2008 - ACM Senior Member
His primary areas of investigation include Computer security, Internet privacy, Database, Authentication and World Wide Web. Edgar Weippl interconnects Cellular network, Phishing and Usability in the investigation of issues within Computer security. His Social engineering study in the realm of Internet privacy connects with subjects such as Management tool.
His Database study combines topics from a wide range of disciplines, such as Computer forensics, Cloud computing and Database forensics. His Authentication study combines topics in areas such as Field, Web crawler, Timestamp, Network forensics and Social web. His work on Web service, Session hijacking and User agent as part of general World Wide Web study is frequently connected to Measurement study, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
Computer security, Internet privacy, World Wide Web, Cloud computing security and Cloud computing are his primary areas of study. As part of his studies on Computer security, Edgar Weippl frequently links adjacent subjects like The Internet. His World Wide Web research focuses on Web service, Web application security and Web development.
In his study, Security through obscurity and Asset is inextricably linked to Security service, which falls within the broad field of Cloud computing security. His Computer security model course of study focuses on Software security assurance and Security testing. His study looks at the relationship between Social engineering and topics such as Bring your own device, which overlap with Young professional.
Edgar Weippl focuses on Computer security, Cyber-physical system, The Internet, Cryptocurrency and Internet privacy. His Computer security study integrates concerns from other disciplines, such as Cloud computing and Cloud computing security. The Cyber-physical system study combines topics in areas such as Information technology, Information security, Risk analysis, Communications security and Use case.
The concepts of his The Internet study are interwoven with issues in Online discussion, Control, Certificate authority, Network security and Variety. His work carried out in the field of Cryptocurrency brings together such families of science as Blockchain, Data mining and Cryptography. His Internet privacy research is multidisciplinary, incorporating perspectives in World Wide Web and Man-in-the-middle attack.
Computer security, Internet privacy, The Internet, Cryptocurrency and Cloud computing are his primary areas of study. Edgar Weippl has researched Computer security in several fields, including Protocol and Robustness. The study incorporates disciplines such as Authentication, Control, Legislature and Personally identifiable information in addition to Internet privacy.
The various areas that Edgar Weippl examines in his The Internet study include Address space, Server, Exploit and Network security. His work in Cryptocurrency addresses issues such as Scheme, which are connected to fields such as Data science. His work in the fields of Cloud computing, such as Cloud computing security, overlaps with other areas such as Business value.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Advanced social engineering attacks
Katharina Krombholz;Heidelinde Hobel;Markus Huber;Edgar Weippl.
workshop on information security applications (2015)
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
Martin Mulazzani;Sebastian Schrittwieser;Manuel Leithner;Markus Huber.
usenix security symposium (2011)
QR code security
Peter Kieseberg;Manuel Leithner;Martin Mulazzani;Lindsay Munroe.
advances in mobile multimedia (2010)
Security in E-Learning
Edgar R. Weippl.
(2005)
A frame of reference for research of integrated governance, risk and compliance (GRC)
Nicolas Racz;Edgar Weippl;Andreas Seufert.
international conference on communications (2010)
Fake identities in social media: A case study on the sustainability of the Facebook business model
Katharina Krombholz;Dieter Merkl;Edgar R. Weippl.
Journal of Service Science Research (2012)
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
Sebastian Schrittwieser;Stefan Katzenbeisser;Johannes Kinder;Georg Merzdovnik.
ACM Computing Surveys (2016)
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI
Andreas Holzinger;Andreas Holzinger;Peter Kieseberg;Edgar R. Weippl;A Min Tjoa.
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE) (2018)
Security Ontologies: Improving Quantitative Risk Analysis
A. Ekelhart;S. Fenz;M. Klemen;E. Weippl.
hawaii international conference on system sciences (2007)
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Sebastian Schrittwieser;Peter Frühwirt;Peter Kieseberg;Manuel Leithner.
network and distributed system security symposium (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
TU Wien
University of Passau
University of Natural Resources and Life Sciences
TU Wien
École Polytechnique Fédérale de Lausanne
Graz University of Technology
Duke University
Kookmin University
The University of Texas at San Antonio
University of Waterloo
DeepMind (United Kingdom)
University of L'Aquila
Gdańsk University of Technology
Kyoto University
Bharathiar University
University of Massachusetts Amherst
IBM (United States)
University of Iowa
University of Adelaide
University of Essex
Ministry of Education of the People's Republic of China
Oswaldo Cruz Foundation
University of Southern Queensland
Georgetown University
Eastern New Mexico University
Scripps Research Institute