addressing misalignment between information security metrics and business-driven security objectives / Fruehwirth, C., Biffl, S., Tabatabai, M., & Weippl, E. (2010). Addressing misalignment between information security metrics and business-driven security objectives. In G. Succi, M. Morisio, & N. Nagappan (Eds.), Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec ’10. https://doi.org/10.1145/1853919.1853927
  • Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform / Frühwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., & Sunindyo, W. D. (2010). Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session (pp. 1–2). http://hdl.handle.net/20.500.12708/53188
  • InnoDB Database Forensics / Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981
  • Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case / Anjomshoaa, A., Khue, V. S., Tjoa, A. M., Weippl, E., & Michael, H. (2010). Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010) (pp. 180–189). Springer. http://hdl.handle.net/20.500.12708/52975
  • An event-based empirical process analysis framework / Sunindyo, W. D., Biffl, S., Mordinyi, R., Moser, T., Schatten, A., Tabatabai, M., Wahyudin, D., Weippl, E., & Winkler, D. (2010). An event-based empirical process analysis framework. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM ’10. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy, EU. https://doi.org/10.1145/1852786.1852867

2009

  • Security in Data Warehouses / Weippl, E. (2009). Security in Data Warehouses. In Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (pp. 272–279). IGI Global. http://hdl.handle.net/20.500.12708/26598
  • Automation Of Post-Exploitation / Tabatabai Irani, M., & Weippl, E. (2009). Automation Of Post-Exploitation. International Journal of Web Information Systems (IJWIS), 5(4), 518–536. http://hdl.handle.net/20.500.12708/166271
  • Can End-to-End Verifiable E-Voting be Explained Easily? / Kalchgruber, P., & Weippl, E. (2009). Can End-to-End Verifiable E-Voting be Explained Easily? In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009). IIWAS, Austria. ACM Press. http://hdl.handle.net/20.500.12708/52980
  • Automation of Post-exploitation / Irani, M. T., & Weippl, E. R. (2009). Automation of Post-exploitation. In Security Technology (pp. 250–257). Springer LNCS. https://doi.org/10.1007/978-3-642-10847-1_31
  • An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System / Farman, A. K., & Weippl, E. (2009). An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System. In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009). IIWAS, Austria. ACM. http://hdl.handle.net/20.500.12708/52977
  • Blending the Sketched Use Case Scenario with License Agreements Using Semantics / Asfand-e-yar, M., Anjomshoaa, A., Weippl, E. R., & Tjoa, A. M. (2009). Blending the Sketched Use Case Scenario with License Agreements Using Semantics. In Knowledge Science, Engineering and Management (pp. 275–284). Springer, LNAI. https://doi.org/10.1007/978-3-642-10488-6_28
  • Screen Recording for E-Learning / Weippl, E., & Schnabl, S. (2009). Screen Recording for E-Learning. In Proceedings of ED-MEDIA 2009 (pp. 1271–1277). http://hdl.handle.net/20.500.12708/52671
  • Integrated Approach for the Detection of Learning Styles & Affective States / Weippl, E., Tjoa, A. M., Graf, S., & Farman, A. K. (2009). Integrated Approach for the Detection of Learning Styles & Affective States. In Proceedings of ED-MEDIA 2009 (pp. 753–761). http://hdl.handle.net/20.500.12708/52670

2008

  • Improving Storage Concepts for Semantic Models and Ontologies / Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370
  • Security, Trust and Privacy on Mobile Devices and Multimedia Applications / Weippl, E., & Riedl, B. (2008). Security, Trust and Privacy on Mobile Devices and Multimedia Applications. In Handbook of Research on Mobile Multimedia, Second Edition (pp. 115–131). Information Science Reference. http://hdl.handle.net/20.500.12708/26600
  • XML Security - A Comparative Literature Review / Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763
    Project: SecOnt (2008–2010)
  • Cyber Attacks and the article 5 of the Treaty of NATO / Weippl, E. (2008). Cyber Attacks and the article 5 of the Treaty of NATO. Euro Atlantic Quartely, 3(4), 22. http://hdl.handle.net/20.500.12708/171290
  • Chair’s Message / Weippl, E. (2008). Chair’s Message. In Proceedings of the The Third International Conference on Availability, Security, and Reliability ARES 2008. IEEE Computer Society Press. https://doi.org/10.1109/ARES.2008.4
  • Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other / Obermüller, E., & Krameritsch, J. (2008). Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (p. 8). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77782
  • Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity / Reichl, F., Csanyi, G., Herbst, I., Hruska, A., Obermüller, E., Fröhlich, J., Michalek, C.-R., & Spiegl, A. (2008). Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (pp. 465–473). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77769
  • The Learning Process According to the Brain / Csanyi, G. (2008). The Learning Process According to the Brain. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 2342–2347). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77759
  • Fortification of IT Security by Automatic Security Advisory Processing / Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69
    Project: SecOnt (2008–2010)
  • Semantic Potential of existing Security Advisory Standards / Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160
    Project: SecOnt (2008–2010)
  • Massive "Multiplayer" E-Learning / Purgathofer, P., & Reinthaler, W. (2008). Massive “Multiplayer” E-Learning. In E. Weippl & J. Luca (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2008 (p. 9). AACE. http://hdl.handle.net/20.500.12708/52509
  • ED-MEDIA Conference Proceedings 2008 / Weippl, E., & Luca, J. (Eds.). (2008). ED-MEDIA Conference Proceedings 2008. AACE. http://hdl.handle.net/20.500.12708/23011

2007

  • Database Security and Statistical Database Security / Weippl, E. (2007). Database Security and Statistical Database Security. In J. Wang (Ed.), Encyclopedia of Data Warehousing and Mining. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25405
  • Social Engineering / Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393
  • Business Requirements of Backup Systems / Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394
  • Ontological Mapping of Common Criteria's Security Assurance Requirements / Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164
  • Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
  • Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard / Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29
    Project: SecOnt (2008–2010)
  • Comparative Literature Review on RFID Security and Privacy / Riedl, B., Goluch, G., Pöchlinger, S., & Weippl, E. (2007). Comparative Literature Review on RFID Security and Privacy. In Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007). 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien, Non-EU. Österreichische Computer Gesellschaft. http://hdl.handle.net/20.500.12708/51858
  • Dependability in e-assessment / Weippl, E. (2007). Dependability in e-assessment. International Journal on E-Learning: Corporate, Government, Healthcare & Higher Education, 6(2), 293–302. http://hdl.handle.net/20.500.12708/169623
  • Forschung und Praxis der Informationssicherheit / Weippl, E. (2007). Forschung und Praxis der Informationssicherheit. University meets Public, Vienna, Austria. http://hdl.handle.net/20.500.12708/84576
  • Security Ontologies: Improving Quantitative Risk Analysis / Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565
    Project: SecOnt (2008–2010)
  • Formal Threat Descriptions for Enhancing Governmental Risk Assessment / Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161
  • Security Issues for the Use of Semantic Web in E-Commerce / Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1
    Project: SecOnt (2008–2010)
  • Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse / Weippl, E., Latif, K., & Tjoa, A. M. (2007). Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. In IEEE International Conference on Information Reuse and Integration (pp. 170–176). http://hdl.handle.net/20.500.12708/51807
  • Security Ontologies: How to Improve Understanding of Complex Relationships / Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804
    Project: SecOnt (2008–2010)
  • Security Aspects In Semantic Web Services Filtering / Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916
    Project: SecOnt (2008–2010)

2006

2005

  • Security in E-Learning / Weippl, E. (2005). Security in E-Learning. In The Handbook of Information Security. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25372
  • On cooperatively creating dynamic ontologies / Gahleitner, E., Palkoska, J., & Weippl, E. (2005). On cooperatively creating dynamic ontologies. In Proceedings of the 16th ACM Conference on Hypertext and Hypermedia. Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg, Austria. http://hdl.handle.net/20.500.12708/51214
  • Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing / Nguyen, M. T., Tjoa, A. M., Weippl, E., & Brezany, P. (2005). Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. International Journal of Data Warehousing and Mining, IDEA GROUP(Vol. 1-4), 22–55. http://hdl.handle.net/20.500.12708/173340
  • Security in e-learning / Weippl, E. (2005). Security in e-learning. ACM ELearn, 2005, 3. http://hdl.handle.net/20.500.12708/173360
  • Privacy in e-learning: Anonymity, pseudonyms and authenticated usage / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: Anonymity, pseudonyms and authenticated usage. Interactive Technology and Smart Education (ITSE), 2005(2), 247–256. http://hdl.handle.net/20.500.12708/173359
  • E-Learning without Text and Language: A Language-Free Learning Model / Kalinyaprak, H., Futschek, G., Blaha, G., & Weippl, E. (2005). E-Learning without Text and Language: A Language-Free Learning Model. In ED-MEDIA 2005. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/51032
  • Privacy in e-learning: How to implement anonymity / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: How to implement anonymity. In Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC). International Workshop on e-Learning Online Communities - eLOC 2005, Cairo, Non-EU. IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/51217
  • The semantic desktop: A semantic personal information management system based on rdf and topic maps / Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216
  • Dependability in e-assessment / Weippl, E. (2005). Dependability in e-assessment. In Proceedings of EDMEDIA 2005 (pp. 1674–1679). AACE. http://hdl.handle.net/20.500.12708/51215
  • Semantic storage: A report on performance and flexibility / Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213
  • Non-repudiation and audits in e-learning / Weippl, E. (2005). Non-repudiation and audits in e-learning. In Proceedings of E-Learn 2005 (pp. 1785–1790). http://hdl.handle.net/20.500.12708/51212
  • Security in E-Learning / Weippl, E. (2005). Security in E-Learning. Springer. http://hdl.handle.net/20.500.12708/22294

2004

 

2024

  • Exact Methods for Covering Array Generation / Hiess, I. (2024). Exact Methods for Covering Array Generation [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.119362
    Download: PDF (1.51 MB)
  • Topology Discovery within the Bitcoin Network / Rosenblattl, J. (2024). Topology Discovery within the Bitcoin Network [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.87425
    Download: PDF (907 KB)
  • Fuzzing embedded protocols / Szewieczek, M. (2024). Fuzzing embedded protocols [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.113741
    Download: PDF (1.61 MB)

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

 

  • Award for the 2nd highest CISA exam (2005) score in Europe and Africa.
    2006 / USA

Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.

Until then, please visit Edgar Weippl’s research profile in TISS .