Edgar Weippl

is research director of SBA Research and Associate Professor (Privatdozent) at the TU Wien.Edgar WEIPPL

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research focuses on applied concepts of IT-security and e-learning.

Bio

After graduating with a Ph.D. from the TU Wien, Edgar worked in a research startup for two years. He then spent one year teaching as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen.

Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE), organizes the ARES conference and is General Chair of SACMAT 2015, PC Chair of Esorics 2015, General Chair of ACM CCS 2016, and PC Chair of ACM SACMAT 2017.

Top Publications:

  • Security aspects in Semantic Web Services Filtering (2007)
    • INPROCEEDINGS--
    • Witold Abramowicz and Andreas Ekelhart and Stefan Fenz and Monika Kaczmarek and A Min Tjoa and Edgar R. Weippl and Dominik Zyskowski
    • Proceedings of the 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)
    @INPROCEEDINGS{Abramowicz_Securityaspectsin_2007,
       author = {Witold Abramowicz and Andreas Ekelhart and Stefan Fenz and Monika Kaczmarek and {A Min} Tjoa and {Edgar R.} Weippl and Dominik Zyskowski},
       title = {Security aspects in Semantic Web Services Filtering},
       booktitle = {Proceedings of the 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)},
       year = {2007},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 - Abramowicz - Security Aspects in Semantic Web Services Filtering.pdf},
       volume = {229},
       pages = {21--31},
       publisher = {Austrian Computer Society},
    }
  • Self-Monitoring in Social Networks (2010)
    • ARTICLE--
    • Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and A Min Tjoa and Edgar R. Weippl
    • Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS)
    @ARTICLE{Anjomshoaa_Self_Monitoring_in_Social_Netw_2010,
       author = {Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Self-Monitoring in Social Networks},
       journal = {Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS)},
       year = {2010},
       note = {According to Aminwithin Reporting Timeframe},
    }
  • SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting (2013)
    • INPROCEEDINGS--
    • Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{ARES_SHPF_short_2013,
       author = {Thomas Unger and Martin Schmiedecker and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
       booktitle = {Proceedings of the Eighth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/shpf_extendedPreprint.pdf},
       link_source = {https://github.com/mmulazzani/shpf},
       link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
    }
  • Exploiting Ontology for Software License Agreements (2010)
    • ARTICLE--
    • Muhammad Asfand e yar and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa
    • International Journal of Software and Informatics (IJSI)
    @ARTICLE{Asfand-e-yar_Exploiting_Ontology_for_Softwa_2010,
       author = {Muhammad Asfand e yar and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
       title = {Exploiting Ontology for Software License Agreements},
       journal = {International Journal of Software and Informatics (IJSI)},
       year = {2010},
       month = {3},
       volume = {4},
       number = {1},
       pages = {1--12},
       note = {According to Aminwithin Reporting Timeframe},
    }
  • Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations (2014)
    • INPROCEEDINGStrue-
    • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl
    • SINCONF 2014 (Conference on Security of Information and Networks)
    @INPROCEEDINGS{Aufner2014Plugin,
       author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
       booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/secperv.pdf},
    }
  • OCG IT-Security Zertifikat fuer Nutzer (2008)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek
    • IRIS 2008
    @INPROCEEDINGS{Benditsch_OCGITSecurityZertifikat_2008,
       author = {{Edgar R.} Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek},
       title = {OCG IT-Security Zertifikat fuer Nutzer},
       booktitle = {IRIS 2008},
       year = {2008},
       month = {1},
    }
  • The Handbook of Technology Management (2009)
    • INBOOK--
    • Edgar R. Weippl and Benjamin Böck
    • Wiley and Sons
    @INBOOK{Bock_acceptedforpublicationSocialEngineering_2009,
       author = {{Edgar R.} Weippl and Benjamin Böck},
       title = {The Handbook of Technology Management},
       year = {2009},
       month = {1},
       chapter = {accepted for publication: Social Engineering},
       publisher = {Wiley and Sons},
    }
  • The Handbook of Computer Networks (2007)
    • INBOOK--
    • Edgar R. Weippl and Markus Klemen and Benjamin Böck
    • Wiley
    @INBOOK{Bock_SocialEngineering_2007,
       author = {{Edgar R.} Weippl and Markus Klemen and Benjamin Böck},
       title = {The Handbook of Computer Networks},
       year = {2007},
       month = {1},
       chapter = {Social Engineering},
       publisher = {Wiley},
    }
  • Availability, Reliability, and Security in Information Systems (2016)
    • BOOK--
    • Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl
    • Springer
    @BOOK{Buccafurri2016Availability,
       author = {Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Availability,
       Reliability,
       and Security in Information Systems},
       booktitle = {Lecture Notes in Computer Science},
       year = {2016},
       pdf = {2016 - FBuccafurri - Availability,
       Reliability,
       and Security in Information Systems - Editorial Notes.pdf},
       publisher = {Springer},
    }
  • Network Security Challenges in Android Applications (2015)
    • INPROCEEDINGS--
    • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl and Vesna Dimitrova
    • 10th International Conference on Availability, Reliability and Security (ARES 2015)
    @INPROCEEDINGS{Buhov2015Network,
       author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl and Vesna Dimitrova},
       title = {Network Security Challenges in Android Applications},
       booktitle = {10th International Conference on Availability,
       Reliability and Security (ARES 2015)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Network_Security_Preprint.pdf},
    }
  • Pin It! Improving Android Network Security At Runtime (2016)
    • INPROCEEDINGStruetrue
    • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl
    • IFIP Networking 2016
    @INPROCEEDINGS{Buhov2016Improving,
       author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Pin It! Improving Android Network Security At Runtime},
       booktitle = {IFIP Networking 2016},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Pin It! Improving Android Network Security at Runtime.pdf},
    }
  • The Role and Security of Firewall in IaaS Cloud Computing (2015)
    • INPROCEEDINGS--
    • Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and Edgar R. Weippl
    • Tenth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Cropper2015Role,
       author = {Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and {Edgar R.} Weippl},
       title = {The Role and Security of Firewall in IaaS Cloud Computing},
       booktitle = {Tenth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PID3762737.pdf},
    }
  • Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013 (2013)
    • INPROCEEDINGS--
    • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu
    • Lecture Notes in Computer Science
    @INPROCEEDINGS{Cuzzocrea2013Availability,
       author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
       title = {Availability,
       Reliability,
       and Security in Information Systems and HCI,
       IFIP WG 8.4,
       8.9,
       TC 5 International Cross-Domain Conference,
       CD-ARES 2013},
       booktitle = {Lecture Notes in Computer Science},
       year = {2013},
    }
  • Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD (2013)
    • INPROCEEDINGS--
    • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu
    • Lecture Notes in Computer Science
    @INPROCEEDINGS{Cuzzocrea2013Security,
       author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
       title = {Security Engineering and Intelligence Informatics,
       CD-ARES 2013 Workshops: MoCrySEn and SeCIHD},
       booktitle = {Lecture Notes in Computer Science},
       year = {2013},
    }
  • Cloudoscopy: Services Discovery and Topology Mapping (2013)
    • INPROCEEDINGStrue-
    • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl
    • Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
       author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Cloudoscopy: Services Discovery and Topology Mapping },
       booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
       year = {2013},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/cloud_final.pdf},
    }
  • Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing (2013)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen
    • Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)
    @INPROCEEDINGS{Dabrowski2013Framework,
       author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
       title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 2013 IEEE International Conference on Systems,
       Man,
       and Cybernetics (SMC2013)},
       year = {2013},
       month = {10},
    }
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
       author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
       link_source = {http://sourceforge.net/p/icc/},
    }
  • QR - Inception: Barcode in Barcode Attacks (2014)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl
    • 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
    @INPROCEEDINGS{Dabrowski2014Inception,
       author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
       title = {QR - Inception: Barcode in Barcode Attacks},
       booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
       year = {2014},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/qrinception.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
    }
  • Poster NDSS 2014: Hardware Trojans--Detect and React? (2014)
    • ARTICLE--
    • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl
    • Network and Distributed System Security (NDSS) Symposium 2014
    @ARTICLE{Dabrowski2014Poster,
       author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
       title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
       journal = {Network and Distributed System Security (NDSS) Symposium 2014},
       year = {2014},
       month = {2},
    }
  • Towards a Hardware Trojan Detection Cycle (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl
    • Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014
    @INPROCEEDINGS{Dabrowski2014Towards,
       author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Towards a Hardware Trojan Detection Cycle},
       booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures,
       ARES ECTCM 2014},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a hardware trojan _paper.pdf},
    }
  • Error-Correcting Codes as Source for Decoding Ambiguity (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl
    • LangSec Workshop at IEEE Security & Privacy
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
       author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
       title = {Error-Correcting Codes as Source for Decoding Ambiguity},
       booktitle = {LangSec Workshop at IEEE Security & Privacy},
       year = {2015},
       month = {21},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ecc.pdf},
       volume = {10},
    }
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner
    • USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015
    @INPROCEEDINGS{Dabrowski2015Leveraging,
       author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
       title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
       booktitle = {USENIX Summit on Gaming,
       Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
       year = {2015},
       month = {8},
       pdf = {https://www.usenix.org/system/files/conference/3gse15/3gse15-dabrowski.pdf},
    }
  • Smart Privacy Visor: Bridging the Privacy Gap (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen
    • Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)
    @INPROCEEDINGS{Dabrowski2015Smart,
       author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
       title = {Smart Privacy Visor: Bridging the Privacy Gap},
       booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
    }
  • Browser History Stealing with Captive Wi-Fi Portals (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and Edgar R. Weippl
    • Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST)
    @INPROCEEDINGS{Dabrowski2016Browser,
       author = {Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and {Edgar R.} Weippl},
       title = {Browser History Stealing with Captive Wi-Fi Portals},
       booktitle = {Proceedings of Workshops at IEEE Security & Privacy 2016,
       Mobile Security Technologies (MoST)},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dabrowski2016Browser.pdf},
    }
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection (2016)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Georg Petzl and Edgar R. Weippl
    • 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)
    @INPROCEEDINGS{Dabrowski2016Messenger,
       author = {Adrian Dabrowski and Georg Petzl and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection},
       booktitle = {19th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/providerICdetection.pdf},
    }
  • Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl
    • 11th International Conference on Passwords
    @INPROCEEDINGS{Dabrowski2016Mobile,
       author = {Adrian Dabrowski and {Edgar R.} Weippl},
       title = {Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication},
       booktitle = {11th International Conference on Passwords},
       year = {2016},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/wifipresence.pdf},
       link_video = {https://www.youtube.com/watch?v=6fC58E1XAAw&list=PLdIqs92nsIzT2ao_wAJ2GCRKl_3zaebgb&index=2},
    }
  • Grid Shock: Coordinated Load-Change Attacks on Power Grids (2017)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC) 2017
    @INPROCEEDINGS{Dabrowski2017Grid,
       author = {Adrian Dabrowski and Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Grid Shock: Coordinated Load-Change Attacks on Power Grids},
       booktitle = {Annual Computer Security Applications Conference (ACSAC) 2017},
       year = {2017},
       month = {12},
    }
  • Cloud Speicherdienste als Angriffsvektoren (2011)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl
    • 9th Information Security Konferenz in Krems
    @INPROCEEDINGS{DropboxKrems2011,
       author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
       title = {Cloud Speicherdienste als Angriffsvektoren},
       booktitle = {9th Information Security Konferenz in Krems},
       year = {2011},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DunkleWolken.pdf},
    }
  • Architectural approach for handling semi-structured data in a user-centered working environment (2007)
    • ARTICLE--
    • Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and Edgar R. Weippl
    • International Journal of Web Information Systems
    @ARTICLE{Ekelhart_Architecturalapproachhandling_2007,
       author = {Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and {Edgar R.} Weippl},
       title = {Architectural approach for handling semi-structured data in a user-centered working environment},
       journal = {International Journal of Web Information Systems},
       year = {2007},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 - Ekelhart - Architectural Approach for Handling Semi-Structured Data in a User-Centered Working Environment.pdf},
       volume = {3},
       pages = {198--211},
    }
  • Formal threat descriptions for enhancing governmental risk assessment (2007)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Stefan Fenz and Thomas Neubauer and Edgar R. Weippl
    • Proceedings of the First International Conference on Theory and Practice of Electronic Governance
    @INPROCEEDINGS{Ekelhart_Formalthreatdescriptions_2007,
       author = {Andreas Ekelhart and Stefan Fenz and Thomas Neubauer and {Edgar R.} Weippl},
       title = {Formal threat descriptions for enhancing governmental risk assessment},
       booktitle = {Proceedings of the First International Conference on Theory and Practice of Electronic Governance},
       year = {2007},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 Ekelhart - Formal Threat Descriptions for Enhancing Governmental Risk Assessment.pdf},
       volume = {232},
       pages = {40--43},
       publisher = {ACM},
       acm = {933612},
    }
  • Ontological Mapping of Common Criterias Security Assurance Requirements (2007)
    • INPROCEEDINGS--
    • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch
    • New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007, May 14-16
    @INPROCEEDINGS{Ekelhart_OntologicalMappingof_2007,
       author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch},
       title = {Ontological Mapping of Common Criterias Security Assurance Requirements},
       booktitle = {New Approaches for Security,
       Privacy and Trust in Complex Environments,
       Proceedings of the IFIP TC 11 22nd International Information Security Conference,
       IFIPSEC2007,
       May 14-16},
       year = {2007},
       month = {5},
       abstract = {The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data security and data privacy. Due to the very complex and time-consuming certification process a lot of companies abstain from a CC certification. We created the CC Ontology tool,
       which is based on an ontological representation of the CC catalog,
       to support the evaluator at the certification process. Tasks such as the planning of an evaluation process,
       the review of relevant documents or the creating of reports are supported by the CC Ontology tool. With the development of this tool we reduce the time and costs needed to complete a certification.},
       volume = {232_2007},
       pages = {85-95},
       publisher = {International Federation for Information Processing ,
      },
       note = {978-0-387-72366-2},
    }
    The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data security and data privacy. Due to the very complex and time-consuming certification process a lot of companies abstain from a CC certification. We created the CC Ontology tool, which is based on an ontological representation of the CC catalog, to support the evaluator at the certification process. Tasks such as the planning of an evaluation process, the review of relevant documents or the creating of reports are supported by the CC Ontology tool. With the development of this tool we reduce the time and costs needed to complete a certification.
