Full name Familienname, Vorname
Weippl, Edgar
 
Main Affiliation Organisations­zuordnung
 

Results 41-60 of 194 (Search time: 0.006 seconds).

PreviewAuthor(s)TitleTypeIssue Date
41Neuner, Sebastian ; Voyiatzis, Artemios G. ; Schmiedecker, Martin ; Weippl, Edgar Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFSKonferenzbeitrag Inproceedings2017
42Merzdovnik, Georg ; Huber, Markus ; Buhov, Damjan ; Nikiforakis, Nick ; Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar Block Me If You Can: A Large-Scale Study of Tracker-Blocking ToolsKonferenzbeitrag Inproceedings2017
43Machida, Shimon ; Dabrowski, Adrian ; Weippl, Edgar ; Echizen, Isao PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social NetworksKonferenzbeitrag Inproceedings2017
44Islam, Shareeful ; Fenz, Stefan ; Weippl, Edgar ; Mouratidis, Haralambos A Risk Management Framework for Cloud Migration Decision SupportArtikel Article2017
45Ullrich, Johanna ; Zseby, Tanja ; Fabini, Joachim ; Weippl, Edgar Network-Based Secret Communication in Clouds: A SurveyArtikel Article 2017
46Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar Grid Shock: Coordinated Load-Changing Attacks on Power GridsKonferenzbeitrag Inproceedings2017
47Judmayer, Aljosha ; Ullrich, Johanna ; Merzdovnik, Georg ; Voyiatzis, Artemios G. ; Weippl, Edgar Lightweight Address Hopping for Defending the IPv6 IoTKonferenzbeitrag Inproceedings2017
48Kieseberg, Peter ; Neuner, Sebastian ; Schrittwieser, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar Real-time forensics through endpoint visibilityKonferenzbeitrag Inproceedings2017
49Krombholz, Katharina ; Mayer, Wilfried ; Mulazzani, Martin ; Weippl, Edgar I Have No Idea What I'm Doing - On the Usability of Deploying HTTPSKonferenzbeitrag Inproceedings2017
50Islam, Shareeful ; Fenz, Stefan ; Weippl, Edgar ; Kalloniatis, Christos Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on PractitionersArtikel Article2016
51Ismail, Umar Mukhtar ; Islam, Shariful ; Ouedraogo, Moussa ; Weippl, Edgar A Framework for Security Transparency in Cloud ComputingArtikel Article2016
52Dabrowski, Adrian ; Petzl, Georg ; Weippl, Edgar The Messenger Shoots Back: Network Operator Based IMSI Catcher DetectionKonferenzbeitrag Inproceedings2016
53Neuner, Sebastian ; Schmiedecker, Martin ; Weippl, Edgar Effectiveness of file‐based deduplication in digital forensicsArtikel Article 2016
54Ullrich, Johanna ; Weippl, Edgar The beauty or the beast? Attacking rate limits of the xen hypervisorKonferenzbeitrag Inproceedings2016
55Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kinder, Johannes ; Merzdovnik, Georg ; Weippl, Edgar Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?Artikel Article 2016
56Kieseberg, Peter ; Malle, Bernd ; Frühwirt, Peter ; Holzinger, Andreas ; Weippl, Edgar A tamper-proof audit and control system for the doctor in the loopArtikel Article 2016
57Ullrich, Johanna ; Cropper, Jordan ; Frühwirt, Peter ; Weippl, Edgar The and security of firewalls in cyber-physical cloud computingArtikel Article2016
58Neuner, Sebastian ; Mulazzani, Martin ; Schrittwieser, Sebastian ; Weippl, Edgar Gradually Improving the Forensic ProcessKonferenzbeitrag Inproceedings2015
59Buhov, Damjan ; Huber, Markus ; Merzdovnik, Georg ; Weippl, Edgar ; Dimitrova, Vesna Network Security Challenges in Android ApplicationsKonferenzbeitrag Inproceedings2015
60Krombholz, Katharina ; Dabrowski, Adrian ; Smith, Matthew ; Weippl, Edgar Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable ComputingKonferenzbeitrag Inproceedings2015

Results 41-60 of 136 (Search time: 0.018 seconds).

