Edgar Weippl

is research director of SBA Research and Associate Professor (Privatdozent) at the TU Wien.Edgar WEIPPL

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research focuses on applied concepts of IT-security and e-learning.

Bio

After graduating with a Ph.D. from the TU Wien, Edgar worked in a research startup for two years. He then spent one year teaching as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen.

Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE), ), organizes the ARES conference and is General Chair of SACMAT 2015, PC Chair of Esorics 2015 and General Chair of ACM CCS 2016.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model," Information and Software Technology (Elsevier), 2014. BibTeX
    @ARTICLE{Islam2014Empirical,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
      journal = {Information and Software Technology (Elsevier)},
      year = {2014},
      month = {2},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      pdf = {cv_workshop_229_2013_Cloudoscopy_weippl.pdf},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl and Gerhard Kitzler and Sigrun Goluch, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl and Gerhard Kitzler and Sigrun Goluch},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      acm = {6519720},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner, "XML Security – A comparative literature review," Journal of Systems and Software, vol. 81, pp. 1715-1724, 2008. BibTeX
    @ARTICLE{Ekelhart_XMLSecurity_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
      title = {XML Security - A comparative literature review},
      journal = {Journal of Systems and Software},
      year = {2008},
      month = {1},
      abstract = {Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML Security for Mobile Computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.},
      volume = {81},
      pages = {1715-1724},
      note = {ISSN: 0164-1212},
      }

View all publications

  • Sebastian Neuner and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Gradually Improving the Forensic Process," in International Workshop on Cyber Crime (IWCC), 2015. BibTeX | PDF
    @INPROCEEDINGS{Neuner2015Gradually,
      Author = {Sebastian Neuner and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Gradually Improving the Forensic Process},
      booktitle = {International Workshop on Cyber Crime (IWCC)},
      year = {2015},
      month = {8},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
      }
  • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl, "Error-Correcting Codes as Source for Decoding Ambiguity," in LangSec Workshop at IEEE Security & Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
      Author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
      title = {Error-Correcting Codes as Source for Decoding Ambiguity},
      booktitle = {LangSec Workshop at IEEE Security & Privacy},
      year = {2015},
      month = {21},
      pdf = {ecc.pdf},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing," in 1st Workshop on Wearable Security and Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Glass,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
      booktitle = {1st Workshop on Wearable Security and Privacy},
      year = {2015},
      month = {1},
      pdf = {Ok Glass.pdf},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Security and privacy of smartphone messaging applications," International Journal of Pervasive Computing and Communications, vol. 11, 2015. BibTeX
    @ARTICLE{Mueller2015Security,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Security and privacy of smartphone messaging applications},
      journal = {International Journal of Pervasive Computing and Communications},
      year = {2015},
      month = {0},
      volume = {11},
      }
  • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl, "QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes," in 2015 International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX
    @INPROCEEDINGS{Krombholz2015Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
      booktitle = {2015 International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      }
  • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl, "Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology," in Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015, 2015. BibTeX
    @INPROCEEDINGS{Krombholz2015Privacy,
      Author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
      title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
      booktitle = {Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015},
      year = {2015},
      month = {7},
      }
  • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen, "Smart Privacy Visor: Bridging the Privacy Gap," in Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015), 2015. BibTeX
    @INPROCEEDINGS{Dabrowski2015Smart,
      Author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
      title = {Smart Privacy Visor: Bridging the Privacy Gap},
      booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
      year = {2015},
      month = {6},
      }
  • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Security tests for mobile applications – Why using TLS SSL is not enough," in 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg2015Security,
      Author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Security tests for mobile applications - Why using TLS SSL is not enough},
      booktitle = {2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)},
      year = {2015},
      month = {4},
      pdf = {ASQT2015_cameraready_wo1stpage.pdf},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Mulazzani and Edgar R. Weippl, "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers," in Annual Computer Security Applications Conference (ACSAC), 2014. BibTeX | PDF | Src
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
      Author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2014},
      month = {12},
      pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
      link_source = {http://sourceforge.net/p/icc/},
      }
  • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations," Digital Investigation, vol. 11, pp. 336-348, 2014. BibTeX | PDF
    @ARTICLE{Fruehwirt2014Towards,
      Author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
      journal = {Digital Investigation},
      year = {2014},
      month = {0},
      pdf = {towards a forensic aware_paper.pdf},
      volume = {11},
      pages = {336-348},
      }
  • Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl, "Automated Analysis of Underground Marketplaces," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Hudic2014Automated,
      Author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
      title = {Automated Analysis of Underground Marketplaces},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {undergroundmarketplaces.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
      }
  • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and Edgar R. Weippl, "Enter Sandbox: Android Sandbox Comparison," in Proceedings of the IEEE Mobile Security Technologies Workshop (MoST), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Neuner2014Enter,
      Author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Enter Sandbox: Android Sandbox Comparison},
      booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
      year = {2014},
      month = {5},
      pdf = {mostAndroid.pdf},
      publisher = {IEEE},
      link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
      }
  • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger, "Protecting Anonymity in Data-Driven Biomedical Science." , 2014, pp. 301-316. BibTeX
    @INBOOK{Kieseberg2014Protecting,
      Author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Protecting Anonymity in Data-Driven Biomedical Science},
      booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
      year = {2014},
      month = {0},
      pages = {301--316},
      }
  • Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl, "InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles," in GI Sicherheit 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
      Author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
      booktitle = {GI Sicherheit 2014 },
      year = {2014},
      month = {3},
      pdf = {FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model," Information and Software Technology (Elsevier), 2014. BibTeX
    @ARTICLE{Islam2014Empirical,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
      journal = {Information and Software Technology (Elsevier)},
      year = {2014},
      month = {2},
      }
  • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Using Model Driven Security Approaches in Web Application Development," in AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Using,
      Author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Using Model Driven Security Approaches in Web Application Development },
      booktitle = {AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)},
      year = {2014},
      month = {4},
      pdf = {UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
      }
  • Christian Kadluba and Martin Mulazzani and Lorenz Zechner and Sebastian Neuner and Edgar R. Weippl, "Windows Installer Security," in Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), 2014. BibTeX | PDF
    @INPROCEEDINGS{Kadluba2014Windows,
      Author = {Christian Kadluba and Martin Mulazzani and Lorenz Zechner and Sebastian Neuner and {Edgar R.} Weippl},
      title = {Windows Installer Security},
      booktitle = {Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)},
      year = {2014},
      month = {12},
      pdf = {Sebastian Neuner msiInstaller.pdf},
      }
  • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile," in International Conference on Privacy, Security, Risk and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014Using,