  • Ontology-based Business Knowledge for Simulating Threats to Corporate Assets (2006)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Stefan Fenz and Markus Klemen and A Min Tjoa and Edgar R. Weippl
    • Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006
    @INPROCEEDINGS{Ekelhart_OntologybasedBusinessKnowledge_2006,
       author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Ontology-based Business Knowledge for Simulating Threats to Corporate Assets},
       booktitle = {Practical Aspects of Knowledge Management,
       6th International Conference,
       PAKM 2006},
       year = {2006},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2006 - Ekelhart - Ontology-based Business Knowledge for Simulating Threats to Corporate Assets.pdf},
       volume = {4333_2006},
       pages = {37--48},
       publisher = {Springer Berlin Heidelberg},
    }
  • Security Issues for the Use of Semantic Web in e-Commerce (2007)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Stefan Fenz and A Min Tjoa and Edgar R. Weippl
    • Business Information Systems, 10th International Conference on Business Information Systems, BIS 2007
    @INPROCEEDINGS{Ekelhart_SecurityIssuesUse_2007,
       author = {Andreas Ekelhart and Stefan Fenz and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Security Issues for the Use of Semantic Web in e-Commerce},
       booktitle = {Business Information Systems,
       10th International Conference on Business Information Systems,
       BIS 2007},
       year = {2007},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 - Ekelhart - Security Issues for the Use of Semantic Web in e-Commerce.pdf},
       pages = {1--13},
       publisher = {Springer Berlin Heidelberg},
    }
  • Security Ontologies: Improving Quantitative Risk Analysis (2007)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl
    • Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007
    @INPROCEEDINGS{Ekelhart_SecurityOntologiesImproving_2007,
       author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
       title = {Security Ontologies: Improving Quantitative Risk Analysis},
       booktitle = {Proceedings of the 40th Hawaii International Conference on System Sciences,
       HICSS2007},
       year = {2007},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 - Ekelhart - Security Ontologies Improving Quantitative Risk Analysis.pdf},
       pages = {156--162},
       publisher = {IEEE Computer Society},
    }
  • Security Ontology: Simulating Threats to Corporate Assets (2006)
    • INPROCEEDINGS--
    • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl
    • Second International Conference on Information Systems Security (ICISS 2006)
    @INPROCEEDINGS{Ekelhart_SecurityOntologySimulating_2006,
       author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
       title = {Security Ontology: Simulating Threats to Corporate Assets},
       booktitle = {Second International Conference on Information Systems Security (ICISS 2006)},
       year = {2006},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2006 - Ekelhart - Security Ontology Simulating Threats to Corporate Assets.pdf},
       volume = {4332_2006},
       pages = {249--259},
       publisher = {Springer Berlin Heidelberg},
    }
  • XML Security - A comparative literature review (2008)
    • ARTICLE--
    • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner
    • Journal of Systems and Software
    @ARTICLE{Ekelhart_XMLSecurity_2008,
       author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
       title = {XML Security - A comparative literature review},
       journal = {Journal of Systems and Software},
       year = {2008},
       month = {1},
       volume = {81},
       pages = {1715-1724},
       note = {ISSN: 0164-1212},
    }
  • E-voting authentication with QR-codes (2014)
    • INPROCEEDINGS--
    • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl
    • 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust
    @INPROCEEDINGS{Falkner2014Evoting,
       author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
       title = {E-voting authentication with QR-codes},
       booktitle = {2nd International Conference on Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/evoting_final_HCI_2014.pdf},
    }
  • Fortification of IT security by automatic security advisory processing (2008)
    • INPROCEEDINGS--
    • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart
    • Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, AINA2008
    @INPROCEEDINGS{Fenz_FortificationofIT_2008,
       author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
       title = {Fortification of IT security by automatic security advisory processing},
       booktitle = {Proceedings of the 22nd International Conference on Advanced Information Networking and Applications,
       AINA2008},
       year = {2008},
       month = {3},
       abstract = {The past years have seen the rapid increase of security related incidents in the field of information technology. IT infrastructures in the commercial as well as in the governmental sector are becoming evermore heterogeneous which increases the complexity of handling and maintaining an adequate security level. Especially organizations which are hosting and processing highly sensitive data are obligated to establish a holistic company-wide security approach. We propose a novel security concept to reduce this complexity by automatic assessment of security advisories. A central entity collects vulnerability information from various sources,
       converts it into a standardized and machine-readable format and distributes it to its subscribers. The subscribers are then able to automatically map the vulnerability information to the ontological stored infrastructure data to visualize newly-discovered software vulnerabilities. The automatic analysis of vulnerabilities decreases response times and permits precise response to new threats and vulnerabilities,
       thus decreasing the administration complexity and increasing the IT security level.},
       pages = {575-582},
       publisher = {IEEE Computer Society},
    }
    The past years have seen the rapid increase of security related incidents in the field of information technology. IT infrastructures in the commercial as well as in the governmental sector are becoming evermore heterogeneous which increases the complexity of handling and maintaining an adequate security level. Especially organizations which are hosting and processing highly sensitive data are obligated to establish a holistic company-wide security approach. We propose a novel security concept to reduce this complexity by automatic assessment of security advisories. A central entity collects vulnerability information from various sources, converts it into a standardized and machine-readable format and distributes it to its subscribers. The subscribers are then able to automatically map the vulnerability information to the ontological stored infrastructure data to visualize newly-discovered software vulnerabilities. The automatic analysis of vulnerabilities decreases response times and permits precise response to new threats and vulnerabilities, thus decreasing the administration complexity and increasing the IT security level.
  • Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard (2007)
    • INPROCEEDINGS--
    • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl
    • Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007
    @INPROCEEDINGS{Fenz_InformationSecurityFortification_2007,
       author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl},
       title = {Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard},
       booktitle = {Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing,
       PRDC2007},
       year = {2007},
       month = {12},
       pages = {381-388},
       publisher = {IEEE Computer Society},
       note = {0-7695-3054-0},
    }
  • Ontology-based IT-Security Planning (2006)
    • INPROCEEDINGS--
    • Stefan Fenz and Edgar R. Weippl
    • Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, PRDC2006
    @INPROCEEDINGS{Fenz_OntologybasedITSecurityPlanning_2006,
       author = {Stefan Fenz and {Edgar R.} Weippl},
       title = {Ontology-based IT-Security Planning},
       booktitle = {Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing,
       PRDC2006},
       year = {2006},
       month = {12},
       abstract = {IT-security has become a much diversified field and small and medium sized enterprises (SMEs),
       in particular,
       do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology,
       to provide a solid base for an applicable and holistic IT-security approach for SMEs,
       enabling low-cost risk management and threat analysis.},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2006 - Fenz - Ontology-based IT Security Planning.pdf},
       pages = {389-390},
       publisher = {IEEE Computer Society},
       note = {9353421},
    }
    IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis.
  • Semantic Potential of existing Security Advisory Standards (2008)
    • INPROCEEDINGS--
    • Stefan Fenz and Andreas Ekelhart and Edgar R. Weippl
    • Proceedings of the FIRST2008 Conference
    @INPROCEEDINGS{Fenz_SemanticPotentialof_2008,
       author = {Stefan Fenz and Andreas Ekelhart and {Edgar R.} Weippl},
       title = {Semantic Potential of existing Security Advisory Standards},
       booktitle = {Proceedings of the FIRST2008 Conference},
       year = {2008},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2008 - Fenz - Semantic Potential of Existing Security Advisory Standards.pdf},
    }
  • InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl
    • GI Sicherheit 2014
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
       author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
       booktitle = {GI Sicherheit 2014 },
       year = {2014},
       month = {3},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
    }
  • Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • ASQT
    @INPROCEEDINGS{Fruehwirt2014Testen,
       author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
       booktitle = {ASQT},
       year = {2014},
       month = {9},
    }
  • Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations (2014)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • Digital Investigation
    @ARTICLE{Fruehwirt2014Towards,
       author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
       journal = {Digital Investigation},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/towards a forensic aware_paper.pdf},
       volume = {11},
       pages = {336-348},
    }
  • Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile (2014)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • International Conference on Privacy, Security, Risk and Trust
    @INPROCEEDINGS{Fruehwirt2014Using,
       author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
       booktitle = {International Conference on Privacy,
       Security,
       Risk and Trust},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/using machine learning_paper.pdf},
    }
  • Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform (2010)
    • INPROCEEDINGS--
    • C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl
    • 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010
    @INPROCEEDINGS{Fruehwirth_Research_Challenges_in_the_Sec_2010,
       author = {C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform},
       booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010},
       year = {2010},
       month = {9},
    }
  • Sicherheit in sozialen Netzwerken: Quo Vadis (2010)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl
    • 8th Information Security Konferenz in Krems
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
       author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
       booktitle = {8th Information Security Konferenz in Krems},
       year = {2010},
       month = {11},
    }
  • On Cooperatively Creating Dynamic Ontologies (2005)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska
    • Proceedings of the 16th ACM Conference on Hypertext and Hypermedia
    @INPROCEEDINGS{Gahleitner_CooperativelyCreatingDynamic_2005,
       author = {{Edgar R.} Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska},
       title = {On Cooperatively Creating Dynamic Ontologies},
       booktitle = {Proceedings of the 16th ACM Conference on Hypertext and Hypermedia},
       year = {2005},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p208-gahleitner.pdf},
       publisher = {ACM},
       acm = {878760},
    }
  • Nichtabstreitbarkeit und Audits in ELearning (2006)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Gernot Goluch
    • IRIS 2006
    @INPROCEEDINGS{Goluch_NichtabstreitbarkeitundAudits_2006,
       author = {{Edgar R.} Weippl and Gernot Goluch},
       title = {Nichtabstreitbarkeit und Audits in ELearning},
       booktitle = {IRIS 2006},
       year = {2006},
       month = {1},
    }
  • Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. (2013)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl
    • SEC
    @INPROCEEDINGS{hobel2013a,
       author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
       title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.},
       booktitle = {SEC},
       year = {2013},
       volume = {405},
       pages = {286-299},
       publisher = {Springer},
       note = {The original publication is available at www.springerlink.com},
    }
  • Towards Security-Enhanced and Privacy-Preserving Mashup Compositions (2013)
    • INPROCEEDINGS--
    • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl
    • Security and Privacy Protection in Information Processing Systems
    @INPROCEEDINGS{hobel2013towards,
       author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
       title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions},
       booktitle = {Security and Privacy Protection in Information Processing Systems},
       year = {2013},
       month = {7},
       pages = {286--299},
       publisher = {Springer},
    }
  • Genie in a Model? Why Model Driven Security will not secure your Web Application (2014)
    • ARTICLE--
    • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
    @ARTICLE{Hochreiner2014Genie,
       author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
       journal = {Journal of Wireless Mobile Networks,
       Ubiquitous Computing,
       and Dependable Applications (JoWUA)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jowua-v5n3-4.pdf},
       volume = {5},
       pages = {44-62},
    }
  • Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices (2014)
    • INPROCEEDINGS--
    • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl
    • SINCONF 2014 (Conference on Security of Information and Networks)
    @INPROCEEDINGS{Hochreiner2014Towards,
       author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
       title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
       booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
       year = {2014},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sinconf_preprint.pdf},
    }
  • Using Model Driven Security Approaches in Web Application Development (2014)
    • INPROCEEDINGStrue-
    • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl
    • AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)
    @INPROCEEDINGS{Hochreiner2014Using,
       author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Using Model Driven Security Approaches in Web Application Development },
       booktitle = {AsiaARES (The 2014 Asian Conference on Availability,
       Reliability and Security)},
       year = {2014},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
    }
  • Friend-in-the-middle Attacks (2010)
    • TECHREPORT--
    • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl
    • -
    @TECHREPORT{Huber2010Friendin-the-middle,
       author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
       title = {Friend-in-the-middle Attacks},
       booktitle = {Technical Report},
       year = {2010},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FITM_TR-SBA-Research-0710-01.pdf},
    }
  • Appinspect: large-scale evaluation of social networking apps (2013)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • Proceedings of the first ACM conference on Online social networks
    @INPROCEEDINGS{huber2013appinspect,
       author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Appinspect: large-scale evaluation of social networking apps},
       booktitle = {Proceedings of the first ACM conference on Online social networks},
       year = {2013},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/AppInspect_peprint.pdf},
       pages = {143--154},
       publisher = {ACM},
       link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
    }
  • Cheap and Automated Socio-Technical Attacks based on Social Networking Sites (2010)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • 3rd Workshop on Artificial Intelligence and Security AISec 10
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
       author = {Markus Huber and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
       booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
       year = {2010},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p61huber.pdf},
    }
  • Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam (2011)
    • ARTICLE--
    • Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl
    • IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
       author = {Markus Huber and Martin Schmiedecker and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
       title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
       journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
       year = {2011},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/FITM_InternetComputing_preprint.pdf},
       note = {Pre Print},
    }
  • InnoDB Database Forensics (2010)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Markus Huber and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 24th International Conference on Advanced Information Networking and Applications
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
       author = {Peter Fruehwirt and Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics},
       booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
       year = {2010},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/AINA2010-InnoDBforensics_preprint.pdf},
    }
  • Social Networking Sites Security Quo Vadis (2010)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
       author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Social Networking Sites Security Quo Vadis},
       booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
       year = {2010},
       month = {8},
    }
  • Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites (2010)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
       author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
       booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
       year = {2010},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sec2010-friendInjection_preprint.pdf},
    }
  • Automated Analysis of Underground Marketplaces (2014)
    • INPROCEEDINGS--
    • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl
    • Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Hudic2014Automated,
       author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
       title = {Automated Analysis of Underground Marketplaces},
       booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/undergroundmarketplaces.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
    }
  • Towards Fully Automated Digital Alibis with Social Interaction (2014)
    • INPROCEEDINGS--
    • Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{ifip119_2014_alibi,
       author = {Stefanie Beyer and Martin Schmiedecker and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {Towards Fully Automated Digital Alibis with Social Interaction},
       booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2014},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/alibigenerator_preprint.pdf},
       link_source = {https://github.com/mmulazzani/alibiFramework},
       link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
    }
  • A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives (2014)
    • INPROCEEDINGS--
    • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz
    • IIWAS 2014
    @INPROCEEDINGS{Islam2014Decision,
       author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
       title = {A Decision Framework Model for Migration into Cloud: Business,
       Application,
       Security and Privacy Perspectives},
       booktitle = {IIWAS 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/09_iiwas_46.pdf},
    }
  • An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model (2014)
    • ARTICLEtrue-
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Information and Software Technology (Elsevier)
    @ARTICLE{Islam2014Empirical,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
       journal = {Information and Software Technology (Elsevier)},
       year = {2014},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/10_Paper 1.pdf},
    }
  • An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model (2013)
    • ARTICLE--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Proceedings of the Winter Simulation Conference 2013
    @ARTICLE{Islam_An_Empirical_Study_on_the_Impl_2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model},
       journal = {Proceedings of the Winter Simulation Conference 2013},
       year = {2013},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/empiricalstudy 1.pdf},
    }
  • A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System (2013)
    • INPROCEEDINGS--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Security Engineering for Cloud Computing: Approaches and Tools
    @INPROCEEDINGS{Islam_A_Goal_Driven_Risk_Management__2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System},
       booktitle = {Security Engineering for Cloud Computing: Approaches and Tools},
       year = {2013},
    }
  • Condensed Cryptographic Currencies Crash Course (C5) (2016)
    • INPROCEEDINGS-true
    • Aljosha Judmayer and Edgar R. Weippl
    • 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security
    @INPROCEEDINGS{Judmayer2016Condensed,
       author = {Aljosha Judmayer and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {Condensed Cryptographic Currencies Crash Course (C5)},
       booktitle = {2016 {ACM} {SIGSAC} Conference on Computer and Communications Security},
       year = {2016},
       month = {10},
       pdf = {http://dl.acm.org/citation.cfm?id=2976754},
    }
  • Cryptographic Currencies Crash Course (C4): Tutorial (2016)
    • INPROCEEDINGS-true
    • Aljosha Judmayer and Edgar R. Weippl
    • 25th International Conference on World Wide Web (WWW 2016)
    @INPROCEEDINGS{Judmayer2016Cryptographic,
       author = {Aljosha Judmayer and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {Cryptographic Currencies Crash Course (C4): Tutorial},
       booktitle = {25th International Conference on World Wide Web (WWW 2016)},
       year = {2016},
       month = {4},
       pdf = {http://www2016.net/proceedings/companion/p1021.pdf},
    }
  • Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms (2017)
    • ARTICLE--
    • Aljosha Judmayer and Nicholas Stifter and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Judmayer2017Blocks,
       author = {Aljosha Judmayer and Nicholas Stifter and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Blocks and Chains: Introduction to Bitcoin,
       Cryptocurrencies,
       and Their Consensus Mechanisms},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2017},
       pdf = {https://doi.org/10.2200/S00773ED1V01Y201704SPT020},
    }
  • Lightweight Address Hopping for Defending the IPv6 IoT (2017)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Johanna Ullrich and Georg Merzdovnik and Artemios G. Voyiatzis and Edgar R. Weippl
    • 12th International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Judmayer2017Lightweight,
       author = {Aljosha Judmayer and Johanna Ullrich and Georg Merzdovnik and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Lightweight Address Hopping for Defending the IPv6 IoT},
       booktitle = {12th International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2017},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201707 - JUDMAYER - LightweightAddressHopping.pdf},
    }
  • Merged Mining: Curse or Cure? (2017)
    • INPROCEEDINGS--
    • Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar R. Weippl
    • International Workshop on Cryptocurrencies and Blockchain Technology (CBT 17)
    @INPROCEEDINGS{Judmayer2017Merged,
       author = {Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Merged Mining: Curse or Cure?},
       booktitle = {International Workshop on Cryptocurrencies and Blockchain Technology (CBT 17)},
       year = {2017},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/201709 - AJudmayer - CBT_Merged_Mining_camera_ready_final.pdf},
    }
  • Windows Installer Security (2014)
    • INPROCEEDINGS--
    • Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and Edgar R. Weippl
    • Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)
    @INPROCEEDINGS{Kadluba2014Windows,
       author = {Christian Kadluba and Martin Schmiedecker and Lorenz Zechner and Sebastian Neuner and {Edgar R.} Weippl},
       title = {Windows Installer Security},
       booktitle = {Sixth ASE International Conference on Privacy,
       Security,
       Risk and Trust (PASSAT 2014)},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Sebastian Neuner msiInstaller.pdf},
    }
  • E-Learning without Text and Language: A Language-Free Learning Model (2005)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha
    • Proceedings of EDMEDIA 2005
    @INPROCEEDINGS{Kalinyaprak_ELearningwithoutText_2005,
       author = {{Edgar R.} Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha},
       title = {E-Learning without Text and Language: A Language-Free Learning Model},
       booktitle = {Proceedings of EDMEDIA 2005},
       year = {2005},
       month = {6},
    }
  • Recent developments in model-driven architecture and security (2010)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Viesturs Kaugers
    • NA
    @INPROCEEDINGS{Kaugers_Recent_developments_in_model_d_2010,
       author = {{Edgar R.} Weippl and Viesturs Kaugers},
       title = {Recent developments in model-driven architecture and security},
       booktitle = {NA},
       year = {2010},
       abstract = {Security is definitely one of the most important aspects in business information systems. This aspect is strongly related to costs,
       risks and reputation of organization. Currently innovative way to develop software is offered by model-driven architecture. This architecture uses models and transformations to generate executable code. Along with model-driven architecture there is one more approach based on mentioned methodology for developing secure systems. It's called model-driven security. It uses the same principles as model-driven security but also introduces new ones like special languages for modeling security requirements,
       frameworks for building secure systems and means to define security policies. This paper describes current situation,
       presents overview of topical and perspective model-driven architecture and security developments and gives conclusions on the subject.},
       note = {Unpublished yet},
    }
    Security is definitely one of the most important aspects in business information systems. This aspect is strongly related to costs, risks and reputation of organization. Currently innovative way to develop software is offered by model-driven architecture. This architecture uses models and transformations to generate executable code. Along with model-driven architecture there is one more approach based on mentioned methodology for developing secure systems. It's called model-driven security. It uses the same principles as model-driven security but also introduces new ones like special languages for modeling security requirements, frameworks for building secure systems and means to define security policies. This paper describes current situation, presents overview of topical and perspective model-driven architecture and security developments and gives conclusions on the subject.
