Edgar Weippl

is research director of SBA Research and Associate Professor (Privatdozent) at the TU Wien.Edgar WEIPPL

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research focuses on applied concepts of IT-security and e-learning.

Bio

After graduating with a Ph.D. from the TU Wien, Edgar worked in a research startup for two years. He then spent one year teaching as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen.

Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE), ), organizes the ARES conference and is General Chair of SACMAT 2015, PC Chair of Esorics 2015 and General Chair of ACM CCS 2016.

Publications

  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model," Information and Software Technology (Elsevier), 2014. BibTeX
    @ARTICLE{Islam2014Empirical,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
      journal = {Information and Software Technology (Elsevier)},
      year = {2014},
      month = {2},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner, "XML Security – A comparative literature review," Journal of Systems and Software, vol. 81, pp. 1715-1724, 2008. BibTeX
    @ARTICLE{Ekelhart_XMLSecurity_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
      title = {XML Security - A comparative literature review},
      journal = {Journal of Systems and Software},
      year = {2008},
      month = {1},
      abstract = {Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML Security for Mobile Computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.},
      volume = {81},
      pages = {1715-1724},
      note = {ISSN: 0164-1212},
      }

View all publications

  • Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Security tests for mobile applications – Why using TLS SSL is not enough," in 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2015. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg2015Security,
      Author = {Peter Kieseberg and Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Security tests for mobile applications - Why using TLS SSL is not enough},
      booktitle = {2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)},
      year = {2015},
      month = {4},
      pdf = {ASQT2015_cameraready_wo1stpage.pdf},
      }
  • Sebastian Neuner and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Gradually Improving the Forensic Process," in International Workshop on Cyber Crime (IWCC), 2015. BibTeX | PDF
    @INPROCEEDINGS{Neuner2015Gradually,
      Author = {Sebastian Neuner and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Gradually Improving the Forensic Process},
      booktitle = {International Workshop on Cyber Crime (IWCC)},
      year = {2015},
      month = {8},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Neuner_IWCC2015.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen, "Smart Privacy Visor: Bridging the Privacy Gap," in Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015), 2015. BibTeX
    @INPROCEEDINGS{Dabrowski2015Smart,
      Author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
      title = {Smart Privacy Visor: Bridging the Privacy Gap},
      booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
      year = {2015},
      month = {6},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Security and privacy of smartphone messaging applications," International Journal of Pervasive Computing and Communications, vol. 11, 2015. BibTeX
    @ARTICLE{Mueller2015Security,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Security and privacy of smartphone messaging applications},
      journal = {International Journal of Pervasive Computing and Communications},
      year = {2015},
      month = {6},
      volume = {11},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing," in 1st Workshop on Wearable Security and Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Glass,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
      booktitle = {1st Workshop on Wearable Security and Privacy},
      year = {2015},
      month = {1},
      pdf = {Ok Glass.pdf},
      }
  • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl, "Error-Correcting Codes as Source for Decoding Ambiguity," in LangSec Workshop at IEEE Security & Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
      Author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
      title = {Error-Correcting Codes as Source for Decoding Ambiguity},
      booktitle = {LangSec Workshop at IEEE Security & Privacy},
      year = {2015},
      month = {21},
      pdf = {ecc.pdf},
      volume = {10},
      }
  • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl, "QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes," in 2015 International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX
    @INPROCEEDINGS{Krombholz2015Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
      booktitle = {2015 International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      }
  • Damjan Buhov and Markus Huber and Georg Merzdovnik and Edgar R. Weippl and Vesna Dimitrova, "Network Security Challenges in Android Applications," in 10th International Conference on Availability, Reliability and Security (ARES 2015), 2015. BibTeX
    @INPROCEEDINGS{Buhov2015Network,
      Author = {Damjan Buhov and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl and Vesna Dimitrova},
      title = {Network Security Challenges in Android Applications},
      booktitle = {10th International Conference on Availability, Reliability and Security (ARES 2015)},
      year = {2015},
      month = {8},
      }
  • Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and Edgar R. Weippl, "The Role and Security of Firewall in IaaS Cloud Computing," in Tenth International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX
    @INPROCEEDINGS{Cropper2015Role,
      Author = {Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and {Edgar R.} Weippl},
      title = {The Role and Security of Firewall in IaaS Cloud Computing},
      booktitle = {Tenth International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      }
  • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl, "Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology," in Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015, 2015. BibTeX
    @INPROCEEDINGS{Krombholz2015Privacy,
      Author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
      title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
      booktitle = {Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015},
      year = {2015},
      month = {7},
      }
  • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner, "Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education," in USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015, 2015. BibTeX
    @INPROCEEDINGS{Dabrowski2015Leveraging,
      Author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
      title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
      booktitle = {USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
      year = {2015},
      month = {8},
      }
  • Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and Edgar R. Weippl and Andreas Holzinger, "Witnesses for the Doctor in the Loop," in 2015 International Conference on Brain Informatics & Health (BIH), 2015. BibTeX
    @INPROCEEDINGS{Kieseberg2015Witnesses,
      Author = {Peter Kieseberg and Johannes Schantl and Peter Fruehwirt and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Witnesses for the Doctor in the Loop},
      booktitle = {2015 International Conference on Brain Informatics & Health (BIH)},
      year = {2015},
      month = {9},
      }
  • Johanna Ullrich and Edgar R. Weippl, "Protection through Isolation: Virtues and Pitfalls." , 2015. BibTeX
    @INBOOK{Ullrich2015Protection,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      title = {Protection through Isolation: Virtues and Pitfalls},
      booktitle = {The Cloud Security Ecosystem},
      year = {2015},
      month = {5},
      }
  • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "On Reconnaissance with IPv6: A Pattern-Based Scanning Approach," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
      Author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Fadai2015Trust.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Mulazzani and Edgar R. Weippl, "IMSI-Catch Me If You Can: IMSI-Catcher-Catchers," in Annual Computer Security Applications Conference (ACSAC), 2014. BibTeX | PDF | Src
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
      Author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2014},
      month = {12},
      pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
      link_source = {http://sourceforge.net/p/icc/},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar R. Weippl, "Spoiled Onions: Exposing Malicious Tor Exit Relays," in The 14th Privacy Enhancing Technologies Symposium (PETS), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Winter2014Spoiled,
      Author = {Philipp Winter and Richard Koewer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and {Edgar R.} Weippl},
      title = {Spoiled Onions: Exposing Malicious Tor Exit Relays},
      booktitle = {The 14th Privacy Enhancing Technologies Symposium (PETS)},
      year = {2014},
      month = {7},
      pdf = {http://www.sba-research.org/wp-content/uploads/publications/pets2014_preprint.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/spoiled-onions},
      }
  • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations," Digital Investigation, vol. 11, pp. 336-348, 2014. BibTeX | PDF
    @ARTICLE{Fruehwirt2014Towards,
      Author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
      journal = {Digital Investigation},
      year = {2014},
      month = {0},
      pdf = {towards a forensic aware_paper.pdf},
      volume = {11},
      pages = {336-348},
      }
  • Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "Towards Fully Automated Digital Alibis with Social Interaction," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ifip119_2014_alibi,
      Author = {Stefanie Beyer and Martin Mulazzani and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {Towards Fully Automated Digital Alibis with Social Interaction},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {alibigenerator_preprint.pdf},
      link_source = {https://github.com/mmulazzani/alibiFramework},
      link_slides = {http://www.slideshare.net/SBAResearch/digitale-alibis-ifip},
      }
  • Sebastian Neuner and Victor Van der Veen and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and Edgar R. Weippl, "Enter Sandbox: Android Sandbox Comparison," in Proceedings of the IEEE Mobile Security Technologies Workshop (MoST), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Neuner2014Enter,
      Author = {Sebastian Neuner and Victor {Van der Veen} and Martina Lindorfer and Markus Huber and Georg Merzdovnik and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Enter Sandbox: Android Sandbox Comparison},
      booktitle = {Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)},
      year = {2014},
      month = {5},
      pdf = {mostAndroid.pdf},
      publisher = {IEEE},
      link_slides = {http://www.slideshare.net/SBAResearch/enter-sandbox-android-sandbox-comparison},
      }
  • Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Using Model Driven Security Approaches in Web Application Development," in AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Using,
      Author = {Christoph Hochreiner and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Using Model Driven Security Approaches in Web Application Development },
      booktitle = {AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security)},
      year = {2014},
      month = {4},
      pdf = {UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf},
      }
  • Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and Edgar R. Weippl and Andreas Holzinger, "Protecting Anonymity in Data-Driven Biomedical Science." , 2014, pp. 301-316. BibTeX | PDF
    @INBOOK{Kieseberg2014Protecting,
      Author = {Peter Kieseberg and Heidelinde Hobel and Sebastian Schrittwieser and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Protecting Anonymity in Data-Driven Biomedical Science},
      booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges},
      year = {2014},
      month = {0},
      pdf = {1v0_KIESEBERG_bookchapter.pdf},
      pages = {301--316},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code Through Compile-Time Obfuscation," Computers & Security, 2014. BibTeX
    @ARTICLE{Schrittwieser2014Covert,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Covert Computation - Hiding Code in Code Through Compile-Time Obfuscation},
      journal = {Computers & Security},
      year = {2014},
      month = {5},
      publisher = {Elsevier Advanced Technology},
      }
  • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl, "Automated Analysis of Underground Marketplaces," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Hudic2014Automated,
      Author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
      title = {Automated Analysis of Underground Marketplaces},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {undergroundmarketplaces.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and Edgar R. Weippl, "An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets – The International Journal on Networked Business, 2014. BibTeX
    @ARTICLE{Kieseberg2014algorithm,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Isao Echizen and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata},
      journal = {Electronic Markets - The International Journal on Networked Business},
      year = {2014},
      month = {0},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model," Information and Software Technology (Elsevier), 2014. BibTeX
    @ARTICLE{Islam2014Empirical,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model},
      journal = {Information and Software Technology (Elsevier)},
      year = {2014},
      month = {2},
      }
  • Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl, "InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles," in GI Sicherheit 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014InnoDB,
      Author = {Peter Fruehwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles },
      booktitle = {GI Sicherheit 2014 },
      year = {2014},
      month = {3},
      pdf = {FRUEHWIRT-InnoDB Datenbank Forensik-Rekonstruktion.pdf},
      }
  • Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and Edgar R. Weippl, "E-voting authentication with QR-codes," in 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Falkner2014Evoting,
      Author = {Stefanie Falkner and Peter Kieseberg and Dimitris Simos and Christina Traxler and {Edgar R.} Weippl},
      title = {E-voting authentication with QR-codes},
      booktitle = {2nd International Conference on Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {evoting_final_HCI_2014.pdf},
      }
  • Christian Kadluba and Martin Mulazzani and Lorenz Zechner and Sebastian Neuner and Edgar R. Weippl, "Windows Installer Security," in Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), 2014. BibTeX | PDF
    @INPROCEEDINGS{Kadluba2014Windows,
      Author = {Christian Kadluba and Martin Mulazzani and Lorenz Zechner and Sebastian Neuner and {Edgar R.} Weippl},
      title = {Windows Installer Security},
      booktitle = {Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)},
      year = {2014},
      month = {12},
      pdf = {Sebastian Neuner msiInstaller.pdf},
      }
  • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz, "A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives," in IIWAS 2014, 2014. BibTeX
    @INPROCEEDINGS{Islam2014Decision,
      Author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
      title = {A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives},
      booktitle = {IIWAS 2014},
      year = {2014},
      month = {12},
      }
  • Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications," in iiWas 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Mueller2014Whats,
      Author = {Robin Mueller and Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {What is new with whatsapp & co.? Revisiting the security of smartphone messaging applications},
      booktitle = {iiWas 2014},
      year = {2014},
      month = {12},
      pdf = {WhatsApp-iiwas-paper_cameraready.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Edgar R. Weippl, "Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs," in ASQT, 2014. BibTeX
    @INPROCEEDINGS{Fruehwirt2014Testen,
      Author = {Peter Fruehwirt and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Testen der Integrität von Datenbanken mit Hilfe von Transaction-Logs},
      booktitle = {ASQT},
      year = {2014},
      month = {9},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and Edgar R. Weippl, "AES-SEC: Improving software obfuscation through hardware-assistance," in ARES 2014, 2014. BibTeX
    @INPROCEEDINGS{Schrittwieser2014AESSEC,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Georg Merzdovnik and Peter Kieseberg and {Edgar R.} Weippl},
      title = {AES-SEC: Improving software obfuscation through hardware-assistance },
      booktitle = {ARES 2014},
      year = {2014},
      month = {9},
      }
  • Peter Fruehwirt and Sebastian Schrittwieser and Edgar R. Weippl, "Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile," in International Conference on Privacy, Security, Risk and Trust, 2014. BibTeX | PDF
    @INPROCEEDINGS{Fruehwirt2014Using,
      Author = {Peter Fruehwirt and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile},
      booktitle = {International Conference on Privacy, Security, Risk and Trust},
      year = {2014},
      month = {12},
      pdf = {using machine learning_paper.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Peter Aufner and Georg Merzdovnik and Markus Huber and Edgar R. Weippl, "Plugin in the Middle – Minimising Security Risks in Mobile Middleware Implementations," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Aufner2014Plugin,
      Author = {Peter Aufner and Georg Merzdovnik and Markus Huber and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations},
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {secperv.pdf},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Christoph Hochreiner and Markus Huber and Georg Merzdovnik and Edgar R. Weippl, "Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices," in SINCONF 2014 (Conference on Security of Information and Networks), 2014. BibTeX | PDF
    @INPROCEEDINGS{Hochreiner2014Towards,
      Author = {Christoph Hochreiner and Markus Huber and Georg Merzdovnik and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices },
      booktitle = {SINCONF 2014 (Conference on Security of Information and Networks)},
      year = {2014},
      month = {9},
      pdf = {sinconf_preprint.pdf},
      }
  • Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl, "Genie in a Model? Why Model Driven Security will not secure your Web Application," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 5, pp. 44-62, 2014. BibTeX | PDF
    @ARTICLE{Hochreiner2014Genie,
      Author = {Christoph Hochreiner and Peter Fruehwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Genie in a Model? Why Model Driven Security will not secure your Web Application},
      journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
      year = {2014},
      month = {9},
      pdf = {jowua-v5n3-4.pdf},
      volume = {5},
      pages = {44-62},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and Edgar R. Weippl, "Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting," in Web 2.0 Workshop on Security and Privacy (W2SP), 2013. BibTeX | PDF | Slides
    @INPROCEEDINGS{_Fast_and_Reliable_Browser_Iden_2013,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Web 2.0 Workshop on Security and Privacy (W2SP)},
      year = {2013},
      month = {5},
      pdf = {jsfingerprinting.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/fast-and-efficient-browser-identification-with-javascript-engine-fingerprinting},
      }
  • Christian Krieg and Edgar R. Weippl, "Malware in Hardware Infrastructure Components." Fraunhofer AISEC, 2013. BibTeX | PDF
    @INBOOK{_Malware_in_Hardware_Infrastruc_2013,
      Author = {Christian Krieg and {Edgar R.} Weippl},
      title = {Malware in Hardware Infrastructure Components},
      booktitle = {Advances in IT Early Warning},
      year = {2013},
      month = {2},
      pdf = {weippl_chapter.pdf},
      chapter = {Malware in Hardware Infrastructure Components},
      publisher = {Fraunhofer AISEC},
      note = {ISBN 978-3-8396-0474-8},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      }
  • Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting," in Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), 2013. BibTeX | PDF | Slides | Src
    @INPROCEEDINGS{ARES_SHPF_short_2013,
      Author = {Thomas Unger and Martin Mulazzani and Dominik Frühwirt and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting},
      booktitle = {Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES)},
      year = {2013},
      month = {9},
      pdf = {shpf_extendedPreprint.pdf},
      link_source = {https://github.com/mmulazzani/shpf},
      link_slides = {http://www.slideshare.net/SBAResearch/shpf-enhancing-https-session-security-with-browser-fingerprinting},
      }
  • Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and Edgar R. Weippl, "Quantifying Windows File Slack in Size and Stability," in Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2013. BibTeX | PDF | Slides | Data
    @INPROCEEDINGS{Mulazzani_Slackspace_Quantifiation_2013,
      Author = {Martin Mulazzani and Sebastian Neuner and Peter Kieseberg and Markus Huber and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Quantifying Windows File Slack in Size and Stability},
      booktitle = {Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2013},
      month = {1},
      pdf = {ifipSlack_2013_preprint.pdf},
      link_data = {http://128.130.204.91/slackspaceDataset.7z},
      link_slides = {http://www.slideshare.net/SBAResearch/quantifying-windows-file-slack-in-size-and-stability},
      }
  • Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science." , 2013. BibTeX
    @INBOOK{_Privacy_Anonymity_Pseudonymity_2013,
      Author = {Heidelinde Hobel and Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Privacy, Anonymity, Pseudonymity and Data Disclosure in Data-Driven Science},
      booktitle = {Encyclopedia of Business Analytics and Optimization},
      year = {2013},
      month = {0},
      }
  • Sebastian Schrittwieser and Martin Mulazzani and Edgar R. Weippl, "Ethics in Security Research – Which Lines Should Not Be Crossed?," in Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-ethics-2013,
      Author = {Sebastian Schrittwieser and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Ethics in Security Research - Which Lines Should Not Be Crossed?},
      booktitle = {Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013)},
      year = {2013},
      month = {5},
      pdf = {creds2013_preprint.pdf},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Appinspect: large-scale evaluation of social networking apps," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 143-154. BibTeX | PDF | Slides
    @INPROCEEDINGS{huber2013appinspect,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Appinspect: large-scale evaluation of social networking apps},
      booktitle = {Proceedings of the first ACM conference on Online social networks},
      year = {2013},
      month = {10},
      pdf = {AppInspect_peprint.pdf},
      pages = {143--154},
      publisher = {ACM},
      link_slides = {http://cosn.acm.org/2013/files/Session6/Session6Paper1.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs," Information Security Technical Report (ISTR), Special Issue: ARES, 2013. BibTeX | PDF
    @ARTICLE{_InnoDB_Database_Forensics_Enha_2013,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Enhanced Reconstruction of Data Manipulation Queries from Redo Logs},
      journal = {Information Security Technical Report (ISTR), Special Issue: ARES},
      year = {2013},
      month = {4},
      pdf = {ARES2012_Journal.pdf},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "Security Engineering for Cloud Computing: Approaches and Tools." Information Science Reference, 2013, pp. 98-123. BibTeX
    @INBOOK{_Security_Engineering_for_Cloud_2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {Security Engineering for Cloud Computing: Approaches and Tools},
      year = {2013},
      month = {8},
      chapter = {A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud- Based System},
      pages = {98--123},
      publisher = {Information Science Reference},
      }
  • Sebastian Schrittwieser and Martin Mulazzani and Edgar R. Weippl and Sandra Panhans, "Ethik in der Sicherheitsforschung," in DACH Security 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Ethik_in_der_Sicherheitsforsch_2013,
      Author = {Sebastian Schrittwieser and Martin Mulazzani and {Edgar R.} Weippl and Sandra Panhans},
      title = {Ethik in der Sicherheitsforschung},
      booktitle = {DACH Security 2013},
      year = {2013},
      month = {9},
      pdf = {DACH-Camera Ready.pdf},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pages = {28--35},
      publisher = {ACM},
      }
  • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl, "Towards Security-Enhanced and Privacy-Preserving Mashup Compositions," in Security and Privacy Protection in Information Processing Systems, 2013, pp. 286-299. BibTeX
    @INPROCEEDINGS{hobel2013towards,
      Author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
      title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions},
      booktitle = {Security and Privacy Protection in Information Processing Systems},
      year = {2013},
      month = {7},
      pages = {286--299},
      publisher = {Springer},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model," Proceedings of the Winter Simulation Conference 2013, 2013. BibTeX
    @ARTICLE{Islam_An_Empirical_Study_on_the_Impl_2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {An Empirical Study on the Implementation and Evaluation of a Goal driven Software Development Risk Management Model},
      journal = {Proceedings of the Winter Simulation Conference 2013},
      year = {2013},
      month = {0},
      }
  • Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl, "Covert Computation – Hiding Code in Code for Obfuscation Purposes," in Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013), 2013. BibTeX | PDF
    @INPROCEEDINGS{schrittwieser-covertcomputation-2013,
      Author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Covert Computation - Hiding Code in Code for Obfuscation Purposes},
      booktitle = {Proceedings of the 8th International Symposium on ACM Symposium on Information , Computer and Communications Security (ASIACCS 2013)},
      year = {2013},
      month = {5},
      pdf = {p529-schrittwieser.pdf},
      }
  • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu, "Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013," in Lecture Notes in Computer Science, 2013. BibTeX
    @INPROCEEDINGS{Cuzzocrea2013Availability,
      Author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
      title = {Availability, Reliability, and Security in Information Systems and HCI, IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013},
      booktitle = {Lecture Notes in Computer Science},
      year = {2013},
      month = {0},
      }
  • Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl, "A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System," in Security Engineering for Cloud Computing: Approaches and Tools, 2013. BibTeX
    @INPROCEEDINGS{Islam_A_Goal_Driven_Risk_Management__2013,
      Author = {Shareeful Islam and Haralambos Mouratidis and {Edgar R.} Weippl},
      title = {A Goal Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud Based System},
      booktitle = {Security Engineering for Cloud Computing: Approaches and Tools},
      year = {2013},
      month = {0},
      }
  • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen, "Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing," in Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013), 2013. BibTeX
    @INPROCEEDINGS{Dabrowski2013Framework,
      Author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
      title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
      booktitle = {Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)},
      year = {2013},
      month = {10},
      }
  • Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and Edgar R. Weippl, "Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.," in SEC, 2013, pp. 286-299. BibTeX
    @INPROCEEDINGS{hobel2013a,
      Author = {Heidelinde Hobel and Johannes Heurix and Amin Anjomshoaa and {Edgar R.} Weippl},
      title = {Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.},
      booktitle = {SEC},
      year = {2013},
      month = {0},
      volume = {405},
      pages = {286-299},
      publisher = {Springer},
      note = {The original publication is available at www.springerlink.com},
      }
  • A. Cuzzocrea and C. Kittl and Dimitris Simos and Edgar R. Weippl and L. Xu, "Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD," in Lecture Notes in Computer Science, 2013. BibTeX
    @INPROCEEDINGS{Cuzzocrea2013Security,
      Author = {A. Cuzzocrea and C. Kittl and Dimitris Simos and {Edgar R.} Weippl and L. Xu},
      title = {Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops: MoCrySEn and SeCIHD},
      booktitle = {Lecture Notes in Computer Science},
      year = {2013},
      month = {0},
      }
  • Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and Edgar R. Weippl, "Towards a Unified Penetration Testing Taxonomy," in International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012), 2012. BibTeX
    @INPROCEEDINGS{_Towards_a_Unified_Penetration__2012,
      Author = {Aleksandar Hudic and Shareeful Islam and Lorenz Zechner and Christian Krieg and Severin Winkler and Richard Hable and {Edgar R.} Weippl},
      title = {Towards a Unified Penetration Testing Taxonomy},
      booktitle = {International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012)},
      year = {2012},
      month = {9},
      }
  • Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in The Fifth International Workshop on Digital Forensics (WSDF), 2012. BibTeX | PDF
    @INPROCEEDINGS{_InnoDB_Database_Forensics_Reco_2012,
      Author = {Peter Fruehwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs},
      booktitle = {The Fifth International Workshop on Digital Forensics (WSDF)},
      year = {2012},
      month = {8},
      pdf = {WSDF2012_InnoDB.pdf},
      }
  • Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and Edgar R. Weippl, "Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting," 2012. BibTeX | PDF
    @TECHREPORT{_Fast_and_Efficient_Browser_Ide_2012,
      Author = {Martin Mulazzani and Philipp Reschl and Markus Huber and Manuel Leithner and {Edgar R.} Weippl},
      title = {Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting},
      booktitle = {Technical Report TR-SBA-Research-0512-01},
      year = {2012},
      month = {5},
      pdf = {jsfingerprinting_Tech_Report.pdf},
      }
  • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl, "Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model," Journal of Service Science Research, 2012. BibTeX | PDF
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
      Author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
      title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
      journal = {Journal of Service Science Research},
      year = {2012},
      month = {12},
      pdf = {krombholzetal2012.pdf},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Social Network Forensics: Tapping the Data Pool of Social Networks," in Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2012. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Social_Network_Forensics_2012,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Social Network Forensics: Tapping the Data Pool of Social Networks},
      booktitle = {Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2012},
      month = {1},
      pdf = {socialForensics_preprint.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications," in Network and Distributed System Security Symposium (NDSS 2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Schrittwieser_Guess_Who_s_Texting_You_Evalua_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications},
      booktitle = {Network and Distributed System Security Symposium (NDSS 2012)},
      year = {2012},
      month = {2},
      pdf = {ndss2012_final.pdf},
      }
  • Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and Edgar R. Weippl, "Secure Software in der Cloud," in Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz, 2012. BibTeX
    @INPROCEEDINGS{Schrittwieser_Secure_Software_in_der_Cloud_2012,
      Author = {Sebastian Schrittwieser and Peter Fruehwirt and Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Markus Huber and Gilbert Wondracek and Sylvi Rennert and {Edgar R.} Weippl},
      title = {Secure Software in der Cloud},
      booktitle = {Tagungsband Cloud und Klein: IT im Spannungsfeld zwischen Servercluster und Sensornetz},
      year = {2012},
      month = {4},
      }
  • Edgar R. Weippl, "Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk," 2012. BibTeX
    @TECHREPORT{_Book_Review_Enterprise_Securit_2012,
      Author = {{Edgar R.} Weippl},
      title = {Book Review: Enterprise Security for the Executive by Jennifer L. Bayuk },
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Lorenz Zechner and Peter Kieseberg and Edgar R. Weippl, "INMOTOS: Extending the ROPE-methodology," in 14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{Zechner2012INMOTOS,
      Author = {Lorenz Zechner and Peter Kieseberg and {Edgar R.} Weippl},
      title = {INMOTOS: Extending the ROPE-methodology},
      booktitle = {14th International Conference on Information Integration and Web-based Applications and Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {p272zechner.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Edgar R. Weippl, "Digital Forensics for Enterprise Rights Management," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2012), 2012. BibTeX | PDF
    @INPROCEEDINGS{_Digital_Forensics_for_Enterpri_2012,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and {Edgar R.} Weippl},
      title = {Digital Forensics for Enterprise Rights Management},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2012)},
      year = {2012},
      month = {12},
      pdf = {16_schrittwieser.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl and Lindsay Munroe and Mayank Sinha, "Malicious Pixels Using QR Codes as Attack Vector," in Trustworthy Ubiquitous Computing, 2012, pp. 21-38. BibTeX
    @INPROCEEDINGS{_Malicious_Pixels_Using_QR_Code_2012,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Manuel Leithner and Martin Mulazzani and {Edgar R.} Weippl and Lindsay Munroe and Mayank Sinha},
      title = {Malicious Pixels Using QR Codes as Attack Vector},
      booktitle = {Trustworthy Ubiquitous Computing},
      year = {2012},
      month = {9},
      pages = {21-38},
      }
  • Aleksandar Hudic and Edgar R. Weippl, "Book Review: Private Cloud Computing: Consolidation, Virtualization, and Service Oriented Infrastructure by Stephen R Smoot, Nam K Tan," 2012. BibTeX
    @TECHREPORT{_Book_Review_Private_Cloud_Comp_2012,
      Author = {Aleksandar Hudic and {Edgar R.} Weippl},
      title = {Book Review: Private Cloud Computing: Consolidation, Virtualization, and Service Oriented Infrastructure by Stephen R Smoot, Nam K Tan},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Xbox360 Forensics by Steven Bolt," 2012. BibTeX
    @TECHREPORT{_Book_Review_Xbox360_Forensics__2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Xbox360 Forensics by Steven Bolt},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      note = {Not Peer Reviewed},
      }
  • Manuel Leithner and Edgar R. Weippl, "Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen," 2012. BibTeX
