Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Edgar R. Weippl
Edgar Weippl
2010 – today
- 2013
[j29]Edgar Weippl, Pietro Manzoni: Mobile Computing - Introduction to the Special Theme. ERCIM News 2013(93) (2013)
[j28]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar Weippl: Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Computing and Communications 9(1) (2013)
[j27]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar Weippl: Using the structure of B+-trees for enhancing logging mechanisms of databases. IJWIS 9(1): 53-68 (2013)
[j26]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar Weippl: InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Sec. Techn. Report 17(4): 227-238 (2013)
[c75]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar Weippl: Covert computation: hiding code in code for obfuscation purposes. ASIACCS 2013: 529-534
[c74]Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl: Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. SEC 2013: 286-299
[e6]Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu (Eds.): Availability, Reliability, and Security in Information Systems and HCI - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8127, Springer 2013, ISBN 978-3-642-40510-5
[e5]Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu (Eds.): Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8128, Springer 2013, ISBN 978-3-642-40587-7
[e4]Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu (Eds.): Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8128, Springer 2013, ISBN 978-3-642-40587-7
[e3]Khabib Mustofa, Erich J. Neuhold, A Min Tjoa, Edgar Weippl, Ilsun You (Eds.): Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings. Lecture Notes in Computer Science 7804, Springer 2013, ISBN 978-3-642-36817-2- 2012
[j25]
[j24]Manuel Leithner, Edgar Weippl: Coding for Penetration Testers. Computers & Security 31(2): 252 (2012)
[j23]Aleksandar Hudic, Edgar Weippl: Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure. Computers & Security 31(4): 629 (2012)
[j22]Edgar Weippl, Manuel Leithner: Enterprise Security for the Executive. Computers & Security 31(4): 636 (2012)
[j21]Manuel Leithner, Edgar R. Weippl: Thor's Microsoft Security Bible. Computers & Security 31(4): 638 (2012)
[j20]Manuel Leithner, Edgar Weippl: XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts. Computers & Security 31(4): 639 (2012)
[j19]
[j18]Amin Anjomshoaa, Khue Vo Sao, Amirreza Tahamtan, A Min Tjoa, Edgar Weippl: Self-monitoring in social networks. IJIIDS 6(4): 363-380 (2012)
[j17]Katharina Krombholz, Dieter Merkl, Edgar Weippl: Fake identities in social media: A case study on the sustainability of the Facebook business model. JoSSR 4(2): 175-212 (2012)
[c73]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar Weippl: InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633
[c72]Martin Mulazzani, Markus Huber, Edgar Weippl: Data Visualization for Social Network Forensics. IFIP Int. Conf. Digital Forensics 2012: 115-126
[c71]
[c70]Sebastian Schrittwieser, Peter Kieseberg, Edgar Weippl: Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120
[c69]Lorenz Zechner, Peter Kieseberg, Edgar Weippl: INMOTOS: extending the ROPE-methodology. iiWAS 2012: 272-277
[c68]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl: Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012
[c67]Aleksandar Hudic, Lorenz Zechner, Shareeful Islam, Christian Krieg, Edgar R. Weippl, Severin Winkler, Richard Hable: Towards a Unified Penetration Testing Taxonomy. SocialCom/PASSAT 2012: 811-812
[e2]Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl (Eds.): Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings. Lecture Notes in Computer Science 7465, Springer 2012, ISBN 978-3-642-32497-0
[e1]Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang (Eds.): Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5- 2011
[j16]Christian Schwarzl, Edgar Weippl: A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. IJSSE 2(1): 40-83 (2011)
[j15]Markus Huber, Martin Mulazzani, Edgar Weippl, Gerhard Kitzler, Sigrun Goluch: Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing 15(3): 28-34 (2011)
[c66]Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar Weippl: Social snapshots: digital forensics for online social networks. ACSAC 2011: 113-122
[c65]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar Weippl: Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285
[c64]Nicolas Racz, Edgar Weippl, Andreas Seufert: Governance, Risk & Compliance (GRC) Software - An Exploratory Study of Software Vendor and Market Research Perspectives. HICSS 2011: 1-10
[c63]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar Weippl: Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304
[c62]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar Weippl: An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452
[c61]Nicolas Racz, Edgar Weippl, Riccardo Bonazzi: IT Governance, Risk & Compliance (GRC) Status Quo and Integration: An Explorative Industry Case Study. SERVICES 2011: 429-436
