Остановите войну!
for scientists:
default search action
Edgar R. Weippl
- > Home > Persons > Edgar R. Weippl
Publications
- 2023
- [j62]Edgar R. Weippl, Andreas Holzinger, Peter Kieseberg:
Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2020". Mach. Learn. Knowl. Extr. 5(1): 173-174 (2023) - [c185]Peter Kieseberg, Edgar R. Weippl, A Min Tjoa, Federico Cabitza, Andrea Campagner, Andreas Holzinger:
Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? CD-MAKE 2023: 1-12 - [e33]Andreas Holzinger, Peter Kieseberg, Federico Cabitza, Andrea Campagner, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 - September 1, 2023, Proceedings. Lecture Notes in Computer Science 14065, Springer 2023, ISBN 978-3-031-40836-6 [contents] - 2022
- [e32]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23-26, 2022, Proceedings. Lecture Notes in Computer Science 13480, Springer 2022, ISBN 978-3-031-14462-2 [contents] - 2021
- [j59]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [c169]Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - [c166]Andreas Holzinger, Edgar R. Weippl, A Min Tjoa, Peter Kieseberg:
Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. CD-MAKE 2021: 1-20 - [e30]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12844, Springer 2021, ISBN 978-3-030-84059-4 [contents] - 2020
- [e29]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings. Lecture Notes in Computer Science 12279, Springer 2020, ISBN 978-3-030-57320-1 [contents] - 2019
- [c157]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg, Edgar R. Weippl, Alessio Bertone:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. DPM/CBT@ESORICS 2019: 39-48 - [c153]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c152]Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [p8]Peter Kieseberg, Edgar R. Weippl:
Securing Information Against Manipulation in the Production Systems Engineering Process. Security and Quality in Cyber-Physical Systems Engineering 2019: 335-356 - [e25]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11713, Springer 2019, ISBN 978-3-030-29725-1 [contents] - 2018
- [c146]Andreas Holzinger, Peter Kieseberg, Edgar R. Weippl, A Min Tjoa:
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. CD-MAKE 2018: 1-8 - [c145]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c140]Peter Kieseberg, Edgar R. Weippl:
Security Challenges in Cyber-Physical Production Systems. SWQD 2018: 3-16 - [e23]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27-30, 2018, Proceedings. Lecture Notes in Computer Science 11015, Springer 2018, ISBN 978-3-319-99739-1 [contents] - 2017
- [c132]Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [e22]Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio di Calabria, Italy, August 29 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10410, Springer 2017, ISBN 978-3-319-66807-9 [contents] - [i12]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i8]Klaus Kieseberg, Peter Kieseberg, Edgar R. Weippl:
Trend Analysis of Underground Marketplaces. ERCIM News 2017(111) (2017) - 2016
- [j48]Peter Kieseberg, Bernd Malle, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
A tamper-proof audit and control system for the doctor in the loop. Brain Informatics 3(4): 269-279 (2016) - [c128]Bernd Malle, Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. CD-ARES 2016: 251-266 - [e20]Francesco Buccafurri, Andreas Holzinger, Peter Kieseberg, A Min Tjoa, Edgar R. Weippl:
Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9817, Springer 2016, ISBN 978-3-319-45506-8 [contents] - [i6]Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
Trust for the "Doctor in the Loop". ERCIM News 2016(104) (2016) - [i5]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - 2015
- [j40]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [c112]Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. ARES 2015: 186-192 - [c107]Peter Kieseberg, Johannes Schantl, Peter Frühwirt, Edgar R. Weippl, Andreas Holzinger:
Witnesses for the Doctor in the Loop. BIH 2015: 369-378 - [c105]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c104]Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding. IFIP Int. Conf. Digital Forensics 2015: 179-194 - 2014
- [j38]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [j36]Peter Frühwirt, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4): 336-348 (2014) - [j35]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [j33]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c100]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c95]Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. HCI (24) 2014: 79-90 - [c94]Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar R. Weippl:
E-voting Authentication with QR-codes. HCI (24) 2014: 149-159 - [c93]Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c89]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications. iiWAS 2014: 142-151 - [c85]Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl:
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Sicherheit 2014: 363-374 - [p4]Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar R. Weippl, Andreas Holzinger:
Protecting Anonymity in Data-Driven Biomedical Science. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 301-316 - 2013
- [j32]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar R. Weippl:
Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Comput. Commun. 9(1) (2013) - [j31]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. Int. J. Web Inf. Syst. 9(1): 53-68 (2013) - [j30]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Secur. Tech. Rep. 17(4): 227-238 (2013) - [c79]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c77]Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. IFIP Int. Conf. Digital Forensics 2013: 183-193 - 2012
- [c73]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - [c70]Sebastian Schrittwieser, Peter Kieseberg, Edgar R. Weippl:
Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120 - [c69]Lorenz Zechner, Peter Kieseberg, Edgar R. Weippl:
INMOTOS: extending the ROPE-methodology. iiWAS 2012: 272-277 - [c68]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - 2011
- [c65]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285 - [c63]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304 - [c62]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - 2010
- [c47]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-09 23:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint