Full name Familienname, Vorname
Weippl, Edgar
 
Main Affiliation Organisations­zuordnung
 

Results 1-20 of 194 (Search time: 0.004 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Kieseberg, Peter ; Weippl, Edgar ; Tjoa, A. Min ; Cabitza, Federico ; Campagner, Andrea ; Holzinger, Andreas Controllable AI - An Alternative to Trustworthiness in Complex AI Systems?Inproceedings Konferenzbeitrag 22-Aug-2023
2Eckhart, Matthias ; Ekelhart, Andreas ; Biffl, Stefan ; Lüder, Arndt ; Weippl, Edgar R. QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production SystemsArticle Artikel 22-Jul-2022
3Judmayer, Aljosha ; Stifter, Nicholas ; Schindler, Philipp ; Weippl, Edgar How much is the fork? Fast Probability and Profitability Calculation during Temporary ForksInproceedings Konferenzbeitrag 2022
4Ghesmati, Simin ; Fdhila, Walid ; Weippl, Edgar User-Perceived Privacy in BlockchainPreprint Preprint2022
5Ghesmati-2022-Usability of Cryptocurrency Wallets Providing CoinJoin Tra...-smur.pdf.jpgGhesmati, Simin ; Fdhila, Walid ; Weippl, Edgar R. Usability of Cryptocurrency Wallets Providing CoinJoin TransactionsPreprint Preprint 2022
6Ghesmati, Simin ; Kern, Andreas ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar Unnecessary Input Heuristics and PayJoin TransactionsInproceedings Konferenzbeitrag 2021
7Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW CryptocurrenciesInproceedings Konferenzbeitrag 2021
8Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW CryptocurrenciesInproceedings Konferenzbeitrag 2021
9Schindler, Philipp ; Judmayer, Aljosha ; Hittmeir, Markus ; Stifter, Nicholas ; Weippl, Edgar RandRunner: Distributed Randomness from Trapdoor VDFs with Strong UniquenessKonferenzbeitrag Inproceedings 2021
10Holzinger, Andreas ; Weippl, Edgar ; Tjoa, A Min ; Kieseberg, Peter Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AIKonferenzbeitrag Inproceedings2021
11Mai, Alexandra ; Pfeffer, Katharina ; Gusenbauer, Matthias ; Weippl, Edgar ; Krombholz, Katharina User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachInproceedings Konferenzbeitrag Aug-2020
12Eckhart, Matthias ; Ekelhart, Andreas ; Weippl, Edgar Automated Security Risk Identification Using AutomationML-based Engineering DataArtikel Article 2020
13Schindler, Philipp ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar HydRand: Efficient Continuous Distributed RandomnessKonferenzbeitrag Inproceedings2020
14Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna Maria Magdalena ; Weippl, Edgar From Hack to Elaborate Technique—A Survey on Binary RewritingArtikel Article Jun-2019
15Dabrowski, Adrian ; Merzdovnik, Georg ; Ullrich, Johanna ; Sendera, Gerald ; Weippl, Edgar Measuring Cookies and Web Privacy in a Post-GDPR WorldKonferenzbeitrag Inproceedings2019
16Stifter, Nicholas ; Schindler, Philipp ; Judmayer, Aljosha ; Zamyatin, Alexei ; Kern, Andreas ; Weippl, Edgar Echoes of the Past: Recovering Blockchain Metrics from Merged miningKonferenzbeitrag Inproceedings 2019
17Stifter, Nicholas ; Judmayer, Aljosha ; Weippl, Edgar Revisiting Practical Byzantine Fault Tolerance Through Blockchain TechnologiesBuchbeitrag Book Contribution 2019
18Brenner, Bernhard ; Weippl, Edgar Security AnalysisBuchbeitrag Book Contribution 2019
19Kieseberg, Peter ; Weippl, Edgar Securing Information against Manipulation in the Production Systems Engineering ProcessBuchbeitrag Book Contribution 2019
20Biffl, Stefan ; Eckhart, Matthias ; Lüder, Arndt ; Weippl, Edgar Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems EngineeringBuchbeitrag Book Contribution2019