  • An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System (2009)
    • INPROCEEDINGS--
    • A Min Tjoa and Edgar R. Weippl and Farman Ali Khan and Sabine Graf
    • Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009)
    @INPROCEEDINGS{Khan_Identifying_and_Incorporating__2010,
       author = {{A Min} Tjoa and {Edgar R.} Weippl and Farman Ali Khan and Sabine Graf},
       title = {An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System},
       booktitle = {Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009)},
       year = {2009},
       month = {12},
       abstract = {Learning styles and affective states influence students learning. The purpose of this study is to develop a conceptual framework for identifying and integrating learning styles and affective states of a learner into web-based learning management systems and therefore provide learners with adaptive courses and additional individualized pedagogical guidance that is tailored to their learning styles and affective states. The study was carried out in three phases,
       the first of which was the investigation and determination of learning styles and affective states which are important for learning. Phase two consisted of the development of an approach for the identification of learning styles and affective states as well as the development of a mechanism to calculate them from the students learning interactions within web-based learning management systems. The third phase was to develop a learning strategy that is more personalized and adaptive in nature and tailored to learners needs and current situation through considering learners learning styles and affective states,
       aiming to lead to better learning outcomes and progress},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p431-khan.pdf},
       acm = {351733},
    }
    Learning styles and affective states influence students learning. The purpose of this study is to develop a conceptual framework for identifying and integrating learning styles and affective states of a learner into web-based learning management systems and therefore provide learners with adaptive courses and additional individualized pedagogical guidance that is tailored to their learning styles and affective states. The study was carried out in three phases, the first of which was the investigation and determination of learning styles and affective states which are important for learning. Phase two consisted of the development of an approach for the identification of learning styles and affective states as well as the development of a mechanism to calculate them from the students learning interactions within web-based learning management systems. The third phase was to develop a learning strategy that is more personalized and adaptive in nature and tailored to learners needs and current situation through considering learners learning styles and affective states, aiming to lead to better learning outcomes and progress
  • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata (2014)
    • ARTICLEtrue-
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and Edgar R. Weippl
    • Electronic Markets - The International Journal on Networked Business
    @ARTICLE{Kieseberg2014algorithm,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Isao Echizen and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
       journal = {Electronic Markets - The International Journal on Networked Business},
       year = {2014},
       pdf = {http://link.springer.com/article/10.1007/s12525-014-0154-x},
    }
  • Protecting Anonymity in Data-Driven Biomedical Science (2014)
    • INBOOK--
    • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger
    • -
    @INBOOK{Kieseberg2014Protecting,
       author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Protecting Anonymity in Data-Driven Biomedical Science},
       booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/1v0_KIESEBERG_bookchapter.pdf},
       pages = {301--316},
    }
  • Security tests for mobile applications - Why using TLS SSL is not enough (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl
    • 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    @INPROCEEDINGS{Kieseberg2015Security,
       author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Security tests for mobile applications - Why using TLS SSL is not enough},
       booktitle = {2015 IEEE Eighth International Conference on Software Testing,
       Verification and Validation Workshops (ICSTW)},
       year = {2015},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ASQT2015_cameraready_wo1stpage.pdf},
    }
  • Witnesses for the Doctor in the Loop (2015)
    • INPROCEEDINGS--
    • Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • 2015 International Conference on Brain Informatics & Health (BIH)
    @INPROCEEDINGS{Kieseberg2015Witnesses,
       author = {Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Witnesses for the Doctor in the Loop},
       booktitle = {2015 International Conference on Brain Informatics & Health (BIH)},
       year = {2015},
       month = {9},
       pdf = {https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=1151817&pCurrPk=85962},
    }
  • Detection of Data Leaks in Collaborative Data Driven Research (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2016Detection,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Detection of Data Leaks in Collaborative Data Driven Research},
       journal = {ERCIM News},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Detection_EN105.pdf},
    }
  • Trust for the “Doctor in the Loop" (2016)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • ERCIM News
    @ARTICLE{Kieseberg2016Trust,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Trust for the “Doctor in the Loop"},
       journal = {ERCIM News},
       year = {2016},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/trustfordoctorintheloop.pdf},
    }
  • Forensics using Internal Database Structures (2017)
    • ARTICLE--
    • Peter Kieseberg and Edgar R. Weippl and Sebastian Schrittwieser
    • ERCIM News
    @ARTICLE{Kieseberg2017Forensics,
       author = {Peter Kieseberg and {Edgar R.} Weippl and Sebastian Schrittwieser},
       title = {Forensics using Internal Database Structures},
       journal = {ERCIM News},
       year = {2017},
       month = {1},
       pdf = {http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf},
       volume = {108},
    }
  • Real-time Forensics through Endpoint Visibility (2017)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    @INPROCEEDINGS{Kieseberg2017Realtime,
       author = {Peter Kieseberg and Sebastian Neuner and Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Real-time Forensics through Endpoint Visibility},
       booktitle = {International Conference on Digital Forensics & Cyber Crime (ICDF2C)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf},
       link_slides = {https://www.slideshare.net/SBAResearch/realtime-forensics-through-endpoint-visibility-80707652},
    }
  • Das Testen von Algorithmen in sensibler datengetriebener Forschung (2017)
    • ARTICLE--
    • Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and Edgar R. Weippl and Andreas Holzinger
    • Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)
    @ARTICLE{Kieseberg2017Testen,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Bernd Malle and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Das Testen von Algorithmen in sensibler datengetriebener Forschung},
       journal = {Rundbrief des Fachausschusses Management der Anwendungsentwicklung und -wartung (WI-MAW)},
       year = {2017},
       month = {4},
       pdf = {http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf},
    }
  • Trend Analysis of Underground Marketplaces (2017)
    • ARTICLE--
    • Klaus Kieseberg and Peter Kieseberg and Edgar R. Weippl
    • ERCIM News
    @ARTICLE{Kieseberg2017Trend,
       author = {Klaus Kieseberg and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Trend Analysis of Underground Marketplaces},
       journal = {ERCIM News},
       year = {2017},
       month = {10},
       pdf = {https://ercim-news.ercim.eu/en111/r-i/trend-analysis-of-underground-marketplaces},
       volume = {111},
    }
  • A tamper-proof audit and control system for the doctor in the loop (2016)
    • ARTICLE--
    • Peter Kieseberg and Bernd Malle and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger
    • Brain Informatics
    @ARTICLE{Kiesebergtamperproof,
       author = {Peter Kieseberg and Bernd Malle and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
       title = {A tamper-proof audit and control system for the doctor in the loop},
       journal = {Brain Informatics},
       year = {2016},
       month = {3},
       pdf = {http://link.springer.com/article/10.1007/s40708-016-0046-2},
       pages = {1--11},
    }
  • Trees Cannot Lie: Using Data Structures for Forensics Purposes (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • European Intelligence and Security Informatics Conference (EISIC 2011)
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
       booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
       year = {2011},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/btree_forensics_camera_ready.pdf},
    }
  • The Handbook of Computer Networks (2007)
    • INBOOK--
    • Edgar R. Weippl and Markus Klemen and Thomas Neubauer
    • Wiley
    @INBOOK{Klemen_BusinessRequirementsofBackupSystems_2007,
       author = {{Edgar R.} Weippl and Markus Klemen and Thomas Neubauer},
       title = {The Handbook of Computer Networks},
       year = {2007},
       month = {1},
       chapter = {Business Requirements of Backup Systems},
       publisher = {Wiley},
    }
  • Hardware Malware (2013)
    • ARTICLE--
    • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Krieg2013Hardware,
       author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Hardware Malware},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2013},
       month = {11},
       volume = {4},
       pages = {1-115},
    }
  • Social engineering attacks on the knowledge worker (2013)
    • INPROCEEDINGS--
    • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl
    • Proceedings of the 6th International Conference on Security of Information and Networks
    @INPROCEEDINGS{Krombholz2013Social,
       author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
       title = {Social engineering attacks on the knowledge worker},
       booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
       year = {2013},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sig-alternate.pdf},
       pages = {28--35},
       publisher = {ACM},
    }
  • Advanced social engineering attacks (2014)
    • ARTICLE--
    • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl
    • Journal of Information Security and Applications
    @ARTICLE{Krombholz2014Advanced,
       author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
       title = {Advanced social engineering attacks},
       journal = {Journal of Information Security and Applications},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jisa_revised.pdf},
    }
  • QR Code Security: A Survey of Attacks and Challenges for Usable Security (2014)
    • INBOOK--
    • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl
    • Springer
    @INBOOK{Krombholz2014Code,
       author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
       title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
       booktitle = {Human Aspects of Information Security,
       Privacy,
       and Trust},
       year = {2014},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/llncs.pdf},
       pages = {79--90},
       publisher = {Springer},
       link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
    }
  • QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl
    • 2015 International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Krombholz2015Code,
       author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
       title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
       booktitle = {2015 International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {http://ieeexplore.ieee.org/document/7299920/},
    }
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • 1st Workshop on Wearable Security and Privacy
    @INPROCEEDINGS{Krombholz2015Glass,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Ok Glass,
       Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
       booktitle = {1st Workshop on Wearable Security and Privacy},
       year = {2015},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ok Glass.pdf},
    }
  • Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl
    • Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015
    @INPROCEEDINGS{Krombholz2015Privacy,
       author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
       title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
       booktitle = {Workshop on Inclusive Privacy and Security (WIPS),
       Symposium On Usable Privacy and Security 2015},
       year = {2015},
       month = {7},
       pdf = {https://www.ifs.tuwien.ac.at/node/17062},
    }
  • Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin (2016)
    • INPROCEEDINGS--
    • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl
    • Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.
    @INPROCEEDINGS{Krombholz2016bare,
       author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
       title = {Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin},
       booktitle = {Sicherheit 2016: Sicherheit,
       Schutz und Zuverlässigkeit,
       Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.},
       year = {2016},
       month = {4},
    }
  • The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy (2016)
    • INPROCEEDINGStruetrue
    • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl
    • International Conference on Financial Cryptography and Data Security (FC)
    @INPROCEEDINGS{Krombholz2016Other,
       author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
       booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
       year = {2016},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TheOtherSideOfTheCoin_FC16preConf.pdf},
    }
  • Exploring Design Directions for Wearable Privacy (2017)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • Usable Security
    @INPROCEEDINGS{Krombholz2017Exploring,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Exploring Design Directions for Wearable Privacy},
       booktitle = {Usable Security},
       year = {2017},
       pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
    }
  • "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS (2017)
    • INPROCEEDINGStruetrue
    • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl
    • 26th USENIX Security Symposium (USENIX Security 2017)
    @INPROCEEDINGS{Krombholz2017Have,
       author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
       booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
       year = {2017},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/sec17-krombholz.pdf},
       link_slides = {https://www.slideshare.net/SBAResearch/i-have-no-idea-what-im-doing-on-the-usability-of-deploying-https},
    }
  • Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse (2007)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Khalid Latif
    • IEEE International Conference on Information Reuse and Integration
    @INPROCEEDINGS{Latif_QuestionDrivenSemantics_2007,
       author = {{Edgar R.} Weippl and Khalid Latif},
       title = {Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse},
       booktitle = {IEEE International Conference on Information Reuse and Integration},
       year = {2007},
       month = {8},
    }
  • The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases (2016)
    • INPROCEEDINGS--
    • Bernd Malle and Peter Kieseberg and Edgar R. Weippl and Andreas Holzinger
    • International Conference on Availability, Reliability, and Security
    @INPROCEEDINGS{Malle2016Right,
       author = {Bernd Malle and Peter Kieseberg and {Edgar R.} Weippl and Andreas Holzinger},
       title = {The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases},
       booktitle = {International Conference on Availability,
       Reliability,
       and Security},
       year = {2016},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PAML.pdf},
    }
  • Notary-assisted Certificate Pinning for Improved Security of (Android) Apps (2016)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Damjan Buhov and Artemios G. Voyiatzis and Edgar R. Weippl
