Full name Familienname, Vorname
Weippl, Edgar
 
Main Affiliation Organisations­zuordnung
 

Results 1-20 of 195 (Search time: 0.003 seconds).

PreviewAuthor(s)TitleTypeIssue Date
1Goldenits, Georg ; Mallinger, Kevin ; Neubauer, Thomas ; Weippl, Edgar Tabular Reinforcement learning for Robust, Explainable CropRotation Policies Matching Deep Reinforcement LearningPerformanceInproceedings KonferenzbeitragApr-2024
2Weippl, Edgar ; Maffei, Matteo Message from General Chairs; EuroSP 2024Inproceedings Konferenzbeitrag 2024
3Kieseberg, Peter ; Weippl, Edgar ; Tjoa, A. Min ; Cabitza, Federico ; Campagner, Andrea ; Holzinger, Andreas Controllable AI - An Alternative to Trustworthiness in Complex AI Systems?Inproceedings Konferenzbeitrag22-Aug-2023
4Eckhart, Matthias ; Ekelhart, Andreas ; Biffl, Stefan ; Lüder, Arndt ; Weippl, Edgar R. QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production SystemsArticle Artikel 22-Jul-2022
5Judmayer, Aljosha ; Stifter, Nicholas ; Schindler, Philipp ; Weippl, Edgar How much is the fork? Fast Probability and Profitability Calculation during Temporary ForksInproceedings Konferenzbeitrag2022
6Ghesmati, Simin ; Fdhila, Walid ; Weippl, Edgar User-Perceived Privacy in BlockchainPreprint Preprint2022
7Ghesmati-2022-Usability of Cryptocurrency Wallets Providing CoinJoin Tra...-smur.pdf.jpgGhesmati, Simin ; Fdhila, Walid ; Weippl, Edgar R. Usability of Cryptocurrency Wallets Providing CoinJoin TransactionsPreprint Preprint 2022
8Holzinger, Andreas ; Weippl, Edgar ; Tjoa, A Min ; Kieseberg, Peter Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AIKonferenzbeitrag Inproceedings2021
9Schindler, Philipp ; Judmayer, Aljosha ; Hittmeir, Markus ; Stifter, Nicholas ; Weippl, Edgar RandRunner: Distributed Randomness from Trapdoor VDFs with Strong UniquenessKonferenzbeitrag Inproceedings 2021
10Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW CryptocurrenciesInproceedings Konferenzbeitrag2021
11Judmayer, Aljosha ; Stifter, Nicholas ; Zamyatin, Alexei ; Tsabary, Itay ; Eyal, Ittay ; Gaži, Peter ; Meiklejohn, Sarah ; Weippl, Edgar Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW CryptocurrenciesInproceedings Konferenzbeitrag2021
12Ghesmati, Simin ; Kern, Andreas ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar Unnecessary Input Heuristics and PayJoin TransactionsInproceedings Konferenzbeitrag2021
13Mai, Alexandra ; Pfeffer, Katharina ; Gusenbauer, Matthias ; Weippl, Edgar ; Krombholz, Katharina User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachInproceedings Konferenzbeitrag Aug-2020
14Eckhart, Matthias ; Ekelhart, Andreas ; Weippl, Edgar Automated Security Risk Identification Using AutomationML-based Engineering DataArtikel Article 2020
15Schindler, Philipp ; Judmayer, Aljosha ; Stifter, Nicholas ; Weippl, Edgar HydRand: Efficient Continuous Distributed RandomnessKonferenzbeitrag Inproceedings2020
16Wenzl, Matthias ; Merzdovnik, Georg ; Ullrich, Johanna Maria Magdalena ; Weippl, Edgar From Hack to Elaborate Technique—A Survey on Binary RewritingArtikel Article Jun-2019
17Biffl, Stefan ; Eckhart, Matthias ; Lüder, Arndt ; Weippl, Edgar Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems EngineeringBuchbeitrag Book Contribution2019
18Kieseberg, Peter ; Weippl, Edgar Securing Information against Manipulation in the Production Systems Engineering ProcessBuchbeitrag Book Contribution 2019
19Brenner, Bernhard ; Weippl, Edgar Security AnalysisBuchbeitrag Book Contribution 2019
20Stifter, Nicholas ; Judmayer, Aljosha ; Weippl, Edgar Revisiting Practical Byzantine Fault Tolerance Through Blockchain TechnologiesBuchbeitrag Book Contribution 2019

Results 1-20 of 146 (Search time: 0.021 seconds).