    @TECHREPORT{_Book_Review_Thor_s_Microsoft_S_2012,
      Author = {Manuel Leithner and {Edgar R.} Weippl},
      title = {Book Review: Thors Microsoft Security Bible by Timothy Thor Mullen},
      booktitle = {Computers & Security},
      year = {2012},
      month = {5},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases," in International Conference on Information Integration and Web-based Applications & Services (iiWAS2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Using_the_Structure_of_B_Trees_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Lorcan Morgan and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Using the Structure of B plus Trees for Enhancing Logging Mechanisms of Databases},
      booktitle = {International Conference on Information Integration and Web-based Applications & Services (iiWAS2011)},
      year = {2011},
      month = {12},
      pdf = {iiWAS2011_133_Short_Kieseberg.pdf},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space," in USENIX Security, 2011. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Dark_Clouds_on_the_Horizon_Usi_2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space},
      booktitle = {USENIX Security},
      year = {2011},
      month = {8},
      pdf = {dropboxUSENIX2011.pdf},
      }
  • Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and Edgar R. Weippl, "An Algorithm for k-anonymity-based Fingerprinting," in International Workshop on Digital-forensics and Watermarking (IWDW 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{_An_Algorithm_for_k_anonymity_b_2011,
      Author = {Sebastian Schrittwieser and Peter Kieseberg and Isao Echizen and Sven Wohlgemuth and Noboru Sonehara and {Edgar R.} Weippl},
      title = {An Algorithm for k-anonymity-based Fingerprinting},
      booktitle = {International Workshop on Digital-forensics and Watermarking (IWDW 2011)},
      year = {2011},
      month = {10},
      pdf = {k_anonymity_algorithm_2011.pdf},
      }
  • Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl, "Social Snapshots: Digital Forensics for Online Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2011. BibTeX | PDF
    @INPROCEEDINGS{_Social_Snapshots_Digital_Foren_2011,
      Author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and {Edgar R.} Weippl},
      title = {Social Snapshots: Digital Forensics for Online Social Networks},
      booktitle = {Annual Computer Security Applications Conference (ACSAC)},
      year = {2011},
      month = {12},
      pdf = {social_snapshots_preprint.pdf},
      }
  • Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Trees Cannot Lie: Using Data Structures for Forensics Purposes," in European Intelligence and Security Informatics Conference (EISIC 2011), 2011. BibTeX | PDF
    @INPROCEEDINGS{Kieseberg_Trees_Cannot_Lie_Using_Data_St_2011,
      Author = {Peter Kieseberg and Sebastian Schrittwieser and Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Trees Cannot Lie: Using Data Structures for Forensics Purposes},
      booktitle = {European Intelligence and Security Informatics Conference (EISIC 2011)},
      year = {2011},
      month = {9},
      pdf = {btree_forensics_camera_ready.pdf},
      }
  • Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam," IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 2011. BibTeX | PDF
    @ARTICLE{Huber_Friend_in_the_middle_Attacks_E_2011,
      Author = {Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam},
      journal = {IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks},
      year = {2011},
      month = {5},
      pdf = {FITM_InternetComputing_preprint.pdf},
      note = {Pre Print},
      }
  • Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and Edgar R. Weippl, "Cloud Speicherdienste als Angriffsvektoren," in 9th Information Security Konferenz in Krems, 2011. BibTeX | PDF
    @INPROCEEDINGS{DropboxKrems2011,
      Author = {Martin Mulazzani and Sebastian Schrittwieser and Manuel Leithner and Markus Huber and {Edgar R.} Weippl},
      title = {Cloud Speicherdienste als Angriffsvektoren},
      booktitle = {9th Information Security Konferenz in Krems},
      year = {2011},
      month = {10},
      pdf = {DunkleWolken.pdf},
      }
  • Muhammad Asfand e yar and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa, "Exploiting Ontology for Software License Agreements," International Journal of Software and Informatics (IJSI), vol. 4, iss. 1, pp. 1-12, 2010. BibTeX
    @ARTICLE{Asfand-e-yar_Exploiting_Ontology_for_Softwa_2010,
      Author = {Muhammad Asfand e yar and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {Exploiting Ontology for Software License Agreements},
      journal = {International Journal of Software and Informatics (IJSI)},
      year = {2010},
      month = {3},
      volume = {4},
      number = {1},
      pages = {1--12},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and A Min Tjoa and Edgar R. Weippl, "Self-Monitoring in Social Networks," Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS), 2010. BibTeX
    @ARTICLE{Anjomshoaa_Self_Monitoring_in_Social_Netw_2010,
      Author = {Amin Anjomshoaa and Khue Vo Sao and Amirreza Tahamtan and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Self-Monitoring in Social Networks},
      journal = {Special issue for the International Journal of Intelligent Information and Database Systems (IJIIDS)},
      year = {2010},
      month = {0},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • Amirreza Tahamtan and Amin Anjomshoaa and Edgar R. Weippl and A Min Tjoa, "A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects," in Proc. of 4th International Conference on Knowledge Science, Engineering & Management (KSEM’10), 2010. BibTeX
    @INPROCEEDINGS{Tahamtan_A_SOM_Based_Technique_for_a_Us_2010,
      Author = {Amirreza Tahamtan and Amin Anjomshoaa and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects},
      booktitle = {Proc. of 4th International Conference on Knowledge Science, Engineering & Management (KSEM'10)},
      year = {2010},
      month = {9},
      note = {According to Aminwithin Reporting Timeframe},
      }
  • C. Frühwirth and Stefan Biffl and Mohammad Tabatabai Irani and Edgar R. Weippl, "Addressing misalignment between information security metrics and business-driven security objectives," in Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec), 2010. BibTeX | PDF
    @INPROCEEDINGS{_Addressing_misalignment_betwee_2010,
      Author = {C. Frühwirth and Stefan Biffl and Mohammad {Tabatabai Irani} and {Edgar R.} Weippl},
      title = {Addressing misalignment between information security metrics and business-driven security objectives},
      booktitle = {Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec)},
      year = {2010},
      month = {9},
      pdf = {a6-fruehwirth.pdf},
      acm = {399966},
      }
  • Nicolas Racz and Edgar R. Weippl and Andreas Seufert, "A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)," in Proceedings of IFIP CMS 2010, 2010. BibTeX
    @INPROCEEDINGS{weippl_bzze_2010_CMS_Racz,
      Author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
      title = {A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {3},
      publisher = {Springer LNCS},
      }
  • Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad Tabatabai Irani and Dindin Wahyudin and Edgar R. Weippl and Dietmar Winkler, "An event-based empirical process analysis framework," in Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2010. BibTeX | PDF
    @INPROCEEDINGS{_An_event_based_empirical_proce_2010,
      Author = {Wikan Danar Sunindyo and Stefan Biffl and R. Mordinyi and Thomas Moser and Alexander Schatten and Mohammad {Tabatabai Irani} and Dindin Wahyudin and {Edgar R.} Weippl and Dietmar Winkler},
      title = {An event-based empirical process analysis framework},
      booktitle = {Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)},
      year = {2010},
      month = {9},
      pdf = {a65-sunindyo.pdf},
      acm = {397838},
      }
  • Edgar R. Weippl, "Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction." Information Science Reference, IGI Global, 2010, pp. 272-279. BibTeX | PDF
    @INBOOK{Weippl_SecurityinDataWarehouses_2010,
      Author = {{Edgar R.} Weippl},
      title = {Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction},
      year = {2010},
      month = {1},
      pdf = {weippl_arh_securityDWH.pdf},
      chapter = {Security in Data Warehouses},
      pages = {272--279},
      publisher = {Information Science Reference, IGI Global},
      }
  • Farman Ali Khan and Sabine Graf and Edgar R. Weippl and A Min Tjoa, "Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments," in Proceedings of ED-MEDIA, 2010. BibTeX
    @INPROCEEDINGS{weippl_bzzh_2010_LearningStyles_EDMEDIA,
      Author = {Farman Ali Khan and Sabine Graf and {Edgar R.} Weippl and {A Min} Tjoa},
      title = {Role of Learning Styles and Affective States in Web-based Adaptive Learning Environments},
      booktitle = {Proceedings of ED-MEDIA},
      year = {2010},
      month = {9},
      publisher = {AACE},
      }
  • Nicolas Racz and Edgar R. Weippl and Andreas Seufert, "A process model for integrated IT governance, risk, and compliance management," in Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010), 2010. BibTeX
    @INPROCEEDINGS{weippl_bzzf_2010_Racz,
      Author = {Nicolas Racz and {Edgar R.} Weippl and Andreas Seufert},
      title = {A process model for integrated IT governance, risk, and compliance management},
      booktitle = {Proceedings of the Ninth Conference on Databases and Information Systems (DB IS 2010)},
      year = {2010},
      month = {7},
      publisher = {Springer LNCS},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Tor HTTP usage and information leakage," in Proceedings of IFIP CMS 2010, 2010, pp. 245-255. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_Tor_HTTP_usage_and_information_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Tor HTTP usage and information leakage},
      booktitle = {Proceedings of IFIP CMS 2010},
      year = {2010},
      month = {5},
      pdf = {2010 - Huber - Tor HTTP Usage.pdf},
      pages = {245-255},
      }
  • Nicolas Racz and Andreas Seufert and Edgar R. Weippl, "Questioning the need for separate IT risk management frameworks," in Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, 2010, pp. 245-252. BibTeX
    @INPROCEEDINGS{Weippl_Questioning_the_need_for_separ_2010,
      Author = {Nicolas Racz and Andreas Seufert and {Edgar R.} Weippl},
      title = {Questioning the need for separate IT risk management frameworks},
      booktitle = {Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme },
      year = {2010},
      month = {9},
      abstract = {The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant},
      pages = {245-252},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "InnoDB Database Forensics," in Proceedings of the 24th International Conference on Advanced Information Networking and Applications, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_InnoDB_Database_Forensics_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {InnoDB Database Forensics},
      booktitle = {Proceedings of the 24th International Conference on Advanced Information Networking and Applications},
      year = {2010},
      month = {4},
      pdf = {AINA2010-InnoDBforensics_preprint.pdf},
      }
  • Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and Edgar R. Weippl, "Friend-in-the-middle Attacks," 2010. BibTeX | PDF
    @TECHREPORT{Huber2010Friendin-the-middle,
      Author = {Markus Huber and Martin Mulazzani and Gerhard Kitzler and Sigrun Goluch and {Edgar R.} Weippl},
      title = {Friend-in-the-middle Attacks},
      booktitle = {Technical Report},
      year = {2010},
      month = {1},
      pdf = {FITM_TR-SBA-Research-0710-01.pdf},
      }
  • Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and Edgar R. Weippl, "QR Code Security," in Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010), 2010. BibTeX | PDF
    @INPROCEEDINGS{twuc_2010,