    • 11th International Conference on Availability, Reliability and Security (ARES 2016)
    @INPROCEEDINGS{Merzdovnik2016Notaryassisted,
       author = {Georg Merzdovnik and Damjan Buhov and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Notary-assisted Certificate Pinning for Improved Security of (Android) Apps},
       booktitle = {11th International Conference on Availability,
       Reliability and Security (ARES 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/notarypin.pdf},
    }
  • Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services (2016)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and Artemios G. Voyiatzis and Edgar R. Weippl
    • 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)
    @INPROCEEDINGS{Merzdovnik2016Whom,
       author = {Georg Merzdovnik and Klaus Falb and Martin Schmiedecker and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services},
       booktitle = {30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TLSnotaries_preprint.pdf},
    }
  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools (2017)
    • INPROCEEDINGStrue-
    • Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • 2nd IEEE European Symposium on Security and Privacy (Euro S&P)
    @INPROCEEDINGS{Merzdovnik2017,
       author = {Georg Merzdovnik and Markus Huber and Damjan Buhov and Nick Nikiforakis and Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools},
       booktitle = {2nd IEEE European Symposium on Security and Privacy (Euro S&P)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/block_me_if_you_can.pdf},
    }
  • A performance assessment of network address shuffling in IoT systems (2017)
    • INPROCEEDINGS--
    • Georg Merzdovnik and Aljosha Judmayer and Artemios G. Voyiatzis and Edgar R. Weippl
    • 16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)
    @INPROCEEDINGS{Merzdovnik2017performance,
       author = {Georg Merzdovnik and Aljosha Judmayer and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {A performance assessment of network address shuffling in IoT systems},
       booktitle = {16th International Conference on Computer Aided Systems Theory (EUROCAST 2017)},
       year = {2017},
       month = {2},
       pdf = {http://eurocast2017.fulp.ulpgc.es/sites/default/files/Eurocast_2017_Extended_Abstract_Book.pdf},
    }
  • u'smile - Secure Mobile Environments (2017)
    • ARTICLE--
    • Georg Merzdovnik and Damjan Buhov and Artemios G. Voyiatzis and Edgar R. Weippl
    • ERCIM News
    @ARTICLE{Merzdovnik2017usmile,
       author = {Georg Merzdovnik and Damjan Buhov and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {u'smile - Secure Mobile Environments},
       journal = {ERCIM News},
       year = {2017},
       month = {4},
       pdf = {https://ercim-news.ercim.eu/images/stories/EN109/EN109-web.pdf},
       volume = {109},
       pages = {53--54},
    }
  • What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications (2014)
    • INPROCEEDINGS--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • iiWas 2014
    @INPROCEEDINGS{Mueller2014Whats,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
       booktitle = {iiWas 2014},
       year = {2014},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WhatsApp-iiwas-paper_cameraready.pdf},
    }
  • Security and privacy of smartphone messaging applications (2015)
    • ARTICLE--
    • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl
    • International Journal of Pervasive Computing and Communications
    @ARTICLE{Mueller2015Security,
       author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Security and privacy of smartphone messaging applications},
       journal = {International Journal of Pervasive Computing and Communications},
       year = {2015},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Draft.pdf},
       volume = {11},
    }
  • Aktuelle Herausforderungen in der Datenbankforensik (2009)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Edgar R. Weippl
    • 7th Information Security Konferenz in Krems
    @INPROCEEDINGS{Mulazzani_AktuelleHerausforderungenin_2009,
       author = {Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Aktuelle Herausforderungen in der Datenbankforensik},
       booktitle = {7th Information Security Konferenz in Krems},
       year = {2009},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Mulazzani_AktuelleHerausforderungenin_2009.pdf},
       publisher = {OCG Austrian Computer Society,
       Krems},
    }
  • Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System (2010)
    • ARTICLE--
    • Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
       author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
       journal = {IEEE Transactions on Systems,
       Man,
       and Cybernetics,
       Part C: Applications and Reviews},
       year = {2010},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/IEEE_SMC_Tor_finalPreprint.pdf},
       pages = {539-546},
    }
  • Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space (2011)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl
    • USENIX Security
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
       author = {Martin Schmiedecker and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
       title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
       booktitle = {USENIX Security},
       year = {2011},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/dropboxUSENIX2011.pdf},
    }
  • Quantifying Windows File Slack in Size and Stability (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl
    • Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
       author = {Martin Schmiedecker and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Quantifying Windows File Slack in Size and Stability},
       booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2013},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ifipSlack_2013_preprint.pdf},
       link_data = {http://128.130.204.91/slackspaceDataset.7z},
       link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
    }
  • Social Network Forensics: Tapping the Data Pool of Social Networks (2012)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
       author = {Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
       booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
       year = {2012},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/socialForensics_preprint.pdf},
    }
  • Tor HTTP usage and information leakage (2010)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of IFIP CMS 2010
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
       author = {Markus Huber and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Tor HTTP usage and information leakage},
       booktitle = {Proceedings of IFIP CMS 2010},
       year = {2010},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2010 - Huber - Tor HTTP Usage.pdf},
       pages = {245-255},
    }
  • Digitale {P}{D}{F}-{S}ignaturen mit der {B}\"urgerkarte (2006)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Thomas Neubauer and Arno Hollosi
    • Proceedings of D-A-CH Security 2006
    @INPROCEEDINGS{Neubauer_DigitalePDFSignaturenmit_2006,
       author = {{Edgar R.} Weippl and Thomas Neubauer and Arno Hollosi},
       title = {Digitale {P}{D}{F}-{S}ignaturen mit der {B}\"urgerkarte},
       booktitle = {Proceedings of D-A-CH Security 2006},
       year = {2006},
       month = {1},
    }
  • Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF (2006)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Stefan Biffl and Thomas Neubauer
    • Proceedings of the International Conference on Availability, Reliability and Security (ARES'06)
    @INPROCEEDINGS{Neubauer_DigitalSignatureswith_2006,
       author = {{Edgar R.} Weippl and Stefan Biffl and Thomas Neubauer},
       title = {Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF},
       booktitle = {Proceedings of the International Conference on Availability,
       Reliability and Security (ARES'06)},
       year = {2006},
       month = {1},
       pages = {723-731},
    }
  • Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten (2010)
    • ARTICLE--
    • Thomas Neubauer and Johannes Heurix and A Min Tjoa and Edgar R. Weippl
    • Elektrotechnik und Informationstechnik
    @ARTICLE{Neubauer_Pseudonymisierung_f_r_die_date_2010,
       author = {Thomas Neubauer and Johannes Heurix and {A Min} Tjoa and {Edgar R.} Weippl},
       title = {Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten},
       journal = {Elektrotechnik und Informationstechnik},
       year = {2010},
       month = {5},
       volume = {127},
       number = {5},
       pages = {135-142},
    }
  • Workshop-based Multiobjective {S}ecurity Safeguard Selection (2006)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Thomas Neubauer and Christian Stummer
    • Proceedings of the irst International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Neubauer_WorkshopbasedMultiobjectiveSecurity_2006,
       author = {{Edgar R.} Weippl and Thomas Neubauer and Christian Stummer},
       title = {Workshop-based Multiobjective {S}ecurity Safeguard Selection},
       booktitle = {Proceedings of the irst International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2006},
       month = {1},
       pages = {366--373},
       publisher = {IEEE Computer Society},
    }
  • Enter Sandbox: Android Sandbox Comparison (2014)
    • INPROCEEDINGS--
    • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)
    @INPROCEEDINGS{Neuner2014Enter,
       author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Enter Sandbox: Android Sandbox Comparison},
       booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
       year = {2014},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/mostAndroid.pdf},
       publisher = {IEEE},
       link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
    }
  • Gradually Improving the Forensic Process (2015)
    • INPROCEEDINGS--
    • Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and Edgar R. Weippl
    • International Workshop on Cyber Crime (IWCC)
    @INPROCEEDINGS{Neuner2015Gradually,
       author = {Sebastian Neuner and Martin Schmiedecker and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Gradually Improving the Forensic Process},
       booktitle = {International Workshop on Cyber Crime (IWCC)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
    }
  • Effectiveness of File‐based Deduplication in Digital Forensics (2016)
    • ARTICLE--
    • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • Security and Communication Networks
    @ARTICLE{Neuner2016Effectiveness,
       author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Effectiveness of File‐based Deduplication in Digital Forensics},
       journal = {Security and Communication Networks},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner2016Effectiveness_preprint.pdf},
       publisher = {Wiley},
    }
  • PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics (2016)
    • INPROCEEDINGStrue-
    • Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl
    • 16th Annual DFRWS Conference
    @INPROCEEDINGS{Neuner2016PeekaTorrent,
       author = {Sebastian Neuner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics},
       booktitle = {16th Annual DFRWS Conference},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/peekatorrent_preprint.pdf},
       link_source = {https://github.com/schmiedecker/peekatorrent},
       link_data = {https://www.peekatorrent.org},
       link_slides = {http://www.slideshare.net/SBAResearch/peekatorrent-leveraging-p2p-hash-values-for-digital-forensics},
    }
  • Time is on my side: Steganography in filesystem metadata (2016)
    • INPROCEEDINGS--
    • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl
    • 16th Annual DFRWS Conference
    @INPROCEEDINGS{Neuner2016Time,
       author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and {Edgar R.} Weippl},
       title = {Time is on my side: Steganography in filesystem metadata},
       booktitle = {16th Annual DFRWS Conference},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/timestampStego_preprint.pdf},
       link_data = {https://www.sba-research.org/dfrws2016/},
       link_slides = {http://www.slideshare.net/SBAResearch/time-is-on-my-side-steganography-in-filesystem-metadata},
    }
  • Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS (2017)
    • ARTICLE--
    • Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Edgar R. Weippl
    • International Conference on Availability, Reliability and Security (ARES)
    @ARTICLE{Neuner2017,
       author = {Sebastian Neuner and {Artemios G.} Voyiatzis and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS},
       journal = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/hiccups.pdf},
    }
  • Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing (2005)
    • ARTICLE--
    • A Min Tjoa and Edgar R. Weippl and Tho Manh Nguyen and Peter Brezany
    • International Journal of Data Warehousing and Mining
    @ARTICLE{Nguyen_TowardGridBasedZeroLatency_2005,
       author = {{A Min} Tjoa and {Edgar R.} Weippl and {Tho Manh} Nguyen and Peter Brezany},
       title = {Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing},
       journal = {International Journal of Data Warehousing and Mining},
       year = {2005},
       month = {1},
       volume = {1},
       number = {4},
       pages = {22-55},
       publisher = {Idea Group},
    }
  • Comparative Literature Review on RFID Security and Privacy (2007)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger
    • Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)
    @INPROCEEDINGS{Riedl_ComparativeLiteratureReview_2007,
       author = {{Edgar R.} Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger},
       title = {Comparative Literature Review on RFID Security and Privacy},
       booktitle = {Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)},
       year = {2007},
       month = {1},
    }
  • Covert Computation - Hiding Code in Code for Obfuscation Purposes (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
       booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information ,
       Computer and Communications Security (ASIACCS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p529-schrittwieser.pdf},
    }
  • Ethics in Security Research - Which Lines Should Not Be Crossed? (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl
    • Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)
    @INPROCEEDINGS{schrittwieser-ethics-2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl},
       title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
       booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/creds2013_preprint.pdf},
    }
  • AES-SEC: Improving software obfuscation through hardware-assistance (2014)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl
    • ARES 2014
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
       title = {AES-SEC: Improving software obfuscation through hardware-assistance },
       booktitle = {ARES 2014},
       year = {2014},
       month = {9},
       pdf = {http://ieeexplore.ieee.org/document/6980281/},
    }
  • Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation (2014)
    • ARTICLEtrue-
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl
    • Computers & Security
    @ARTICLE{Schrittwieser2014Covert,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
       journal = {Computers & Security},
       year = {2014},
       month = {5},
       pdf = {http://www.sciencedirect.com/science/article/pii/S0167404814000030},
       publisher = {Elsevier Advanced Technology},
    }
  • Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? (2016)
    • ARTICLEtruetrue
    • Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar R. Weippl
    • ACM Computing Survey (CSUR)
    @ARTICLE{Schrittwieser2016Protecting,
       author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
       journal = {ACM Computing Survey (CSUR)},
       year = {2016},
       pdf = {http://dl.acm.org/citation.cfm?id=2886012},
       volume = {49},
       publisher = {ACM},
    }
  • Ethik in der Sicherheitsforschung (2013)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Martin Schmiedecker and Edgar R. Weippl and Sandra Panhans
    • DACH Security 2013
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
       author = {Sebastian Schrittwieser and Martin Schmiedecker and {Edgar R.} Weippl and Sandra Panhans},
