Edgar Weippl
Privatdoz. Dipl.-Ing. Mag.rer.soc.oec. Dr.techn.
Research Areas
- IT-Security, E-Learning
Role
-
Affiliated
Software Engineering, E194-01
Courses
2024W
- Bachelor Thesis / 188.919 / PR
- Research seminar for PhD students / 188.081 / SE
2025S
- Research seminar for PhD students / 188.081 / SE
Projects
-
Christian Doppler - Laboratory for Software Engineering Integration for Flexible Automation Systems
2010 – 2016 / Christian Doppler Research Association (CDG) -
HardObfuscation - Hardware-assisted software obfuscation for ERM
2010 – 2015 / Austrian Research Promotion Agency (FFG) -
Female Academy for Mentoring, Opportunities and Self-Development
2010 – 2014 / Austrian Research Promotion Agency (FFG) -
Secure 2.0 - Securing the Information Sharing on Web 2.0
2009 – 2014 / Austrian Research Promotion Agency (FFG)
Publications: 53315 / 53316 / 53317 -
Female Intrapreneurship Career Academy
2009 – 2012 / Austrian Research Promotion Agency (FFG) -
Austrian Grid: Grid Computing Infrastructure Initiative for Austria
2008 – 2010 / Federal Ministry of Science and Research (bm:wf) -
DynamOnt Methodology for Dynamic Ontology Creation
2005 – 2007 / Austrian Research Promotion Agency (FFG)
Publication: 51695
Publications
2024
- Tabular Reinforcement learning for Robust, Explainable CropRotation Policies Matching Deep Reinforcement LearningPerformance / Goldenits, G., Mallinger, K., Neubauer, T., & Weippl, E. (2024). Tabular Reinforcement learning for Robust, Explainable CropRotation Policies Matching Deep Reinforcement LearningPerformance. In EGU General Assembly 2024. EGU General Assembly 2024, Wien, Austria. EGU. https://doi.org/10.5194/egusphere-egu24-9018
- Message from General Chairs; EuroSP 2024 / Weippl, E., & Maffei, M. (2024). Message from General Chairs; EuroSP 2024. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 9th IEEE European Symposium on Security and Privacy Workshops (EUROS&PW 2024), Wien, Austria. https://doi.org/10.1109/EuroSPW61312.2024.00005
2023
- Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? / Kieseberg, P., Weippl, E., Tjoa, A. M., Cabitza, F., Campagner, A., & Holzinger, A. (2023). Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? In A. Holzinger, P. Kieseberg, & F. Cabitza (Eds.), Machine Learning and Knowledge Extraction : 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings (pp. 1–12). Springer. https://doi.org/10.1007/978-3-031-40837-3_1
2022
-
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems
/
Eckhart, M., Ekelhart, A., Biffl, S., Lüder, A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3193119
Project: CDL-SQI (2018–2024) -
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions
/
Ghesmati, S., Fdhila, W., & Weippl, E. R. (2022). Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. Cryptology ePrint Archive. https://doi.org/10.34726/3604
Download: PDF (424 KB)
Project: CDL-SQI (2018–2024) -
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks
/
Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2022). How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. In WWW ’22: Companion Proceedings of the Web Conference 2022 (pp. 467–477). ACM. https://doi.org/10.1145/3487553.3524627
Project: CDL-SQI (2018–2024) -
User-Perceived Privacy in Blockchain
/
Ghesmati, S., Fdhila, W., & Weippl, E. (2022). User-Perceived Privacy in Blockchain. Cryptology ePrint Archive.
Project: CDL-SQI (2018–2024)
2021
- RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness / Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., & Weippl, E. (2021). RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In Proceedings 2021 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium (NDSS) Symposium 2021, Unknown. Internet Society. https://doi.org/10.14722/ndss.2021.24116
-
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
/
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 533–549). Springer. https://doi.org/10.1007/978-3-662-63958-0_39
Project: CDL-SQI (2018–2024) -
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
/
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 507–532). Springer. https://doi.org/10.1007/978-3-662-63958-0_38
Project: CDL-SQI (2018–2024) - Machine Learning and Knowledge Extraction / Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. R. (Eds.). (2021). Machine Learning and Knowledge Extraction (Vol. 12844). Springer. https://doi.org/10.1007/978-3-030-84060-0
- Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI / Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In Machine Learning and Knowledge Extraction (pp. 1–20). Springer. http://hdl.handle.net/20.500.12708/55662
-
Unnecessary Input Heuristics and PayJoin Transactions
/
Ghesmati, S., Kern, A., Judmayer, A., Stifter, N., & Weippl, E. (2021). Unnecessary Input Heuristics and PayJoin Transactions. In HCI International 2021 - Posters (pp. 416–424). https://doi.org/10.1007/978-3-030-78642-7_56
Project: CDL-SQI (2018–2024)
2020
-
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
/
Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., & Krombholz, K. (2020). User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 341–358). USENIX Association. http://hdl.handle.net/20.500.12708/153349
Project: CDL-SQI (2018–2024) - HydRand: Efficient Continuous Distributed Randomness / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, United States of America (the). https://doi.org/10.1109/sp40000.2020.00003
- Automated Security Risk Identification Using AutomationML-based Engineering Data / Eckhart, M., Ekelhart, A., & Weippl, E. (2020). Automated Security Risk Identification Using AutomationML-based Engineering Data. IEEE Transactions on Dependable and Secure Computing, 19(3), 1655–1672. https://doi.org/10.1109/tdsc.2020.3033150
2019
- From Hack to Elaborate Technique—A Survey on Binary Rewriting / Wenzl, M., Merzdovnik, G., Ullrich, J. M. M., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 1–37. https://doi.org/10.1145/3316415
- Distributed Key Generation with Ethereum Smart Contracts / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherlands (the). Springer. http://hdl.handle.net/20.500.12708/58084
- Echoes of the Past: Recovering Blockchain Metrics from Merged mining / Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, United States of America (the). Springer. http://hdl.handle.net/20.500.12708/58072
- Measuring Cookies and Web Privacy in a Post-GDPR World / Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117
- Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process / Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. In IEEE (pp. 3012–3017). IEEE. http://hdl.handle.net/20.500.12708/58116
- Security Development Lifecycle for Cyber-Physical Production Systems / Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., & Weippl, E. (2019). Security Development Lifecycle for Cyber-Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal. IEEE. http://hdl.handle.net/20.500.12708/58114
- Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins / Eckhart, M., Ekelhart, A., & Weippl, E. (2019). Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. https://doi.org/10.1109/etfa.2019.8869197
- Security Related Technical Debt in Cyber Physical Production Systems / Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in Cyber Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal. IEEE. http://hdl.handle.net/20.500.12708/58105
- "Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems" / Stifter, N., Eckhart, M., Brenner, B., & Weippl, E. (2019). “Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.” In Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. http://hdl.handle.net/20.500.12708/58103
- A versatile Security Layer for AutomationML / Brenner, B., Ekelhart, A., & Weippl, E. (2019). A versatile Security Layer for AutomationML. In Proceedings of INDIN 2019. 17th IEEE International Conference on Industrial Informatics (INDIN 2019), Helsinki, Finland. IEEE. http://hdl.handle.net/20.500.12708/58078
- Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges / Eckhart, M., Brenner, B., Ekelhart, A., & Weippl, E. (2019). Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. Journal of Internet Services and Information Security, 9(3), 52–73. https://doi.org/10.22667/JISIS.2019.08.31.052
- Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30184
- Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering (pp. 497–507). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_18
- Securing Information against Manipulation in the Production Systems Engineering Process / Kieseberg, P., & Weippl, E. (2019). Securing Information against Manipulation in the Production Systems Engineering Process. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30203
- Security Analysis / Brenner, B., & Weippl, E. (2019). Security Analysis. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30202
- Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies / Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189
- Security and Quality in Cyber-Physical Systems Engineering / Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (Eds.). (2019). Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/24652
2018
- Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3
- Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491
- A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678
- Machine Learning and Knowledge Extraction : Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018, Proceedings / Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (Eds.). (2018). Machine Learning and Knowledge Extraction : Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018, Proceedings (Vol. 11015). Springer. https://doi.org/10.1007/978-3-319-99740-7
- A Framework for Monitoring Net Neutrality / Mayer, W., Schreiber, T., & Weippl, E. (2018). A Framework for Monitoring Net Neutrality. In The 13th International Conference on Availability, Reliability and Security (ARES 2018). The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, EU. ACM International Conference Proceeding Series. http://hdl.handle.net/20.500.12708/57445
- Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. / Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference (pp. 1–8). Springer. http://hdl.handle.net/20.500.12708/58777
- On Security Research Towards Future Mobile Network Generations / Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research Towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728
- Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447