[c60]Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl: Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. USENIX Security Symposium 2011- 2010
[j14]Thomas Neubauer, Johannes Heurix, A Min Tjoa, Edgar R. Weippl: Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik 127(5): 135-142 (2010)
[j13]Muhammad Asfand-e-yar, Amin Anjomshoaa, Edgar R. Weippl, A. Min Tjoa: Exploiting Ontology for Software License Agreements. Int. J. Software and Informatics 4(1): 89-100 (2010)
[j12]Rivi Sandhu, A Min Tjoa, Edgar R. Weippl: Guest Editorial Foreword to the Special Issue on Availability, Reliability, and Security. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(4): 369-371 (2010)
[j11]Martin Mulazzani, Markus Huber, Edgar R. Weippl: Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(5): 539-546 (2010)
[c59]Amin Anjomshoaa, Khue Vo Sao, A. Min Tjoa, Edgar Weippl, Michael Hollauf: Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case. ACIIDS (1) 2010: 180-189
[c58]Peter Frühwirt, Markus Huber, Martin Mulazzani, Edgar R. Weippl: InnoDB Database Forensics. AINA 2010: 1028-1036
[c57]Nicolas Racz, Edgar Weippl, Andreas Seufert: Integrating IT Governance, Risk, and Compliance Management Processes. DB&IS 2010: 325-338
[c56]Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl: Cheap and automated socio-technical attacks based on social networking sites. AISec 2010: 61-64
[c55]Markus Huber, Martin Mulazzani, Edgar Weippl, Gerhard Kitzler, Sigrun Goluch: Exploiting social networking sites for spam. ACM Conference on Computer and Communications Security 2010: 693-695
[c54]Nicolas Racz, Edgar Weippl, Andreas Seufert: A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). Communications and Multimedia Security 2010: 106-117
[c53]Markus Huber, Martin Mulazzani, Edgar Weippl: Tor HTTP Usage and Information Leakage. Communications and Multimedia Security 2010: 245-255
[c52]Wikan Danar Sunindyo, Stefan Biffl, Richard Mordinyi, Thomas Moser, Alexander Schatten, Mohammed Tabatabai Irani, Dindin Wahyudin, Edgar Weippl, Dietmar Winkler: An event-based empirical process analysis framework. ESEM 2010
[c51]Nicolas Racz, Edgar R. Weippl, Andreas Seufert: Questioning the Need for Separate IT Risk Management Frameworks. GI Jahrestagung (2) 2010: 245-252
[c50]Farman Ali Khan, Sabine Graf, Edgar R. Weippl, A Min Tjoa: Implementation of Affective States and Learning Styles Tactics in Web-Based Learning Management Systems. ICALT 2010: 734-735
[c49]Katharina Holzinger, Andreas Holzinger, Christian Safran, Gabriele Koiner-Erath, Edgar R. Weippl: Use of Wiki Systems in Archaeology - Privacy, Security and Data Protection as Key Problems. ICE-B 2010: 120-123
[c48]Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, A. Min Tjoa: A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects. KSEM 2010: 412-423
[c47]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl: QR code security. MoMM 2010: 430-435
[c46]Markus Huber, Martin Mulazzani, Edgar Weippl: Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. SEC 2010: 80-89
[c45]Markus Huber, Martin Mulazzani, Edgar R. Weippl: Social Networking Sites Security: Quo Vadis. SocialCom/PASSAT 2010: 1117-1122
2000 – 2009
- 2009
[j10]Mohammad Tabatabai Irani, Edgar R. Weippl: Automation of post-exploitation. IJWIS 5(4): 518-536 (2009)
[c44]Mohammad Tabatabai Irani, Edgar R. Weippl: Automation of Post-exploitation - (Focused on MS-Windows Targets). FGIT-SecTech 2009: 250-257
[c43]Farman Ali Khan, Sabine Graf, Edgar R. Weippl, A. Min Tjoa: An approach for identifying affective states through behavioral patterns in web-based learning management systems. iiWAS 2009: 431-435
[c42]Peter Kalchgruber, Edgar R. Weippl: Can end-to-end verifiable e-voting be explained easily? iiWAS 2009: 572-576
[c41]Muhammad Asfand-e-yar, Amin Anjomshoaa, Edgar R. Weippl, A. Min Tjoa: Blending the Sketched Use Case Scenario with License Agreements Using Semantics. KSEM 2009: 275-284
[p2]Edgar Weippl: Database Security and Statistical Database Security. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2100-2108
[p1]Edgar R. Weippl, Markus D. Klemen, Stefan Raffeiner: Improving Storage Concepts for Semantic Models and Ontologies. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 2348-2358
[r1]Edgar Weippl: Database Security and Statistical Database Security. Encyclopedia of Data Warehousing and Mining 2009: 610-616- 2008
[j9]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl: XML security - A comparative literature review. Journal of Systems and Software 81(10): 1715-1724 (2008)
[c40]Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl: Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582- 2007
[j8]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl: Architectural approach for handling semi-structured data in a user-centred working environment. IJWIS 3(3): 198-211 (2007)
[c39]Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl: Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13
[c38]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl: Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156