PreviewAuthor(s)TitleTypeIssue Date
41Berlakovich Felix - 2019 - Mitigating return address leaks with software...pdf.jpgBerlakovich, Felix Mitigating return address leaks with software diversityThesis Hochschulschrift 2019
42Weisskirchner Patrick - 2019 - Evaluation and improvement of ethereum light...pdf.jpgWeißkirchner, Patrick Evaluation and improvement of ethereum light clientsThesis Hochschulschrift 2019
43Stuetz Anton - 2019 - Personal privacy in wireless emissions.pdf.jpgStütz, Anton Personal privacy in wireless emissionsThesis Hochschulschrift 2019
44Wagner Thomas - 2019 - Ein Multi-Architektur Decompiler.pdf.jpgWagner, Thomas Ein Multi-Architektur DecompilerThesis Hochschulschrift 2019
45Szivos Gabor Zoltan - 2019 - Human assisted information extraction through...pdf.jpgSzivos, Gabor Zoltan Human assisted information extraction through Bluetooth low energy on androidThesis Hochschulschrift 2019
46Baumgartner Jakob - 2019 - Automatic identification of cross-container...pdf.jpgBaumgartner, Jakob Automatic identification of cross-container side-channelsThesis Hochschulschrift 2019
47Mai, Alexandra Visualization of bitcoin transactions for forensic and security analysisThesis Hochschulschrift2018
48Fink Tobias - 2018 - Automated XSS vulnerability detection through context aware...pdf.jpgFink, Tobias Automated XSS vulnerability detection through context aware fuzzing and dynamic analysisThesis Hochschulschrift 2018
49Dabrowski Adrian Marek - 2018 - Security and privacy in large-scale...pdf.jpgDabrowski, Adrian Marek Security and privacy in large-scale InfrastructureThesis Hochschulschrift 2018
50Plieschnegger Stefanie - 2018 - Public Wi-Fi hotspots in the wild revealing...pdf.jpgPlieschnegger, Stefanie Public Wi-Fi hotspots in the wild : revealing vulnerabilities and restrictions for ordinary hotspot usersThesis Hochschulschrift 2018
51Wiesinger Manuel - 2018 - Mitigating Rowhammer attacks with software diversity.pdf.jpgWiesinger, Manuel Mitigating Rowhammer attacks with software diversityThesis Hochschulschrift 2018
52Suchan Alexander - 2018 - Stop to unlock - improving the security of unlock...pdf.jpgSuchan, Alexander Stop to unlock - improving the security of unlock patterns on mobile devicesThesis Hochschulschrift 2018
53Kleine Kristoffer - 2018 - Efficient algorithms and tools for practical...pdf.jpgKleine, Kristoffer Efficient algorithms and tools for practical combinatorial testingThesis Hochschulschrift 2018
54Leonhartsberger Lisa Maria - 2018 - Sichere mobile Apps mit...pdf.jpgLeonhartsberger, Lisa Maria Sichere mobile Apps mit plattformübergreifenden Frameworks entwickeln : Herausforderungen und Lösungsansätze für EntwicklerInnen : challenges and approaches for developersThesis Hochschulschrift 2018
55Mulser Simon - 2018 - Simulation of different selfish mining strategies in...pdf.jpgMulser, Simon Simulation of different selfish mining strategies in bitcoin : simulation respecting network topology and reference implementationThesis Hochschulschrift 2018
56Fassl Matthias - 2018 - Usable authentication ceremonies in secure instant...pdf.jpgFassl, Matthias Usable authentication ceremonies in secure instant messagingThesis Hochschulschrift 2018
57Neuner Sebastian - 2017 - Bad things happen through USB.pdf.jpgNeuner, Sebastian Bad things happen through USBThesis Hochschulschrift 2017
58Zamyatin Alexei - 2017 - Merged mining analysis of effects and implications.pdf.jpgZamyatin, Alexei Merged mining : analysis of effects and implicationsThesis Hochschulschrift 2017
59Fraihs Nikolai - 2017 - Malvertising und Malware im Kontext von Android.pdf.jpgFraihs, Nikolai Malvertising und Malware im Kontext von AndroidThesis Hochschulschrift 2017
60Brendler Samuel - 2017 - Visual detection of anti-adblocking software.pdf.jpgBrendler, Samuel Visual detection of anti-adblocking softwareThesis Hochschulschrift 2017