- Structural Limitations of B+-Tree forensics / Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. In Proceedings of the Central European Cybersecurity Conference 2018. Central European Cybersecurity Conference 2018, Ljubljana, Slowenia, EU. ACM Digital Library. https://doi.org/10.1145/3277570.3277579
- USBlock: Blocking USB-Based Keypress Injection Attacks / Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C., & Weippl, E. (2018). USBlock: Blocking USB-Based Keypress Injection Attacks. In Data and Applications Security and Privacy XXXII (pp. 278–295). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57497
- Security Challenges in Cyber-Physical Production Systems / Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Physical Production Systems. In Software Quality: Methods and Tools for Better Software and Systems (pp. 3–16). Springer Lecture Notes in Business Information Processing. http://hdl.handle.net/20.500.12708/57496
2017
- I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS / Krombholz, K., Mayer, W., Mulazzani, M., & Weippl, E. (2017). I Have No Idea What I’m Doing - On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Security Symposium. 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada, Canada. http://hdl.handle.net/20.500.12708/56967
- Real-time forensics through endpoint visibility / Kieseberg, P., Neuner, S., Schrittwieser, S., Schmiedecker, M., & Weippl, E. (2017). Real-time forensics through endpoint visibility. In Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, Prague, Czech Republic, EU. LNICST SpringerLink Digital Library. http://hdl.handle.net/20.500.12708/57200
- Grid Shock: Coordinated Load-Changing Attacks on Power Grids / Dabrowski, A., Ullrich, J., & Weippl, E. (2017). Grid Shock: Coordinated Load-Changing Attacks on Power Grids. In Proceedings of the 2017 Annual Computer Security Applications Conference. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/57199
- Lightweight Address Hopping for Defending the IPv6 IoT / Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56973
- Network-Based Secret Communication in Clouds: A Survey / Ullrich, J., Zseby, T., Fabini, J., & Weippl, E. (2017). Network-Based Secret Communication in Clouds: A Survey. IEEE Communications Surveys and Tutorials, 19(2), 1112–1144. https://doi.org/10.1109/comst.2017.2659646
- A Risk Management Framework for Cloud Migration Decision Support / Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools / Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, EU. http://hdl.handle.net/20.500.12708/56974
- Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS / Neuner, S., Voyiatzis, A. G., Schmiedecker, M., & Weippl, E. (2017). Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, EU. http://hdl.handle.net/20.500.12708/56971
- PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks / Machida, S., Dabrowski, A., Weippl, E., & Echizen, I. (2017). PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. In I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability (pp. 261–275). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57198
2016
- A tamper-proof audit and control system for the doctor in the loop / Kieseberg, P., Malle, B., Frühwirt, P., Holzinger, A., & Weippl, E. (2016). A tamper-proof audit and control system for the doctor in the loop. Brain Informatics, 3(4), 269–279. http://hdl.handle.net/20.500.12708/150119
- The and security of firewalls in cyber-physical cloud computing / Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The and security of firewalls in cyber-physical cloud computing. EURASIP Journal on Information Security, 2016:18(18). http://hdl.handle.net/20.500.12708/150117
- Availability, Reliability, and Security in Information Systems / Tjoa, A. M., Weippl, E., Kieseberg, P., Holzinger, A., & Buccafurri, F. (Eds.). (2016). Availability, Reliability, and Security in Information Systems. Springer LNCS 9817. https://doi.org/10.1007/978-3-319-45507-5
- Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? / Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., & Weippl, E. (2016). Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1), 1–37. https://doi.org/10.1145/2886012
- The beauty or the beast? Attacking rate limits of the xen hypervisor / Ullrich, J., & Weippl, E. (2016). The beauty or the beast? Attacking rate limits of the xen hypervisor. In Computer Security - ESORICS 2016, Part II (pp. 493–512). http://hdl.handle.net/20.500.12708/57203
- Effectiveness of file‐based deduplication in digital forensics / Neuner, S., Schmiedecker, M., & Weippl, E. (2016). Effectiveness of file‐based deduplication in digital forensics. Security and Communication Networks, 9(15), 2876–2885. http://hdl.handle.net/20.500.12708/150121
- Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners / Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103
- A Framework for Security Transparency in Cloud Computing / Ismail, U. M., Islam, S., Ouedraogo, M., & Weippl, E. (2016). A Framework for Security Transparency in Cloud Computing. Future Internet, 8(1). http://hdl.handle.net/20.500.12708/150120
- The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection / Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202
2015
- QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes / Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201
- Advanced social engineering attacks / Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005
- Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210
- Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology / Krombholz, K., Frauenberger, C., & Weippl, E. (2015). Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology. In SOUPS ’15 Full Proceedings. Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada, Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56200
- On Reconnaissance with IPv6: A Pattern-Based Scanning Approach / Ullrich, J., Kieseberg, P., Krombholz, K., & Weippl, E. (2015). On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 186–192). IEEE. http://hdl.handle.net/20.500.12708/56202
- Privacy is Not an Option: Attacking the IPv6 Privacy Extension / Ullrich, J., & Weippl, E. (2015). Privacy is Not an Option: Attacking the IPv6 Privacy Extension. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 448–468). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/56173
- Network Security Challenges in Android Applications / Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236
- Gradually Improving the Forensic Process / Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually Improving the Forensic Process. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 404–410). IEEE. http://hdl.handle.net/20.500.12708/56235
- Error-Correcting Codes as Source for Decoding Ambiguity / Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209
- Smart Privacy Visor: Bridging the Privacy Gap / Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208
- Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198
2014
- QR Code Security: A Survey of Attacks and Challenges for Usable Security / Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8
- E-voting authentication with QR-codes / Falkner, S., Kieseberg, P., Simos, D. E., Traxler, C., & Weippl, E. (2014). E-voting authentication with QR-codes. In Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 149–159). Springer. http://hdl.handle.net/20.500.12708/56197
- Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations / Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885
- Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile / Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970
- InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles / Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951
- Genie in a Model? Why Model Driven Security will not secure your Web Application / Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875
- Protecting Anonymity in Data-Driven Biomedical Science / Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., & Holzinger, A. (2014). Protecting Anonymity in Data-Driven Biomedical Science. In A. Holzinger & I. Jurisica (Eds.), Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 301–316). Springer-Verlag. https://doi.org/10.1007/978-3-662-43968-5_17
- Hardware Trojans - Detect and React? / Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009
- Towards a Hardware Trojan Detection Cycle / Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977
- IMSI-Catch Me If You Can: IMSI-Catcher-Catchers / Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950
- An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets, 24(2), 113–124. https://doi.org/10.1007/s12525-014-0154-x
- Spoiled Onions: Exposing Malicious Tor Exit Relays / Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959
- Using Model Driven Security Approaches in Web Application Development / Hochreiner, C., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Using Model Driven Security Approaches in Web Application Development. In Asian Conference on Availability, Reliability and Security. AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia, Non-EU. http://hdl.handle.net/20.500.12708/55972
- Towards Fully Automated Digital Alibis with Social Interaction / Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965
- QR - Inception: Barcode in Barcode Attacks / Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952
- IPv6 Security: Attacks and Countermeasures in a Nutshell / Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations / Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238
- Enter Sandbox: Android Sandbox Comparison / Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124
- Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE / Khue, V. S., Anjomshoaa, A., & Tjoa, A. M. (2014). Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE. In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Availability, Reliability, and Security in Information Systems (pp. 138–154). Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6_10
- Windows Installer Security / Kadluba, C., Mulazzani, M., Zechner, L., Neuner, S., & Weippl, E. (2014). Windows Installer Security. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55975
- Automated Analysis of Underground Marketplaces / Hudic, A., Krombholz, K., Otterbein, T., Platzer, C., & Weippl, E. (2014). Automated Analysis of Underground Marketplaces. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55966
- Availability, Reliability, and Security in Information Systems / Availability, Reliability, and Security in Information Systems. (2014). In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Lecture Notes in Computer Science. Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6
