Edgar Weippl
TitelZitiert vonJahr
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
2342015
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2152011
Security in e-learning
ER Weippl
Springer Science & Business Media, 2006
1642006
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
1492010
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1202007
A frame of reference for research of integrated governance, risk and compliance (GRC)
N Racz, E Weippl, A Seufert
IFIP International Conference on Communications and Multimedia Security, 106-117, 2010
1182010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1142012
Fake identities in social media: A case study on the sustainability of the Facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4 (2), 175-212, 2012
832012
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
832011
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
822013
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
762007
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
712011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
712011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
702014
A process model for integrated IT governance, risk, and compliance management
N Racz, E Weippl, A Seufert
Proceedings of the Ninth Baltic Conference on Databases and Information …, 2010
662010
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
632014
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
572016
Using mobile agents in real world: A survey and evaluation of agent platforms
J Altmann, F Gruber, L Klug, W Stockner, E Weippl
2nd Workshop on Infrastructure for Agents, MAS, and Scalable MAS at …, 2001
572001
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
562017
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
International Conference on Information Systems Security, 249-259, 2006
532006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20