Edgar Weippl
Edgar Weippl
University of Vienna, Head of SQI CD-Laboratory, SBA Research
Bestätigte E-Mail-Adresse bei univie.ac.at - Startseite
Zitiert von
Zitiert von
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
Security in e-learning
ER Weippl
Springer Science & Business Media, 2006
A frame of reference for research of integrated governance, risk and compliance (GRC)
N Racz, E Weippl, A Seufert
IFIP International Conference on Communications and Multimedia Security, 106-117, 2010
Fake identities in social media: A case study on the sustainability of the Facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4 (2), 175-212, 2012
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
A Holzinger, P Kieseberg, E Weippl, AM Tjoa
International Cross-Domain Conference for Machine Learning and Knowledge …, 2018
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
The other side of the coin: User experiences with bitcoin security and privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
International conference on financial cryptography and data security, 555-580, 2016
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
A process model for integrated IT governance, risk, and compliance management
N Racz, E Weippl, A Seufert
Proceedings of the Ninth Baltic Conference on Databases and Information …, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20