2013
- Information and Communicatiaon Technology / Mustofa, K., Neuhold, E., Tjoa, A. M., Weippl, E., & You, I. (Eds.). (2013). Information and Communicatiaon Technology: Vol. LNCS 7804. Springer. https://doi.org/10.1007/978-3-642-36818-9
- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Asfand-e-yar, M., & Tjoa, A. M. (2013). Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. In K. Mustofa, E. Neuhold, A. M. Tjoa, E. Weippl, & I. You (Eds.), Information and Communication Technology International Conference, ICT-EurAsia 2013 (pp. 233–242). Springer LNCS. https://doi.org/10.1007/978-3-642-36818-9_24
- Towards Security-Enhanced and Privacy-Preserving Mashup Compositions / Hobel, H., Heurix, J., Anjomshoaa, A., & Weippl, E. (2013). Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. In Security and Privacy Protection in Information Processing Systems (pp. 286–299). Springer-Verlag GmbH. https://doi.org/10.1007/978-3-642-39218-4_22
- Hardware Malware / Krieg, C., Dabrowski, A., Hobel, H., Krombholz, K., & Weippl, E. (2013). Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, 4(2), 1–115. https://doi.org/10.2200/s00530ed1v01y201308spt006
- Malware in Hardware Infrastructure Components / Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197
- Covert Computation - Hiding Code in Code for Obfuscation Purposes / Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990
- SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting / Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985
- Ethics in Security Research - Which Lines Should Not Be Crossed? / Schrittwieser, S., Weippl, E., & Mulazzani, M. (2013). Ethics in Security Research - Which Lines Should Not Be Crossed? Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85712
- Cloudoscopy: Services Discovery and Topology Mapping / Herzberg, A., Shulman, H., Ullrich, J., & Weippl, E. (2013). Cloudoscopy: Services Discovery and Topology Mapping. In Fifth ACM cloud computing security workshop (CCSW 2013) (pp. 113–122). http://hdl.handle.net/20.500.12708/54996
- Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting / Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714
- Accounting and Management Information Systems: A Semantic Integration / Schwaiger, W., & Abmayer, M. (2013). Accounting and Management Information Systems: A Semantic Integration. In G. Kotsis, E. Weippl, M. Steinbauer, I. Khalil, & M. Indrawan-Santiago (Eds.), iiWAS2013; (pp. 346–352). The Association for Computing Machinery. http://hdl.handle.net/20.500.12708/66873
- Ethik in der Sicherheitsforschung / Schrittwieser, S., Mulazzani, M., Weippl, E., & Panhans, S. (2013). Ethik in der Sicherheitsforschung. In D-A-CH Security 2013. DACH Security 2013, Nürnberg, EU. http://hdl.handle.net/20.500.12708/54988
- Quantifying Windows File Slack in Size and Stability / Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989
- Appinspect: large-scale evaluation of social networking apps / Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987
- Securing a Space-Based Service Architecture with Coordination-Driven Access Control / Craß, S., Dönz, T., Joskowicz, G., Kühn, E., & Marek, A. (2013). Securing a Space-Based Service Architecture with Coordination-Driven Access Control. In E. Weippl, A. M. Tjoa, & S. Tjoa (Eds.), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Issue on Frontiers in Security and Dependability (p. 22). Innovative Information Science & Technology Research Group (ISYOU). http://hdl.handle.net/20.500.12708/54974
- A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System / Islam, S., Mouratidis, H., & Weippl, E. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing: Approaches and Tools (pp. 97–122). IGI Global. http://hdl.handle.net/20.500.12708/55063
2012
- A Context-Aware Mashup Integration Guideline for Enterprise 2.0 / Bader, G., Anjomshoaa, A., & Tjoa, A. M. (2012). A Context-Aware Mashup Integration Guideline for Enterprise 2.0. In G. Quirchmayr, J. Basl, I. You, L. Xu, & E. R. Weippl (Eds.), Multidisciplinary Research and Practice for Informations Systems : IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings (pp. 17–30). Lecture Notes in Computer Science (LNCS) / Springer Verlag. https://doi.org/10.1007/978-3-642-32498-7_2
- Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications / Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519
- InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs / Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520
- Malicious Pixels: Using QR Codes as Attack Vector / Kieseberg, P., Schrittwieser, S., Leithner, M., Mulazzani, M., Weippl, E., Munroe, L., & Sinha, M. (2012). Malicious Pixels: Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing (pp. 21–38). Atlantic Press. http://hdl.handle.net/20.500.12708/27834
- Self-Monitoring in Social Networks / Anjomshoaa, A., Khue, V. S., Tahamtan, A., Tjoa, A. M., & Weippl, E. (2012). Self-Monitoring in Social Networks. International Journal of Intelligent Information and Database Systems, 6(4), 363. https://doi.org/10.1504/ijiids.2012.049110
- Digital Forensics for Enterprise Rights Management Systems / Schrittwieser, S., Kieseberg, P., & Weippl, E. (2012). Digital Forensics for Enterprise Rights Management Systems. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (p. 10). ACM. http://hdl.handle.net/20.500.12708/54523
- QMHE2012 / Avasilcai, S., Tjoa, A. M., Hutu, C. A., & Weippl, E. (Eds.). (2012). QMHE2012. OCG (Österreichische Computer Gesellschaft). http://hdl.handle.net/20.500.12708/23672
2011
- Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam / Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843
- A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems / Schwarzl, C., & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering, 2(1), 40–83. https://doi.org/10.4018/jsse.2011010103
- Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting / Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219
- Trees Cannot Lie: Using Data Structures for Forensics Purposes / Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934
- Cloud Speicherdienste als Angriffsvektoren / Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931
- Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases / Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930
- Social Snapshots: Digital Forensics for Online Social Networks / Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929
- An Algorithm for k-anonymity-based Fingerprinting / Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., & Weippl, E. (2011). An Algorithm for k-anonymity-based Fingerprinting. In Proceedings of the 10th International Workshop on Digital-forensics and Watermarking. International Workshop on Digital-forensics and Watermarking, Atlantic City, USA, Non-EU. http://hdl.handle.net/20.500.12708/53927
- Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space / Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926
2010
- Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten / Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik : e & i, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2
- Addressing misalignment between information security metrics and business-driven security objectives / Fruehwirth, C., Biffl, S., Tabatabai, M., & Weippl, E. (2010). Addressing misalignment between information security metrics and business-driven security objectives. In G. Succi, M. Morisio, & N. Nagappan (Eds.), Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec ’10. https://doi.org/10.1145/1853919.1853927
- An event-based empirical process analysis framework / Sunindyo, W. D., Biffl, S., Mordinyi, R., Moser, T., Schatten, A., Tabatabai, M., Wahyudin, D., Weippl, E., & Winkler, D. (2010). An event-based empirical process analysis framework. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM ’10. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy, EU. https://doi.org/10.1145/1852786.1852867
- Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. Interaction Design and Architecture(s) Journal, 9–10, 85–103. http://hdl.handle.net/20.500.12708/168194
- Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems / Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems. In Proceedings of 10th IEEE International Conference on Advanced Learning Technologies (pp. 734–735). http://hdl.handle.net/20.500.12708/53736
- InnoDB Database Forensics / Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981
- Tor HTTP usage and information leakage / Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521
- A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC) / Racz, N., Seufert, A., & Weippl, E. (2010). A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC). In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53520
- Social Engineering / Böck, B., & Weippl, E. (2010). Social Engineering. In The Handbook of Technology Management. John Wiley & Sons Ltd. http://hdl.handle.net/20.500.12708/26599
- Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop / Ahmed, M., & Weippl, E. (2010). Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52979
- Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System / Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270
- Exploiting Ontology for Software License Agreements / Asfand-E-Yar, M., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). Exploiting Ontology for Software License Agreements. International Journal of Software and Informatics, 4(1), 89–100. http://hdl.handle.net/20.500.12708/167084
- A process model for integrated IT governance, risk, and compliance management / Racz, N., Seufert, A., & Weippl, E. (2010). A process model for integrated IT governance, risk, and compliance management. In Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010) (pp. 155–170). http://hdl.handle.net/20.500.12708/53519
- Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites / Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518
- Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments / Farman, A. K., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments. In Proceedings of EDMEDIA 2010. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/53507
- Questioning the need for separate IT risk management frameworks / Racz, N., Seufert, A., & Weippl, E. (2010). Questioning the need for separate IT risk management frameworks. In Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2. Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig, EU. Springer LNI. http://hdl.handle.net/20.500.12708/53506
- Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises / Racz, N., Panitz, J., Amberg, M., Weippl, E., & Seufert, A. (2010). Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises. In Proceedings of the 21st Australasian Conference on Information Systems (ACIS). ACIS 2010, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53504
-
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects:
/
Tahamtan, A., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: In Knowledge Science, Engineering & Management (pp. 412–423). Springer. http://hdl.handle.net/20.500.12708/53315
Project: Secure2.0 (2009–2014) - Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects / Sunindyo, W. D., Biffl, S., Frühwirth, C., Mordinyi, R., Moser, T., Schatten, A., Schrittwieser, S., Weippl, E., & Winkler, D. (2010). Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session (pp. 1–2). COREP Vauban. http://hdl.handle.net/20.500.12708/53214
- Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform / Frühwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., & Sunindyo, W. D. (2010). Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session (pp. 1–2). http://hdl.handle.net/20.500.12708/53188
- Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case / Anjomshoaa, A., Khue, V. S., Tjoa, A. M., Weippl, E., & Michael, H. (2010). Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010) (pp. 180–189). Springer. http://hdl.handle.net/20.500.12708/52975
2009
- Automation of Post-exploitation / Irani, M. T., & Weippl, E. R. (2009). Automation of Post-exploitation. In Security Technology (pp. 250–257). Springer LNCS. https://doi.org/10.1007/978-3-642-10847-1_31
- Security in Data Warehouses / Weippl, E. (2009). Security in Data Warehouses. In Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (pp. 272–279). IGI Global. http://hdl.handle.net/20.500.12708/26598
- Automation Of Post-Exploitation / Tabatabai Irani, M., & Weippl, E. (2009). Automation Of Post-Exploitation. International Journal of Web Information Systems (IJWIS), 5(4), 518–536. http://hdl.handle.net/20.500.12708/166271
- Can End-to-End Verifiable E-Voting be Explained Easily? / Kalchgruber, P., & Weippl, E. (2009). Can End-to-End Verifiable E-Voting be Explained Easily? In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009). IIWAS, Austria. ACM Press. http://hdl.handle.net/20.500.12708/52980
- An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System / Farman, A. K., & Weippl, E. (2009). An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System. In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009). IIWAS, Austria. ACM. http://hdl.handle.net/20.500.12708/52977
- Blending the Sketched Use Case Scenario with License Agreements Using Semantics / Asfand-e-yar, M., Anjomshoaa, A., Weippl, E. R., & Tjoa, A. M. (2009). Blending the Sketched Use Case Scenario with License Agreements Using Semantics. In Knowledge Science, Engineering and Management (pp. 275–284). Springer, LNAI. https://doi.org/10.1007/978-3-642-10488-6_28
- Screen Recording for E-Learning / Weippl, E., & Schnabl, S. (2009). Screen Recording for E-Learning. In Proceedings of ED-MEDIA 2009 (pp. 1271–1277). http://hdl.handle.net/20.500.12708/52671
- Integrated Approach for the Detection of Learning Styles & Affective States / Weippl, E., Tjoa, A. M., Graf, S., & Farman, A. K. (2009). Integrated Approach for the Detection of Learning Styles & Affective States. In Proceedings of ED-MEDIA 2009 (pp. 753–761). http://hdl.handle.net/20.500.12708/52670
2008
- Improving Storage Concepts for Semantic Models and Ontologies / Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370
- Security, Trust and Privacy on Mobile Devices and Multimedia Applications / Weippl, E., & Riedl, B. (2008). Security, Trust and Privacy on Mobile Devices and Multimedia Applications. In Handbook of Research on Mobile Multimedia, Second Edition (pp. 115–131). Information Science Reference. http://hdl.handle.net/20.500.12708/26600
-
XML Security - A Comparative Literature Review
/
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763
Project: SecOnt (2008–2010) - Cyber Attacks and the article 5 of the Treaty of NATO / Weippl, E. (2008). Cyber Attacks and the article 5 of the Treaty of NATO. Euro Atlantic Quartely, 3(4), 22. http://hdl.handle.net/20.500.12708/171290
- Chair’s Message / Weippl, E. (2008). Chair’s Message. In Proceedings of the The Third International Conference on Availability, Security, and Reliability ARES 2008. IEEE Computer Society Press. https://doi.org/10.1109/ARES.2008.4
- Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other / Obermüller, E., & Krameritsch, J. (2008). Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (p. 8). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77782
- Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity / Reichl, F., Csanyi, G., Herbst, I., Hruska, A., Obermüller, E., Fröhlich, J., Michalek, C.-R., & Spiegl, A. (2008). Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (pp. 465–473). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77769
- The Learning Process According to the Brain / Csanyi, G. (2008). The Learning Process According to the Brain. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 2342–2347). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77759
-
Fortification of IT Security by Automatic Security Advisory Processing
/
Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69
Project: SecOnt (2008–2010) -
Semantic Potential of existing Security Advisory Standards
/
Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160
Project: SecOnt (2008–2010) - Massive "Multiplayer" E-Learning / Purgathofer, P., & Reinthaler, W. (2008). Massive “Multiplayer” E-Learning. In E. Weippl & J. Luca (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2008 (p. 9). AACE. http://hdl.handle.net/20.500.12708/52509
- ED-MEDIA Conference Proceedings 2008 / Weippl, E., & Luca, J. (Eds.). (2008). ED-MEDIA Conference Proceedings 2008. AACE. http://hdl.handle.net/20.500.12708/23011
2007
- Database Security and Statistical Database Security / Weippl, E. (2007). Database Security and Statistical Database Security. In J. Wang (Ed.), Encyclopedia of Data Warehousing and Mining. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25405
- Social Engineering / Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393
- Business Requirements of Backup Systems / Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394
- Ontological Mapping of Common Criteria's Security Assurance Requirements / Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164
- Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
-
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
/
Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29
Project: SecOnt (2008–2010) - Comparative Literature Review on RFID Security and Privacy / Riedl, B., Goluch, G., Pöchlinger, S., & Weippl, E. (2007). Comparative Literature Review on RFID Security and Privacy. In Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007). 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien, Non-EU. Österreichische Computer Gesellschaft. http://hdl.handle.net/20.500.12708/51858
- Dependability in e-assessment / Weippl, E. (2007). Dependability in e-assessment. International Journal on E-Learning: Corporate, Government, Healthcare & Higher Education, 6(2), 293–302. http://hdl.handle.net/20.500.12708/169623
- Forschung und Praxis der Informationssicherheit / Weippl, E. (2007). Forschung und Praxis der Informationssicherheit. University meets Public, Vienna, Austria. http://hdl.handle.net/20.500.12708/84576
-
Security Ontologies: Improving Quantitative Risk Analysis
/
Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565
Project: SecOnt (2008–2010) - Formal Threat Descriptions for Enhancing Governmental Risk Assessment / Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161
-
Security Issues for the Use of Semantic Web in E-Commerce
/
Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1
Project: SecOnt (2008–2010) - Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse / Weippl, E., Latif, K., & Tjoa, A. M. (2007). Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. In IEEE International Conference on Information Reuse and Integration (pp. 170–176). http://hdl.handle.net/20.500.12708/51807
-
Security Ontologies: How to Improve Understanding of Complex Relationships
/
Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804
Project: SecOnt (2008–2010) -
Security Aspects In Semantic Web Services Filtering
/
Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916
Project: SecOnt (2008–2010)
2006
- Workshop-based multiobjective security safeguard selection / Neubauer, T., Stummer, C., & Weippl, E. (2006). Workshop-based multiobjective security safeguard selection. In First International Conference on Availability, Reliability and Security (ARES’06). First International Conference on Availability, Reliability and Security (ARES’06) 2006, Vienna, Austria. IEEE Computer Society. https://doi.org/10.1109/ares.2006.144
- Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF / Neubauer, T., Weippl, E., & Biffl, S. (2006). Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 723–731). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51391
- Securing Mobile Communication: RADIUS in a Windows Environment / Weippl, E. (2006). Securing Mobile Communication: RADIUS in a Windows Environment. In Mobile Multimedia: Communication Engineering Perspective (pp. 22–37). Nova Science Publishers. http://hdl.handle.net/20.500.12708/25385
- Implementing IT Security for Small and Medium-Sized Enterprises / Weippl, E., & Klemen, M. (2006). Implementing IT Security for Small and Medium-Sized Enterprises. In Enterprise Information Systems Assurance and System Managerial and Technical Issues. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25386
- Computer Security in the Context of E-Learning / Weippl, E. (2006). Computer Security in the Context of E-Learning. In Encyclopedia of E-Commerce, E-Government and Mobile Commerce (pp. 135–141). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25371
- Security and Trust in Mobile Multimedia / Weippl, E. (2006). Security and Trust in Mobile Multimedia. In Handbook of Research on Mobile Multimedia (pp. 22–37). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25369
- Nichtabstreitbarkeit und Audits in ELearning / Weippl, E., & Goluch, G. (2006). Nichtabstreitbarkeit und Audits in ELearning. In IRIS 2006. IRIS, Salzburg, Austria, Austria. http://hdl.handle.net/20.500.12708/51425