      Author = {Peter Kieseberg and Manuel Leithner and Martin Mulazzani and Lindsay Munroe and Sebastian Schrittwieser and Mayank Sinha and {Edgar R.} Weippl},
      title = {QR Code Security},
      booktitle = {Fourth International Workshop on Trustworthy Ubiquitous Computing (TwUC 2010)},
      year = {2010},
      month = {11},
      pdf = {QR Code Security.pdf},
      }
  • Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl, "Cheap and Automated Socio-Technical Attacks based on Social Networking Sites," in 3rd Workshop on Artificial Intelligence and Security AISec 10, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Cheap_and_Automated_Socio_Tech_2010,
      Author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Cheap and Automated Socio-Technical Attacks based on Social Networking Sites},
      booktitle = {3rd Workshop on Artificial Intelligence and Security AISec 10},
      year = {2010},
      month = {10},
      pdf = {p61huber.pdf},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Social Networking Sites Security Quo Vadis," in Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing, 2010. BibTeX
    @INPROCEEDINGS{Huber_Social_Networking_Sites_Securi_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Social Networking Sites Security Quo Vadis},
      booktitle = {Proceedings of the 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing},
      year = {2010},
      month = {8},
      }
  • C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform," in 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Fruehwirth_Research_Challenges_in_the_Sec_2010,
      Author = {C. Frühwirth and Stefan Biffl and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010},
      year = {2010},
      month = {9},
      }
  • Thomas Neubauer and Johannes Heurix and A Min Tjoa and Edgar R. Weippl, "Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten," Elektrotechnik und Informationstechnik, vol. 127, iss. 5, pp. 135-142, 2010. BibTeX
    @ARTICLE{Neubauer_Pseudonymisierung_f_r_die_date_2010,
      Author = {Thomas Neubauer and Johannes Heurix and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten},
      journal = {Elektrotechnik und Informationstechnik},
      year = {2010},
      month = {5},
      volume = {127},
      number = {5},
      pages = {135-142},
      }
  • Peter Fruehwirt and Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Sicherheit in sozialen Netzwerken: Quo Vadis," in 8th Information Security Konferenz in Krems, 2010. BibTeX
    @INPROCEEDINGS{Fruewirt_Sicherheit_in_sozialen_Netzwer_2010,
      Author = {Peter Fruehwirt and Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Sicherheit in sozialen Netzwerken: Quo Vadis},
      booktitle = {8th Information Security Konferenz in Krems},
      year = {2010},
      month = {11},
      }
  • Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and Edgar R. Weippl, "Defect Detection Using Event-Based Process Analysis in Software Engineering Projects," in 36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010, 2010. BibTeX
    @INPROCEEDINGS{Sunindyo_Defect_Detection_Using_Event_B_2010,
      Author = {Wikan Danar Sunindyo and Stefan Biffl and C. Frühwirth and R. Mordinyi and Thomas Moser and Alexander Schatten and Sebastian Schrittwieser and {Edgar R.} Weippl},
      title = {Defect Detection Using Event-Based Process Analysis in Software Engineering Projects},
      booktitle = {36th Euromicro Conference Software Engineering and Advanced Applications SEAA 2010},
      year = {2010},
      month = {9},
      }
  • Markus Huber and Martin Mulazzani and Edgar R. Weippl, "Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites," in Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy, 2010. BibTeX | PDF
    @INPROCEEDINGS{Huber_Who_On_Earth_Is_Mr_Cypher_Auto_2010,
      Author = {Markus Huber and Martin Mulazzani and {Edgar R.} Weippl},
      title = {Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites},
      booktitle = {Proceedings of the IFIP International Information Security Conference 2010: Security and Privacy},
      year = {2010},
      month = {9},
      pdf = {sec2010-friendInjection_preprint.pdf},
      }
  • Martin Mulazzani and Markus Huber and Edgar R. Weippl, "Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 539-546, 2010. BibTeX | PDF
    @ARTICLE{Mulazzani_Anonymity_and_Monitoring_How_t_2010,
      Author = {Martin Mulazzani and Markus Huber and {Edgar R.} Weippl},
      title = {Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews},
      year = {2010},
      month = {9},
      pdf = {IEEE_SMC_Tor_finalPreprint.pdf},
      pages = {539-546},
      }
  • Martin Mulazzani and Edgar R. Weippl, "Aktuelle Herausforderungen in der Datenbankforensik," in 7th Information Security Konferenz in Krems, 2009. BibTeX | PDF
    @INPROCEEDINGS{Mulazzani_AktuelleHerausforderungenin_2009,
      Author = {Martin Mulazzani and {Edgar R.} Weippl},
      title = {Aktuelle Herausforderungen in der Datenbankforensik},
      booktitle = {7th Information Security Konferenz in Krems},
      year = {2009},
      month = {1},
      pdf = {Mulazzani_AktuelleHerausforderungenin_2009.pdf},
      publisher = {OCG Austrian Computer Society, Krems},
      }
  • Peter Kalchgruber and Edgar R. Weippl, "Can end-to-end verifiable e-voting be explained easily?," in Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS), 2009. BibTeX | PDF
    @INPROCEEDINGS{_Can_end_to_end_verifiable_e_vo_2009,
      Author = {Peter Kalchgruber and {Edgar R.} Weippl},
      title = {Can end-to-end verifiable e-voting be explained easily?},
      booktitle = {Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS)},
      year = {2009},
      month = {12},
      pdf = {p572-kalchgruber.pdf},
      acm = {351868},
      }
  • A Min Tjoa and Edgar R. Weippl and Farman Ali Khan and Sabine Graf, "An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System," in Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), 2009. BibTeX | PDF
    @INPROCEEDINGS{Khan_Identifying_and_Incorporating__2010,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and Farman Ali Khan and Sabine Graf},
      title = {An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System},
      booktitle = {Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009)},
      year = {2009},
      month = {12},
      abstract = {Learning styles and affective states influence students learning. The purpose of this study is to develop a conceptual framework for identifying and integrating learning styles and affective states of a learner into web-based learning management systems and therefore provide learners with adaptive courses and additional individualized pedagogical guidance that is tailored to their learning styles and affective states. The study was carried out in three phases, the first of which was the investigation and determination of learning styles and affective states which are important for learning. Phase two consisted of the development of an approach for the identification of learning styles and affective states as well as the development of a mechanism to calculate them from the students learning interactions within web-based learning management systems. The third phase was to develop a learning strategy that is more personalized and adaptive in nature and tailored to learners needs and current situation through considering learners learning styles and affective states, aiming to lead to better learning outcomes and progress},
      pdf = {p431-khan.pdf},
      acm = {351733},
      }
  • Edgar R. Weippl and Benjamin Böck, "The Handbook of Technology Management." Wiley and Sons, 2009. BibTeX
    @INBOOK{Bock_acceptedforpublicationSocialEngineering_2009,
      Author = {{Edgar R.} Weippl and Benjamin Böck},
      title = {The Handbook of Technology Management},
      year = {2009},
      month = {1},
      chapter = {accepted for publication: Social Engineering},
      publisher = {Wiley and Sons},
      }
  • Edgar R. Weippl and Mohammad Tabatabai Irani, "Automation Of Post-Exploitation," in Proceedings of International Conference on Security Technology (SecTech 2009), 2009. BibTeX | PDF
    @INPROCEEDINGS{TabatabaiIrani_AutomationOfPostExploitation_2009,
      Author = {{Edgar R.} Weippl and Mohammad {Tabatabai Irani}},
      title = {Automation Of Post-Exploitation},
      booktitle = {Proceedings of International Conference on Security Technology (SecTech 2009)},
      year = {2009},
      month = {1},
      pdf = {TabatabaiIrani_AutomationOfPostExploitation_2009.pdf},
      publisher = {Springer LNCS},
      }
  • Stefan Fenz and Andreas Ekelhart and Edgar R. Weippl, "Semantic Potential of existing Security Advisory Standards," in Proceedings of the FIRST2008 Conference, 2008. BibTeX | PDF
    @INPROCEEDINGS{Fenz_SemanticPotentialof_2008,
      Author = {Stefan Fenz and Andreas Ekelhart and {Edgar R.} Weippl},
      title = {Semantic Potential of existing Security Advisory Standards},
      booktitle = {Proceedings of the FIRST2008 Conference},
      year = {2008},
      month = {1},
      pdf = {2008 - Fenz - Semantic Potential of Existing Security Advisory Standards.pdf},
      }
  • Edgar R. Weippl, "Cyber Attacks and the article 5 of the Treaty of NATO," Euro Atlantic Quarterly, p. 22, 2008. BibTeX
    @ARTICLE{weippl_gca,
      Author = {{Edgar R.} Weippl},
      title = {Cyber Attacks and the article 5 of the Treaty of NATO},
      journal = {Euro Atlantic Quarterly},
      year = {2008},
      month = {1},
      pages = {22},
      note = {ISSN 1336-8761},
      }
  • Edgar R. Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek, "OCG IT-Security Zertifikat fuer Nutzer," in IRIS 2008, 2008. BibTeX
    @INPROCEEDINGS{Benditsch_OCGITSecurityZertifikat_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek},
      title = {OCG IT-Security Zertifikat fuer Nutzer},
      booktitle = {IRIS 2008},
      year = {2008},
      month = {1},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart, "Fortification of IT security by automatic security advisory processing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, AINA2008, 2008, pp. 575-582. BibTeX
    @INPROCEEDINGS{Fenz_FortificationofIT_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart},
      title = {Fortification of IT security by automatic security advisory processing},
      booktitle = {Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, AINA2008},
      year = {2008},
      month = {3},
      abstract = {The past years have seen the rapid increase of security related incidents in the field of information technology. IT infrastructures in the commercial as well as in the governmental sector are becoming evermore heterogeneous which increases the complexity of handling and maintaining an adequate security level. Especially organizations which are hosting and processing highly sensitive data are obligated to establish a holistic company-wide security approach. We propose a novel security concept to reduce this complexity by automatic assessment of security advisories. A central entity collects vulnerability information from various sources, converts it into a standardized and machine-readable format and distributes it to its subscribers. The subscribers are then able to automatically map the vulnerability information to the ontological stored infrastructure data to visualize newly-discovered software vulnerabilities. The automatic analysis of vulnerabilities decreases response times and permits precise response to new threats and vulnerabilities, thus decreasing the administration complexity and increasing the IT security level.},
      pages = {575-582},
      publisher = {IEEE Computer Society},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner, "XML Security – A comparative literature review," Journal of Systems and Software, vol. 81, pp. 1715-1724, 2008. BibTeX
    @ARTICLE{Ekelhart_XMLSecurity_2008,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Markus Steinkellner},
      title = {XML Security - A comparative literature review},
      journal = {Journal of Systems and Software},
      year = {2008},
      month = {1},