      Author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
      booktitle = {International Conference on Privacy, Security, Risk and Trust},
      year = {2014},
      month = {12},
      pdf = {using machine learning_paper.pdf},
      }
  • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl, "Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Towards,
      Author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {sinconf_preprint.pdf},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl, "AES-SEC: Improving software obfuscation through hardware-assistance," in ARES 2014, 2014. BibTeX
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
      title = {AES-SEC: Improving software obfuscation through hardware-assistance },
      booktitle = {ARES 2014},
      year = {2014},
      month = {9},
      }
  • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz, "A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives," in IIWAS 2014, 2014. BibTeX
    @INPROCEEDINGS{Islam2014Decision,
      Author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
      title = {A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives},
      booktitle = {IIWAS 2014},
      year = {2014},
      month = {12},
      }
  • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs," in ASQT, 2014. BibTeX
    @INPROCEEDINGS{Fruehwirt2014Testen,
      Author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
      booktitle = {ASQT},
      year = {2014},
      month = {9},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications," in iiWas 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Mueller2014Whats,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
      booktitle = {iiWas 2014},
      year = {2014},
      month = {12},
      pdf = {WhatsApp-iiwas-paper_cameraready.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl, "E-voting authentication with QR-codes," in 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Falkner2014Evoting,
      Author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
      title = {E-voting authentication with QR-codes},
      booktitle = {2nd International Conference on Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {evoting_final_HCI_2014.pdf},
      }
  • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl, "Plugin in the Middle – Minimising Security Risks in Mobile Middleware Implementations," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Aufner2014Plugin,
      Author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {secperv.pdf},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Genie in a Model? Why Model Driven Security will not secure your Web Application," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 5, pp. 44-62, 2014. BibTeX | PDF
    @ARTICLE{Hochreiner2014Genie,
      Author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
      journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
      year = {2014},
      month = {9},
      pdf = {jowua-v5n3-4.pdf},
      volume = {5},
      pages = {44-62},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      pdf = {cv_workshop_229_2013_Cloudoscopy_weippl.pdf},
      }
  • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science." , 2013. BibTeX
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
      Author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science},
      booktitle = {Encyclopedia of Business Analytics and Optimization},
      year = {2013},
      month = {0},
      }
  • Sebastian Schrittwieser and Martin Mulazzani and Edgar R. Weippl, "Ethics in Security Research – Which Lines Should Not Be Crossed?," in Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-ethics-2013,
      Author = {Sebastian Schrittwieser and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
      booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
      year = {2013},
      month = {5},
      pdf = {creds2013_preprint.pdf},
      }
  • Christian Krieg and Edgar R. Weippl, "Malware in Hardware Infrastructure Components." Fraunhofer AISEC, 2013. BibTeX | PDF
    @INBOOK{_Malware_in_Hardware_Infrastruc_2013,
      Author = {Christian Krieg and {Edgar R.} Weippl},
      title = {Malware in Hardware Infrastructure Components},
      booktitle = {Advances in IT Early Warning},
      year = {2013},
      month = {2},
      pdf = {weippl_chapter.pdf},
      chapter = {Malware in Hardware Infrastructure Components},
      publisher = {Fraunhofer AISEC},
      note = {ISBN 978-3-8396-0474-8},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "Security Engineering for Cloud Computing: Approaches and Tools." Information Science Reference, 2013, pp. 98-123. BibTeX
    @INBOOK{_Security_Engineering_for_Cloud_2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {Security Engineering for Cloud Computing: Approaches and Tools},
      year = {2013},
      month = {8},
      chapter = {A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud- Based System},
      pages = {98--123},
      publisher = {Information Science Reference},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pages = {28--35},
      publisher = {ACM},
      }
  • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen, "Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing," in Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013), 2013. BibTeX
    @INPROCEEDINGS{Dabrowski2013Framework,
      Author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
      title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
      booktitle = {Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)},
      year = {2013},
      month = {10},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      acm = {6825991},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu, "Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD," in Lecture Notes in Computer Science, 2013. BibTeX
    @INPROCEEDINGS{Cuzzocrea2013Security,
      Author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
      title = {Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD},
      booktitle = {Lecture Notes in Computer Science},
      year = {2013},
      month = {0},
      }
  • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu, "Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013," in Lecture Notes in Computer Science, 2013. BibTeX
    @INPROCEEDINGS{Cuzzocrea2013Availability,
      Author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
      title = {Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013},
      booktitle = {Lecture Notes in Computer Science},
      year = {2013},
      month = {0},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl, "Towards Security-Enhanced and Privacy-Preserving Mashup Compositions," in Security and Privacy Protection in Information Processing Systems, 2013, pp. 286-299. BibTeX
    @INPROCEEDINGS{hobel2013towards,
      Author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
      title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions},
      booktitle = {Security and Privacy Protection in Information Processing Systems},
      year = {2013},
      month = {7},
      pages = {286--299},
      publisher = {Springer},
      }
  • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl, "Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.," in SEC, 2013, pp. 286-299. BibTeX
    @INPROCEEDINGS{hobel2013a,
      Author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
      title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.},
      booktitle = {SEC},
      year = {2013},
      month = {0},
      volume = {405},
      pages = {286-299},
      publisher = {Springer},
      note = {The original publication is available at www.springerlink.com},
      }
  • Sebastian Schrittwieser and Martin Mulazzani and Edgar R. Weippl and Sandra Panhans, "Ethik in der Sicherheitsforschung," in DACH Security 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
      Author = {Sebastian Schrittwieser and Martin Mulazzani and {Edgar R.} Weippl and Sandra Panhans},
      title = {Ethik in der Sicherheitsforschung},
      booktitle = {DACH Security 2013},
      year = {2013},
      month = {9},
      pdf = {DACH-Camera Ready.pdf},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System," in Security Engineering for Cloud Computing: Approaches and Tools, 2013. BibTeX
    @INPROCEEDINGS{Islam_A_Goal_Driven_Risk_Management__2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System},
      booktitle = {Security Engineering for Cloud Computing: Approaches and Tools},
      year = {2013},
      month = {0},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model," Proceedings of the Winter Simulation Conference 2013, 2013. BibTeX
    @ARTICLE{Islam_An_Empirical_Study_on_the_Impl_2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model},
      journal = {Proceedings of the Winter Simulation Conference 2013},
      year = {2013},
      month = {0},
      }
  • Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and Edgar R. Weippl, "Towards a Unified Penetration Testing Taxonomy," in International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012), 2012. BibTeX
    @INPROCEEDINGS{_Towards_a_Unified_Penetration__2012,
      Author = {Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and {Edgar R.} Weippl},
      title = {Towards a Unified Penetration Testing Taxonomy},
      booktitle = {International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012)},
      year = {2012},
      month = {9},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Social Network Forensics: Tapping the Data Pool of Social Networks," in Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2012. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
      booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2012},
      month = {1},
      pdf = {socialForensics_preprint.pdf},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl, "Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model," Journal of Service Science Research, 2012. BibTeX | PDF