[c37]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar Weippl: Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43
[c36]Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A. Min Tjoa, Edgar R. Weippl, Dominik Zyskowski: Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31
[c35]Bernhard Riedl, Gernot Goluch, Stefan Pöchlinger, Edgar R. Weippl: A Comparative Literature Review on RFID Security and Privacy. iiWAS 2007: 213-222
[c34]Khalid Latif, Edgar Weippl, A. Min Tjoa: Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. IRI 2007: 170-176
[c33]Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl: Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388
[c32]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl: Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95- 2006
[j7]Edgar Weippl, Andreas Holzinger, A. Min Tjoa: Security aspects of ubiquitous computing in healthcare. Elektrotechnik und Informationstechnik 123(4): 156-161 (2006)
[c31]Thomas Neubauer, Christian Stummer, Edgar Weippl: Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373
[c30]Thomas Neubauer, Edgar Weippl, Stefan Biffl: Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731
[c29]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl: Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259
[c28]
[c27]Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa: The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151
[c26]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl: Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48
[c25]- 2005
[b1]Edgar Weippl: Security in E-Learning. Advances in Information Security 16, Springer 2005, ISBN 978-0-387-24341-2, pp. 1-185
[j6]
[j5]Edgar R. Weippl, A. Min Tjoa: Privacy in e-learning: anonymity, pseudonyms and authenticated usage. Interact. Techn. Smart Edu. 2(4): 247-256 (2005)
[j4]Tho Manh Nguyen, Peter Brezany, A. Min Tjoa, Edgar Weippl: Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. IJDWM 1(4): 22-55 (2005)
[c24]Edgar R. Weippl, A. Min Tjoa: Privacy in E-learning: How to implement anonymity. AICCSA 2005: 840-846
[c23]Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa: Semantic Storage: A Report on Performance and Flexibility. DEXA 2005: 586-595
[c22]Eva Gahleitner, Wernher Behrendt, Jürgen Palkoska, Edgar Weippl: On cooperatively creating dynamic ontologies. Hypertext 2005: 208-210- 2004
[j3]Wolfgang Eßmayr, Stefan Probst, Edgar Weippl: Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. Electronic Commerce Research 4(1-2): 127-156 (2004)
[c21]Rudolf Ramler, Klaus Wolfmaier, Edgar Weippl: From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach. ICWE 2004: 287-299
[c20]
[c19]Edgar Weippl, Alexander Schatten, Shuaib Karim, A. Min Tjoa: SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. PAKM 2004: 365-377- 2003
[j2]Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug: A New Approach To Secure Federated Information Bases Using Agent Technology. J. Database Manag. 14(1): 48-68 (2003)
[j1]Edgar Weippl, Wolfgang Eßmayr: Personal Trusted Devices for Web Services: Revisiting Multilevel Security. MONET 8(2): 151-157 (2003)
[c18]Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl: XML-Based OLAP Query Processing in a Federated Data Warehouses. ICEIS (1) 2003: 71-78
[c17]Reinhard Kronsteiner, Edgar Weippl, Ismail Khalil Ibrahim, Gabriele Kotsis: Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content? iiWAS 2003
[c16]- 2002
[c15]Stefan Probst, Wolfgang Eßmayr, Edgar Weippl: Reusable Components for Developing Security-Aware Application. ACSAC 2002: 239-248
[c14]Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker: Towards authentication using mobile devices. Communications and Multimedia Security 2002: 91-105
[c13]Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl: CoSMo: An Approach Towards Conceptual Security Modeling. DEXA 2002: 557-566- 2001
[c12]
[c11]Edgar Weippl: Building secure knowledge bases: combining Java agents and DBagents. Agents 2001: 212-213
[c10]
[c9]Ismail Khalil Ibrahim, Wieland Schwinger, Edgar Weippl, Josef Altmann, Werner Winiwarter: Agent Solutions for E-Business Transactions. DEXA Workshop 2001: 84-86
[c8]Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwarter: Content-based Management of Document Access Control. INAP 2001: 78-86
[c7]Bronson Trevor, Edgar Weippl, Werner Winiwarter: A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content. INAP 2001: 316-330
[c6]- 2000
[c5]Edgar Weippl, Wolfgang Eßmayr: Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. DEXA 2000: 939-948
[c4]Edgar Weippl, Jörn Altmann, Wolfgang Eßmayr: Mobile Database Agents for Building Data Warehouses. DEXA Workshop 2000: 477-481
[c3]Edgar Weippl, Hans Lohninger: Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases. EJC 2000: 271-274
[c2]Edgar Weippl: Coimbra: secure Web access to multimedia content. ACM Multimedia Workshops 2000: 145-148
[c1]Wolfgang Eßmayr, Edgar Weippl: Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:07 CEST by the dblp team