-
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets
/
Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626
Project: SecOnt (2008–2010) - Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure / Weippl, E. (2006). Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure. Information Systems Control Journal, 4(10). http://hdl.handle.net/20.500.12708/173392
- Security Aspects of Ubiquitious Computing in Health Care / Weippl, E., & Tjoa, A. M. (2006). Security Aspects of Ubiquitious Computing in Health Care. Elektrotechnik Und Informationstechnik, 123(4), 156–161. http://hdl.handle.net/20.500.12708/173391
- Digitale PDF-Signaturen mit der Bürgerkarte / Weippl, E. (2006). Digitale PDF-Signaturen mit der Bürgerkarte. In Proceedings of D-A-CH 2006. D-A-CH 2006, Duesseldorf, EU. http://hdl.handle.net/20.500.12708/51426
-
Security Ontology: Simulating Threats to Corporate Assets
/
Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423
Project: SecOnt (2008–2010) - Workshop-based Multiobjective Security Safeguard Selection / Neubauer, T., & Weippl, E. (2006). Workshop-based Multiobjective Security Safeguard Selection. In Proceedings of ARES 2006. IEEE Computer Society, Vienna, Austria. http://hdl.handle.net/20.500.12708/51424
- Addressing the Weakest Link: How to improve teaching of IT security / Weippl, E. (2006). Addressing the Weakest Link: How to improve teaching of IT security. In Proceedings of EDMEDIA 2006 (pp. 223–227). http://hdl.handle.net/20.500.12708/51422
-
Ontology-based IT-Security planning
/
Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421
Project: SecOnt (2008–2010)
2005
- Security in E-Learning / Weippl, E. (2005). Security in E-Learning. In The Handbook of Information Security. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25372
- On cooperatively creating dynamic ontologies / Gahleitner, E., Palkoska, J., & Weippl, E. (2005). On cooperatively creating dynamic ontologies. In Proceedings of the 16th ACM Conference on Hypertext and Hypermedia. Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg, Austria. http://hdl.handle.net/20.500.12708/51214
- Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing / Nguyen, M. T., Tjoa, A. M., Weippl, E., & Brezany, P. (2005). Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. International Journal of Data Warehousing and Mining, IDEA GROUP(Vol. 1-4), 22–55. http://hdl.handle.net/20.500.12708/173340
- Security in e-learning / Weippl, E. (2005). Security in e-learning. ACM ELearn, 2005, 3. http://hdl.handle.net/20.500.12708/173360
- Privacy in e-learning: Anonymity, pseudonyms and authenticated usage / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: Anonymity, pseudonyms and authenticated usage. Interactive Technology and Smart Education (ITSE), 2005(2), 247–256. http://hdl.handle.net/20.500.12708/173359
- E-Learning without Text and Language: A Language-Free Learning Model / Kalinyaprak, H., Futschek, G., Blaha, G., & Weippl, E. (2005). E-Learning without Text and Language: A Language-Free Learning Model. In ED-MEDIA 2005. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/51032
- Privacy in e-learning: How to implement anonymity / Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: How to implement anonymity. In Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC). International Workshop on e-Learning Online Communities - eLOC 2005, Cairo, Non-EU. IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/51217
- The semantic desktop: A semantic personal information management system based on rdf and topic maps / Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216
- Dependability in e-assessment / Weippl, E. (2005). Dependability in e-assessment. In Proceedings of EDMEDIA 2005 (pp. 1674–1679). AACE. http://hdl.handle.net/20.500.12708/51215
- Semantic storage: A report on performance and flexibility / Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213
- Non-repudiation and audits in e-learning / Weippl, E. (2005). Non-repudiation and audits in e-learning. In Proceedings of E-Learn 2005 (pp. 1785–1790). http://hdl.handle.net/20.500.12708/51212
- Security in E-Learning / Weippl, E. (2005). Security in E-Learning. Springer. http://hdl.handle.net/20.500.12708/22294
2004
- Content-basierte Zugriffsrechte in E-Learning Systemen / Weippl, E., & Klemen, M. (2004). Content-basierte Zugriffsrechte in E-Learning Systemen. ÖGAI Journal, 23(4), 24–29. http://hdl.handle.net/20.500.12708/174838
Supervisions
2024
-
Federated Generation of Synthetic Tabular Data
/
Martinez Duarte, D. (2024). Federated Generation of Synthetic Tabular Data [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.112561
Download: PDF (2.38 MB) -
Black-box Model Watermarking in Federated Learning
/
Sakhnovych, Y. (2024). Black-box Model Watermarking in Federated Learning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.120214
Download: PDF (5.96 MB) -
Towards understanding Multi-block Maximal Extractable Value in Ethereum
/
Brachmann, J. J. (2024). Towards understanding Multi-block Maximal Extractable Value in Ethereum [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.124160
Download: PDF (1.86 MB) -
Internet of things testbed - A modular framework to find vulnerabilities
/
Gufler, K. (2024). Internet of things testbed - A modular framework to find vulnerabilities [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.105441
Download: PDF (1.09 MB) -
Exact methods for covering array generation
/
Hiess, I. (2024). Exact methods for covering array generation [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.119362
Download: PDF (1.51 MB) -
Privacy and Usability Aspects of Public Blockchains
/
Ghesmati, S. (2024). Privacy and Usability Aspects of Public Blockchains [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.123326
Download: PDF (2.83 MB) -
Aggregation & analysis of IPv6 prefixes at Internet-scale
/
Nowak, P. (2024). Aggregation & analysis of IPv6 prefixes at Internet-scale [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.118701
Download: PDF (1.86 MB) -
Pay To Win: Algorithmic Incentive Manipulation Attacks on Permissionless Cryptocurrencies
/
Judmayer, A. (2024). Pay To Win: Algorithmic Incentive Manipulation Attacks on Permissionless Cryptocurrencies [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.123266
Download: PDF (4.09 MB)
2023
- Fuzzing embedded protocols / Szewieczek, M. (2023). Fuzzing embedded protocols [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.113741
-
Topology discovery within the bitcoin network
/
Rosenblattl, J. (2023). Topology discovery within the bitcoin network [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.87425
Download: PDF (907 KB) -
Input models for combinatorial testing using source annotations
/
Fugger, M. H. (2023). Input models for combinatorial testing using source annotations [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.116180
Download: PDF (1020 KB) -
Impact of user trust in IT systems on security and privacy
/
Pfeffer, K. (2023). Impact of user trust in IT systems on security and privacy [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.111762
Download: PDF (2.16 MB) -
Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environment
/
Stöger, M. B. (2023). Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environment [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.105402
Download: PDF (1.79 MB) -
Privacy-preserving collaborative anomaly detection
/
Arfaoui, G. (2023). Privacy-preserving collaborative anomaly detection [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.102061
Download: PDF (2.75 MB) -
Analysing the internet aas a graph
/
Fodor, T. B. (2023). Analysing the internet aas a graph [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.105646
Download: PDF (2.07 MB) -
Bitcoin network topology discovery using timing analysis
/
Klonowski, T. (2023). Bitcoin network topology discovery using timing analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.104666
Download: PDF (1.58 MB)
2022
-
Mental models of cryptographic protocols from different stakeholder perspectives
/
Mai, A. (2022). Mental models of cryptographic protocols from different stakeholder perspectives [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.110704
Download: PDF (2.7 MB) -
Ethereum attack simulator : A discrete event simulation engine for attacks against the ethereum blockchain
/
Maitz, A. (2022). Ethereum attack simulator : A discrete event simulation engine for attacks against the ethereum blockchain [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2023.102026
Download: PDF (50.7 MB) -
Advances in distributed randomness
/
Schindler, P. (2022). Advances in distributed randomness [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.107310
Download: PDF (10.8 MB) -
Power consumption of TLS : How the additional "S" in HTTPS impacts the power consumption of power-pluggend devices
/
Causevic, A. (2022). Power consumption of TLS : How the additional “S” in HTTPS impacts the power consumption of power-pluggend devices [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.78581
Download: PDF (2.81 MB) -
Automated stitching for scanning electron microscopy images of integrated circuits
/
Burian, D. (2022). Automated stitching for scanning electron microscopy images of integrated circuits [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.83154
Download: PDF (3.61 MB)
2021
-
Smart home privacy leaks
/
Treiber, S. (2021). Smart home privacy leaks [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.79860
Download: PDF (1.49 MB) -
Measuring privacy-enhancing technologies
/
Mayer, W. (2021). Measuring privacy-enhancing technologies [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.100322
Download: PDF (1.94 MB) -
Identification of obfuscated function clones in binaries using machine learning
/
Pucher, M. (2021). Identification of obfuscated function clones in binaries using machine learning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2022.87962
Download: PDF (3.15 MB) -
Investigating router misconfigurations on the IPv6 internet
/
Maier, M. (2021). Investigating router misconfigurations on the IPv6 internet [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.77442
Download: PDF (2.27 MB) -
Comparison and evaluation of the attacks and defenses against adversarial attacks
/
Jankovic, A. (2021). Comparison and evaluation of the attacks and defenses against adversarial attacks [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.73829
Download: PDF (2.14 MB) -
Backdoor defenses
/
Milakovic, A. (2021). Backdoor defenses [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.73830
Download: PDF (6.44 MB) -
Object capabilities and their benefits for web application security
/
Koppmann, M. (2021). Object capabilities and their benefits for web application security [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.80738
Download: PDF (908 KB) -
Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network Operators
/
Gegenhuber, G. K. (2021). Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network Operators [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.81341
Download: PDF (1.59 MB) -
A bionic view on complex software systems and the consequences for digital sustainability
/
Tomic, V. (2021). A bionic view on complex software systems and the consequences for digital sustainability [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.82584
Download: PDF (1.72 MB) -
Privacy-preserving remote attestation protocol
/
George, D. R. (2021). Privacy-preserving remote attestation protocol [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.86825
Download: PDF (3.94 MB) -
Race to the door - A Goldfinger attack on proof of work cryptocurrencies
/
Rosegger, A. (2021). Race to the door - A Goldfinger attack on proof of work cryptocurrencies [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.90805
Download: PDF (1.4 MB) -
On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approach
/
Schachenhofer, B. (2021). On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approach [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2021.86556
Download: PDF (1.36 MB)
2020
-
On Hardware-based security in embedded systems : evaluating potential use of secure hardware in C-ITS stations
/
Hechenberger, G. (2020). On Hardware-based security in embedded systems : evaluating potential use of secure hardware in C-ITS stations [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.67806
Download: PDF (1.98 MB) -
Semantic approaches to detect file system log events for analyzing data exfiltration
/
Fröschl, A. (2020). Semantic approaches to detect file system log events for analyzing data exfiltration [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.59160
Download: PDF (6.78 MB) -
Cruel intentions : enhancing androids intent firewall
/
Klepp, T. (2020). Cruel intentions : enhancing androids intent firewall [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.33840
Download: PDF (4.63 MB) -
IoT guard: usable transparency and control over smart home IoT devices
/
Victora, S. (2020). IoT guard: usable transparency and control over smart home IoT devices [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.53900
Download: PDF (11.6 MB) -
Open source and privacy aware Push notifications for mobile phones
/
Jagenteufel, H. (2020). Open source and privacy aware Push notifications for mobile phones [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.40164
Download: PDF (1.29 MB) -
Towards a scalable secure element cluster : a recommendation on hardware configuration
/
Hinterleitner, T. (2020). Towards a scalable secure element cluster : a recommendation on hardware configuration [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.72905
Download: PDF (1.61 MB) -
Security and privacy of secure messaging services : a case study of wire
/
Boll, A. (2020). Security and privacy of secure messaging services : a case study of wire [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2020.41015
Download: PDF (872 KB) - Opcode coverage-guided virtualization deobfuscation based on symbolic execution / Tatzer, C. (2020). Opcode coverage-guided virtualization deobfuscation based on symbolic execution [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79934
- Hashiko: a generative hybrid password manager for android : design, implementation and security analysis / Jofen, P. (2020). Hashiko: a generative hybrid password manager for android : design, implementation and security analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/78420
2019
-
Evaluation and improvement of ethereum light clients
/
Weißkirchner, P. (2019). Evaluation and improvement of ethereum light clients [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.72202
Download: PDF (1.42 MB) -
Mitigating return address leaks with software diversity
/
Berlakovich, F. (2019). Mitigating return address leaks with software diversity [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.57687
Download: PDF (953 KB) -
Automatic identification of cross-container side-channels
/
Baumgartner, J. (2019). Automatic identification of cross-container side-channels [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.60810
Download: PDF (899 KB) -
Efficient and effective response to computer security incidents and cybercrime : system-level defenses against USB-based attacks
/
Neuner, S. (2019). Efficient and effective response to computer security incidents and cybercrime : system-level defenses against USB-based attacks [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.66290
Download: PDF (6.64 MB) -
Human assisted information extraction through Bluetooth low energy on android
/
Szivos, G. Z. (2019). Human assisted information extraction through Bluetooth low energy on android [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.53964
Download: PDF (2.38 MB) -
Ein Multi-Architektur Decompiler
/
Wagner, T. (2019). Ein Multi-Architektur Decompiler [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.58400
Download: PDF (791 KB) -
Personal privacy in wireless emissions
/
Stütz, A. (2019). Personal privacy in wireless emissions [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2019.41669
Download: PDF (3.07 MB)
2018
-
Simulation of different selfish mining strategies in bitcoin : simulation respecting network topology and reference implementation
/
Mulser, S. (2018). Simulation of different selfish mining strategies in bitcoin : simulation respecting network topology and reference implementation [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.47081
Download: PDF (1.66 MB) -
Usable authentication ceremonies in secure instant messaging
/
Fassl, M. (2018). Usable authentication ceremonies in secure instant messaging [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.47902
Download: PDF (2.29 MB) -
Stop to unlock - improving the security of unlock patterns on mobile devices
/
Suchan, A. (2018). Stop to unlock - improving the security of unlock patterns on mobile devices [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.49443
Download: PDF (880 KB) -
Efficient algorithms and tools for practical combinatorial testing
/
Kleine, K. (2018). Efficient algorithms and tools for practical combinatorial testing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.55567
Download: PDF (1.11 MB) -
Public Wi-Fi hotspots in the wild : revealing vulnerabilities and restrictions for ordinary hotspot users
/
Plieschnegger, S. (2018). Public Wi-Fi hotspots in the wild : revealing vulnerabilities and restrictions for ordinary hotspot users [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.46600
Download: PDF (4.72 MB) -
Mitigating Rowhammer attacks with software diversity
/
Wiesinger, M. (2018). Mitigating Rowhammer attacks with software diversity [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.47713
Download: PDF (824 KB) -
Security and privacy in large-scale Infrastructure
/
Dabrowski, A. M. (2018). Security and privacy in large-scale Infrastructure [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.58883
Download: PDF (7.67 MB) -
Automated XSS vulnerability detection through context aware fuzzing and dynamic analysis
/
Fink, T. (2018). Automated XSS vulnerability detection through context aware fuzzing and dynamic analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.44740
Download: PDF (1.11 MB) -
Sichere mobile Apps mit plattformübergreifenden Frameworks entwickeln : Herausforderungen und Lösungsansätze für EntwicklerInnen : challenges and approaches for developers
/
Leonhartsberger, L. M. (2018). Sichere mobile Apps mit plattformübergreifenden Frameworks entwickeln : Herausforderungen und Lösungsansätze für EntwicklerInnen : challenges and approaches for developers [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2018.41688
Download: PDF (3.24 MB) - Visualization of bitcoin transactions for forensic and security analysis / Mai, A. (2018). Visualization of bitcoin transactions for forensic and security analysis [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/78198
2017
-
Security and privacy in mobile environments
/
Merzdovnik, G. (2017). Security and privacy in mobile environments [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.45068
Download: PDF (2.54 MB) -
Visual detection of anti-adblocking software
/
Brendler, S. (2017). Visual detection of anti-adblocking software [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.39548
Download: PDF (7.45 MB) -
Malvertising und Malware im Kontext von Android
/
Fraihs, N. (2017). Malvertising und Malware im Kontext von Android [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.45548
Download: PDF (842 KB) -
Randomness for blockchains : generating publicly-verifiable and bias-resistant randomness in decentralized systems
/
Schindler, P. (2017). Randomness for blockchains : generating publicly-verifiable and bias-resistant randomness in decentralized systems [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.47782
Download: PDF (1.53 MB) -
Security assurance assessment for multi-layered and multi-tenant hybrid clouds
/
Hudic, A. (2017). Security assurance assessment for multi-layered and multi-tenant hybrid clouds [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.50990
Download: PDF (14.5 MB) -
Modern end-to-end encrypted messaging for the desktop
/
Bayerle, R. (2017). Modern end-to-end encrypted messaging for the desktop [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.40163
Download: PDF (1.02 MB) -
Bad things happen through USB
/
Neuner, S. (2017). Bad things happen through USB [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.31200
Download: PDF (2.46 MB) -
Merged mining : analysis of effects and implications
/
Zamyatin, A. (2017). Merged mining : analysis of effects and implications [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2017.41136
Download: PDF (3.83 MB)
2016
-
IPv6 high performance scanning
/
Kukovic, C. (2016). IPv6 high performance scanning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.35201
Download: PDF (2.02 MB) -
Web browser fingerprinting : a framework for measuring the web browser
/