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
      Author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
      title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
      journal = {Journal of Service Science Research},
      year = {2012},
      month = {12},
      pdf = {krombholzetal2012.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Edgar R. Weippl, "Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk," 2012. BibTeX
    @TECHREPORT{_Book_Review_Enterprise_Securit_2012,
      Author = {{Edgar R.} Weippl},
      title = {Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk },
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl, "INMOTOS: Extending the ROPE-methodology," in 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{_INMOTOS_Extending_the_ROPE_met_2012,
      Author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
      title = {INMOTOS: Extending the ROPE-methodology},
      booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {p272-zechner.pdf},
      acm = {6880214},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Xbox360 Forensics by Steven Bolt," 2012. BibTeX
    @TECHREPORT{_Book_Review_Xbox360_Forensics__2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Xbox360 Forensics by Steven Bolt},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      note = {Not Peer Reviewed},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Digital Forensics for Enterprise Rights Management," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Digital Forensics for Enterprise Rights Management},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {16_schrittwieser.pdf},
      acm = {6880294},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen," 2012. BibTeX
    @TECHREPORT{_Book_Review_Thor_s_Microsoft_S_2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Aleksandar Hudic and Edgar R. Weippl, "Book Review: Private Cloud Computing: Consolidation, Virtualization, and Service Oriented Infrastructure by Stephen R Smoot, Nam K Tan," 2012. BibTeX
    @TECHREPORT{_Book_Review_Private_Cloud_Comp_2012,
      Author = {Aleksandar Hudic and {Edgar R.} Weippl},
      title = {Book Review: Private Cloud Computing: Consolidation, Virtualization, and Service Oriented Infrastructure by Stephen R Smoot, Nam K Tan},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      acm = {6519720},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl, "An Algorithm for k-anonymity-based Fingerprinting," in International Workshop on Digital-forensics and Watermarking (IWDW 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
      title = {An Algorithm for k-anonymity-based Fingerprinting},
      booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
      year = {2011},
      month = {10},
      pdf = {k_anonymity_algorithm_2011.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl and Gerhard Kitzler and Sigrun Goluch, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl and Gerhard Kitzler and Sigrun Goluch},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      acm = {6538206},
      }
  • Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad Tabatabai Irani and Dindin Wahyudin and Edgar R. Weippl and Dietmar Winkler, "An event-based empirical process analysis framework," in Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2010. BibTeX | PDF
    @INPROCEEDINGS{_An_event_based_empirical_proce_2010,
      Author = {Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad {Tabatabai Irani} and Dindin Wahyudin and {Edgar R.} Weippl and Dietmar Winkler},
      title = {An event-based empirical process analysis framework},
      booktitle = {Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)},
      year = {2010},
      month = {9},
      pdf = {a65-sunindyo.pdf},
      acm = {397838},
      }
  • Nicolas Racz and Andreas Seufert and Edgar R. Weippl, "Questioning the need for separate IT risk management frameworks," in Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, 2010, pp. 245-252. BibTeX
    @INPROCEEDINGS{Weippl_Questioning_the_need_for_separ_2010,
      Author = {Nicolas Racz and Andreas Seufert and {Edgar R.} Weippl},
      title = {Questioning the need for separate IT risk management frameworks},
      booktitle = {Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme },
      year = {2010},
      month = {9},
      abstract = {The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant},
      pages = {245-252},
      }
  • Edgar R. Weippl, "Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction." Information Science Reference, IGI Global, 2010, pp. 272-279. BibTeX | PDF
    @INBOOK{Weippl_SecurityinDataWarehouses_2010,
      Author = {{Edgar R.} Weippl},
      title = {Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction},
      year = {2010},
      month = {1},
      pdf = {weippl_arh_securityDWH.pdf},
      chapter = {Security in Data Warehouses},
      pages = {272--279},
      publisher = {Information Science Reference, IGI Global},
      }
  • Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and A Min Tjoa and Edgar R. Weippl, "Self-Monitoring in Social Networks," Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS), 2010. BibTeX
    @ARTICLE{Anjomshoaa_Self_Monitoring_in_Social_Netw_2010,
      Author = {Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Self-Monitoring in Social Networks},
      journal = {Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS)},
      year = {2010},
      month = {0},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61-huber.pdf},
      acm = {388606},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR_Code_Security.pdf},
      acm = {493049},
      }
  • Muhammad Asfand e yar and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa, "Exploiting Ontology for Software License Agreements," International Journal of Software and Informatics (IJSI), vol. 4, iss. 1, pp. 1-12, 2010. BibTeX
    @ARTICLE{Asfand-e-yar_Exploiting_Ontology_for_Softwa_2010,
      Author = {Muhammad Asfand e yar and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {Exploiting Ontology for Software License Agreements},
      journal = {International Journal of Software and Informatics (IJSI)},
      year = {2010},
      month = {3},
      volume = {4},
      number = {1},
      pages = {1--12},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • Nicolas Racz and Edgar R. Weippl and Andreas Seufert, "A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)," in Proceedings of IFIP CMS 2010, 2010. BibTeX
    @INPROCEEDINGS{weippl_bzze_2010_CMS_Racz,
      Author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
      title = {A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {3},
      publisher = {Springer LNCS},
      }
  • C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform," in 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Fruehwirth_Research_Challenges_in_the_Sec_2010,
      Author = {C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010},
      year = {2010},
      month = {9},
      }
  • C. Frühwirth and Stefan Biffl and Mohammad Tabatabai Irani and Edgar R. Weippl, "Addressing misalignment between information security metrics and business-driven security objectives," in Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec), 2010. BibTeX | PDF
    @INPROCEEDINGS{_Addressing_misalignment_betwee_2010,
      Author = {C. Frühwirth and Stefan Biffl and Mohammad {Tabatabai Irani} and {Edgar R.} Weippl},
      title = {Addressing misalignment between information security metrics and business-driven security objectives},
      booktitle = {Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec)},
      year = {2010},
      month = {9},
      pdf = {a6-fruehwirth.pdf},
      acm = {399966},
      }
  • Farman Ali Khan and Sabine Graf and Edgar R. Weippl and A Min Tjoa, "Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments," in Proceedings of ED-MEDIA, 2010. BibTeX
    @INPROCEEDINGS{weippl_bzzh_2010_LearningStyles_EDMEDIA,
      Author = {Farman Ali Khan and Sabine Graf and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments},
      booktitle = {Proceedings of ED-MEDIA},
      year = {2010},
      month = {9},
      publisher = {AACE},
      }
  • Nicolas Racz and Edgar R. Weippl and Andreas Seufert, "A process model for integrated IT governance, risk, and compliance management," in Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010), 2010. BibTeX
    @INPROCEEDINGS{weippl_bzzf_2010_Racz,
      Author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
      title = {A process model for integrated IT governance, risk, and compliance management},
      booktitle = {Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010)},
      year = {2010},
      month = {7},
      publisher = {Springer LNCS},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "InnoDB Database Forensics," in Proceedings of the 24th International Conference on Advanced Information Networking and Applications, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics},
      booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
      year = {2010},
      month = {4},
      pdf = {AINA2010-InnoDBforensics_preprint.pdf},
      }
  • Amirreza Tahamtan and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa, "A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects," in Proc. of 4th International Conference on Knowledge Science, Engineering & Management (KSEM’10), 2010. BibTeX
    @INPROCEEDINGS{Tahamtan_A_SOM_Based_Technique_for_a_Us_2010,
      Author = {Amirreza Tahamtan and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects},
      booktitle = {Proc. of 4th International Conference on Knowledge Science, Engineering & Management (KSEM'10)},
      year = {2010},
      month = {9},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Defect Detection Using Event-Based Process Analysis in Software Engineering Projects," in 36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Sunindyo_Defect_Detection_Using_Event_B_2010,
