Edgar Weippl
Title
Cited by
Cited by
Year
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
3402015
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
M Mulazzani, S Schrittwieser, M Leithner, M Huber, ER Weippl
USENIX security symposium, 65-76, 2011
2402011
Security in e-learning
ER Weippl
ELearn 2005 (3), 3, 2005
1752005
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
1732010
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1312007
A frame of reference for research of integrated governance, risk and compliance (GRC)
N Racz, E Weippl, A Seufert
IFIP International Conference on Communications and Multimedia Security, 106-117, 2010
1302010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1262012
Fake identities in social media: A case study on the sustainability of the facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4 (2), 175-212, 2012
1112012
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 2013
992013
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016
892016
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
872011
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
852007
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
842017
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
842014
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
792011
Friend-in-the-middle attacks: Exploiting social networking sites for spam
M Huber, M Mulazzani, E Weippl, G Kitzler, S Goluch
IEEE Internet Computing 15 (3), 28-34, 2011
792011
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
782014
A process model for integrated IT governance, risk, and compliance management
N Racz, E Weippl, A Seufert
Proceedings of the Ninth Baltic Conference on Databases and Information …, 2010
722010
Using mobile agents in real world: A survey and evaluation of agent platforms
J Altmann, F Gruber, L Klug, W Stockner, E Weippl
2nd Workshop on Infrastructure for Agents, MAS, and Scalable MAS at …, 2001
652001
InnoDB database forensics
P Frühwirt, M Huber, M Mulazzani, ER Weippl
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
622010
The system can't perform the operation now. Try again later.
Articles 1–20