      abstract = {Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML Security for Mobile Computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.},
      volume = {81},
      pages = {1715-1724},
      note = {ISSN: 0164-1212},
      }
  • Edgar R. Weippl and Markus Klemen and Stefan Raffeiner, "The Semantic Web for Knowledge and Data Management: Technologies and Practices." Idea Group, 2008, pp. 38-48. BibTeX
    @INBOOK{Weippl_ImprovingStorageConceptsforSemanticModelsandOntologies_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Stefan Raffeiner},
      title = {The Semantic Web for Knowledge and Data Management: Technologies and Practices},
      year = {2008},
      month = {1},
      chapter = {Improving Storage Concepts for Semantic Models and Ontologies},
      pages = {38--48},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Simon Tjoa and Stefan Jakoubi, ARES Conference Proceedings, IEEE, 2008. BibTeX
    @BOOK{Tjoa_ARESConferenceProceedings_2008,
      Author = {{Edgar R.} Weippl and Simon Tjoa and Stefan Jakoubi},
      title = {ARES Conference Proceedings},
      year = {2008},
      month = {1},
      publisher = {IEEE},
      }
  • Edgar R. Weippl, "Encyclopedia of Data Warehousing and Mining." Idea Group, 2008. BibTeX
    @INBOOK{Weippl_DatabaseSecurityandStatisticalDatabaseSecurity_2008,
      Author = {{Edgar R.} Weippl},
      title = {Encyclopedia of Data Warehousing and Mining},
      year = {2008},
      month = {1},
      chapter = {Database Security and Statistical Database Security},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl, "Handbook of Research on Information Security and Assurance." Idea Group, 2008. BibTeX
    @INBOOK{Weippl_SecurityAwarenessVirtualEnvironmentsandELearning_2008,
      Author = {{Edgar R.} Weippl},
      title = {Handbook of Research on Information Security and Assurance},
      year = {2008},
      month = {1},
      chapter = {Security Awareness: Virtual Environments and E-Learning},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Bernhard Riedl, "Handbook of Research on Mobile Multimedia, Second Edition." Information Science Reference, 2008, p. IX. BibTeX
    @INBOOK{Weippl_SecurityTrustandPrivacyonMobileDevicesandMultimediaApplications_2008,
      Author = {{Edgar R.} Weippl and Bernhard Riedl},
      title = {Handbook of Research on Mobile Multimedia, Second Edition},
      year = {2008},
      month = {1},
      chapter = {Security, Trust and Privacy on Mobile Devices and Multimedia Applications},
      pages = {Chapter IX},
      publisher = {Information Science Reference},
      note = {ISBN: 978-1-60566-046-2},
      }
  • Edgar R. Weippl and Joe Luca, ED-MEDIA Conference Proceedings, AACE, 2008. BibTeX
    @BOOK{Weippl_EDMEDIAConferenceProceedings_2008,
      Author = {{Edgar R.} Weippl and Joe Luca},
      title = {ED-MEDIA Conference Proceedings},
      year = {2008},
      month = {1},
      publisher = {AACE},
      }
  • Edgar R. Weippl and Martin Ebner, "Security Privacy Challenges in E-Learning 2.0," in E-Learn 2008, 2008. BibTeX
    @INPROCEEDINGS{Weippl_SecurityPrivacyChallenges_2008,
      Author = {{Edgar R.} Weippl and Martin Ebner},
      title = {Security Privacy Challenges in E-Learning 2.0},
      booktitle = {E-Learn 2008},
      year = {2008},
      month = {1},
      }
  • Edgar R. Weippl, "Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions." IGI Global, 2008. BibTeX
    @INBOOK{Weippl__2008,
      Author = {{Edgar R.} Weippl},
      title = {Preface to Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions},
      year = {2008},
      month = {1},
      publisher = {IGI Global},
      }
  • Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and Edgar R. Weippl, "Architectural approach for handling semi-structured data in a user-centered working environment," International Journal of Web Information Systems, vol. 3, pp. 198-211, 2007. BibTeX | PDF
    @ARTICLE{Ekelhart_Architecturalapproachhandling_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and {Edgar R.} Weippl},
      title = {Architectural approach for handling semi-structured data in a user-centered working environment},
      journal = {International Journal of Web Information Systems},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Architectural Approach for Handling Semi-Structured Data in a User-Centered Working Environment.pdf},
      volume = {3},
      pages = {198--211},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch, "Ontological Mapping of Common Criterias Security Assurance Requirements," in New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007, May 14-16, 2007, pp. 85-95. BibTeX
    @INPROCEEDINGS{Ekelhart_OntologicalMappingof_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch},
      title = {Ontological Mapping of Common Criterias Security Assurance Requirements},
      booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007, May 14-16},
      year = {2007},
      month = {5},
      abstract = {The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data security and data privacy. Due to the very complex and time-consuming certification process a lot of companies abstain from a CC certification. We created the CC Ontology tool, which is based on an ontological representation of the CC catalog, to support the evaluator at the certification process. Tasks such as the planning of an evaluation process, the review of relevant documents or the creating of reports are supported by the CC Ontology tool. With the development of this tool we reduce the time and costs needed to complete a certification.},
      volume = {232_2007},
      pages = {85-95},
      publisher = {International Federation for Information Processing ,},
      note = {978-0-387-72366-2},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontologies: Improving Quantitative Risk Analysis," in Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007, 2007, pp. 156-162. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologiesImproving_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontologies: Improving Quantitative Risk Analysis},
      booktitle = {Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Security Ontologies Improving Quantitative Risk Analysis.pdf},
      pages = {156--162},
      publisher = {IEEE Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and Thomas Neubauer and Edgar R. Weippl, "Formal threat descriptions for enhancing governmental risk assessment," in Proceedings of the First International Conference on Theory and Practice of Electronic Governance, 2007, pp. 40-43. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_Formalthreatdescriptions_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Thomas Neubauer and {Edgar R.} Weippl},
      title = {Formal threat descriptions for enhancing governmental risk assessment},
      booktitle = {Proceedings of the First International Conference on Theory and Practice of Electronic Governance},
      year = {2007},
      month = {1},
      pdf = {2007 Ekelhart - Formal Threat Descriptions for Enhancing Governmental Risk Assessment.pdf},
      volume = {232},
      pages = {40--43},
      publisher = {ACM},
      acm = {933612},
      }
  • Witold Abramowicz and Andreas Ekelhart and Stefan Fenz and Monika Kaczmarek and A Min Tjoa and Edgar R. Weippl and Dominik Zyskowski, "Security aspects in Semantic Web Services Filtering," in Proceedings of the 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007), 2007, pp. 21-31. BibTeX | PDF
    @INPROCEEDINGS{Abramowicz_Securityaspectsin_2007,
      Author = {Witold Abramowicz and Andreas Ekelhart and Stefan Fenz and Monika Kaczmarek and {A Min} Tjoa and {Edgar R.} Weippl and Dominik Zyskowski},
      title = {Security aspects in Semantic Web Services Filtering},
      booktitle = {Proceedings of the 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)},
      year = {2007},
      month = {1},
      pdf = {2007 - Abramowicz - Security Aspects in Semantic Web Services Filtering.pdf},
      volume = {229},
      pages = {21--31},
      publisher = {Austrian Computer Society},
      }
  • Edgar R. Weippl and Stefan Fenz and Andreas Ekelhart, "Security Ontologies: How to Improve Understanding of Complex Relationships," in Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007, 2007, pp. 404-407. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SecurityOntologiesHow_2007,
      Author = {{Edgar R.} Weippl and Stefan Fenz and Andreas Ekelhart},
      title = {Security Ontologies: How to Improve Understanding of Complex Relationships},
      booktitle = {Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007},
      year = {2007},
      month = {6},
      pdf = {2007 - Weippl - Security Ontologies How to Improve Understanding of Complex Relationships.pdf},
      pages = {404--407},
      publisher = {AACE},
      }
  • Edgar R. Weippl, "Security Considerations in M-Learning: Threats and Countermeasures," Advanced Technology for Learning, vol. 4, iss. 2, pp. 1-7, 2007. BibTeX
    @ARTICLE{Weippl_SecurityConsiderationsin_2007,
      Author = {{Edgar R.} Weippl},
      title = {Security Considerations in M-Learning: Threats and Countermeasures},
      journal = {Advanced Technology for Learning},
      year = {2007},
      month = {1},
      volume = {4},
      number = {2},
      pages = {1--7},
      publisher = {Acta Press},
      }
  • Edgar R. Weippl, "Dependability in E-Assessment," International Journal on E-Learning, vol. 6, iss. 2, 2007. BibTeX
    @ARTICLE{Weippl_DependabilityinEAssessment_2007,
      Author = {{Edgar R.} Weippl},
      title = {Dependability in E-Assessment},
      journal = {International Journal on E-Learning},
      year = {2007},
      month = {1},
      volume = {6},
      number = {2},
      publisher = {AACE},
      }
  • Edgar R. Weippl and Bernhard Riedl and Veronika Grascher, "Wikis im Social Web." OCG Austrian Computer Society, 2007, pp. 190-198. BibTeX
    @INBOOK{Weippl_EinsatzvonAuditsinWikisanStellevonZugriffskontrollenalssozioorganisatorischeSicherheitsmassnahme_2007,
      Author = {{Edgar R.} Weippl and Bernhard Riedl and Veronika Grascher},
      title = {Wikis im {S}ocial {W}eb},
      year = {2007},
      month = {1},
      chapter = {Einsatz von Audits in Wikis an Stelle von Zugriffskontrollen als sozio-organisatorische Sicherheitsmassnahme},
      pages = {190--198},
      publisher = {OCG Austrian Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and A Min Tjoa and Edgar R. Weippl, "Security Issues for the Use of Semantic Web in e-Commerce," in Business Information Systems, 10th International Conference on Business Information Systems, BIS 2007, 2007, pp. 1-13. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityIssuesUse_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Security Issues for the Use of Semantic Web in e-Commerce},
      booktitle = {Business Information Systems, 10th International Conference on Business Information Systems, BIS 2007},
      year = {2007},
      month = {4},
      pdf = {2007 - Ekelhart - Security Issues for the Use of Semantic Web in e-Commerce.pdf},
      pages = {1--13},
      publisher = {Springer Berlin Heidelberg},
      }
  • Edgar R. Weippl and Markus Klemen and Benjamin Böck, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Bock_SocialEngineering_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Benjamin Böck},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Social Engineering},
      publisher = {Wiley},
      }
  • Stefan Fenz and Edgar R. Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl, "Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard," in Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007, 2007, pp. 381-388. BibTeX
    @INPROCEEDINGS{Fenz_InformationSecurityFortification_2007,
      Author = {Stefan Fenz and {Edgar R.} Weippl and Andreas Ekelhart and Gernot Goluch and Bernhard Riedl},
      title = {Information Security Fortification by Ontological Mapping of the ISO IEC 27001 Standard},
      booktitle = {Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, PRDC2007},
      year = {2007},
      month = {12},
      pages = {381-388},
      publisher = {IEEE Computer Society},
      note = {0-7695-3054-0},