      Author = {Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Defect Detection Using Event-Based Process Analysis in Software Engineering Projects},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010},
      year = {2010},
      month = {9},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 539-546, 2010. BibTeX | PDF
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews},
      year = {2010},
      month = {9},
      pdf = {IEEE_SMC_Tor_finalPreprint.pdf},
      pages = {539-546},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Tor HTTP usage and information leakage," in Proceedings of IFIP CMS 2010, 2010, pp. 245-255. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Tor HTTP usage and information leakage},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {5},
      pdf = {2010 - Huber - Tor HTTP Usage.pdf},
      pages = {245-255},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites," in Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
      booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
      year = {2010},
      month = {9},
      pdf = {sec2010-friendInjection_preprint.pdf},
      }
  • Thomas Neubauer and Johannes Heurix and A Min Tjoa and Edgar R. Weippl, "Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten," Elektrotechnik und Informationstechnik, vol. 127, iss. 5, pp. 135-142, 2010. BibTeX
    @ARTICLE{Neubauer_Pseudonymisierung_f_r_die_date_2010,
      Author = {Thomas Neubauer and Johannes Heurix and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten},
      journal = {Elektrotechnik und Informationstechnik},
      year = {2010},
      month = {5},
      volume = {127},
      number = {5},
      pages = {135-142},
      }
  • Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Technical Report: Friend-in-the-middle Attacks’," , TR-SBA-Res, 2010. BibTeX | PDF
    @TECHREPORT{fitm10,
      Author = {Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Technical Report: Friend-in-the-middle Attacks'},
      year = {2010},
      month = {1},
      pdf = {pdf/FITM_TR-SBA-Research-0710-01.pdf},
      number = {TR-SBA-Res},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Social Networking Sites Security Quo Vadis," in Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing, 2010. BibTeX
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Social Networking Sites Security Quo Vadis},
      booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
      year = {2010},
      month = {8},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Sicherheit in sozialen Netzwerken: Quo Vadis," in 8th Information Security Konferenz in Krems, 2010. BibTeX
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
      booktitle = {8th Information Security Konferenz in Krems},
      year = {2010},
      month = {11},
      }
  • Martin Mulazzani and Edgar R. Weippl, "Aktuelle Herausforderungen in der Datenbankforensik," in 7th Information Security Konferenz in Krems, 2009. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_AktuelleHerausforderungenin_2009,
      Author = {Martin Mulazzani and {Edgar R.} Weippl},
      title = {Aktuelle Herausforderungen in der Datenbankforensik},
      booktitle = {7th Information Security Konferenz in Krems},
      year = {2009},
      month = {1},
      pdf = {Mulazzani_AktuelleHerausforderungenin_2009.pdf},
      publisher = {OCG Austrian Computer Society, Krems},
      }
  • A Min Tjoa and Edgar R. Weippl and Farman Ali Khan and Sabine Graf, "An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System," in Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), 2009. BibTeX | PDF
    @INPROCEEDINGS{Khan_Identifying_and_Incorporating__2010,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and Farman Ali Khan and Sabine Graf},
      title = {An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System},
      booktitle = {Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009)},
      year = {2009},
      month = {12},
      abstract = {Learning styles and affective states influence students learning. The purpose of this study is to develop a conceptual framework for identifying and integrating learning styles and affective states of a learner into web-based learning management systems and therefore provide learners with adaptive courses and additional individualized pedagogical guidance that is tailored to their learning styles and affective states. The study was carried out in three phases, the first of which was the investigation and determination of learning styles and affective states which are important for learning. Phase two consisted of the development of an approach for the identification of learning styles and affective states as well as the development of a mechanism to calculate them from the students learning interactions within web-based learning management systems. The third phase was to develop a learning strategy that is more personalized and adaptive in nature and tailored to learners needs and current situation through considering learners learning styles and affective states, aiming to lead to better learning outcomes and progress},
      pdf = {p431-khan.pdf},
      acm = {351733},
      }
  • Edgar R. Weippl and Benjamin Böck, "The Handbook of Technology Management." Wiley and Sons, 2009. BibTeX
    @INBOOK{Bock_acceptedforpublicationSocialEngineering_2009,
      Author = {{Edgar R.} Weippl and Benjamin Böck},
      title = {The Handbook of Technology Management},
      year = {2009},
      month = {1},
      chapter = {accepted for publication: Social Engineering},
      publisher = {Wiley and Sons},
      }
  • Edgar R. Weippl and Mohammad Tabatabai Irani, "Automation Of Post-Exploitation," in Proceedings of International Conference on Security Technology (SecTech 2009), 2009. BibTeX | PDF
    @INPROCEEDINGS{TabatabaiIrani_AutomationOfPostExploitation_2009,
      Author = {{Edgar R.} Weippl and Mohammad {Tabatabai Irani}},
      title = {Automation Of Post-Exploitation},
      booktitle = {Proceedings of International Conference on Security Technology (SecTech 2009)},
      year = {2009},
      month = {1},
      pdf = {TabatabaiIrani_AutomationOfPostExploitation_2009.pdf},
      publisher = {Springer LNCS},
      }
  • Peter Kalchgruber and Edgar R. Weippl, "Can end-to-end verifiable e-voting be explained easily?," in Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS), 2009. BibTeX | PDF
    @INPROCEEDINGS{_Can_end_to_end_verifiable_e_vo_2009,
      Author = {Peter Kalchgruber and {Edgar R.} Weippl},
      title = {Can end-to-end verifiable e-voting be explained easily?},
      booktitle = {Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS)},
      year = {2009},
      month = {12},
      pdf = {p572-kalchgruber.pdf},
      acm = {351868},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart, "Fortification of IT security by automatic security advisory processing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, AINA2008, 2008, pp. 575-582. BibTeX
    @INPROCEEDINGS{Fenz_FortificationofIT_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
      title = {Fortification of IT security by automatic security advisory processing},
      booktitle = {Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, AINA2008},
      year = {2008},
      month = {3},
      abstract = {The past years have seen the rapid increase of security related incidents in the field of information technology. IT infrastructures in the commercial as well as in the governmental sector are becoming evermore heterogeneous which increases the complexity of handling and maintaining an adequate security level. Especially organizations which are hosting and processing highly sensitive data are obligated to establish a holistic company-wide security approach. We propose a novel security concept to reduce this complexity by automatic assessment of security advisories. A central entity collects vulnerability information from various sources, converts it into a standardized and machine-readable format and distributes it to its subscribers. The subscribers are then able to automatically map the vulnerability information to the ontological stored infrastructure data to visualize newly-discovered software vulnerabilities. The automatic analysis of vulnerabilities decreases response times and permits precise response to new threats and vulnerabilities, thus decreasing the administration complexity and increasing the IT security level.},
      pages = {575-582},
      publisher = {IEEE Computer Society},
      }
  • Edgar R. Weippl and Martin Ebner, "Security Privacy Challenges in E-Learning 2.0," in E-Learn 2008, 2008. BibTeX
    @INPROCEEDINGS{Weippl_SecurityPrivacyChallenges_2008,
      Author = {{Edgar R.} Weippl and Martin Ebner},
      title = {Security Privacy Challenges in E-Learning 2.0},
      booktitle = {E-Learn 2008},
      year = {2008},
      month = {1},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart, "Semantic Potential of existing Security Advisory Standards," in Proceedings of the FIRST2008 Conference, 2008. BibTeX | PDF
    @INPROCEEDINGS{Fenz_SemanticPotentialof_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
      title = {Semantic Potential of existing Security Advisory Standards},
      booktitle = {Proceedings of the FIRST2008 Conference},
      year = {2008},
      month = {1},