Culafic, V. (2016). Web browser fingerprinting : a framework for measuring the web browser [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.29603
Download: PDF (1.35 MB) -
Geheime Kommunikation im Internet
/
Ullrich, J. M. M. (2016). Geheime Kommunikation im Internet [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.40006
Download: PDF (5.75 MB) -
The end of the password era : towards password-less authentication based on enhanced FIDO
/
Bachl, M. (2016). The end of the password era : towards password-less authentication based on enhanced FIDO [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.39549
Download: PDF (774 KB) -
Usable security and privacy challenges with disruptive technologies
/
Krombholz-Reindl, K. (2016). Usable security and privacy challenges with disruptive technologies [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.41089
Download: PDF (3.77 MB) -
Deferred peerings as obstacles on the Internet
/
Rieder, T. (2016). Deferred peerings as obstacles on the Internet [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.38022
Download: PDF (2.66 MB) -
Monitoring net neutrality of Austrian ISPs
/
Schreiber, T. (2016). Monitoring net neutrality of Austrian ISPs [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2016.39547
Download: PDF (3.34 MB)
2015
-
Malware through the looking glass : malware analysis in an evolving threat landscape
/
Lindorfer, M. (2015). Malware through the looking glass : malware analysis in an evolving threat landscape [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.35065
Download: PDF (2.89 MB) -
Automated discovery of secure website domains
/
Frühwirt, D. (2015). Automated discovery of secure website domains [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.29601
Download: PDF (3.11 MB) -
Confidential desktop: towards an access control framework for preserving data confidentiality based on environmental conditions
/
Weiß, S. (2015). Confidential desktop: towards an access control framework for preserving data confidentiality based on environmental conditions [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.31586
Download: PDF (5.35 MB) -
Security-Schätzung von Open Source Webanwendungen
/
Hernádi, T. (2015). Security-Schätzung von Open Source Webanwendungen [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.29668
Download: PDF (832 KB) -
Straightjacket: tightening process execution policies at runtime
/
Gadllah, A. (2015). Straightjacket: tightening process execution policies at runtime [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2015.27913
Download: PDF (666 KB) - Analysis of internet-wide TLS usage beyond HTTPS / Mayer, W. (2015). Analysis of internet-wide TLS usage beyond HTTPS [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/158806
- Database forensics : towards a forensic-aware database solution / Frühwirt, P. (2015). Database forensics : towards a forensic-aware database solution [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79876
- Didaktische Methoden im Kontext der kritischen Informationsinfrastruktur / Proschinger, C. M. (2015). Didaktische Methoden im Kontext der kritischen Informationsinfrastruktur [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/78478
2014
-
Btrfs filesystem forensics
/
Juch, A. (2014). Btrfs filesystem forensics [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.24504
Download: PDF (598 KB) -
Appropriate obfuscation of location information on an application level for mobile devices : empower users to regain control of their location privacy
/
Hochreiner, C. (2014). Appropriate obfuscation of location information on an application level for mobile devices : empower users to regain control of their location privacy [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.24026
Download: PDF (1.88 MB) -
On the applicability of secret sharing cryptography in secure cloud services
/
Kirchner, M. (2014). On the applicability of secret sharing cryptography in secure cloud services [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.23657
Download: PDF (4.38 MB) -
Detecting privacy leaks in the private browsing mode of modern web browsers through process monitoring
/
Brunner, H. (2014). Detecting privacy leaks in the private browsing mode of modern web browsers through process monitoring [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.26222
Download: PDF (1.81 MB) -
Der Einfluss von Bildungsmaßnahmen auf die Relevanz von Internet Privacy für Endnutzer
/
Schmidt, C. (2014). Der Einfluss von Bildungsmaßnahmen auf die Relevanz von Internet Privacy für Endnutzer [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.25723
Download: PDF (2.08 MB) -
Hardware-assisted code obfuscation
/
Schrittwieser, S. (2014). Hardware-assisted code obfuscation [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.24865
Download: PDF (2.1 MB) -
New challenges in digital forensics : online storage and anonymous communication
/
Mulazzani, M. (2014). New challenges in digital forensics : online storage and anonymous communication [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.23982
Download: PDF (409 KB) - Lower-latency anonymity : latency reduction in the tor network using circuit-level round-trip-time measurements / Annessi, R. (2014). Lower-latency anonymity : latency reduction in the tor network using circuit-level round-trip-time measurements [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159154
2013
-
Security challenges in mobile middleware
/
Aufner, P. (2013). Security challenges in mobile middleware [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2013.23506
Download: PDF (1.56 MB) -
Security and privacy implications of third-party access to online social networks
/
Huber, M. (2013). Security and privacy implications of third-party access to online social networks [Dissertation, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2013.21837
Download: PDF (2.14 MB) -
On WebSockets in penetration testing
/
Koch, R. (2013). On WebSockets in penetration testing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-58898
Download: PDF (1.57 MB) - Defence side reconnaissance: preliminary surveying of an attacker's profile / Frühwirt, P. (2013). Defence side reconnaissance: preliminary surveying of an attacker’s profile [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159717
- Storage and visualization of heterogeneous data from online social networks / Bors, C., & Krejci, R. (2013). Storage and visualization of heterogeneous data from online social networks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159741
- Forensic analysis of web data / Dinhobl, E. (2013). Forensic analysis of web data [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/80098
2012
-
Context-aware security analysis of mashups
/
Hobel, H. (2012). Context-aware security analysis of mashups [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-57186
Download: PDF (4 MB) - Automated analysis and clustering of Windows shellcodes / Merzdovnik, G. (2012). Automated analysis and clustering of Windows shellcodes [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160581
2011
-
Vergleich unterschiedlicher Ansätze zur Implementierung eines Business Continuity Management
/
Tinkl, B. (2011). Vergleich unterschiedlicher Ansätze zur Implementierung eines Business Continuity Management [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-44369
Download: PDF (1.09 MB) -
Einhaltung der Qualitätskriterien von IT Services
/
Hofmann, W. (2011). Einhaltung der Qualitätskriterien von IT Services [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-60838
Download: PDF (3.25 MB) -
PPJ - a polymorphic runtime packer for Java
/
Bernauer, A. J. (2011). PPJ - a polymorphic runtime packer for Java [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-41502
Download: PDF (2.65 MB) -
Governance, risk & compliance (GRC) for information systems : towards an integrated approach
/
Racz, N. (2011). Governance, risk & compliance (GRC) for information systems : towards an integrated approach [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-43830
Download: PDF (2.5 MB) -
A unified tooling framework for pedestrian simulation
/
Imber, M. (2011). A unified tooling framework for pedestrian simulation [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-39895
Download: PDF (1.59 MB) - Social network forensics - using social networking data as digital evidence / Wacholski, K. (2011). Social network forensics - using social networking data as digital evidence [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/161494
- Trusted Backups : Prototyp eines Backup Tools zum Erstellen von vertrauenswürdigen Backups mittels TPM (TC) / Baumann, T. (2011). Trusted Backups : Prototyp eines Backup Tools zum Erstellen von vertrauenswürdigen Backups mittels TPM (TC) [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160775
- Identifying and incorporating learning styles and affective states in web-based learning management systems / Khan, F. A. (2011). Identifying and incorporating learning styles and affective states in web-based learning management systems [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160513
- Webserver-Sicherheit und Virtualisierung / Grabher, M. (2011). Webserver-Sicherheit und Virtualisierung [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160180
- Einbettung der Risk Oriented Process Evaluation in das (IT-)Projektmanagement / Bründl, D. (2011). Einbettung der Risk Oriented Process Evaluation in das (IT-)Projektmanagement [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159950
- On strategic approaches to DDoS defense : principles, protection, practice / Zumpf, R. (2011). On strategic approaches to DDoS defense : principles, protection, practice [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159928
2010
-
Anonymity, integrity and reliability issues with open proxies
/
Schmidt, C. (2010). Anonymity, integrity and reliability issues with open proxies [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-32968
Download: PDF (1.76 MB) - Privacy enhanced role based access control model in object oriented environments with multiple frameworks / Richtsfeld, M. (2010). Privacy enhanced role based access control model in object oriented environments with multiple frameworks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159863
- Virtualized grid computing systems offering secure LOGs / Huemer, D. (2010). Virtualized grid computing systems offering secure LOGs [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159836
2009
-
Biometrische Systeme - wie sicher sind sie wirklich?