       title = {Ethik in der Sicherheitsforschung},
       booktitle = {DACH Security 2013},
       year = {2013},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/DACH-Camera Ready.pdf},
    }
  • Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • Network and Distributed System Security Symposium (NDSS 2012)
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
       booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
       year = {2012},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ndss2012_final.pdf},
    }
  • Secure Software in der Cloud (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl
    • Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
       author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
       title = {Secure Software in der Cloud},
       booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
       year = {2012},
       month = {4},
    }
  • Defect Detection Using Event-Based Process Analysis in Software Engineering Projects (2010)
    • INPROCEEDINGS--
    • Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl
    • 36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010
    @INPROCEEDINGS{Sunindyo_Defect_Detection_Using_Event_B_2010,
       author = {Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Defect Detection Using Event-Based Process Analysis in Software Engineering Projects},
       booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010},
       year = {2010},
       month = {9},
    }
  • Automation Of Post-Exploitation (2009)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Mohammad Tabatabai Irani
    • Proceedings of International Conference on Security Technology (SecTech 2009)
    @INPROCEEDINGS{TabatabaiIrani_AutomationOfPostExploitation_2009,
       author = {{Edgar R.} Weippl and Mohammad {Tabatabai Irani}},
       title = {Automation Of Post-Exploitation},
       booktitle = {Proceedings of International Conference on Security Technology (SecTech 2009)},
       year = {2009},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/TabatabaiIrani_AutomationOfPostExploitation_2009.pdf},
       publisher = {Springer LNCS},
    }
  • A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects (2010)
    • INPROCEEDINGS--
    • Amirreza Tahamtan and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa
    • Proc. of 4th International Conference on Knowledge Science, Engineering & Management (KSEM'10)
    @INPROCEEDINGS{Tahamtan_A_SOM_Based_Technique_for_a_Us_2010,
       author = {Amirreza Tahamtan and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
       title = {A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects},
       booktitle = {Proc. of 4th International Conference on Knowledge Science,
       Engineering & Management (KSEM'10)},
       year = {2010},
       month = {9},
       note = {According to Aminwithin Reporting Timeframe},
    }
  • ARES Conference Proceedings (2008)
    • BOOK--
    • Edgar R. Weippl and Simon Tjoa and Stefan Jakoubi
    • IEEE
    @BOOK{Tjoa_ARESConferenceProceedings_2008,
       author = {{Edgar R.} Weippl and Simon Tjoa and Stefan Jakoubi},
       title = {ARES Conference Proceedings},
       year = {2008},
       month = {1},
       publisher = {IEEE},
    }
  • Hand Dynamics for Behavioral User Authentication (2016)
    • INPROCEEDINGS--
    • Fuensanta Torres Garcia and Katharina Krombholz and Rudolf Mayer and Edgar R. Weippl
    • 5th International Workshop on Security of Mobile Applications (IWSMA 2016)
    @INPROCEEDINGS{TorresGarcia2016Hand,
       author = {Fuensanta {Torres Garcia} and Katharina Krombholz and Rudolf Mayer and {Edgar R.} Weippl},
       title = {Hand Dynamics for Behavioral User Authentication},
       booktitle = {5th International Workshop on Security of Mobile Applications (IWSMA 2016)},
       year = {2016},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES_2016_paper_19 (2).pdf},
    }
  • QR Code Security (2010)
    • INPROCEEDINGS--
    • Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl
    • Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)
    @INPROCEEDINGS{twuc_2010,
       author = {Peter Kieseberg and Manuel Leithner and Martin Schmiedecker and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
       title = {QR Code Security},
       booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
       year = {2010},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2014)
    • INPROCEEDINGS--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • 8th USENIX Workshop on Offensive Technologies (WOOT)
    @INPROCEEDINGS{Ullrich2014IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
       year = {2014},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Johanna IPv6.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
    }
  • CyPhySec: Defending Cyber-Physical Systems  (2015)
    • ARTICLE--
    • Johanna Ullrich and Edgar R. Weippl
    • ERCIM News 102
    @ARTICLE{Ullrich2015CyPhySec,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       title = {CyPhySec: Defending Cyber-Physical Systems },
       journal = {ERCIM News 102},
       year = {2015},
       month = {7},
       pdf = {https://ercim-news.ercim.eu/en102/special/cyphysec-defending-cyber-physical-systems},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2015)
    • ARTICLE--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • Magdeburger Journal zur Sicherheitsforschung
    @ARTICLE{Ullrich2015IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       journal = {Magdeburger Journal zur Sicherheitsforschung},
       year = {2015},
       month = {3},
       pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
       volume = {1},
    }
  • Privacy is Not an Option: Attacking the IPv6 Privacy Extension (2015)
    • INPROCEEDINGStruetrue
    • Johanna Ullrich and Edgar R. Weippl
    • International Symposium on Recent Advances in Intrusion Detection (RAID)
    @INPROCEEDINGS{Ullrich2015Privacy,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
       booktitle = {International Symposium on Recent Advances in Intrusion Detection (RAID)},
       year = {2015},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ullrich2015Privacy.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/privacy-is-not-an-option-attacking-the-ipv6-privacy-extension},
    }
  • Protection through Isolation: Virtues and Pitfalls (2015)
    • INBOOK--
    • Johanna Ullrich and Edgar R. Weippl
    • -
    @INBOOK{Ullrich2015Protection,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       title = {Protection through Isolation: Virtues and Pitfalls},
       booktitle = {The Cloud Security Ecosystem},
       year = {2015},
       month = {5},
       pdf = {https://www.safaribooksonline.com/library/view/the-cloud-security/9780128017807/B9780128015957000069.xhtml},
    }
  • On Reconnaissance with IPv6: A Pattern-Based Scanning Approach (2015)
    • INPROCEEDINGS--
    • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl
    • International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
       author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
       title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
       booktitle = {International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2015},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/PID3762727.pdf},
    }
  • The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor (2016)
    • INPROCEEDINGStruetrue
    • Johanna Ullrich and Edgar R. Weippl
    • European Symposium on Research in Computer Security (ESORICS)
    @INPROCEEDINGS{Ullrich2016Beauty,
       author = {Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor},
       booktitle = {European Symposium on Research in Computer Security (ESORICS)},
       year = {2016},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/botb paper.pdf},
    }
  • The Quest for Privacy in Consumer IoT (2016)
    • INPROCEEDINGS--
    • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl
    • 1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016)
    @INPROCEEDINGS{Ullrich2016Quest,
       author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {The Quest for Privacy in Consumer IoT},
       booktitle = {1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/consiot.pdf},
    }
  • The role and security of firewalls in cyber-physical cloud computing (2016)
    • ARTICLE--
    • Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and Edgar R. Weippl
    • EURASIP Journal on Information Security
    @ARTICLE{Ullrich2016role,
       author = {Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and {Edgar R.} Weippl},
       title = {The role and security of firewalls in cyber-physical cloud computing},
       journal = {EURASIP Journal on Information Security},
       year = {2016},
       month = {8},
       pdf = {http://jis.eurasipjournals.springeropen.com/articles/10.1186/s13635-016-0042-3},
    }
  • Secure Cyber-Physical Production Systems: Solid Steps towards Realization (2016)
    • INPROCEEDINGS--
    • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl
    • 1st International Workshop on Cyber-Physical Production Systems (CPPS 2016)
    @INPROCEEDINGS{Ullrich2016Secure,
       author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
       title = {Secure Cyber-Physical Production Systems: Solid Steps towards Realization},
       booktitle = {1st International Workshop on Cyber-Physical Production Systems (CPPS 2016)},
       year = {2016},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/cpps.pdf},
    }
  • Network-Based Secret Communication in Clouds: A Survey (2017)
    • ARTICLEtruetrue
    • Johanna Ullrich and Tanja Szeby and Joachim Fabini and Edgar R. Weippl
    • IEEE Communications Surveys & Tutorials
    @ARTICLE{Ullrich2017NetworkBased,
       author = {Johanna Ullrich and Tanja Szeby and Joachim Fabini and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Network-Based Secret Communication in Clouds: A Survey},
       journal = {IEEE Communications Surveys & Tutorials},
       year = {2017},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/secretCloud_2017.pdf},
    }
  • Personal Trusted Devices for web services: Revisiting Multilevel Security (2003)
    • ARTICLE--
    • Edgar R. Weippl and Wolfgang Essmayr
    • Mobile Networks and Applications, Kluwer
    @ARTICLE{weippl_aa,
       author = {{Edgar R.} Weippl and Wolfgang Essmayr},
       title = {Personal Trusted Devices for web services: Revisiting Multilevel Security},
       journal = {Mobile Networks and Applications,
       Kluwer},
       year = {2003},
       month = {1},
       volume = {8},
       number = {2},
       pages = {151--157},
    }
  • Addressing the Weakest Link: How to improve teaching of IT security (2006)
    • INPROCEEDINGS--
    • Edgar R. Weippl
    • Proceedings of ED-MEDIA 2006
  • Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms (2004)
    • ARTICLE--
    • Edgar R. Weippl and Wolfgang Essmayr and Stefan Probst
    • International Journal of Electronic Commerce Research
    @ARTICLE{weippl_ae,
       author = {{Edgar R.} Weippl and Wolfgang Essmayr and Stefan Probst},
       title = {Role-Based Access Controls: Status,
       Dissemination,
       and Prospects for Generic Security Mechanisms},
       journal = {International Journal of Electronic Commerce Research},
       year = {2004},
       month = {1},
       volume = {4},
       number = {1},
       pages = {127--156},
       publisher = {Kluwer},
    }
  • A New Approach to Secure Federated Information Bases using Agent Technology (2003)
    • ARTICLE--
    • Edgar R. Weippl and Wolfgang Essmayr and Ludwig Klug
    • Journal of Database Management, Kluwer
    @ARTICLE{weippl_af,
       author = {{Edgar R.} Weippl and Wolfgang Essmayr and Ludwig Klug},
       title = {A New Approach to Secure Federated Information Bases using Agent Technology},
       journal = {Journal of Database Management,
       Kluwer},
       year = {2003},
       month = {1},
       volume = {14},
       number = {1},
       pages = {48--68},
    }
  • Security in Mobile Multimedia (2004)
    • ARTICLE--
    • Edgar R. Weippl
    • Journal of Communication Engineering
    @ARTICLE{weippl_ag,
       author = {{Edgar R.} Weippl},
       title = {Security in Mobile Multimedia},
       journal = {Journal of Communication Engineering},
       year = {2004},
       month = {1},
       volume = {1},
       number = {1},
       pages = {59--69},
       note = {ISSN 1693-5152},
    }
  • Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces (2000)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Hans Lohninger
    • Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT)
    @INPROCEEDINGS{weippl_bj,
       author = {{Edgar R.} Weippl and Hans Lohninger},
       title = {Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces},
       booktitle = {Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT)},
       year = {2000},
       month = {12},
       pages = {355-362},
    }
  • Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations (2000)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Wolfgang Essmayr
    • Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA)
    @INPROCEEDINGS{weippl_bk,
       author = {{Edgar R.} Weippl and Wolfgang Essmayr},
       title = {Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations},
       booktitle = {Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA)},
       year = {2000},
       month = {9},
       publisher = {LNCS Springer},
    }
  • Identity Mapping: An Approach to Unravel Enterprise Security Management Policies (2000)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Wolfgang Essmayr
    • Proceedings of the 16th IFIP World Computer Congress
    @INPROCEEDINGS{weippl_bl,
       author = {{Edgar R.} Weippl and Wolfgang Essmayr},
       title = {Identity Mapping: An Approach to Unravel Enterprise Security Management Policies},
       booktitle = {Proceedings of the 16th IFIP World Computer Congress},
       year = {2000},
       month = {8},
       publisher = {Kluwer},
    }
  • Knowledge Landscapes: A VR Interface for CBT Knowledge Bases (2000)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Hans Lohninger
    • 10th European-Japanese Conference on Information Modeling and Knowledge Bases
    @INPROCEEDINGS{weippl_bm,
       author = {{Edgar R.} Weippl and Hans Lohninger},
       title = {Knowledge Landscapes: A VR Interface for CBT Knowledge Bases},
       booktitle = {10th European-Japanese Conference on Information Modeling and Knowledge Bases},
       year = {2000},
       month = {5},
       note = {Reprinted in Kangassalo H.,
       Jaakkola H.,
       Kawaguchi E. (eds),
       Information Modelling and Knowledge Bases XII,
       271-274,
       ISBN 1-58603-1635. IOS Press,
       Amsterdam,
       2001.},
    }
  • Evaluating CBT Software Usage in Schools and Universities (1999)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Hans Lohninger
    • Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education
    @INPROCEEDINGS{weippl_bo,
       author = {{Edgar R.} Weippl and Hans Lohninger},
       title = {Evaluating CBT Software Usage in Schools and Universities},
       booktitle = {Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education},
       year = {1999},
       month = {6},
    }
  • Special Requirements for Information Visualization in CBT (1997)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Hans Lohninger
    • Proceedings of Edu Compugraphics 97
    @INPROCEEDINGS{weippl_bp,
       author = {{Edgar R.} Weippl and Hans Lohninger},
       title = {Special Requirements for Information Visualization in CBT},
       booktitle = {Proceedings of Edu Compugraphics 97},
       year = {1997},
       month = {12},
       pages = {133-139},
       note = {ISBN 972-8342-02-0},
    }
  • A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) (2010)
    • INPROCEEDINGS--
    • Nicolas Racz and Edgar R. Weippl and Andreas Seufert
    • Proceedings of IFIP CMS 2010
    @INPROCEEDINGS{weippl_bzze_2010_CMS_Racz,
       author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
       title = {A Frame of Reference for Research of Integrated Governance,
       Risk and Compliance (GRC)},
       booktitle = {Proceedings of IFIP CMS 2010},
       year = {2010},
       month = {3},
       publisher = {Springer LNCS},
    }
  • A process model for integrated IT governance, risk, and compliance management (2010)
    • INPROCEEDINGS--
    • Nicolas Racz and Edgar R. Weippl and Andreas Seufert
    • Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010)