      abstract = {New discoveries made on a nearly daily basis and the constantly growing amount of vulnerabilities in software products have led to the distribution of great numbers of vendor dependent vulnerability information over various channels such as mailing lists and RSS (Really Simple Syndication) feeds. However, the format of these messages presents a major problem as it lacks standardized, semantic information, resulting in very time-intensive, expensive, and error-prone processing due to the necessary human involvement. Recent developments in the field of IT security have increased the need for a sound semantic security advisory standard that allows for automatic processing of relevant security advisories in a more precise and timely manner. This would reduce pressure on organizations trying to keep their complex infrastructures secure and up-to-date by complying with standards, such as Basel II and local legislations. This paper conducts an evaluation of existing security advisory standards to identify usable semantic standards, which enable the automated processing of security advisories to ensure faster reaction times and precise response to new threats and vulnerabilities. In this way IT management can concentrate on solutions rather than on filtering messages.},
      pdf = {2008 - Fenz - Semantic Potential of Existing Security Advisory Standards.pdf},
      }
  • Edgar R. Weippl, "Cyber Attacks and the article 5 of the Treaty of NATO," Euro Atlantic Quarterly, p. 22, 2008. BibTeX
    @ARTICLE{weippl_gca,
      Author = {{Edgar R.} Weippl},
      title = {Cyber Attacks and the article 5 of the Treaty of NATO},
      journal = {Euro Atlantic Quarterly},
      year = {2008},
      month = {1},
      pages = {22},
      note = {ISSN 1336-8761},
      }
  • Edgar R. Weippl and Joe Luca, ED-MEDIA Conference Proceedings, AACE, 2008. BibTeX
    @BOOK{Weippl_EDMEDIAConferenceProceedings_2008,
      Author = {{Edgar R.} Weippl and Joe Luca},
      title = {ED-MEDIA Conference Proceedings},
      year = {2008},
      month = {1},
      publisher = {AACE},
      }
  • Edgar R. Weippl and Simon Tjoa and Stefan Jakoubi, ARES Conference Proceedings, IEEE, 2008. BibTeX
    @BOOK{Tjoa_ARESConferenceProceedings_2008,
      Author = {{Edgar R.} Weippl and Simon Tjoa and Stefan Jakoubi},
      title = {ARES Conference Proceedings},
      year = {2008},
      month = {1},
      publisher = {IEEE},
      }
  • Edgar R. Weippl, "Handbook of Research on Information Security and Assurance." Idea Group, 2008. BibTeX
    @INBOOK{Weippl_SecurityAwarenessVirtualEnvironmentsandELearning_2008,
      Author = {{Edgar R.} Weippl},
      title = {Handbook of Research on Information Security and Assurance},
      year = {2008},
      month = {1},
      chapter = {Security Awareness: Virtual Environments and E-Learning},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl, "Encyclopedia of Data Warehousing and Mining." Idea Group, 2008. BibTeX
    @INBOOK{Weippl_DatabaseSecurityandStatisticalDatabaseSecurity_2008,
      Author = {{Edgar R.} Weippl},
      title = {Encyclopedia of Data Warehousing and Mining},
      year = {2008},
      month = {1},
      chapter = {Database Security and Statistical Database Security},
      publisher = {Idea Group},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner, "XML Security – A comparative literature review," Journal of Systems and Software, vol. 81, pp. 1715-1724, 2008. BibTeX
    @ARTICLE{Ekelhart_XMLSecurity_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
      title = {XML Security - A comparative literature review},
      journal = {Journal of Systems and Software},
      year = {2008},
      month = {1},
      abstract = {Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML Security for Mobile Computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.},
      volume = {81},
      pages = {1715-1724},
      note = {ISSN: 0164-1212},
      }
  • Edgar R. Weippl, "Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions." IGI Global, 2008. BibTeX
    @INBOOK{Weippl__2008,
      Author = {{Edgar R.} Weippl},
      title = {Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions},
      year = {2008},
      month = {1},
      publisher = {IGI Global},
      }
  • Edgar R. Weippl and Markus Klemen and Stefan Raffeiner, "The Semantic Web for Knowledge and Data Management: Technologies and Practices." Idea Group, 2008, pp. 38-48. BibTeX
    @INBOOK{Weippl_ImprovingStorageConceptsforSemanticModelsandOntologies_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Stefan Raffeiner},
      title = {The Semantic Web for Knowledge and Data Management: Technologies and Practices},
      year = {2008},
      month = {1},
      chapter = {Improving Storage Concepts for Semantic Models and Ontologies},
      pages = {38--48},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek, "OCG IT-Security Zertifikat fuer Nutzer," in IRIS 2008, 2008. BibTeX
    @INPROCEEDINGS{Benditsch_OCGITSecurityZertifikat_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek},
      title = {OCG IT-Security Zertifikat fuer Nutzer},
      booktitle = {IRIS 2008},
      year = {2008},
      month = {1},
      }
  • Edgar R. Weippl and Bernhard Riedl, "Handbook of Research on Mobile Multimedia, Second Edition." Information Science Reference, 2008, p. IX. BibTeX
    @INBOOK{Weippl_SecurityTrustandPrivacyonMobileDevicesandMultimediaApplications_2008,
      Author = {{Edgar R.} Weippl and Bernhard Riedl},
      title = {Handbook of Research on Mobile Multimedia, Second Edition},
      year = {2008},
      month = {1},
      chapter = {Security, Trust and Privacy on Mobile Devices and Multimedia Applications},
      pages = {Chapter IX},
      publisher = {Information Science Reference},
      note = {ISBN: 978-1-60566-046-2},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl, "Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard," in Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007, 2007, pp. 381-388. BibTeX
    @INPROCEEDINGS{Fenz_InformationSecurityFortification_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl},
      title = {Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard},
      booktitle = {Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007},
      year = {2007},
      month = {12},
      pages = {381-388},
      publisher = {IEEE Computer Society},
      note = {0-7695-3054-0},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart, "Security Issues for the Use of Semantic Web in e-Commerce," in Business Information Systems, 10th International Conference on Business Information Systems, BIS 2007, 2007, pp. 1-13. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityIssuesUse_2007,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
      title = {Security Issues for the Use of Semantic Web in e-Commerce},
      booktitle = {Business Information Systems, 10th International Conference on Business Information Systems, BIS 2007},
      year = {2007},
      month = {4},
      pdf = {2007 - Ekelhart - Security Issues for the Use of Semantic Web in e-Commerce.pdf},
      number = {978-3-540-},
      pages = {1-13},
      publisher = {Springer Berlin Heidelberg},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Thomas Neubauer, "Formal threat descriptions for enhancing governmental risk assessment," in Proceedings of the First International Conference on Theory and Practice of Electronic Governance, 2007, pp. 40-43. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_Formalthreatdescriptions_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Thomas Neubauer},
      title = {Formal threat descriptions for enhancing governmental risk assessment},
      booktitle = {Proceedings of the First International Conference on Theory and Practice of Electronic Governance},
      year = {2007},
      month = {1},
      abstract = {Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history of IT systems in the governmental sector and the connection of these legacy systems to newer technologies, most governmental institutions are faced with a heterogeneous IT environment. More and more governmental duties and responsibilities rely solely on IT systems which have to be highly dependable to ensure the proper operation of these governmental services. An increasing amount of software vulnerabilities and the generally heightened physical threat level due to terror attacks and natural disasters demand for a holistic IT security approach which captures, manages, and secures the entire governmental IT infrastructure. Our contribution is (1) a novel inventory solution, (2) a mechanism to embed the virtual IT infrastructure data into a physical model provided by our security ontology, and (3) a methodology to automatically identify threatened assets and to reason on the current security status based on formal threat definitions taking software configurations and physical locations into account. A prototypical implementation of the aforementioned concepts shows how these concepts help governmental institutions to secure their IT infrastructure in a holistic and systematic way to fortify their IT systems in an appropriate way against current and future threats.},
      pdf = {2007 - Ekelhart - Formal Threat Descriptions for Enhancing Governmental Risk Assessment.pdf},
      volume = {232},
      pages = {40-43},
      publisher = {ACM},
      note = {978-1-59593-822-0},
      acm = {933612},
      }
  • Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "Security Ontologies: Improving Quantitative Risk Analysis," in Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007, 2007, pp. 156-162. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologiesImproving_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {Security Ontologies: Improving Quantitative Risk Analysis},
      booktitle = {Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Security Ontologies Improving Quantitative Risk Analysis.pdf},
      pages = {156-162},
      publisher = {IEEE Computer Society},
      note = {0-7695-2755-8},
      }
  • Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart and Gernot Goluch, "Architectural approach for handling semi-structured data in a user-centered working environment," International Journal of Web Information Systems, vol. 3, iss. 3, pp. 198-211, 2007. BibTeX | PDF
    @ARTICLE{Ekelhart_Architecturalapproachhandling_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart and Gernot Goluch},
      title = {Architectural approach for handling semi-structured data in a user-centered working environment},
