Seguir
Edgar Weippl
Edgar Weippl
University of Vienna, Head of SQI CD-Laboratory, SBA Research
Dirección de correo verificada de univie.ac.at - Página principal
Título
Citado por
Citado por
Año
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
7222015
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
2792011
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
2382010
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
A Holzinger, P Kieseberg, E Weippl, AM Tjoa
Machine Learning and Knowledge Extraction: Second IFIP TC 5, TC 8/WG 8.4, 8 …, 2018
2062018
Security in e-learning
ER Weippl
Springer Science & Business Media, 2006
1962006
A frame of reference for research of integrated governance, risk and compliance (GRC)
N Racz, E Weippl, A Seufert
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010
1852010
Fake identities in social media: A case study on the sustainability of the Facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4, 175-212, 2012
1782012
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016
1702016
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
1612017
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1562007
The other side of the coin: User experiences with bitcoin security and privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
1552017
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
1502012
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
1452014
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013
1432013
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
1192011
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
1152014
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
1152014
A process model for integrated IT governance, risk, and compliance management
N Racz, E Weippl, A Seufert
Proceedings of the Ninth Baltic Conference on Databases and Information …, 2010
1002010
" I Have No Idea What I'm Doing"-On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
992017
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
982007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20