Edgar Weippl
Edgar Weippl
University of Vienna, Head of SQI CD-Laboratory, SBA Research
Verified email at - Homepage
Cited by
Cited by
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and applications 22, 113-122, 2015
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
M Mulazzani, S Schrittwieser, M Leithner, M Huber, E Weippl
20th USENIX Security Symposium (USENIX Security 11), 2011
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
A Holzinger, P Kieseberg, E Weippl, AM Tjoa
Machine Learning and Knowledge Extraction: Second IFIP TC 5, TC 8/WG 8.4, 8 …, 2018
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
Acm computing surveys (csur) 49 (1), 1-37, 2016
Security in e-learning
ER Weippl
Springer Science & Business Media, 2005
A frame of reference for research of integrated governance, risk and compliance (GRC)
N Racz, E Weippl, A Seufert
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010
Fake identities in social media: A case study on the sustainability of the Facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4, 175-212, 2012
Block me if you can: A large-scale study of tracker-blocking tools
G Merzdovnik, M Huber, D Buhov, N Nikiforakis, S Neuner, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319-333, 2017
The other side of the coin: User experiences with bitcoin security and privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
Fast and reliable browser identification with javascript engine fingerprinting
M Mulazzani, P Reschl, M Huber, M Leithner, S Schrittwieser, E Weippl, ...
Web 2.0 Workshop on Security and Privacy (W2SP) 5, 4, 2013
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium (USENIX Security 17), 1339-1356, 2017
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Springer Nature, 2022
On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018
Social snapshots: Digital forensics for online social networks
M Huber, M Mulazzani, M Leithner, S Schrittwieser, G Wondracek, ...
Proceedings of the 27th annual computer security applications conference …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20