      journal = {International Journal of Web Information Systems},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Architectural Approach for Handling Semi-Structured Data in a User-Centered Working Environment.pdf},
      volume = {3},
      number = {3},
      pages = {198-211},
      note = {ISSN: 1744-0084},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch, "Ontological Mapping of Common Criterias Security Assurance Requirements," in New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007, May 14-16, 2007, pp. 85-95. BibTeX
    @INPROCEEDINGS{Ekelhart_OntologicalMappingof_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch},
      title = {Ontological Mapping of Common Criterias Security Assurance Requirements},
      booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007, May 14-16},
      year = {2007},
      month = {5},
      abstract = {The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data security and data privacy. Due to the very complex and time-consuming certification process a lot of companies abstain from a CC certification. We created the CC Ontology tool, which is based on an ontological representation of the CC catalog, to support the evaluator at the certification process. Tasks such as the planning of an evaluation process, the review of relevant documents or the creating of reports are supported by the CC Ontology tool. With the development of this tool we reduce the time and costs needed to complete a certification.},
      volume = {232_2007},
      pages = {85-95},
      publisher = {International Federation for Information Processing ,},
      note = {978-0-387-72366-2},
      }
  • Edgar R. Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger, "Comparative Literature Review on RFID Security and Privacy," in Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007), 2007. BibTeX
    @INPROCEEDINGS{Riedl_ComparativeLiteratureReview_2007,
      Author = {{Edgar R.} Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger},
      title = {Comparative Literature Review on RFID Security and Privacy},
      booktitle = {Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)},
      year = {2007},
      month = {1},
      }
  • Edgar R. Weippl and Markus Klemen and Benjamin Böck, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Bock_SocialEngineering_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Benjamin Böck},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Social Engineering},
      publisher = {Wiley},
      }
  • Edgar R. Weippl and Bernhard Riedl and Veronika Grascher, "Wikis im Social Web." OCG Austrian Computer Society, 2007, pp. 190-198. BibTeX
    @INBOOK{Weippl_EinsatzvonAuditsinWikisanStellevonZugriffskontrollenalssozioorganisatorischeSicherheitsmassnahme_2007,
      Author = {{Edgar R.} Weippl and Bernhard Riedl and Veronika Grascher},
      title = {Wikis im {S}ocial {W}eb},
      year = {2007},
      month = {1},
      chapter = {Einsatz von Audits in Wikis an Stelle von Zugriffskontrollen als sozio-organisatorische Sicherheitsmassnahme},
      pages = {190--198},
      publisher = {OCG Austrian Computer Society},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart, "Security Ontologies: How to Improve Understanding of Complex Relationships," in Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007, 2007, pp. 404-407. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SecurityOntologiesHow_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
      title = {Security Ontologies: How to Improve Understanding of Complex Relationships},
      booktitle = {Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007},
      year = {2007},
      month = {6},
      abstract = {It is commonly accepted that simulation can provide a valuable tool in improving learning. Building on a complex knowledge base of IT security related concepts we offer our students a simulation to experience how different safeguards can influence the outcome of security incidents. The goal is to teach students that countermeasures have to cost-effective, that is, the cost of installing and operating safeguards should not exceed the anticipated benefit.},
      pdf = {2007 - Weippl - Security Ontologies How to Improve Understanding of Complex Relationships.pdf},
      pages = {404-407},
      publisher = {AACE},
      }
  • Edgar R. Weippl, "Dependability in E-Assessment," International Journal on E-Learning, vol. 6, iss. 2, 2007. BibTeX
    @ARTICLE{Weippl_DependabilityinEAssessment_2007,
      Author = {{Edgar R.} Weippl},
      title = {Dependability in E-Assessment},
      journal = {International Journal on E-Learning},
      year = {2007},
      month = {1},
      volume = {6},
      number = {2},
      publisher = {AACE},
      }
  • Edgar R. Weippl and Markus Klemen and Thomas Neubauer, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Klemen_BusinessRequirementsofBackupSystems_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Thomas Neubauer},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Business Requirements of Backup Systems},
      publisher = {Wiley},
      }
  • Edgar R. Weippl, "Security Considerations in M-Learning: Threats and Countermeasures," Advanced Technology for Learning, vol. 4, iss. 2, pp. 1-7, 2007. BibTeX
    @ARTICLE{Weippl_SecurityConsiderationsin_2007,
      Author = {{Edgar R.} Weippl},
      title = {Security Considerations in M-Learning: Threats and Countermeasures},
      journal = {Advanced Technology for Learning},
      year = {2007},
      month = {1},
      volume = {4},
      number = {2},
      pages = {1--7},
      publisher = {Acta Press},
      }
  • Edgar R. Weippl and Khalid Latif, "Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse," in IEEE International Conference on Information Reuse and Integration, 2007. BibTeX
    @INPROCEEDINGS{Latif_QuestionDrivenSemantics_2007,
      Author = {{Edgar R.} Weippl and Khalid Latif},
      title = {Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse},
      booktitle = {IEEE International Conference on Information Reuse and Integration},
      year = {2007},
      month = {8},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Witold Abramowicz and Dominik Zyskowski and Monika Kaczmarek, "Security aspects in Semantic Web Services Filtering," in Proceedings of the 9th @WAS International Conference on Information Integration and Web-based Applications \& Services (iiWAS2007), 2007, pp. 21-31. BibTeX | PDF
    @INPROCEEDINGS{Abramowicz_Securityaspectsin_2007,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Witold Abramowicz and Dominik Zyskowski and Monika Kaczmarek},
      title = {Security aspects in Semantic Web Services Filtering},
      booktitle = {Proceedings of the 9th @WAS International Conference on Information Integration and Web-based Applications \& Services (iiWAS2007)},
      year = {2007},
      month = {1},
      abstract = {Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact crucial in the overall value of service quality. A security ontology that enables a quantification of risks related to the usage of Semantic Web services in enterprise information systems was created to meet users' requirements and enhance Semantic Web services with machine processable security information. This article presents how this security ontology can be integrated into the Web service description and how it enhances the process of Web services filtering.},
      pdf = {2007 - Abramowicz - Security Aspects in Semantic Web Services Filtering.pdf},
      volume = {229},
      pages = {21-31},
      publisher = {Austrian Computer Society},
      }
  • Edgar R. Weippl and Thomas Neubauer and Christian Stummer, "Workshop-based Multiobjective Security Safeguard Selection," in Proceedings of the irst International Conference on Availability, Reliability and Security (ARES), 2006, pp. 366-373. BibTeX
    @INPROCEEDINGS{Neubauer_WorkshopbasedMultiobjectiveSecurity_2006,
      Author = {{Edgar R.} Weippl and Thomas Neubauer and Christian Stummer},
      title = {Workshop-based Multiobjective {S}ecurity Safeguard Selection},
      booktitle = {Proceedings of the irst International Conference on Availability, Reliability and Security (ARES)},
      year = {2006},
      month = {1},
      pages = {366--373},
      publisher = {IEEE Computer Society},
      }
  • A Min Tjoa and Edgar R. Weippl and Andreas Holzinger, "Security Aspects of Ubiquitous Computing in Health Care," e\&i, vol. 2006, iss. 4, pp. 156-161, 2006. BibTeX
    @ARTICLE{Weippl_SecurityAspectsof_2006,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Security Aspects of Ubiquitous Computing in Health Care},
      journal = {e\&i},
      year = {2006},
      month = {1},
      volume = {2006},
      number = {4},
      pages = {156--161},
      publisher = {Springer Verlag},
      note = {http://dx.doi.org/10.1007/s00502-006-0336},
      }
  • Edgar R. Weippl and Thomas Neubauer and Arno Hollosi, "Digitale PDF-Signaturen mit der Bürgerkarte," in Proceedings of D-A-CH Security 2006, 2006. BibTeX
    @INPROCEEDINGS{Neubauer_DigitalePDFSignaturenmit_2006,
      Author = {{Edgar R.} Weippl and Thomas Neubauer and Arno Hollosi},
      title = {Digitale {P}{D}{F}-{S}ignaturen mit der {B}\"urgerkarte},
      booktitle = {Proceedings of D-A-CH Security 2006},
      year = {2006},
      month = {1},
      }
  • Edgar R. Weippl, "On the Use of Test Centers in e-Assessment," eLearning Reports, iss. 7, 2006. BibTeX
    @ARTICLE{Weippl_UseofTest_2006,
      Author = {{Edgar R.} Weippl},
      title = {On the Use of Test Centers in e-Assessment},
      journal = {eLearning Reports},
      year = {2006},
      month = {2},
      volume = {0},
      number = {7},
      }
  • Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "Security Ontology: Simulating Threats to Corporate Assets," in Information Systems Security, Second International Conference, ICISS 2006, 2006, pp. 249-259. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologySimulating_2006,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {Security Ontology: Simulating Threats to Corporate Assets},