      }
  • Edgar R. Weippl and Markus Klemen and Thomas Neubauer, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Klemen_BusinessRequirementsofBackupSystems_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Thomas Neubauer},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Business Requirements of Backup Systems},
      publisher = {Wiley},
      }
  • Edgar R. Weippl and Khalid Latif, "Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse," in IEEE International Conference on Information Reuse and Integration, 2007. BibTeX
    @INPROCEEDINGS{Latif_QuestionDrivenSemantics_2007,
      Author = {{Edgar R.} Weippl and Khalid Latif},
      title = {Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse},
      booktitle = {IEEE International Conference on Information Reuse and Integration},
      year = {2007},
      month = {8},
      }
  • Edgar R. Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger, "Comparative Literature Review on RFID Security and Privacy," in Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007), 2007. BibTeX
    @INPROCEEDINGS{Riedl_ComparativeLiteratureReview_2007,
      Author = {{Edgar R.} Weippl and Gernot Goluch and Bernhard Riedl and Stefan Poechlinger},
      title = {Comparative Literature Review on RFID Security and Privacy},
      booktitle = {Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007)},
      year = {2007},
      month = {1},
      }
  • Edgar R. Weippl, "Handbook of Research on Mobile Multimedia." Idea Group, 2006, pp. 22-37. BibTeX
    @INBOOK{Weippl_Chapter3SecurityandTrustinMobileMultimedia_2006,
      Author = {{Edgar R.} Weippl},
      title = {Handbook of Research on Mobile Multimedia},
      year = {2006},
      month = {1},
      chapter = {Chapter 3:Security and Trust in Mobile Multimedia},
      pages = {22--37},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Mathias Strasser, "Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure," Information Systems Control Journal, vol. 4, iss. 10, 2006. BibTeX
    @ARTICLE{Weippl_SarbanesOxleyActCompliance_2006,
      Author = {{Edgar R.} Weippl and Mathias Strasser},
      title = {Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure},
      journal = {Information Systems Control Journal},
      year = {2006},
      month = {8},
      volume = {4},
      number = {10},
      publisher = {ISACA},
      }
  • Edgar R. Weippl and Stefan Biffl and Thomas Neubauer, "Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF," in Proceedings of the International Conference on Availability, Reliability and Security (ARES’06), 2006, pp. 723-731. BibTeX
    @INPROCEEDINGS{Neubauer_DigitalSignatureswith_2006,
      Author = {{Edgar R.} Weippl and Stefan Biffl and Thomas Neubauer},
      title = {Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF},
      booktitle = {Proceedings of the International Conference on Availability, Reliability and Security (ARES'06)},
      year = {2006},
      month = {1},
      pages = {723-731},
      }
  • Edgar R. Weippl and Thomas Neubauer and Arno Hollosi, "Digitale PDF-Signaturen mit der Bürgerkarte," in Proceedings of D-A-CH Security 2006, 2006. BibTeX
    @INPROCEEDINGS{Neubauer_DigitalePDFSignaturenmit_2006,
      Author = {{Edgar R.} Weippl and Thomas Neubauer and Arno Hollosi},
      title = {Digitale {P}{D}{F}-{S}ignaturen mit der {B}\"urgerkarte},
      booktitle = {Proceedings of D-A-CH Security 2006},
      year = {2006},
      month = {1},
      }
  • Edgar R. Weippl, "On the Use of Test Centers in e-Assessment," eLearning Reports, iss. 7, 2006. BibTeX
    @ARTICLE{Weippl_UseofTest_2006,
      Author = {{Edgar R.} Weippl},
      title = {On the Use of Test Centers in e-Assessment},
      journal = {eLearning Reports},
      year = {2006},
      month = {2},
      volume = {0},
      number = {7},
      }
  • A Min Tjoa and Edgar R. Weippl and Andreas Holzinger, "Security Aspects of Ubiquitous Computing in Health Care," e\&i, vol. 2006, iss. 4, pp. 156-161, 2006. BibTeX
    @ARTICLE{Weippl_SecurityAspectsof_2006,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and Andreas Holzinger},
      title = {Security Aspects of Ubiquitous Computing in Health Care},
      journal = {e\&i},
      year = {2006},
      month = {1},
      volume = {2006},
      number = {4},
      pages = {156--161},
      publisher = {Springer Verlag},
      note = {http://dx.doi.org/10.1007/s00502-006-0336},
      }
  • Edgar R. Weippl and Thomas Neubauer and Christian Stummer, "Workshop-based Multiobjective Security Safeguard Selection," in Proceedings of the irst International Conference on Availability, Reliability and Security (ARES), 2006, pp. 366-373. BibTeX
    @INPROCEEDINGS{Neubauer_WorkshopbasedMultiobjectiveSecurity_2006,
      Author = {{Edgar R.} Weippl and Thomas Neubauer and Christian Stummer},
      title = {Workshop-based Multiobjective {S}ecurity Safeguard Selection},
      booktitle = {Proceedings of the irst International Conference on Availability, Reliability and Security (ARES)},
      year = {2006},
      month = {1},
      pages = {366--373},
      publisher = {IEEE Computer Society},
      }
  • Edgar R. Weippl, "Addressing the Weakest Link: How to improve teaching of IT security," in Proceedings of ED-MEDIA 2006, 2006. BibTeX
  • Edgar R. Weippl and Markus Klemen, "Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues." Idea Group, 2006. BibTeX
    @INBOOK{Weippl_ImplementingITSecurityforSmallandMediumSizedEnterprises_2006,
      Author = {{Edgar R.} Weippl and Markus Klemen},
      title = {Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues},
      year = {2006},
      month = {1},
      chapter = {Implementing IT Security for Small and Medium-Sized Enterprises},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Jamil Wahbeh, "Mobile Multimedia: Communication Engineering Perspective." Nova Science Publishers, 2006, pp. 101-116. BibTeX
    @INBOOK{Weippl_SecuringMobileCommunicationRADIUSinaWindowsEnvironment_2006,
      Author = {{Edgar R.} Weippl and Jamil Wahbeh},
      title = {Mobile Multimedia: Communication Engineering Perspective},
      year = {2006},
      month = {1},
      chapter = {Securing Mobile Communication: RADIUS in a Windows Environment},
      pages = {101--116},
      publisher = {Nova Science Publishers},
      }
  • Edgar R. Weippl and Gernot Goluch, "Nichtabstreitbarkeit und Audits in ELearning," in IRIS 2006, 2006. BibTeX
    @INPROCEEDINGS{Goluch_NichtabstreitbarkeitundAudits_2006,
      Author = {{Edgar R.} Weippl and Gernot Goluch},
      title = {Nichtabstreitbarkeit und Audits in ELearning},
      booktitle = {IRIS 2006},
      year = {2006},
      month = {1},
      }
  • Stefan Fenz and Edgar R. Weippl, "Ontology-based IT-Security Planning," in Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, PRDC2006, 2006, pp. 389-390. BibTeX | PDF
    @INPROCEEDINGS{Fenz_OntologybasedITSecurityPlanning_2006,
      Author = {Stefan Fenz and {Edgar R.} Weippl},
      title = {Ontology-based IT-Security Planning},
      booktitle = {Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, PRDC2006},
      year = {2006},
      month = {12},
      abstract = {IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-security approach. We thus propose a security ontology, to provide a solid base for an applicable and holistic IT-security approach for SMEs, enabling low-cost risk management and threat analysis.},
      pdf = {2006 - Fenz - Ontology-based IT Security Planning.pdf},
      pages = {389-390},
      publisher = {IEEE Computer Society},
      note = {9353421},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontology: Simulating Threats to Corporate Assets," in Second International Conference on Information Systems Security (ICISS 2006), 2006, pp. 249-259. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologySimulating_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontology: Simulating Threats to Corporate Assets},
      booktitle = {Second International Conference on Information Systems Security (ICISS 2006)},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Security Ontology Simulating Threats to Corporate Assets.pdf},
      volume = {4332_2006},
      pages = {249--259},
      publisher = {Springer Berlin Heidelberg},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and A Min Tjoa and Edgar R. Weippl, "Ontology-based Business Knowledge for Simulating Threats to Corporate Assets," in Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006, 2006, pp. 37-48. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_OntologybasedBusinessKnowledge_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Ontology-based Business Knowledge for Simulating Threats to Corporate Assets},
      booktitle = {Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Ontology-based Business Knowledge for Simulating Threats to Corporate Assets.pdf},
      volume = {4333_2006},
      pages = {37--48},
      publisher = {Springer Berlin Heidelberg},
      }
  • Edgar R. Weippl, "On the Use of Test Centers in E-Assessment," published in elearningreports.com, 2005. BibTeX
    @ARTICLE{Weippl_UseofTest_2005,
      Author = {{Edgar R.} Weippl},
      title = {On the Use of Test Centers in E-Assessment},
      journal = {published in elearningreports.com},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl, "The Handbook of Information Security." John Wiley \& Sons, 2005. BibTeX
    @INBOOK{Weippl_SecurityinELearning_2005a,
      Author = {{Edgar R.} Weippl},
      title = {The Handbook of Information Security},
      year = {2005},
      month = {1},
      chapter = {Security in E-Learning},
      publisher = {John Wiley \& Sons},
      note = {ISBN 0-471-64833-7},
      }
  • Edgar R. Weippl, "Non-Repudiation and Audits in E-Learning, invited paper," in Proceedings of E-Learn 2005, 2005, pp. 1785-1790. BibTeX
    @INPROCEEDINGS{Weippl_NonRepudiationandAudits_2005,
      Author = {{Edgar R.} Weippl},
      title = {Non-Repudiation and Audits in E-Learning, invited paper},
      booktitle = {Proceedings of E-Learn 2005},
      year = {2005},
      month = {1},
      pages = {1785--1790},
      }
  • A Min Tjoa and Edgar R. Weippl, "Privacy in E-learning: How to Implement Anonymity," in Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC), 2005. BibTeX
    @INPROCEEDINGS{Weippl_PrivacyinElearning_2005a,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl},
      title = {Privacy in E-learning: How to Implement Anonymity},
      booktitle = {Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC)},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl, Security in E-Learning, Springer NY, 2005. BibTeX
    @BOOK{Weippl_SecurityinELearning_2005b,
      Author = {{Edgar R.} Weippl},
      title = {Security in E-Learning},
      year = {2005},
      month = {1},
      publisher = {Springer NY},
      note = {ISBN 0-387-24341-0, \url{http://www.e-learning-security.org}},
      }
  • Edgar R. Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska, "On Cooperatively Creating Dynamic Ontologies," in Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, 2005. BibTeX | PDF
    @INPROCEEDINGS{Gahleitner_CooperativelyCreatingDynamic_2005,
      Author = {{Edgar R.} Weippl and Eva Gahleitner and Wernher Behrendt and Juergen Palkoska},
      title = {On Cooperatively Creating Dynamic Ontologies},
      booktitle = {Proceedings of the 16th ACM Conference on Hypertext and Hypermedia},
      year = {2005},
      month = {9},
      pdf = {p208-gahleitner.pdf},
      publisher = {ACM},
      acm = {878760},
      }
  • Edgar R. Weippl, "Encyclopedia of E-Commerce, E-Government and Mobile Commerce." Idea Group, Publish, 2005, pp. 135-140. BibTeX
    @INBOOK{Weippl_ComputerSecurityintheContextofELearning_2005,
      Author = {{Edgar R.} Weippl},
      title = {Encyclopedia of E-Commerce, E-Government and Mobile Commerce},
      year = {2005},
      month = {1},
      chapter = {Computer Security in the Context of E-Learning},
      pages = {135--140},
      publisher = {Idea Group, Publish},
      }
  • A Min Tjoa and Edgar R. Weippl, "Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage," Interactive Technology and Smart Education (ITSE), vol. 2005, iss. 2, pp. 247-256, 2005. BibTeX
