Full name Familienname, Vorname
Weippl, Edgar
 
Main Affiliation Organisations­zuordnung
 

Filter:
Subject:  Security

Results 1-5 of 5 (Search time: 0.003 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Mai, Alexandra ; Pfeffer, Katharina ; Gusenbauer, Matthias ; Weippl, Edgar ; Krombholz, Katharina User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachInproceedings Konferenzbeitrag Aug-2020
2Ullrich, Johanna ; Zseby, Tanja ; Fabini, Joachim ; Weippl, Edgar Network-Based Secret Communication in Clouds: A SurveyArtikel Article 2017
3Hobel, Heidelinde ; Heurix, Johannes ; Anjomshoaa, Amin ; Weippl, Edgar Towards Security-Enhanced and Privacy-Preserving Mashup CompositionsKonferenzbeitrag Inproceedings 2013
4Tahamtan, Amirreza ; Anjomshoaa, Amin ; Weippl, Edgar ; Tjoa, A Min A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects:Konferenzbeitrag Inproceedings 2010
5Weippl, Edgar ; Fenz, Stefan ; Ekelhart, Andreas Fortification of IT Security by Automatic Security Advisory ProcessingKonferenzbeitrag Inproceedings 2008

Filter:
Subject:  Security

Results 1-19 of 19 (Search time: 0.023 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Szewieczek, Martin Fuzzing embedded protocolsThesis Hochschulschrift2024
2Koppmann Michael - 2021 - Object capabilities and their benefits for web...pdf.jpgKoppmann, Michael Object capabilities and their benefits for web application securityThesis Hochschulschrift 2021
3Boll Andreas - 2020 - Security and privacy of secure messaging services a case...pdf.jpgBoll, Andreas Security and privacy of secure messaging services : a case study of wireThesis Hochschulschrift 2020
4Neuner Sebastian - 2019 - Efficient and effective response to computer security...pdf.jpgNeuner, Sebastian Efficient and effective response to computer security incidents and cybercrime : system-level defenses against USB-based attacksThesis Hochschulschrift 2019
5Mai, Alexandra Visualization of bitcoin transactions for forensic and security analysisThesis Hochschulschrift2018
6Fraihs Nikolai - 2017 - Malvertising und Malware im Kontext von Android.pdf.jpgFraihs, Nikolai Malvertising und Malware im Kontext von AndroidThesis Hochschulschrift 2017
7Merzdovnik Georg - 2017 - Security and privacy in mobile environments.pdf.jpgMerzdovnik, Georg Security and privacy in mobile environmentsThesis Hochschulschrift 2017
8Krombholz-Reindl Katharina - 2016 - Usable security and privacy challenges with...pdf.jpgKrombholz-Reindl, Katharina Usable security and privacy challenges with disruptive technologiesThesis Hochschulschrift 2016
9Culafic Vanja - 2016 - Web browser fingerprinting a framework for measuring the...pdf.jpgCulafic, Vanja Web browser fingerprinting : a framework for measuring the web browserThesis Hochschulschrift 2016
10Ullrich Johanna Maria Magdalena - 2016 - Geheime Kommunikation im Internet.pdf.jpgUllrich, Johanna Maria Magdalena Geheime Kommunikation im InternetThesis Hochschulschrift 2016
11Hernadi Tamas - 2015 - Security-Schaetzung von Open Source Webanwendungen.pdf.jpgHernádi, Tamás Security-Schätzung von Open Source WebanwendungenThesis Hochschulschrift 2015
12Gadllah Adel - 2015 - Straightjacket tightening process execution policies at...pdf.jpgGadllah, Adel Straightjacket: tightening process execution policies at runtimeThesis Hochschulschrift 2015
13Weiss Sophie - 2015 - Confidential desktop towards an access control framework...pdf.jpgWeiß, Sophie Confidential desktop: towards an access control framework for preserving data confidentiality based on environmental conditionsThesis Hochschulschrift 2015
14Fruehwirt Dominik - 2015 - Automated discovery of secure website domains.pdf.jpgFrühwirt, Dominik Automated discovery of secure website domainsThesis Hochschulschrift 2015
15Lindorfer Martina - 2015 - Malware through the looking glass malware analysis in...pdf.jpgLindorfer, Martina Malware through the looking glass : malware analysis in an evolving threat landscapeThesis Hochschulschrift 2015
16Aufner Peter - 2013 - Security challenges in mobile middleware.pdf.jpgAufner, Peter Security challenges in mobile middlewareThesis Hochschulschrift 2013
17Hobel Heidelinde - 2012 - Context-aware security analysis of mashups.pdf.jpgHobel, Heidelinde Context-aware security analysis of mashupsThesis Hochschulschrift 2012
18Böck, Benjamin Social engineeringThesis Hochschulschrift2007
19Glatz, Georg Developing an implementation for an information security metrics program at Raiffeisen Informatik GmbHThesis Hochschulschrift2007