      booktitle = {Information Systems Security, Second International Conference, ICISS 2006},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Security Ontology Simulating Threats to Corporate Assets.pdf},
      volume = {4332_2006},
      pages = {249-259},
      publisher = {Springer Berlin Heidelberg},
      note = {978-3-540-68962-1},
      }
  • Edgar R. Weippl, "Handbook of Research on Mobile Multimedia." Idea Group, 2006, pp. 22-37. BibTeX
    @INBOOK{Weippl_Chapter3SecurityandTrustinMobileMultimedia_2006,
      Author = {{Edgar R.} Weippl},
      title = {Handbook of Research on Mobile Multimedia},
      year = {2006},
      month = {1},
      chapter = {Chapter 3:Security and Trust in Mobile Multimedia},
      pages = {22--37},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Markus Klemen, "Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues." Idea Group, 2006. BibTeX
    @INBOOK{Weippl_ImplementingITSecurityforSmallandMediumSizedEnterprises_2006,
      Author = {{Edgar R.} Weippl and Markus Klemen},
      title = {Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues},
      year = {2006},
      month = {1},
      chapter = {Implementing IT Security for Small and Medium-Sized Enterprises},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Jamil Wahbeh, "Mobile Multimedia: Communication Engineering Perspective." Nova Science Publishers, 2006, pp. 101-116. BibTeX
    @INBOOK{Weippl_SecuringMobileCommunicationRADIUSinaWindowsEnvironment_2006,
      Author = {{Edgar R.} Weippl and Jamil Wahbeh},
      title = {Mobile Multimedia: Communication Engineering Perspective},
      year = {2006},
      month = {1},
      chapter = {Securing Mobile Communication: RADIUS in a Windows Environment},
      pages = {101--116},
      publisher = {Nova Science Publishers},
      }
  • Edgar R. Weippl and Mathias Strasser, "Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure," Information Systems Control Journal, vol. 4, iss. 10, 2006. BibTeX
    @ARTICLE{Weippl_SarbanesOxleyActCompliance_2006,
      Author = {{Edgar R.} Weippl and Mathias Strasser},
      title = {Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure},
      journal = {Information Systems Control Journal},
      year = {2006},
      month = {8},
      volume = {4},
      number = {10},
      publisher = {ISACA},
      }
  • Edgar R. Weippl, "Addressing the Weakest Link: How to improve teaching of IT security," in Proceedings of ED-MEDIA 2006, 2006. BibTeX
  • Edgar R. Weippl and Stefan Biffl and Thomas Neubauer, "Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF," in Proceedings of the International Conference on Availability, Reliability and Security (ARES’06), 2006, pp. 723-731. BibTeX
    @INPROCEEDINGS{Neubauer_DigitalSignatureswith_2006,
      Author = {{Edgar R.} Weippl and Stefan Biffl and Thomas Neubauer},
      title = {Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF},
      booktitle = {Proceedings of the International Conference on Availability, Reliability and Security (ARES'06)},
      year = {2006},
      month = {1},
      pages = {723-731},
      }
  • Stefan Fenz and Edgar R. Weippl, "Ontology-based IT-Security Planning," in Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, PRDC2006, 2006, pp. 389-390. BibTeX | PDF
    @INPROCEEDINGS{Fenz_OntologybasedITSecurityPlanning_2006,
      Author = {Stefan Fenz and {Edgar R.} Weippl},
      title = {Ontology-based IT-Security Planning},
      booktitle = {Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, PRDC2006},
      year = {2006},
      month = {12},
      abstract = {IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis.},
      pdf = {2006 - Fenz - Ontology-based IT Security Planning.pdf},
      pages = {389-390},
      publisher = {IEEE Computer Society},
      note = {9353421},
      }
  • Edgar R. Weippl and Gernot Goluch, "Nichtabstreitbarkeit und Audits in ELearning," in IRIS 2006, 2006. BibTeX
    @INPROCEEDINGS{Goluch_NichtabstreitbarkeitundAudits_2006,
      Author = {{Edgar R.} Weippl and Gernot Goluch},
      title = {Nichtabstreitbarkeit und Audits in ELearning},
      booktitle = {IRIS 2006},
      year = {2006},
      month = {1},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "Ontology-based Business Knowledge for Simulating Threats to Corporate Assets," in Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006, 2006, pp. 37-48. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_OntologybasedBusinessKnowledge_2006,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {Ontology-based Business Knowledge for Simulating Threats to Corporate Assets},
      booktitle = {Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Ontology-based Business Knowledge for Simulating Threats to Corporate Assets.pdf},
      volume = {4333_2006},
      pages = {37-48},
      publisher = {Springer Berlin Heidelberg},
      note = {978-3-540-49998-5},
      }
  • Edgar R. Weippl, "Encyclopedia of E-Commerce, E-Government and Mobile Commerce." Idea Group, Publish, 2005, pp. 135-140. BibTeX
    @INBOOK{Weippl_ComputerSecurityintheContextofELearning_2005,
      Author = {{Edgar R.} Weippl},
      title = {Encyclopedia of E-Commerce, E-Government and Mobile Commerce},
      year = {2005},
      month = {1},
      chapter = {Computer Security in the Context of E-Learning},
      pages = {135--140},
      publisher = {Idea Group, Publish},
      }
  • Edgar R. Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha, "E-Learning without Text and Language: A Language-Free Learning Model," in Proceedings of EDMEDIA 2005, 2005. BibTeX
    @INPROCEEDINGS{Kalinyaprak_ELearningwithoutText_2005,
      Author = {{Edgar R.} Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha},
      title = {E-Learning without Text and Language: A Language-Free Learning Model},
      booktitle = {Proceedings of EDMEDIA 2005},
      year = {2005},
      month = {6},
      }
  • Edgar R. Weippl, "Security in E-Learning," ACM ELearn Magazine, 2005. BibTeX | PDF
    @ARTICLE{Weippl_SecurityinELearning_2005,
      Author = {{Edgar R.} Weippl},
      title = {Security in E-Learning},
      journal = {ACM ELearn Magazine},
      year = {2005},
      month = {1},
      pdf = {p431-khan.pdf},
      acm = {867458},
      }
  • Edgar R. Weippl, "Dependability in E-Assessment," in Proceedings of ED-MEDIA 2005, 2005. BibTeX
    @INPROCEEDINGS{Weippl_DependabilityinEAssessment_2005,
      Author = {{Edgar R.} Weippl},
      title = {Dependability in E-Assessment},
      booktitle = {Proceedings of ED-MEDIA 2005},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl, Security in E-Learning, Springer NY, 2005. BibTeX
    @BOOK{Weippl_SecurityinELearning_2005b,
      Author = {{Edgar R.} Weippl},
      title = {Security in E-Learning},
      year = {2005},
      month = {1},
      publisher = {Springer NY},
      note = {ISBN 0-387-24341-0, \url{http://www.e-learning-security.org}},
      }
  • Edgar R. Weippl, "Non-Repudiation and Audits in E-Learning, invited paper," in Proceedings of E-Learn 2005, 2005, pp. 1785-1790. BibTeX
    @INPROCEEDINGS{Weippl_NonRepudiationandAudits_2005,
      Author = {{Edgar R.} Weippl},
      title = {Non-Repudiation and Audits in E-Learning, invited paper},
      booktitle = {Proceedings of E-Learn 2005},
      year = {2005},
      month = {1},
      pages = {1785--1790},
      }
  • Edgar R. Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska, "On Cooperatively Creating Dynamic Ontologies," in Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, 2005. BibTeX | PDF
    @INPROCEEDINGS{Gahleitner_CooperativelyCreatingDynamic_2005,
      Author = {{Edgar R.} Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska},
      title = {On Cooperatively Creating Dynamic Ontologies},
      booktitle = {Proceedings of the 16th ACM Conference on Hypertext and Hypermedia},
      year = {2005},
      month = {9},
      pdf = {p208-gahleitner.pdf},
      publisher = {ACM},
      acm = {878760},
      }
  • A Min Tjoa and Edgar R. Weippl, "Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage," Interactive Technology and Smart Education (ITSE), vol. 2005, iss. 2, pp. 247-256, 2005. BibTeX
    @ARTICLE{Weippl_PrivacyinELearning_2005,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl},
      title = {Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage},
      journal = {Interactive Technology and Smart Education (ITSE)},
      year = {2005},
      month = {1},
      volume = {2005},
      number = {2},
      pages = {247--256},
      publisher = {Troubador Publishing Ltd.},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps," in Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005, 2005, pp. 135-151. BibTeX
    @INPROCEEDINGS{Weippl_SemanticDesktopSemantic_2005,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps},
      booktitle = {Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005},
      year = {2005},
      month = {10},
      number = {4623},
      pages = {135-151},
      }
  • Edgar R. Weippl, "On the Use of Test Centers in E-Assessment," published in elearningreports.com, 2005. BibTeX
    @ARTICLE{Weippl_UseofTest_2005,
      Author = {{Edgar R.} Weippl},
      title = {On the Use of Test Centers in E-Assessment},
      journal = {published in elearningreports.com},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl, "The Handbook of Information Security." John Wiley \& Sons, 2005. BibTeX
    @INBOOK{Weippl_SecurityinELearning_2005a,
      Author = {{Edgar R.} Weippl},
      title = {The Handbook of Information Security},
      year = {2005},
      month = {1},
      chapter = {Security in E-Learning},
      publisher = {John Wiley \& Sons},
      note = {ISBN 0-471-64833-7},
      }