PreviewAuthors / EditorsTitleTypeIssue Date
1Felder Jodok - 2025 - Predicting Bugs in Source Code A Machine Learning Approach...pdf.jpgFelder, Jodok Predicting Bugs in Source Code. A Machine Learning Approach for Predicting Faults by utilizing Code & Change MetricsThesis Hochschulschrift 2025
2Hiess Irene - 2024 - Exact Methods for Covering Array Generation.pdf.jpgHiess, Irene Exact methods for covering array generationThesis Hochschulschrift 2024
3Gufler Kevin - 2024 - Internet of Things Testbed.pdf.jpgGufler, Kevin Internet of things testbed - A modular framework to find vulnerabilitiesThesis Hochschulschrift 2024
4Nowak Philipp - 2024 - Aggregation Analysis of IPv6 Prefixes at Internet-Scale.pdf.jpgNowak, Philipp Aggregation & analysis of IPv6 prefixes at Internet-scaleThesis Hochschulschrift 2024
5Martinez Duarte Daniela - 2024 - Federated Generation of Synthetic Tabular Data.pdf.jpgMartinez Duarte, Daniela Federated generation of synthetic tabular dataThesis Hochschulschrift 2024
6Brachmann Jakob Johannes - 2024 - Towards understanding Multi-block Maximal...pdf.jpgBrachmann, Jakob Johannes Towards understanding multi-block maximal extractable value in ethereumThesis Hochschulschrift 2024
7Sakhnovych Yana - 2024 - Black-box Model Watermarking in Federated Learning.pdf.jpgSakhnovych, Yana Black-box model watermarking in federated learningThesis Hochschulschrift 2024
8Ghesmati Simin - 2024 - Privacy and Usability Aspects of Public Blockchains.pdf.jpgGhesmati, Simin Privacy and usability aspects of public blockchainsThesis Hochschulschrift 2024
9Arfaoui Ghaith - 2023 - Privacy-Preserving Collaborative Anomaly Detection.pdf.jpgArfaoui, Ghaith Privacy-preserving collaborative anomaly detectionThesis Hochschulschrift 2023
10Rosenblattl Jakob - 2024 - Topology Discovery within the Bitcoin Network.pdf.jpgRosenblattl, Jakob Topology discovery within the bitcoin networkThesis Hochschulschrift 2023
11Klonowski Timo - 2023 - Bitcoin Network Topology Discovery Using Timing Analysis.pdf.jpgKlonowski, Timo Bitcoin network topology discovery using timing analysisThesis Hochschulschrift 2023
12Fodor Thomas Bogdan - 2023 - Graph-theoretic Analysis of the IPv4IPv6 Routing...pdf.jpgFodor, Thomas Bogdan Analysing the internet aas a graphThesis Hochschulschrift 2023
13Fugger Markus Hermann - 2023 - Input Models for Combinatorial Testing using...pdf.jpgFugger, Markus Hermann Input models for combinatorial testing using source annotationsThesis Hochschulschrift 2023
14Stoeger Michael Bernd - 2023 - Scanning for IoT Devices Using a Mobile Android...pdf.jpgStöger, Michael Bernd Scanning for IoT devices using a mobile android application: Detecting devices in IP-based networks and the bluetooth environmentThesis Hochschulschrift 2023
15Pfeffer Katharina - 2023 - Impact of user trust in IT systems on security and...pdf.jpgPfeffer, Katharina Impact of user trust in IT systems on security and privacyThesis Hochschulschrift 2023
16Szewieczek, Martin Fuzzing embedded protocolsThesis Hochschulschrift2023
17Holzinger, Andreas ; Kieseberg, Peter ; Cabitza, Federico ; Campagner, Andrea ; Tjoa, A Min ; Weippl, Edgar Machine Learning and Knowledge ExtractionProceedings Tagungsband 2023
18Judmayer Aljosha - 2024 - Pay To Win Algorithmic Incentive Manipulation Attacks...pdf.jpgJudmayer, Aljosha Pay to win : algorithmic incentive manipulation attacks on permissionless cryptocurrenciesThesis Hochschulschrift 2023
19Causevic Amra - 2022 - Power consumption of TLS How the additional S in HTTPS...pdf.jpgCausevic, Amra Power consumption of TLS : How the additional "S" in HTTPS impacts the power consumption of power-pluggend devicesThesis Hochschulschrift 2022
20Maitz Alexander - 2022 - Ethereum attack simulator A discrete event simulation...pdf.jpgMaitz, Alexander Ethereum attack simulator : A discrete event simulation engine for attacks against the ethereum blockchainThesis Hochschulschrift 2022