/
Schwarzl, C. (2009). Biometrische Systeme - wie sicher sind sie wirklich? [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-30164
Download: PDF (5.7 MB) -
Anonymity & Monitoring : how to monitor the infrastructure of an anonymity system
/
Mulazzani, M. (2009). Anonymity & Monitoring : how to monitor the infrastructure of an anonymity system [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-28214
Download: PDF (615 KB) - Enterprise rights management and secure printing / Schrittwieser, S. (2009). Enterprise rights management and secure printing [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186606
- Compliance für Informationssicherheit für die obersten Organe der österreichischen Bundesverwaltung / Lechner, S. (2009). Compliance für Informationssicherheit für die obersten Organe der österreichischen Bundesverwaltung [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186600
- Mehr Transparenz für den Wähler : Entwicklung eines end-to-end-verifizierbaren Wahlsystems / Kalchgruber, P. (2009). Mehr Transparenz für den Wähler : Entwicklung eines end-to-end-verifizierbaren Wahlsystems [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186100
- Die Anforderungen von EUROSOX an IT-Prozesse : ein Umsetzungsleitfaden für Führungskräfte zur Implementierung von IT-Governance / Liegl, P. (2009). Die Anforderungen von EUROSOX an IT-Prozesse : ein Umsetzungsleitfaden für Führungskräfte zur Implementierung von IT-Governance [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186070
- Post-exploit and its automation : focused on Windows based targets / Tabatabai Irani, M. (2009). Post-exploit and its automation : focused on Windows based targets [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/185718
- Understanding rootkits : a threat analysis covering rootkits from user-mode to hypervisor-level / Scholz, B. (2009). Understanding rootkits : a threat analysis covering rootkits from user-mode to hypervisor-level [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/185676
- Die Verwendung von Interactive-Sender-Responses zur Abwehr von Spam / Wagner, R. (2009). Die Verwendung von Interactive-Sender-Responses zur Abwehr von Spam [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184816
- Teaching linear cryptanalysis by breaking the Data Encryption Standard (DES) / Dassler, H. (2009). Teaching linear cryptanalysis by breaking the Data Encryption Standard (DES) [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/177882
2008
-
Mapping security frameworks into SecOnt
/
Manutscheri, A. (2008). Mapping security frameworks into SecOnt [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-24144
Download: PDF (1.31 MB) -
Entwicklung eines Spam-Filter Gateways basierend auf Open-Source-Projekten
/
Rainer, T. (2008). Entwicklung eines Spam-Filter Gateways basierend auf Open-Source-Projekten [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-27206
Download: PDF (867 KB) -
Vergleich von IT-Risikomanagement Tools anhand eines Business Cases
/
Lin, C.-C. (2008). Vergleich von IT-Risikomanagement Tools anhand eines Business Cases [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-27174
Download: PDF (1.94 MB) -
Digital rights management
/
Freund, W. (2008). Digital rights management [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-25051
Download: PDF (1.03 MB) -
Umfassendes Risikomanagement
/
Löbl, C. (2008). Umfassendes Risikomanagement [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-21852
Download: PDF (692 KB) - Hacking and securing Linux : a capture the flag contest / Graffer, C. (2008). Hacking and securing Linux : a capture the flag contest [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179700
- Screen recording : a practical guide with case studies / Schnabl, S. (2008). Screen recording : a practical guide with case studies [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/178362
2007
-
Development of a modular extensible framework for penetration testing
/
Huemer, D. (2007). Development of a modular extensible framework for penetration testing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-96799
Download: PDF (1.93 MB) -
Sicherheit und dynamische Veränderung von .pdf Dokumenten
/
Peinthor, C. (2007). Sicherheit und dynamische Veränderung von .pdf Dokumenten [Master Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-14036
Download: PDF (964 KB) - Developing an implementation for an information security metrics program at Raiffeisen Informatik GmbH / Glatz, G. (2007). Developing an implementation for an information security metrics program at Raiffeisen Informatik GmbH [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/181908
- Social engineering / Böck, B. (2007). Social engineering [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179430
- Managing security policies / Lehrbaum, R. (2007). Managing security policies [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179405
2006
- Ein umfassendes Lehrkonzept für UMBE mit E-Learning Unterstützung und virtuellen Umgebungen / Scholz, M. (2006). Ein umfassendes Lehrkonzept für UMBE mit E-Learning Unterstützung und virtuellen Umgebungen [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186922
- Einsatz von ISO 17799 und IT-Grundschutz in kleinen und mittleren Unternehmen / Gerdenitsch, P. (2006). Einsatz von ISO 17799 und IT-Grundschutz in kleinen und mittleren Unternehmen [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/186921
- Security ontologies : improving quantitative risk analysis / Fenz, S. (2006). Security ontologies : improving quantitative risk analysis [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184418
- Sichere Web-Services mit ASP.NET 2.0 : eine Beispielanwendung für das Projektmanagement agiler Softwareentwicklung / Bennar, T. (2006). Sichere Web-Services mit ASP.NET 2.0 : eine Beispielanwendung für das Projektmanagement agiler Softwareentwicklung [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184415
- WLAN Authentifizierungsmechanismen anhand einer praktischen Implementierung von EAP-TLS / Wahbeh, J. (2006). WLAN Authentifizierungsmechanismen anhand einer praktischen Implementierung von EAP-TLS [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179548
2005
- Computer-Forensik / Böck, B. (2005). Computer-Forensik [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184508
- E-Learning und der Nutzen von sicheren Betriebssystemen am Beispiel von Moodle und SELinux / Frandl, S. (2005). E-Learning und der Nutzen von sicheren Betriebssystemen am Beispiel von Moodle und SELinux [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/182907
- Strategieentwicklung von Blended-Learning Projekten / Fleck, R. (2005). Strategieentwicklung von Blended-Learning Projekten [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/180576
Awards
-
Award for the 2nd highest CISA exam (2005) score in Europe and Africa.
2006 / USA
And more…
Soon, this page will include additional information such as reference projects, activities as journal reviewer and editor, memberships in councils and committees, and other research activities.
Until then, please visit Edgar Weippl’s research profile in TISS .