Full name Familienname, Vorname
Weippl, Edgar
 
Main Affiliation Organisations­zuordnung
 

Results 1-20 of 193 (Search time: 0.002 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Kieseberg, Peter ; Weippl, Edgar ; Tjoa, A. Min ; Cabitza, Federico ; Campagner, Andrea ; Holzinger, Andreas Controllable AI - An Alternative to Trustworthiness in Complex AI Systems?Inproceedings Konferenzbeitrag 22-Aug-2023
2Judmayer, Aljosha ; Stifter, Nicholas ; Schindler, Philipp ; Weippl, Edgar How much is the fork? Fast Probability and Profitability Calculation during Temporary ForksInproceedings Konferenzbeitrag 2022
3Ghesmati, Simin ; Fdhila, Walid ; Weippl, Edgar User-Perceived Privacy in BlockchainPreprint Preprint2022
4Ghesmati-2022-Usability of Cryptocurrency Wallets Providing CoinJoin Tra...-smur.pdf.jpgGhesmati, Simin ; Fdhila, Walid ; Weippl, Edgar R. Usability of Cryptocurrency Wallets Providing CoinJoin TransactionsPreprint Preprint 2022
5Holzinger, Andreas ; Weippl, Edgar ; Tjoa, A Min ; Kieseberg, Peter Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AIKonferenzbeitrag Inproceedings2021
6Ghesmati, Simin ; Kern, Andreas ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar Unnecessary Input Heuristics and PayJoin TransactionsInproceedings Konferenzbeitrag 2021
7Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW CryptocurrenciesInproceedings Konferenzbeitrag 2021
8Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW CryptocurrenciesInproceedings Konferenzbeitrag 2021
9Schindler, Philipp ; Judmayer, Aljosha ; Hittmeir, Markus ; Stifter, Nicholas ; Weippl, Edgar RandRunner: Distributed Randomness from Trapdoor VDFs with Strong UniquenessKonferenzbeitrag Inproceedings 2021
10Mai, Alexandra ; Pfeffer, Katharina ; Gusenbauer, Matthias ; Weippl, Edgar ; Krombholz, Katharina User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachInproceedings Konferenzbeitrag Aug-2020
11Eckhart, Matthias ; Ekelhart, Andreas ; Weippl, Edgar Automated Security Risk Identification Using AutomationML-based Engineering DataArtikel Article 2020
12Schindler, Philipp ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar HydRand: Efficient Continuous Distributed RandomnessKonferenzbeitrag Inproceedings2020
13Brenner, Bernhard ; Ekelhart, Andreas ; Weippl, Edgar A versatile Security Layer for AutomationMLKonferenzbeitrag Inproceedings 2019
14Eckhart, Matthias ; Ekelhart, Andreas ; Weippl, Edgar Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital TwinsKonferenzbeitrag Inproceedings 2019
15Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna ; Weippl, Edgar From Hack to Elaborate Technique-A Survey on Binary RewritingArtikel Article 2019
16Dabrowski, Adrian ; Merzdovnik, Georg ; Ullrich, Johanna ; Sendera, Gerald ; Weippl, Edgar Measuring Cookies and Web Privacy in a Post-GDPR WorldKonferenzbeitrag Inproceedings2019
17Stifter, Nicholas ; Schindler, Philipp ; Judmayer, Aljosha ; Zamyatin, Alexei ; Kern, Andreas ; Weippl, Edgar Echoes of the Past: Recovering Blockchain Metrics from Merged miningKonferenzbeitrag Inproceedings 2019
18Stifter, Nicholas ; Eckhart, Matthias ; Brenner, Bernhard ; Weippl, Edgar "Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems"Konferenzbeitrag Inproceedings 2019
19Stifter, Nicholas ; Judmayer, Aljosha ; Weippl, Edgar Revisiting Practical Byzantine Fault Tolerance Through Blockchain TechnologiesBuchbeitrag Book Contribution 2019
20Eckhart, Matthias ; Ekelhart, Andreas ; Lüder, Arndt ; Biffl, Stefan ; Weippl, Edgar Security Development Lifecycle for Cyber-Physical Production SystemsKonferenzbeitrag Inproceedings 2019

Results 1-20 of 132 (Search time: 0.002 seconds).

PreviewAuthors / EditorsTitleTypeIssue Date
1Szewieczek Martin - 2024 - Fuzzing embedded protocols.pdf.jpgSzewieczek, Martin Fuzzing embedded protocolsThesis Hochschulschrift 2024
2Rosenblattl Jakob - 2024 - Topology Discovery within the Bitcoin Network.pdf.jpgRosenblattl, Jakob Topology Discovery within the Bitcoin NetworkThesis Hochschulschrift 2024
3Fugger Markus Hermann - 2023 - Input Models for Combinatorial Testing using...pdf.jpgFugger, Markus Hermann Input Models for Combinatorial Testing using Source AnnotationsThesis Hochschulschrift 2023
4Fodor Thomas Bogdan - 2023 - Graph-theoretic Analysis of the IPv4IPv6 Routing...pdf.jpgFodor, Thomas Bogdan Analysing the internet aas a graphThesis Hochschulschrift 2023
5Klonowski Timo - 2023 - Bitcoin Network Topology Discovery Using Timing Analysis.pdf.jpgKlonowski, Timo Bitcoin network topology discovery using timing analysisThesis Hochschulschrift 2023
6Arfaoui Ghaith - 2023 - Privacy-Preserving Collaborative Anomaly Detection.pdf.jpgArfaoui, Ghaith Privacy-preserving collaborative anomaly detectionThesis Hochschulschrift 2023
7Stoeger Michael Bernd - 2023 - Scanning for IoT Devices Using a Mobile Android...pdf.jpgStöger, Michael Bernd Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environmentThesis Hochschulschrift 2023
8Pfeffer Katharina - 2023 - Impact of user trust in IT systems on security and...pdf.jpgPfeffer, Katharina Impact of user trust in IT systems on security and privacyThesis Hochschulschrift 2023
9Causevic Amra - 2022 - Power consumption of TLS How the additional S in HTTPS...pdf.jpgCausevic, Amra Power consumption of TLS : How the additional "S" in HTTPS impacts the power consumption of power-pluggend devicesThesis Hochschulschrift 2022
10Schindler Philipp - 2022 - Advances in distributed randomness.pdf.jpgSchindler, Philipp Advances in distributed randomnessThesis Hochschulschrift 2022
11Maitz Alexander - 2022 - Ethereum attack simulator A discrete event simulation...pdf.jpgMaitz, Alexander Ethereum attack simulator : A discrete event simulation engine for attacks against the ethereum blockchainThesis Hochschulschrift 2022
12Burian Daniel - 2022 - Automated stitching for scanning electron microscopy...pdf.jpgBurian, Daniel Automated stitching for scanning electron microscopy images of integrated circuitsThesis Hochschulschrift 2022
13Mai Alexandra - 2023 - Mental Models of Cryptographic Protocols from Different...pdf.jpgMai, Alexandra Mental models of cryptographic protocols from different stakeholder perspectivesThesis Hochschulschrift 2022
14Holzinger, Andreas ; Kieseberg, Peter ; Tjoa, A Min ; Weippl, Edgar R. Machine Learning and Knowledge ExtractionBook Buch2021
15Schachenhofer Bernhard - 2021 - On the Security of proof-of-stake directed...pdf.jpgSchachenhofer, Bernhard On the Security of proof-of-stake directed acyclic graph protocols : a simulation-based approachThesis Hochschulschrift 2021
16Rosegger Andreas - 2021 - Race to the door - A Goldfinger attack on proof of...pdf.jpgRosegger, Andreas Race to the door - A Goldfinger attack on proof of work cryptocurrenciesThesis Hochschulschrift 2021
17Treiber Simon - 2021 - Smart home privacy leaks.pdf.jpgTreiber, Simon Smart home privacy leaksThesis Hochschulschrift 2021
18George Dominik Roy - 2021 - Privacy-preserving remote attestation protocol.pdf.jpgGeorge, Dominik Roy Privacy-preserving remote attestation protocolThesis Hochschulschrift 2021
19Tomic Vedrana - 2021 - A bionic view on complex software systems and the...pdf.jpgTomic, Vedrana A bionic view on complex software systems and the consequences for digital sustainabilityThesis Hochschulschrift 2021
20Gegenhuber Gabriel Karl - 2021 - Zero-rating one big mess Analyzing differential...pdf.jpgGegenhuber, Gabriel Karl Zero-rating, one big mess : Analyzing differential pricing practices of European mobile network OperatorsThesis Hochschulschrift 2021