Advanced social engineering attacks K Krombholz, H Hobel, M Huber, E Weippl Journal of Information Security and applications 22, 113-122, 2015 | 722 | 2015 |
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl | 279 | 2011 |
QR code security P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ... Proceedings of the 8th International Conference on Advances in Mobile …, 2010 | 238 | 2010 |
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI A Holzinger, P Kieseberg, E Weippl, AM Tjoa Machine Learning and Knowledge Extraction: Second IFIP TC 5, TC 8/WG 8.4, 8 …, 2018 | 206 | 2018 |
Security in e-learning ER Weippl Springer Science & Business Media, 2006 | 196 | 2006 |
A frame of reference for research of integrated governance, risk and compliance (GRC) N Racz, E Weippl, A Seufert Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010 | 185 | 2010 |
Fake identities in social media: A case study on the sustainability of the Facebook business model K Krombholz, D Merkl, E Weippl Journal of Service Science Research 4, 175-212, 2012 | 178 | 2012 |
Protecting software through obfuscation: Can it keep pace with progress in code analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016 | 170 | 2016 |
Block me if you can: A large-scale study of tracker-blocking tools G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ... 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017 | 161 | 2017 |
Security ontologies: Improving quantitative risk analysis A Ekelhart, S Fenz, M Klemen, E Weippl 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 156 | 2007 |
The other side of the coin: User experiences with bitcoin security and privacy K Krombholz, A Judmayer, M Gusenbauer, E Weippl Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 155 | 2017 |
Guess who is texting you? evaluating the security of smartphone messaging applications S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ... | 150 | 2012 |
IMSI-catch me if you can: IMSI-catcher-catchers A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl Proceedings of the 30th annual computer security applications Conference …, 2014 | 145 | 2014 |
Fast and reliable browser identification with javascript engine fingerprinting M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ... Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013 | 143 | 2013 |
Social snapshots: Digital forensics for online social networks M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ... Proceedings of the 27th annual computer security applications conference …, 2011 | 119 | 2011 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 115 | 2014 |
QR code security: A survey of attacks and challenges for usable security K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 115 | 2014 |
A process model for integrated IT governance, risk, and compliance management N Racz, E Weippl, A Seufert Proceedings of the Ninth Baltic Conference on Databases and Information …, 2010 | 100 | 2010 |
" I Have No Idea What I'm Doing"-On the Usability of Deploying HTTPS K Krombholz, W Mayer, M Schmiedecker, E Weippl | 99 | 2017 |
Information security fortification by ontological mapping of the ISO/IEC 27001 standard S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 98 | 2007 |