


Остановите войну!
for scientists:


default search action
Edgar R. Weippl
Person information

- affiliation: University of Vienna, Austria
- affiliation: SBA Research, Austria
- affiliation: Vienna University of Technology, Institute of Software Technology and Interactive Systems
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j63]Gabriel K. Gegenhuber
, Markus Maier
, Florian Holzbauer
, Wilfried Mayer, Georg Merzdovnik
, Edgar R. Weippl
, Johanna Ullrich:
An extended view on measuring tor AS-level adversaries. Comput. Secur. 132: 103302 (2023) - [j62]Edgar R. Weippl, Andreas Holzinger
, Peter Kieseberg
:
Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2020". Mach. Learn. Knowl. Extr. 5(1): 173-174 (2023) - [j61]Matthias Eckhart
, Andreas Ekelhart
, Stefan Biffl
, Arndt Lüder
, Edgar R. Weippl
:
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Trans. Ind. Informatics 19(4): 5870-5881 (2023) - [c184]Peter Kieseberg
, Edgar R. Weippl, A Min Tjoa, Federico Cabitza, Andrea Campagner, Andreas Holzinger
:
Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? CD-MAKE 2023: 1-12 - [c183]Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl:
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. SECRYPT 2023: 7-19 - [c182]Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski:
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. USENIX Security Symposium 2023: 3493-3510 - [e33]Andreas Holzinger
, Peter Kieseberg
, Federico Cabitza
, Andrea Campagner
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 - September 1, 2023, Proceedings. Lecture Notes in Computer Science 14065, Springer 2023, ISBN 978-3-031-40836-6 [contents] - 2022
- [j60]Matthias Eckhart
, Andreas Ekelhart
, Edgar R. Weippl
:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1655-1672 (2022) - [c181]Simin Ghesmati, Walid Fdhila
, Edgar R. Weippl:
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques. ARES 2022: 5:1-5:14 - [c180]Katja Bühler
, Cornelia Travnicek
, Veronika Nowak
, Edgar R. Weippl
, Lukas Fischer
, Rudolf Ramler
, Robert Wille
:
Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers. DEXA Workshops 2022: 155-166 - [c179]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: - How I Learned to Stop Worrying and Love the Fork. ESORICS (1) 2022: 46-66 - [c178]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Estimating (Miner) Extractable Value is Hard, Let's Go Shopping! Financial Cryptography Workshops 2022: 74-92 - [c177]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. Financial Cryptography Workshops 2022: 164-194 - [c176]Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl:
Zero-Rating, One Big Mess: Analyzing Differential Pricing Practices of European MNOs. GLOBECOM 2022: 203-208 - [c175]Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl, Katharina Krombholz:
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). HCI (32) 2022: 42-61 - [c174]Alexandra Mai, Oliver Schedler, Edgar R. Weippl, Katharina Krombholz:
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations. HCI (32) 2022: 173-193 - [c173]Sebastian Schrittwieser
, Patrick Kochberger
, Michael Pucher
, Caroline Lawitschka, Philip König, Edgar R. Weippl
:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. NordSec 2022: 273-291 - [c172]Manuel Kern, Florian Skopik, Max Landauer, Edgar R. Weippl:
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach. SAC 2022: 1656-1665 - [c171]Katharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz:
Replication: Stories as Informal Lessons about Security. SOUPS @ USENIX Security Symposium 2022: 1-18 - [c170]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. WWW (Companion Volume) 2022: 467-477 - [e32]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23-26, 2022, Proceedings. Lecture Notes in Computer Science 13480, Springer 2022, ISBN 978-3-031-14462-2 [contents] - [e31]Steven Furnell, Paolo Mori
, Edgar R. Weippl, Olivier Camp:
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1545, Springer 2022, ISBN 978-3-030-94899-3 [contents] - [i38]Alvaro A. Cárdenas-Mora, Simin Nadjm-Tehrani, Edgar R. Weippl, Matthias Eckhart
:
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171). Dagstuhl Reports 12(4): 54-71 (2022) - [i37]Patrick Kochberger, Sebastian Schrittwieser, Edgar R. Weippl:
Meta-framework for Automating Static Malware Analysis. ERCIM News 2022(129): 0 (2022) - [i36]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. IACR Cryptol. ePrint Arch. 2022: 285 (2022) - [i35]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2022: 287 (2022) - [i34]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. IACR Cryptol. ePrint Arch. 2022: 359 (2022) - [i33]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics & PayJoin Transactions. IACR Cryptol. ePrint Arch. 2022: 589 (2022) - 2021
- [j59]Peter Kieseberg
, Sebastian Schrittwieser
, Edgar R. Weippl
:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [j58]Paolo Mori, Wolfgang Prinz, Laura Ricci, Edgar R. Weippl:
Editorial for Special Issue on Block Chain Technology and its Applications. Pervasive Mob. Comput. 71: 101351 (2021) - [c169]Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg
, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - [c168]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Studying Bitcoin Privacy Attacks and Their Impact on Bitcoin-Based Identity Methods. BPM (Blockchain and RPA Forum) 2021: 85-101 - [c167]Adrian Dabrowski
, Katharina Pfeffer, Markus Reichel, Alexandra Mai, Edgar R. Weippl, Michael Franz:
Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure. DeFi@CCS 2021: 1-8 - [c166]Andreas Holzinger
, Edgar R. Weippl
, A Min Tjoa
, Peter Kieseberg
:
Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. CD-MAKE 2021: 1-20 - [c165]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c164]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [c163]Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics and PayJoin Transactions. HCI (38) 2021: 416-424 - [c162]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. NDSS 2021 - [c161]Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. USENIX Security Symposium 2021: 37-54 - [p11]Isabel Ramos
, Dale Mackrell
, Alta van der Merwe, Jan Pries-Heje, Jolita Ralyté, Janis Stirna, John Krogstie, Matthew Jones, Benjamin Mueller, Frédéric Adam, Bettina Jaber, Edgar R. Weippl, Marijn Janssen, Amany R. Elbanna, Banita Lal, Pierluigi Plebani
, Allen C. Johnston, Li Da Xu:
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems). IFIP's Exciting First 60+ Years 2021: 333-360 - [e30]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17-20, 2021, Proceedings. Lecture Notes in Computer Science 12844, Springer 2021, ISBN 978-3-030-84059-4 [contents] - [i32]Simon Dejung, Mingyan Liu, Arndt Lüder, Edgar R. Weippl:
Managing Industrial Control Systems Security Risks for Cyber Insurance (Dagstuhl Seminar 21451). Dagstuhl Reports 11(10): 36-56 (2021) - [i31]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Bitcoin Privacy - A Survey on Mixing Techniques. IACR Cryptol. ePrint Arch. 2021: 629 (2021) - [i30]Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods. IACR Cryptol. ePrint Arch. 2021: 1088 (2021) - [i29]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl:
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork. IACR Cryptol. ePrint Arch. 2021: 1182 (2021) - [i28]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Estimating (Miner) Extractable Value is Hard, Letâs Go Shopping! IACR Cryptol. ePrint Arch. 2021: 1231 (2021) - 2020
- [j57]Lotfi Ben Othmane, Doug Jacobson, Edgar R. Weippl:
Editorial: Special issue on security and privacy in smart cyber-physical systems. Comput. Secur. 88 (2020) - [c160]Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. SEC 2020: 234-247 - [c159]Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar R. Weippl, Katharina Krombholz:
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. SOUPS @ USENIX Security Symposium 2020: 341-358 - [c158]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Efficient Continuous Distributed Randomness. SP 2020: 73-89 - [e29]Andreas Holzinger
, Peter Kieseberg
, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25-28, 2020, Proceedings. Lecture Notes in Computer Science 12279, Springer 2020, ISBN 978-3-030-57320-1 [contents] - [e28]Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5 [contents] - [e27]Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12395, Springer 2020, ISBN 978-3-030-58985-1 [contents] - [i27]Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. IACR Cryptol. ePrint Arch. 2020: 942 (2020) - [i26]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [j56]Lotfi Ben Othmane, Doug Jacobson, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. Comput. Secur. 87 (2019) - [j55]Matthias Wenzl
, Georg Merzdovnik
, Johanna Ullrich, Edgar R. Weippl:
From Hack to Elaborate Technique - A Survey on Binary Rewriting. ACM Comput. Surv. 52(3): 49:1-49:37 (2019) - [j54]Matthias Eckhart
, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9(3): 52-73 (2019) - [c157]Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg
, Edgar R. Weippl, Alessio Bertone
:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. DPM/CBT@ESORICS 2019: 39-48 - [c156]Matthias Eckhart
, Andreas Ekelhart, Edgar R. Weippl:
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. ETFA 2019: 1222-1225 - [c155]Nicholas Stifter, Matthias Eckhart
, Bernhard Brenner, Edgar R. Weippl:
Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems. ETFA 2019: 1623-1626 - [c154]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining. Financial Cryptography 2019: 527-549 - [c153]Peter Kieseberg
, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c152]Peter Kieseberg
, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [c151]Matthias Eckhart
, Andreas Ekelhart, Arndt Lüder, Stefan Biffl, Edgar R. Weippl:
Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019: 3004-3011 - [c150]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. IECON 2019: 3012-3017 - [c149]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
A Versatile Security Layer for AutomationML. INDIN 2019: 358-364 - [c148]Adrian Dabrowski
, Georg Merzdovnik
, Johanna Ullrich
, Gerald Sendera, Edgar R. Weippl
:
Measuring Cookies and Web Privacy in a Post-GDPR World. PAM 2019: 258-270 - [p10]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Introduction to Security and Quality Improvement in Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 1-29 - [p9]Bernhard Brenner, Edgar R. Weippl:
Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks. Security and Quality in Cyber-Physical Systems Engineering 2019: 305-334 - [p8]Peter Kieseberg, Edgar R. Weippl:
Securing Information Against Manipulation in the Production Systems Engineering Process. Security and Quality in Cyber-Physical Systems Engineering 2019: 335-356 - [p7]Nicholas Stifter, Aljosha Judmayer, Edgar R. Weippl:
Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. Security and Quality in Cyber-Physical Systems Engineering 2019: 471-495 - [p6]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. Security and Quality in Cyber-Physical Systems Engineering 2019: 497-507 - [e26]Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar R. Weippl:
Security and Quality in Cyber-Physical Systems Engineering, With Forewords by Robert M. Lee and Tom Gilb. Springer 2019, ISBN 978-3-030-25311-0 [contents] - [e25]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11713, Springer 2019, ISBN 978-3-030-29725-1 [contents] - [e24]Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa
, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11711, Springer 2019, ISBN 978-3-030-27812-0 [contents] - [i25]Christian Kudera, Georg Merzdovnik, Edgar R. Weippl:
AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices. ERCIM News 2019(119) (2019) - [i24]Matthias Wenzl, Georg Merzdovnik, Edgar R. Weippl:
ISaFe - Injecting Security Features into Constrained Embedded Firmware. ERCIM News 2019(119) (2019) - [i23]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - [i22]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 985 (2019) - 2018
- [j53]David Rupprecht
, Adrian Dabrowski
, Thorsten Holz
, Edgar R. Weippl, Christina Pöpper
:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [j52]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid. Elektrotech. Informationstechnik 135(3): 250-255 (2018) - [c147]Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl:
A Framework for Monitoring Net Neutrality. ARES 2018: 17:1-17:10 - [c146]Andreas Holzinger
, Peter Kieseberg
, Edgar R. Weippl, A Min Tjoa
:
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. CD-MAKE 2018: 1-8 - [c145]Peter Kieseberg
, Sebastian Schrittwieser
, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c144]Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. DBSec 2018: 278-295 - [c143]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper). DPM/CBT@ESORICS 2018: 197-206 - [c142]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). Financial Cryptography Workshops 2018: 31-42 - [c141]Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. RAID 2018: 184-203 - [c140]Peter Kieseberg
, Edgar R. Weippl:
Security Challenges in Cyber-Physical Production Systems. SWQD 2018: 3-16 - [e23]Andreas Holzinger, Peter Kieseberg, A Min Tjoa
, Edgar R. Weippl:
Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27-30, 2018, Proceedings. Lecture Notes in Computer Science 11015, Springer 2018, ISBN 978-3-319-99739-1 [contents] - [i21]Foteini Baldimtsi, Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152). Dagstuhl Reports 8(4): 20-31 (2018) - [i20]Edgar R. Weippl, Benjamin Sanderse:
Digital Twins - Introduction to the Special Theme. ERCIM News 2018(115) (2018) - [i19]Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. IACR Cryptol. ePrint Arch. 2018: 87 (2018) - [i18]Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Practical Continuous Distributed Randomness. IACR Cryptol. ePrint Arch. 2018: 319 (2018) - [i17]Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar R. Weippl:
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. IACR Cryptol. ePrint Arch. 2018: 400 (2018) - [i16]Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. IACR Cryptol. ePrint Arch. 2018: 415 (2018) - [i15]Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. IACR Cryptol. ePrint Arch. 2018: 836 (2018) - [i14]Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar R. Weippl:
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining. IACR Cryptol. ePrint Arch. 2018: 1134 (2018) - 2017
- [b3]Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01224-2 - [j51]Aleksandar Hudic, Paul Smith, Edgar R. Weippl:
Security assurance assessment methodology for hybrid clouds. Comput. Secur. 70: 723-743 (2017) - [j50]Johanna Ullrich, Tanja Zseby, Joachim Fabini, Edgar R. Weippl:
Network-Based Secret Communication in Clouds: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1112-1144 (2017) - [j49]Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl:
Securing the Internet, One HTTP 200 OK at a Time. login Usenix Mag. 42(4) (2017) - [c139]Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik
, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. ARES 2017: 20:1-20:10 - [c138]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. ARES 2017: 33:1-33:6 - [c137]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ACSAC 2017: 303-314 - [c136]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse or Cure? DPM/CBT@ESORICS 2017: 316-333 - [c135]Aljosha Judmayer, Georg Merzdovnik
, Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
A Performance Assessment of Network Address Shuffling in IoT Systems. EUROCAST (1) 2017: 197-204 - [c134]Georg Merzdovnik
, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. EuroS&P 2017: 319-333 - [c133]Shimon Machida, Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [c132]