| | Preview | Author(s) | Title | Type | Issue Date |
| 41 | | Neuner, Sebastian ; Voyiatzis, Artemios G. ; Schmiedecker, Martin ; Weippl, Edgar | Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS | Konferenzbeitrag Inproceedings | 2017 |
| 42 | | Merzdovnik, Georg ; Huber, Markus ; Buhov, Damjan ; Nikiforakis, Nick ; Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar | Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools | Konferenzbeitrag Inproceedings | 2017 |
| 43 | | Machida, Shimon ; Dabrowski, Adrian ; Weippl, Edgar ; Echizen, Isao | PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks | Konferenzbeitrag Inproceedings | 2017 |
| 44 | | Islam, Shareeful ; Fenz, Stefan ; Weippl, Edgar ; Mouratidis, Haralambos | A Risk Management Framework for Cloud Migration Decision Support | Artikel Article | 2017 |
| 45 | | Ullrich, Johanna ; Zseby, Tanja ; Fabini, Joachim ; Weippl, Edgar | Network-Based Secret Communication in Clouds: A Survey | Artikel Article | 2017 |
| 46 | | Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar | Grid Shock: Coordinated Load-Changing Attacks on Power Grids | Konferenzbeitrag Inproceedings | 2017 |
| 47 | | Judmayer, Aljosha ; Ullrich, Johanna ; Merzdovnik, Georg ; Voyiatzis, Artemios G. ; Weippl, Edgar | Lightweight Address Hopping for Defending the IPv6 IoT | Konferenzbeitrag Inproceedings | 2017 |
| 48 | | Kieseberg, Peter ; Neuner, Sebastian ; Schrittwieser, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar | Real-time forensics through endpoint visibility | Konferenzbeitrag Inproceedings | 2017 |
| 49 | | Krombholz, Katharina ; Mayer, Wilfried ; Mulazzani, Martin ; Weippl, Edgar | I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS | Konferenzbeitrag Inproceedings | 2017 |
| 50 | | Islam, Shareeful ; Fenz, Stefan ; Weippl, Edgar ; Kalloniatis, Christos | Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners | Artikel Article | 2016 |
| 51 | | Ismail, Umar Mukhtar ; Islam, Shariful ; Ouedraogo, Moussa ; Weippl, Edgar | A Framework for Security Transparency in Cloud Computing | Artikel Article | 2016 |
| 52 | | Dabrowski, Adrian ; Petzl, Georg ; Weippl, Edgar | The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection | Konferenzbeitrag Inproceedings | 2016 |
| 53 | | Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar | Effectiveness of file‐based deduplication in digital forensics | Artikel Article | 2016 |
| 54 | | Ullrich, Johanna ; Weippl, Edgar | The beauty or the beast? Attacking rate limits of the xen hypervisor | Konferenzbeitrag Inproceedings | 2016 |
| 55 | | Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kinder, Johannes ; Merzdovnik, Georg ; Weippl, Edgar | Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? | Artikel Article | 2016 |
| 56 | | Kieseberg, Peter ; Malle, Bernd ; Frühwirt, Peter ; Holzinger, Andreas ; Weippl, Edgar | A tamper-proof audit and control system for the doctor in the loop | Artikel Article | 2016 |
| 57 | | Ullrich, Johanna ; Cropper, Jordan ; Frühwirt, Peter ; Weippl, Edgar | The and security of firewalls in cyber-physical cloud computing | Artikel Article | 2016 |
| 58 | | Neuner, Sebastian ; Mulazzani, Martin ; Schrittwieser, Sebastian ; Weippl, Edgar | Gradually Improving the Forensic Process | Konferenzbeitrag Inproceedings | 2015 |
| 59 | | Buhov, Damjan ; Huber, Markus ; Merzdovnik, Georg ; Weippl, Edgar ; Dimitrova, Vesna | Network Security Challenges in Android Applications | Konferenzbeitrag Inproceedings | 2015 |
| 60 | | Krombholz, Katharina ; Dabrowski, Adrian ; Smith, Matthew ; Weippl, Edgar | Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing | Konferenzbeitrag Inproceedings | 2015 |