  • Edgar R. Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and A Min Tjoa, "Semantic Storage: A Report on Performance and Flexibility," in Database and Expert Systems Applications, 16th International Conference, DEXA 2005, 2005, pp. 586-595. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SemanticStorageReport_2005,
      Author = {{Edgar R.} Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and {A Min} Tjoa},
      title = {Semantic Storage: A Report on Performance and Flexibility},
      booktitle = {Database and Expert Systems Applications, 16th International Conference, DEXA 2005},
      year = {2005},
      month = {8},
      abstract = {Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype, which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.},
      pdf = {2005-Weippl.pdf},
      volume = {3588_2005},
      pages = {586-595},
      publisher = {Springer Berlin Heidelberg},
      }
  • A Min Tjoa and Edgar R. Weippl and Tho Manh Nguyen and Peter Brezany, "Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing," International Journal of Data Warehousing and Mining, vol. 1, iss. 4, pp. 22-55, 2005. BibTeX
    @ARTICLE{Nguyen_TowardGridBasedZeroLatency_2005,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and {Tho Manh} Nguyen and Peter Brezany},
      title = {Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing},
      journal = {International Journal of Data Warehousing and Mining},
      year = {2005},
      month = {1},
      volume = {1},
      number = {4},
      pages = {22-55},
      publisher = {Idea Group},
      }
  • A Min Tjoa and Edgar R. Weippl, "Privacy in E-learning: How to Implement Anonymity," in Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC), 2005. BibTeX
    @INPROCEEDINGS{Weippl_PrivacyinElearning_2005a,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl},
      title = {Privacy in E-learning: How to Implement Anonymity},
      booktitle = {Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC)},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl, "Security in Mobile Multimedia," Journal of Communication Engineering, vol. 1, iss. 1, pp. 59-69, 2004. BibTeX
    @ARTICLE{weippl_ag,
      Author = {{Edgar R.} Weippl},
      title = {Security in Mobile Multimedia},
      journal = {Journal of Communication Engineering},
      year = {2004},
      month = {1},
      volume = {1},
      number = {1},
      pages = {59--69},
      note = {ISSN 1693-5152},
      }
  • Edgar R. Weippl and Wolfgang Essmayr and Stefan Probst, "Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms," International Journal of Electronic Commerce Research, vol. 4, iss. 1, pp. 127-156, 2004. BibTeX
    @ARTICLE{weippl_ae,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr and Stefan Probst},
      title = {Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms},
      journal = {International Journal of Electronic Commerce Research},
      year = {2004},
      month = {1},
      volume = {4},
      number = {1},
      pages = {127--156},
      publisher = {Kluwer},
      }
  • Edgar R. Weippl and Wolfgang Essmayr and Ludwig Klug, "A New Approach to Secure Federated Information Bases using Agent Technology," Journal of Database Management, Kluwer, vol. 14, iss. 1, pp. 48-68, 2003. BibTeX
    @ARTICLE{weippl_af,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr and Ludwig Klug},
      title = {A New Approach to Secure Federated Information Bases using Agent Technology},
      journal = {Journal of Database Management, Kluwer},
      year = {2003},
      month = {1},
      volume = {14},
      number = {1},
      pages = {48--68},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Personal Trusted Devices for web services: Revisiting Multilevel Security," Mobile Networks and Applications, Kluwer, vol. 8, iss. 2, pp. 151-157, 2003. BibTeX
    @ARTICLE{weippl_aa,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Personal Trusted Devices for web services: Revisiting Multilevel Security},
      journal = {Mobile Networks and Applications, Kluwer},
      year = {2003},
      month = {1},
      volume = {8},
      number = {2},
      pages = {151--157},
      }
  • Edgar R. Weippl, "The Transition from E-commerce to M-commerce: Why Security should be the enabling technology," Journal of Information Technology Theory and Application (JITTA), vol. 3, iss. 4, pp. 17-19, 2001. BibTeX
    @ARTICLE{weippl_ga,
      Author = {{Edgar R.} Weippl},
      title = {The Transition from E-commerce to M-commerce: Why Security should be the enabling technology},
      journal = {Journal of Information Technology Theory and Application (JITTA)},
      year = {2001},
      month = {1},
      volume = {3},
      number = {4},
      pages = {17--19},
      note = {\url{http://peffers.net/journal/volume3_4/ecpreface.pdf}},
      }
  • Edgar R. Weippl, "Building secure knowledge bases: combining Java agents and DBagents," in Proceedings of the fifth international conference on Autonomous agents (AGENTS), 2001. BibTeX | PDF
    @INPROCEEDINGS{_Building_secure_knowledge_base_2001,
      Author = {{Edgar R.} Weippl},
      title = {Building secure knowledge bases: combining Java agents and DBagents},
      booktitle = {Proceedings of the fifth international conference on Autonomous agents (AGENTS)},
      year = {2001},
      month = {5},
      pdf = {p212-weippl.pdf},
      acm = {06996},
      }
  • Edgar R. Weippl and Hans Lohninger, "Knowledge Landscapes: A VR Interface for CBT Knowledge Bases," in 10th European-Japanese Conference on Information Modeling and Knowledge Bases, 2000. BibTeX
    @INPROCEEDINGS{weippl_bm,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Knowledge Landscapes: A VR Interface for CBT Knowledge Bases},
      booktitle = {10th European-Japanese Conference on Information Modeling and Knowledge Bases},
      year = {2000},
      month = {5},
      note = {Reprinted in Kangassalo H., Jaakkola H., Kawaguchi E. (eds), Information Modelling and Knowledge Bases XII, 271-274, ISBN 1-58603-1635. IOS Press, Amsterdam, 2001.},
      }
  • Edgar R. Weippl and Hans Lohninger, "Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces," in Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT), 2000, pp. 355-362. BibTeX
    @INPROCEEDINGS{weippl_bj,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces},
      booktitle = {Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT)},
      year = {2000},
      month = {12},
      pages = {355-362},
      }
  • Edgar R. Weippl, "Coimbra: secure Web access to multimedia content," in Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA), 2000. BibTeX | PDF
    @INPROCEEDINGS{_Coimbra_secure_Web_access_to_m_2000,
      Author = {{Edgar R.} Weippl},
      title = {Coimbra: secure Web access to multimedia content},
      booktitle = {Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA)},
      year = {2000},
      month = {11},
      pdf = {p145-weippl.pdf},
      acm = {90340},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Identity Mapping: An Approach to Unravel Enterprise Security Management Policies," in Proceedings of the 16th IFIP World Computer Congress, 2000. BibTeX
    @INPROCEEDINGS{weippl_bl,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Identity Mapping: An Approach to Unravel Enterprise Security Management Policies},
      booktitle = {Proceedings of the 16th IFIP World Computer Congress},
      year = {2000},
      month = {8},
      publisher = {Kluwer},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations," in Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA), 2000. BibTeX
    @INPROCEEDINGS{weippl_bk,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations},
      booktitle = {Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA)},
      year = {2000},
      month = {9},
      publisher = {LNCS Springer},
      }
  • Edgar R. Weippl and Hans Lohninger, "Evaluating CBT Software Usage in Schools and Universities," in Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education, 1999. BibTeX
    @INPROCEEDINGS{weippl_bo,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Evaluating CBT Software Usage in Schools and Universities},
      booktitle = {Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education},
      year = {1999},
      month = {6},
      }
  • Edgar R. Weippl and Hans Lohninger, "Special Requirements for Information Visualization in CBT," in Proceedings of Edu Compugraphics 97, 1997, pp. 133-139. BibTeX
    @INPROCEEDINGS{weippl_bp,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Special Requirements for Information Visualization in CBT},
      booktitle = {Proceedings of Edu Compugraphics 97},
      year = {1997},
      month = {12},
      pages = {133-139},
      note = {ISBN 972-8342-02-0},
      }
  • Edgar R. Weippl and Viesturs Kaugers, "Recent developments in model-driven architecture and security," in NA, 1900. BibTeX
    @INPROCEEDINGS{Kaugers_Recent_developments_in_model_d_2010,
      Author = {{Edgar R.} Weippl and Viesturs Kaugers},
      title = {Recent developments in model-driven architecture and security},
      booktitle = {NA},
      year = {1900},
      month = {0},
      abstract = {Security is definitely one of the most important aspects in business information systems. This aspect is strongly related to costs, risks and reputation of organization. Currently innovative way to develop software is offered by model-driven architecture. This architecture uses models and transformations to generate executable code. Along with model-driven architecture there is one more approach based on mentioned methodology for developing secure systems. its called model-driven security. It uses the same principles as model-driven security but also introduces new ones like special languages for modeling security requirements, frameworks for building secure systems and means to define security policies. This paper describes current situation, presents overview of topical and perspective model-driven architecture and security developments and gives conclusions on the subject.},
      note = {Unpublished yet},
      }

List of publications as PDF