    @ARTICLE{Weippl_PrivacyinELearning_2005,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl},
      title = {Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage},
      journal = {Interactive Technology and Smart Education (ITSE)},
      year = {2005},
      month = {1},
      volume = {2005},
      number = {2},
      pages = {247--256},
      publisher = {Troubador Publishing Ltd.},
      }
  • A Min Tjoa and Edgar R. Weippl and Tho Manh Nguyen and Peter Brezany, "Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing," International Journal of Data Warehousing and Mining, vol. 1, iss. 4, pp. 22-55, 2005. BibTeX
    @ARTICLE{Nguyen_TowardGridBasedZeroLatency_2005,
      Author = {{A Min} Tjoa and {Edgar R.} Weippl and {Tho Manh} Nguyen and Peter Brezany},
      title = {Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing},
      journal = {International Journal of Data Warehousing and Mining},
      year = {2005},
      month = {1},
      volume = {1},
      number = {4},
      pages = {22-55},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl, "Dependability in E-Assessment," in Proceedings of ED-MEDIA 2005, 2005. BibTeX
    @INPROCEEDINGS{Weippl_DependabilityinEAssessment_2005,
      Author = {{Edgar R.} Weippl},
      title = {Dependability in E-Assessment},
      booktitle = {Proceedings of ED-MEDIA 2005},
      year = {2005},
      month = {1},
      }
  • Edgar R. Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and A Min Tjoa, "Semantic Storage: A Report on Performance and Flexibility," in Database and Expert Systems Applications, 16th International Conference, DEXA 2005, 2005, pp. 586-595. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SemanticStorageReport_2005,
      Author = {{Edgar R.} Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and {A Min} Tjoa},
      title = {Semantic Storage: A Report on Performance and Flexibility},
      booktitle = {Database and Expert Systems Applications, 16th International Conference, DEXA 2005},
      year = {2005},
      month = {8},
      abstract = {Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype, which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.},
      pdf = {2005-Weippl.pdf},
      volume = {3588_2005},
      pages = {586-595},
      publisher = {Springer Berlin Heidelberg},
      }
  • Edgar R. Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha, "E-Learning without Text and Language: A Language-Free Learning Model," in Proceedings of EDMEDIA 2005, 2005. BibTeX
    @INPROCEEDINGS{Kalinyaprak_ELearningwithoutText_2005,
      Author = {{Edgar R.} Weippl and Gerald Futschek and Hakan Kalinyaprak and Georg Blaha},
      title = {E-Learning without Text and Language: A Language-Free Learning Model},
      booktitle = {Proceedings of EDMEDIA 2005},
      year = {2005},
      month = {6},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps," in Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005, 2005, pp. 135-151. BibTeX
    @INPROCEEDINGS{Weippl_SemanticDesktopSemantic_2005,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps},
      booktitle = {Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005},
      year = {2005},
      month = {10},
      number = {4623},
      pages = {135-151},
      }
  • Edgar R. Weippl, "Security in E-Learning," ACM ELearn Magazine, 2005. BibTeX | PDF
    @ARTICLE{Weippl_SecurityinELearning_2005,
      Author = {{Edgar R.} Weippl},
      title = {Security in E-Learning},
      journal = {ACM ELearn Magazine},
      year = {2005},
      month = {1},
      pdf = {p431-khan.pdf},
      acm = {867458},
      }
  • Edgar R. Weippl, "Security in Mobile Multimedia," Journal of Communication Engineering, vol. 1, iss. 1, pp. 59-69, 2004. BibTeX
    @ARTICLE{weippl_ag,
      Author = {{Edgar R.} Weippl},
      title = {Security in Mobile Multimedia},
      journal = {Journal of Communication Engineering},
      year = {2004},
      month = {1},
      volume = {1},
      number = {1},
      pages = {59--69},
      note = {ISSN 1693-5152},
      }
  • Edgar R. Weippl and Wolfgang Essmayr and Stefan Probst, "Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms," International Journal of Electronic Commerce Research, vol. 4, iss. 1, pp. 127-156, 2004. BibTeX
    @ARTICLE{weippl_ae,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr and Stefan Probst},
      title = {Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms},
      journal = {International Journal of Electronic Commerce Research},
      year = {2004},
      month = {1},
      volume = {4},
      number = {1},
      pages = {127--156},
      publisher = {Kluwer},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Personal Trusted Devices for web services: Revisiting Multilevel Security," Mobile Networks and Applications, Kluwer, vol. 8, iss. 2, pp. 151-157, 2003. BibTeX
    @ARTICLE{weippl_aa,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Personal Trusted Devices for web services: Revisiting Multilevel Security},
      journal = {Mobile Networks and Applications, Kluwer},
      year = {2003},
      month = {1},
      volume = {8},
      number = {2},
      pages = {151--157},
      }
  • Edgar R. Weippl and Wolfgang Essmayr and Ludwig Klug, "A New Approach to Secure Federated Information Bases using Agent Technology," Journal of Database Management, Kluwer, vol. 14, iss. 1, pp. 48-68, 2003. BibTeX
    @ARTICLE{weippl_af,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr and Ludwig Klug},
      title = {A New Approach to Secure Federated Information Bases using Agent Technology},
      journal = {Journal of Database Management, Kluwer},
      year = {2003},
      month = {1},
      volume = {14},
      number = {1},
      pages = {48--68},
      }
  • Edgar R. Weippl, "The Transition from E-commerce to M-commerce: Why Security should be the enabling technology," Journal of Information Technology Theory and Application (JITTA), vol. 3, iss. 4, pp. 17-19, 2001. BibTeX
    @ARTICLE{weippl_ga,
      Author = {{Edgar R.} Weippl},
      title = {The Transition from E-commerce to M-commerce: Why Security should be the enabling technology},
      journal = {Journal of Information Technology Theory and Application (JITTA)},
      year = {2001},
      month = {1},
      volume = {3},
      number = {4},
      pages = {17--19},
      note = {\url{http://peffers.net/journal/volume3_4/ecpreface.pdf}},
      }
  • Edgar R. Weippl, "Building secure knowledge bases: combining Java agents and DBagents," in Proceedings of the fifth international conference on Autonomous agents (AGENTS), 2001. BibTeX | PDF
    @INPROCEEDINGS{_Building_secure_knowledge_base_2001,
      Author = {{Edgar R.} Weippl},
      title = {Building secure knowledge bases: combining Java agents and DBagents},
      booktitle = {Proceedings of the fifth international conference on Autonomous agents (AGENTS)},
      year = {2001},
      month = {5},
      pdf = {p212-weippl.pdf},
      acm = {06996},
      }
  • Edgar R. Weippl and Hans Lohninger, "Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces," in Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT), 2000, pp. 355-362. BibTeX
    @INPROCEEDINGS{weippl_bj,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Teach Me: Leveraging CBT-Course Efficiency Using Improved User Interfaces},
      booktitle = {Proceedings of the International Conference on Information and Communication Technologies for Education (EDICT)},
      year = {2000},
      month = {12},
      pages = {355-362},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Identity Mapping: An Approach to Unravel Enterprise Security Management Policies," in Proceedings of the 16th IFIP World Computer Congress, 2000. BibTeX
    @INPROCEEDINGS{weippl_bl,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Identity Mapping: An Approach to Unravel Enterprise Security Management Policies},
      booktitle = {Proceedings of the 16th IFIP World Computer Congress},
      year = {2000},
      month = {8},
      publisher = {Kluwer},
      }
  • Edgar R. Weippl, "Coimbra: secure Web access to multimedia content," in Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA), 2000. BibTeX | PDF
    @INPROCEEDINGS{_Coimbra_secure_Web_access_to_m_2000,
      Author = {{Edgar R.} Weippl},
      title = {Coimbra: secure Web access to multimedia content},
      booktitle = {Proceedings of the 2000 ACM workshops on Multimedia (MULTIMEDIA)},
      year = {2000},
      month = {11},
      pdf = {p145-weippl.pdf},
      acm = {90340},
      }
  • Edgar R. Weippl and Wolfgang Essmayr, "Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations," in Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA), 2000. BibTeX
    @INPROCEEDINGS{weippl_bk,
      Author = {{Edgar R.} Weippl and Wolfgang Essmayr},
      title = {Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations},
      booktitle = {Proceedings of the 11th International Conference on Database and Expert Systems Applications (DEXA)},
      year = {2000},
      month = {9},
      publisher = {LNCS Springer},
      }
  • Edgar R. Weippl and Hans Lohninger, "Knowledge Landscapes: A VR Interface for CBT Knowledge Bases," in 10th European-Japanese Conference on Information Modeling and Knowledge Bases, 2000. BibTeX
    @INPROCEEDINGS{weippl_bm,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Knowledge Landscapes: A VR Interface for CBT Knowledge Bases},
      booktitle = {10th European-Japanese Conference on Information Modeling and Knowledge Bases},
      year = {2000},
      month = {5},
      note = {Reprinted in Kangassalo H., Jaakkola H., Kawaguchi E. (eds), Information Modelling and Knowledge Bases XII, 271-274, ISBN 1-58603-1635. IOS Press, Amsterdam, 2001.},
      }
  • Edgar R. Weippl and Hans Lohninger, "Evaluating CBT Software Usage in Schools and Universities," in Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education, 1999. BibTeX
    @INPROCEEDINGS{weippl_bo,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Evaluating CBT Software Usage in Schools and Universities},
      booktitle = {Proceedings of the 19th IDCE World Conference On Open Learning And Distance Education},
      year = {1999},
      month = {6},
      }
  • Edgar R. Weippl and Hans Lohninger, "Special Requirements for Information Visualization in CBT," in Proceedings of Edu Compugraphics 97, 1997, pp. 133-139. BibTeX
    @INPROCEEDINGS{weippl_bp,
      Author = {{Edgar R.} Weippl and Hans Lohninger},
      title = {Special Requirements for Information Visualization in CBT},
      booktitle = {Proceedings of Edu Compugraphics 97},
      year = {1997},
      month = {12},
      pages = {133-139},
      note = {ISBN 972-8342-02-0},
      }
  • Edgar R. Weippl and Viesturs Kaugers, "Recent developments in model-driven architecture and security," in NA, 1900. BibTeX
    @INPROCEEDINGS{Kaugers_Recent_developments_in_model_d_2010,
      Author = {{Edgar R.} Weippl and Viesturs Kaugers},
      title = {Recent developments in model-driven architecture and security},
      booktitle = {NA},
      year = {1900},
      month = {0},
      abstract = {Security is definitely one of the most important aspects in business information systems. This aspect is strongly related to costs, risks and reputation of organization. Currently innovative way to develop software is offered by model-driven architecture. This architecture uses models and transformations to generate executable code. Along with model-driven architecture there is one more approach based on mentioned methodology for developing secure systems. its called model-driven security. It uses the same principles as model-driven security but also introduces new ones like special languages for modeling security requirements, frameworks for building secure systems and means to define security policies. This paper describes current situation, presents overview of topical and perspective model-driven architecture and security developments and gives conclusions on the subject.},
      note = {Unpublished yet},
      }

List of publications as PDF