Results 1-20 of 136 (Search time: 0.019 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Szewieczek Martin - 2024 - Fuzzing embedded protocols.pdf.jpgSzewieczek, Martin Fuzzing embedded protocolsThesis Hochschulschrift 2024
2Rosenblattl Jakob - 2024 - Topology Discovery within the Bitcoin Network.pdf.jpgRosenblattl, Jakob Topology Discovery within the Bitcoin NetworkThesis Hochschulschrift 2024
3Hiess Irene - 2024 - Exact Methods for Covering Array Generation.pdf.jpgHiess, Irene Exact Methods for Covering Array GenerationThesis Hochschulschrift 2024
4Fugger Markus Hermann - 2023 - Input Models for Combinatorial Testing using...pdf.jpgFugger, Markus Hermann Input Models for Combinatorial Testing using Source AnnotationsThesis Hochschulschrift 2023
5Fodor Thomas Bogdan - 2023 - Graph-theoretic Analysis of the IPv4IPv6 Routing...pdf.jpgFodor, Thomas Bogdan Analysing the internet aas a graphThesis Hochschulschrift 2023
6Klonowski Timo - 2023 - Bitcoin Network Topology Discovery Using Timing Analysis.pdf.jpgKlonowski, Timo Bitcoin network topology discovery using timing analysisThesis Hochschulschrift 2023
7Arfaoui Ghaith - 2023 - Privacy-Preserving Collaborative Anomaly Detection.pdf.jpgArfaoui, Ghaith Privacy-preserving collaborative anomaly detectionThesis Hochschulschrift 2023
8Stoeger Michael Bernd - 2023 - Scanning for IoT Devices Using a Mobile Android...pdf.jpgStöger, Michael Bernd Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environmentThesis Hochschulschrift 2023
9Pfeffer Katharina - 2023 - Impact of user trust in IT systems on security and...pdf.jpgPfeffer, Katharina Impact of user trust in IT systems on security and privacyThesis Hochschulschrift 2023
10Causevic Amra - 2022 - Power consumption of TLS How the additional S in HTTPS...pdf.jpgCausevic, Amra Power consumption of TLS : How the additional "S" in HTTPS impacts the power consumption of power-pluggend devicesThesis Hochschulschrift 2022
11Schindler Philipp - 2022 - Advances in distributed randomness.pdf.jpgSchindler, Philipp Advances in distributed randomnessThesis Hochschulschrift 2022
12Maitz Alexander - 2022 - Ethereum attack simulator A discrete event simulation...pdf.jpgMaitz, Alexander Ethereum attack simulator : A discrete event simulation engine for attacks against the ethereum blockchainThesis Hochschulschrift 2022
13Burian Daniel - 2022 - Automated stitching for scanning electron microscopy...pdf.jpgBurian, Daniel Automated stitching for scanning electron microscopy images of integrated circuitsThesis Hochschulschrift 2022
14Mai Alexandra - 2023 - Mental Models of Cryptographic Protocols from Different...pdf.jpgMai, Alexandra Mental models of cryptographic protocols from different stakeholder perspectivesThesis Hochschulschrift 2022
15Schachenhofer Bernhard - 2021 - On the Security of proof-of-stake directed...pdf.jpgSchachenhofer, Bernhard On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approachThesis Hochschulschrift 2021
16Rosegger Andreas - 2021 - Race to the door - A Goldfinger attack on proof of...pdf.jpgRosegger, Andreas Race to the door - A Goldfinger attack on proof of work cryptocurrenciesThesis Hochschulschrift 2021
17Treiber Simon - 2021 - Smart home privacy leaks.pdf.jpgTreiber, Simon Smart home privacy leaksThesis Hochschulschrift 2021
18George Dominik Roy - 2021 - Privacy-preserving remote attestation protocol.pdf.jpgGeorge, Dominik Roy Privacy-preserving remote attestation protocolThesis Hochschulschrift 2021
19Tomic Vedrana - 2021 - A bionic view on complex software systems and the...pdf.jpgTomic, Vedrana A bionic view on complex software systems and the consequences for digital sustainabilityThesis Hochschulschrift 2021
20Gegenhuber Gabriel Karl - 2021 - Zero-rating one big mess Analyzing differential...pdf.jpgGegenhuber, Gabriel Karl Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network OperatorsThesis Hochschulschrift 2021