    @INPROCEEDINGS{weippl_bzzf_2010_Racz,
       author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
       title = {A process model for integrated IT governance,
       risk,
       and compliance management},
       booktitle = {Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010)},
       year = {2010},
       month = {7},
       publisher = {Springer LNCS},
    }
  • Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments (2010)
    • INPROCEEDINGS--
    • Farman Ali Khan and Sabine Graf and Edgar R. Weippl and A Min Tjoa
    • Proceedings of ED-MEDIA
    @INPROCEEDINGS{weippl_bzzh_2010_LearningStyles_EDMEDIA,
       author = {Farman Ali Khan and Sabine Graf and {Edgar R.} Weippl and {A Min} Tjoa},
       title = {Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments},
       booktitle = {Proceedings of ED-MEDIA},
       year = {2010},
       month = {9},
       publisher = {AACE},
    }
  • Handbook of Research on Mobile Multimedia (2006)
    • INBOOK--
    • Edgar R. Weippl
    • Idea Group
    @INBOOK{Weippl_Chapter3SecurityandTrustinMobileMultimedia_2006,
       author = {{Edgar R.} Weippl},
       title = {Handbook of Research on Mobile Multimedia},
       year = {2006},
       month = {1},
       chapter = {Chapter 3:Security and Trust in Mobile Multimedia},
       pages = {22--37},
       publisher = {Idea Group},
    }
  • Encyclopedia of E-Commerce, E-Government and Mobile Commerce (2005)
    • INBOOK--
    • Edgar R. Weippl
    • Idea Group, Publish
    @INBOOK{Weippl_ComputerSecurityintheContextofELearning_2005,
       author = {{Edgar R.} Weippl},
       title = {Encyclopedia of E-Commerce,
       E-Government and Mobile Commerce},
       year = {2005},
       month = {1},
       chapter = {Computer Security in the Context of E-Learning},
       pages = {135--140},
       publisher = {Idea Group,
       Publish},
    }
  • Encyclopedia of Data Warehousing and Mining (2008)
    • INBOOK--
    • Edgar R. Weippl
    • Idea Group
    @INBOOK{Weippl_DatabaseSecurityandStatisticalDatabaseSecurity_2008,
       author = {{Edgar R.} Weippl},
       title = {Encyclopedia of Data Warehousing and Mining},
       year = {2008},
       month = {1},
       chapter = {Database Security and Statistical Database Security},
       publisher = {Idea Group},
    }
  • Dependability in E-Assessment (2005)
    • INPROCEEDINGS--
    • Edgar R. Weippl
    • Proceedings of ED-MEDIA 2005
    @INPROCEEDINGS{Weippl_DependabilityinEAssessment_2005,
       author = {{Edgar R.} Weippl},
       title = {Dependability in E-Assessment},
       booktitle = {Proceedings of ED-MEDIA 2005},
       year = {2005},
       month = {1},
    }
  • Dependability in E-Assessment (2007)
    • ARTICLE--
    • Edgar R. Weippl
    • International Journal on E-Learning
    @ARTICLE{Weippl_DependabilityinEAssessment_2007,
       author = {{Edgar R.} Weippl},
       title = {Dependability in E-Assessment},
       journal = {International Journal on E-Learning},
       year = {2007},
       month = {1},
       volume = {6},
       number = {2},
       publisher = {AACE},
    }
  • ED-MEDIA Conference Proceedings (2008)
    • BOOK--
    • Edgar R. Weippl and Joe Luca
    • AACE
    @BOOK{Weippl_EDMEDIAConferenceProceedings_2008,
       author = {{Edgar R.} Weippl and Joe Luca},
       title = {ED-MEDIA Conference Proceedings},
       year = {2008},
       month = {1},
       publisher = {AACE},
    }
  • Wikis im {S}ocial {W}eb (2007)
    • INBOOK--
    • Edgar R. Weippl and Bernhard Riedl and Veronika Grascher
    • OCG Austrian Computer Society
    @INBOOK{Weippl_EinsatzvonAuditsinWikisanStellevonZugriffskontrollenalssozioorganisatorischeSicherheitsmassnahme_2007,
       author = {{Edgar R.} Weippl and Bernhard Riedl and Veronika Grascher},
       title = {Wikis im {S}ocial {W}eb},
       year = {2007},
       month = {1},
       chapter = {Einsatz von Audits in Wikis an Stelle von Zugriffskontrollen als sozio-organisatorische Sicherheitsmassnahme},
       pages = {190--198},
       publisher = {OCG Austrian Computer Society},
    }
  • The Transition from E-commerce to M-commerce: Why Security should be the enabling technology (2001)
    • ARTICLE--
    • Edgar R. Weippl
    • Journal of Information Technology Theory and Application (JITTA)
    @ARTICLE{weippl_ga,
       author = {{Edgar R.} Weippl},
       title = {The Transition from E-commerce to M-commerce: Why Security should be the enabling technology},
       journal = {Journal of Information Technology Theory and Application (JITTA)},
       year = {2001},
       month = {1},
       volume = {3},
       number = {4},
       pages = {17--19},
       note = {\url{http://peffers.net/journal/volume3_4/ecpreface.pdf}},
    }
  • Cyber Attacks and the article 5 of the Treaty of NATO (2008)
    • ARTICLE--
    • Edgar R. Weippl
    • Euro Atlantic Quarterly
    @ARTICLE{weippl_gca,
       author = {{Edgar R.} Weippl},
       title = {Cyber Attacks and the article 5 of the Treaty of NATO},
       journal = {Euro Atlantic Quarterly},
       year = {2008},
       month = {1},
       pages = {22},
       note = {ISSN 1336-8761},
    }
  • Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (2006)
    • INBOOK--
    • Edgar R. Weippl and Markus Klemen
    • Idea Group
    @INBOOK{Weippl_ImplementingITSecurityforSmallandMediumSizedEnterprises_2006,
       author = {{Edgar R.} Weippl and Markus Klemen},
       title = {Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues},
       year = {2006},
       month = {1},
       chapter = {Implementing IT Security for Small and Medium-Sized Enterprises},
       publisher = {Idea Group},
    }
  • The Semantic Web for Knowledge and Data Management: Technologies and Practices (2008)
    • INBOOK--
    • Edgar R. Weippl and Markus Klemen and Stefan Raffeiner
    • Idea Group
    @INBOOK{Weippl_ImprovingStorageConceptsforSemanticModelsandOntologies_2008,
       author = {{Edgar R.} Weippl and Markus Klemen and Stefan Raffeiner},
       title = {The Semantic Web for Knowledge and Data Management: Technologies and Practices},
       year = {2008},
       month = {1},
       chapter = {Improving Storage Concepts for Semantic Models and Ontologies},
       pages = {38--48},
       publisher = {Idea Group},
    }
  • Non-Repudiation and Audits in E-Learning, invited paper (2005)
    • INPROCEEDINGS--
    • Edgar R. Weippl
    • Proceedings of E-Learn 2005
    @INPROCEEDINGS{Weippl_NonRepudiationandAudits_2005,
       author = {{Edgar R.} Weippl},
       title = {Non-Repudiation and Audits in E-Learning,
       invited paper},
       booktitle = {Proceedings of E-Learn 2005},
       year = {2005},
       month = {1},
       pages = {1785--1790},
    }
  • Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage (2005)
    • ARTICLE--
    • A Min Tjoa and Edgar R. Weippl
    • Interactive Technology and Smart Education (ITSE)
    @ARTICLE{Weippl_PrivacyinELearning_2005,
       author = {{A Min} Tjoa and {Edgar R.} Weippl},
       title = {Privacy in E-Learning: Anonymity,
       Pseudonyms and Authenticated Usage},
       journal = {Interactive Technology and Smart Education (ITSE)},
       year = {2005},
       month = {1},
       volume = {2005},
       number = {2},
       pages = {247--256},
       publisher = {Troubador Publishing Ltd.},
    }
  • Privacy in E-learning: How to Implement Anonymity (2005)
    • INPROCEEDINGS--
    • A Min Tjoa and Edgar R. Weippl
    • Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC)
    @INPROCEEDINGS{Weippl_PrivacyinElearning_2005a,
       author = {{A Min} Tjoa and {Edgar R.} Weippl},
       title = {Privacy in E-learning: How to Implement Anonymity},
       booktitle = {Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05),
       Workshop on E-Learning Online Communities (eLOC)},
       year = {2005},
       month = {1},
    }
  • Questioning the need for separate IT risk management frameworks (2010)
    • INPROCEEDINGS--
    • Nicolas Racz and Andreas Seufert and Edgar R. Weippl
    • Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme
    @INPROCEEDINGS{Weippl_Questioning_the_need_for_separ_2010,
       author = {Nicolas Racz and Andreas Seufert and {Edgar R.} Weippl},
       title = {Questioning the need for separate IT risk management frameworks},
       booktitle = {Konferenz Risk Management,
       Compliance und Governance für widerstandsfähige Informationssysteme },
       year = {2010},
       month = {9},
       abstract = {The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant},
       pages = {245-252},
    }
    The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant
  • Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure (2006)
    • ARTICLE--
    • Edgar R. Weippl and Mathias Strasser
    • Information Systems Control Journal
    @ARTICLE{Weippl_SarbanesOxleyActCompliance_2006,
       author = {{Edgar R.} Weippl and Mathias Strasser},
       title = {Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure},
       journal = {Information Systems Control Journal},
       year = {2006},
       month = {8},
       volume = {4},
       number = {10},
       publisher = {ISACA},
    }
  • Mobile Multimedia: Communication Engineering Perspective (2006)
    • INBOOK--
    • Edgar R. Weippl and Jamil Wahbeh
    • Nova Science Publishers
    @INBOOK{Weippl_SecuringMobileCommunicationRADIUSinaWindowsEnvironment_2006,
       author = {{Edgar R.} Weippl and Jamil Wahbeh},
       title = {Mobile Multimedia: Communication Engineering Perspective},
       year = {2006},
       month = {1},
       chapter = {Securing Mobile Communication: RADIUS in a Windows Environment},
       pages = {101--116},
       publisher = {Nova Science Publishers},
    }
  • Security Aspects of Ubiquitous Computing in Health Care (2006)
    • ARTICLE--
    • A Min Tjoa and Edgar R. Weippl and Andreas Holzinger
    • e\&i
    @ARTICLE{Weippl_SecurityAspectsof_2006,
       author = {{A Min} Tjoa and {Edgar R.} Weippl and Andreas Holzinger},
       title = {Security Aspects of Ubiquitous Computing in Health Care},
       journal = {e\&i},
       year = {2006},
       month = {1},
       volume = {2006},
       number = {4},
       pages = {156--161},
       publisher = {Springer Verlag},
       note = {http://dx.doi.org/10.1007/s00502-006-0336},
    }
  • Handbook of Research on Information Security and Assurance (2008)
    • INBOOK--
    • Edgar R. Weippl
    • Idea Group
    @INBOOK{Weippl_SecurityAwarenessVirtualEnvironmentsandELearning_2008,
       author = {{Edgar R.} Weippl},
       title = {Handbook of Research on Information Security and Assurance},
       year = {2008},
       month = {1},
       chapter = {Security Awareness: Virtual Environments and E-Learning},
       publisher = {Idea Group},
    }
  • Security Considerations in M-Learning: Threats and Countermeasures (2007)
    • ARTICLE--
    • Edgar R. Weippl
    • Advanced Technology for Learning
    @ARTICLE{Weippl_SecurityConsiderationsin_2007,
       author = {{Edgar R.} Weippl},
       title = {Security Considerations in M-Learning: Threats and Countermeasures},
       journal = {Advanced Technology for Learning},
       year = {2007},
       month = {1},
       volume = {4},
       number = {2},
       pages = {1--7},
       publisher = {Acta Press},
    }
  • Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (2010)
    • INBOOK--
    • Edgar R. Weippl
    • Information Science Reference, IGI Global
    @INBOOK{Weippl_SecurityinDataWarehouses_2010,
       author = {{Edgar R.} Weippl},
       title = {Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction},
       year = {2010},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/weippl_arh_securityDWH.pdf},
       chapter = {Security in Data Warehouses},
       pages = {272--279},
       publisher = {Information Science Reference,
       IGI Global},
    }
  • Security in E-Learning (2005)
    • ARTICLE--
    • Edgar R. Weippl
    • ACM ELearn Magazine
    @ARTICLE{Weippl_SecurityinELearning_2005,
       author = {{Edgar R.} Weippl},
       title = {Security in E-Learning},
       journal = {ACM ELearn Magazine},
       year = {2005},
       month = {1},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p431-khan.pdf},
       acm = {867458},
    }
  • The Handbook of Information Security (2005)
    • INBOOK--
    • Edgar R. Weippl
    • John Wiley \& Sons
    @INBOOK{Weippl_SecurityinELearning_2005a,
       author = {{Edgar R.} Weippl},
       title = {The Handbook of Information Security},
       year = {2005},
       month = {1},
       chapter = {Security in E-Learning},
       publisher = {John Wiley \& Sons},
       note = {ISBN 0-471-64833-7},
    }
  • Security in E-Learning (2005)
    • BOOK--
    • Edgar R. Weippl
    • Springer NY
    @BOOK{Weippl_SecurityinELearning_2005b,
       author = {{Edgar R.} Weippl},
       title = {Security in E-Learning},
       year = {2005},
       month = {1},
       publisher = {Springer NY},
       note = {ISBN 0-387-24341-0,
       \url{http://www.e-learning-security.org}},
    }
  • Security Ontologies: How to Improve Understanding of Complex Relationships (2007)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Stefan Fenz and Andreas Ekelhart
    • Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007
    @INPROCEEDINGS{Weippl_SecurityOntologiesHow_2007,
       author = {{Edgar R.} Weippl and Stefan Fenz and Andreas Ekelhart},
       title = {Security Ontologies: How to Improve Understanding of Complex Relationships},
       booktitle = {Proceedings of the World Conference on Educational Multimedia,
       Hypermedia and Telecommunications 2007},
       year = {2007},
       month = {6},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2007 - Weippl - Security Ontologies How to Improve Understanding of Complex Relationships.pdf},
       pages = {404--407},
       publisher = {AACE},
    }
  • Security Privacy Challenges in E-Learning 2.0 (2008)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Martin Ebner
    • E-Learn 2008
    @INPROCEEDINGS{Weippl_SecurityPrivacyChallenges_2008,
       author = {{Edgar R.} Weippl and Martin Ebner},
       title = {Security Privacy Challenges in E-Learning 2.0},
       booktitle = {E-Learn 2008},
       year = {2008},
       month = {1},
    }
  • Handbook of Research on Mobile Multimedia, Second Edition (2008)
    • INBOOK--
    • Edgar R. Weippl and Bernhard Riedl
    • Information Science Reference
    @INBOOK{Weippl_SecurityTrustandPrivacyonMobileDevicesandMultimediaApplications_2008,
       author = {{Edgar R.} Weippl and Bernhard Riedl},
       title = {Handbook of Research on Mobile Multimedia,
       Second Edition},
       year = {2008},
       month = {1},
       chapter = {Security,
       Trust and Privacy on Mobile Devices and Multimedia Applications},
       pages = {Chapter IX},
       publisher = {Information Science Reference},
       note = {ISBN: 978-1-60566-046-2},
    }
  • The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps (2005)
    • INPROCEEDINGS--
    • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart
    • Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005
    @INPROCEEDINGS{Weippl_SemanticDesktopSemantic_2005,
       author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
       title = {The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps},
       booktitle = {Proceedings of the ODBIS Workshop,
       31st International Conference on Very Large Data Bases (VLDB) 2005},
       year = {2005},
       month = {10},
       number = {4623},
       pages = {135-151},
    }
  • Semantic Storage: A Report on Performance and Flexibility (2005)
    • INPROCEEDINGS--
    • Edgar R. Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and A Min Tjoa
    • Database and Expert Systems Applications, 16th International Conference, DEXA 2005
    @INPROCEEDINGS{Weippl_SemanticStorageReport_2005,
       author = {{Edgar R.} Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and {A Min} Tjoa},
       title = {Semantic Storage: A Report on Performance and Flexibility},
       booktitle = {Database and Expert Systems Applications,
       16th International Conference,
       DEXA 2005},
       year = {2005},
       month = {8},
       abstract = {Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype,
       which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/2005-Weippl.pdf},
       volume = {3588_2005},
       pages = {586-595},
       publisher = {Springer Berlin Heidelberg},
    }
    Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype, which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.
  • On the Use of Test Centers in E-Assessment (2005)
    • ARTICLE--
    • Edgar R. Weippl
    • published in elearningreports.com
    @ARTICLE{Weippl_UseofTest_2005,
       author = {{Edgar R.} Weippl},
       title = {On the Use of Test Centers in E-Assessment},
       journal = {published in elearningreports.com},
       year = {2005},
       month = {1},
    }
  • On the Use of Test Centers in e-Assessment (2006)
    • ARTICLE--
    • Edgar R. Weippl
    • eLearning Reports
    @ARTICLE{Weippl_UseofTest_2006,
       author = {{Edgar R.} Weippl},
       title = {On the Use of Test Centers in e-Assessment},
       journal = {eLearning Reports},
       year = {2006},
       month = {2},
       number = {7},
    }
  • Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions (2008)
    • INBOOK--
    • Edgar R. Weippl
    • IGI Global
    @INBOOK{Weippl__2008,
       author = {{Edgar R.} Weippl},
       title = {Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions},
       year = {2008},
       month = {1},
       publisher = {IGI Global},
    }
  • Spoiled Onions: Exposing Malicious Tor Exit Relays (2014)
    • INPROCEEDINGS--
    • Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl
    • The 14th Privacy Enhancing Technologies Symposium (PETS)
    @INPROCEEDINGS{Winter2014Spoiled,
       author = {Philipp Winter and Richard Koewer and Martin Schmiedecker and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
       title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
       booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
       year = {2014},
       month = {7},
       pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
    }
  • INMOTOS: Extending the ROPE-methodology (2012)
    • INPROCEEDINGS--
    • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl
    • 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)
    @INPROCEEDINGS{Zechner2012INMOTOS,
       author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
       title = {INMOTOS: Extending the ROPE-methodology},
       booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p272zechner.pdf},
    }
  • Addressing misalignment between information security metrics and business-driven security objectives (2010)
    • INPROCEEDINGS--
    • C. Frühwirth and Stefan Biffl and Mohammad Tabatabai Irani and Edgar R. Weippl
    • Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec)
    @INPROCEEDINGS{_Addressing_misalignment_betwee_2010,
       author = {C. Frühwirth and Stefan Biffl and Mohammad {Tabatabai Irani} and {Edgar R.} Weippl},
       title = {Addressing misalignment between information security metrics and business-driven security objectives},
       booktitle = {Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec)},
       year = {2010},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/a6-fruehwirth.pdf},
       acm = {399966},
    }
  • An Algorithm for k-anonymity-based Fingerprinting (2011)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl
    • International Workshop on Digital-forensics and Watermarking (IWDW 2011)
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
       author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
       title = {An Algorithm for k-anonymity-based Fingerprinting},
       booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
       year = {2011},
       month = {10},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/k_anonymity_algorithm_2011.pdf},
    }
  • An event-based empirical process analysis framework (2010)
    • INPROCEEDINGS--
    • Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad Tabatabai Irani and Dindin Wahyudin and Edgar R. Weippl and Dietmar Winkler
    • Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
    @INPROCEEDINGS{_An_event_based_empirical_proce_2010,
       author = {Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad {Tabatabai Irani} and Dindin Wahyudin and {Edgar R.} Weippl and Dietmar Winkler},
       title = {An event-based empirical process analysis framework},
       booktitle = {Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)},
       year = {2010},
       month = {9},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/a65-sunindyo.pdf},
       acm = {397838},
    }
  • Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk (2012)
    • TECHREPORT--
    • Edgar R. Weippl
    • -
    @TECHREPORT{_Book_Review_Enterprise_Securit_2012,
       author = {{Edgar R.} Weippl},
       title = {Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk },
       booktitle = {Computers & Security},
       year = {2012},
       month = {5},
    }
  • Book Review: Private Cloud Computing: Consolidation, Virtualization, and Service Oriented Infrastructure by Stephen R Smoot, Nam K Tan (2012)
    • TECHREPORT--
    • Aleksandar Hudic and Edgar R. Weippl
    • -
    @TECHREPORT{_Book_Review_Private_Cloud_Comp_2012,
       author = {Aleksandar Hudic and {Edgar R.} Weippl},
       title = {Book Review: Private Cloud Computing: Consolidation,
       Virtualization,
       and Service Oriented Infrastructure by Stephen R Smoot,
       Nam K Tan},
       booktitle = {Computers & Security},
       year = {2012},
       month = {5},
    }
  • Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen (2012)
    • TECHREPORT--
    • Manuel Leithner and Edgar R. Weippl
    • -
    @TECHREPORT{_Book_Review_Thor_s_Microsoft_S_2012,
       author = {Manuel Leithner and {Edgar R.} Weippl},
       title = {Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen},
       booktitle = {Computers & Security},
       year = {2012},
       month = {5},
    }
  • Book Review: Xbox360 Forensics by Steven Bolt (2012)
    • TECHREPORT--
    • Manuel Leithner and Edgar R. Weippl
    • -
    @TECHREPORT{_Book_Review_Xbox360_Forensics__2012,
       author = {Manuel Leithner and {Edgar R.} Weippl},
       title = {Book Review: Xbox360 Forensics by Steven Bolt},
       booktitle = {Computers & Security},
       year = {2012},
       month = {5},
       note = {Not Peer Reviewed},
    }
  • Building secure knowledge bases: combining Java agents and DBagents (2001)
    • INPROCEEDINGS--
    • Edgar R. Weippl
    • Proceedings of the fifth international conference on Autonomous agents (AGENTS)
    @INPROCEEDINGS{_Building_secure_knowledge_base_2001,
       author = {{Edgar R.} Weippl},
       title = {Building secure knowledge bases: combining Java agents and DBagents},
       booktitle = {Proceedings of the fifth international conference on Autonomous agents (AGENTS)},
       year = {2001},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p212-weippl.pdf},
       acm = {06996},
    }
  • Can end-to-end verifiable e-voting be explained easily? (2009)
    • INPROCEEDINGS--
    • Peter Kalchgruber and Edgar R. Weippl
    • Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS)
    @INPROCEEDINGS{_Can_end_to_end_verifiable_e_vo_2009,
       author = {Peter Kalchgruber and {Edgar R.} Weippl},
       title = {Can end-to-end verifiable e-voting be explained easily?},
       booktitle = {Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS)},
       year = {2009},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p572-kalchgruber.pdf},
       acm = {351868},
    }
  • Coimbra: secure Web access to multimedia content (2000)
    • INPROCEEDINGS--
    • Edgar R. Weippl
    • Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA)
    @INPROCEEDINGS{_Coimbra_secure_Web_access_to_m_2000,
       author = {{Edgar R.} Weippl},
       title = {Coimbra: secure Web access to multimedia content},
       booktitle = {Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA)},
       year = {2000},
       month = {11},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/p145-weippl.pdf},
       acm = {90340},
    }
  • Digital Forensics for Enterprise Rights Management (2012)
    • INPROCEEDINGS--
    • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
       author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Digital Forensics for Enterprise Rights Management},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/16_schrittwieser.pdf},
    }
  • Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model (2012)
    • ARTICLE--
    • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl
    • Journal of Service Science Research
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
       author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
       title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
       journal = {Journal of Service Science Research},
       year = {2012},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/krombholzetal2012.pdf},
    }
  • Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting (2012)
    • TECHREPORT--
    • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl
    • -
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
       author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
       title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
       booktitle = {Technical Report TR-SBA-Research-0512-01},
       year = {2012},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jsfingerprinting_Tech_Report.pdf},
    }
  • Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting (2013)
    • INPROCEEDINGS--
    • Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl
    • Web 2.0 Workshop on Security and Privacy (W2SP)
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
       author = {Martin Schmiedecker and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
       title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
       booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
       year = {2013},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/jsfingerprinting.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
    }
  • InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs (2013)
    • ARTICLE--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • Information Security Technical Report (ISTR), Special Issue: ARES
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
       journal = {Information Security Technical Report (ISTR),
       Special Issue: ARES},
       year = {2013},
       month = {4},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/ARES2012_Journal.pdf},
    }
  • InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs (2012)
    • INPROCEEDINGS--
    • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl
    • The Fifth International Workshop on Digital Forensics (WSDF)
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
       author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
       title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
       booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
       year = {2012},
       month = {8},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/WSDF2012_InnoDB.pdf},
    }
  • Malicious Pixels Using QR Codes as Attack Vector (2012)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha
    • Trustworthy Ubiquitous Computing
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Schmiedecker and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
       title = {Malicious Pixels Using QR Codes as Attack Vector},
       booktitle = {Trustworthy Ubiquitous Computing},
       year = {2012},
       month = {9},
       pages = {21-38},
    }
  • Malware in Hardware Infrastructure Components (2013)
    • INBOOK--
    • Christian Krieg and Edgar R. Weippl
    • Fraunhofer AISEC
    @INBOOK{_Malware_in_Hardware_Infrastruc_2013,
       author = {Christian Krieg and {Edgar R.} Weippl},
       title = {Malware in Hardware Infrastructure Components},
       booktitle = {Advances in IT Early Warning},
       year = {2013},
       month = {2},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/weippl_chapter.pdf},
       chapter = {Malware in Hardware Infrastructure Components},
       publisher = {Fraunhofer AISEC},
       note = {ISBN 978-3-8396-0474-8},
    }
  • Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science (2013)
    • INBOOK--
    • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl
    • -
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
       author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
       title = {Privacy,
       Anonymity,
       Pseudonymity and Data Disclosure in Data-Driven Science},
       booktitle = {Encyclopedia of Business Analytics and Optimization},
       year = {2013},
    }
  • Security Engineering for Cloud Computing: Approaches and Tools (2013)
    • INBOOK--
    • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl
    • Information Science Reference
    @INBOOK{_Security_Engineering_for_Cloud_2013,
       author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
       title = {Security Engineering for Cloud Computing: Approaches and Tools},
       year = {2013},
       month = {8},
       chapter = {A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud- Based System},
       pages = {98--123},
       publisher = {Information Science Reference},
    }
  • Social Snapshots: Digital Forensics for Online Social Networks (2011)
    • INPROCEEDINGS--
    • Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
       author = {Markus Huber and Martin Schmiedecker and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
       title = {Social Snapshots: Digital Forensics for Online Social Networks},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2011},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/social_snapshots_preprint.pdf},
    }
  • Towards a Unified Penetration Testing Taxonomy (2012)
    • INPROCEEDINGS--
    • Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and Edgar R. Weippl
    • International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012)
    @INPROCEEDINGS{_Towards_a_Unified_Penetration__2012,
       author = {Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and {Edgar R.} Weippl},
       title = {Towards a Unified Penetration Testing Taxonomy},
       booktitle = {International Conference on Information Privacy,
       Security,
       Risk and Trust (PASSAT 2012)},
       year = {2012},
       month = {9},
    }
  • Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases (2011)
    • INPROCEEDINGS--
    • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and Edgar R. Weippl
    • International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
       author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Schmiedecker and Markus Huber and {Edgar R.} Weippl},
       title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
       booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
       year = {2011},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/iiWAS2011_133_Short_Kieseberg.pdf},
    }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close