D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 5,807 339 World Ranking 9095 National Ranking 83

Research.com Recognitions

Awards & Achievements

2008 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Internet privacy, Database, Authentication and World Wide Web. Edgar Weippl interconnects Cellular network, Phishing and Usability in the investigation of issues within Computer security. His Social engineering study in the realm of Internet privacy connects with subjects such as Management tool.

His Database study combines topics from a wide range of disciplines, such as Computer forensics, Cloud computing and Database forensics. His Authentication study combines topics in areas such as Field, Web crawler, Timestamp, Network forensics and Social web. His work on Web service, Session hijacking and User agent as part of general World Wide Web study is frequently connected to Measurement study, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His most cited work include:

  • Advanced social engineering attacks (218 citations)
  • Dark clouds on the horizon: using cloud storage as attack vector and online slack space (168 citations)
  • Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? (93 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Internet privacy, World Wide Web, Cloud computing security and Cloud computing are his primary areas of study. As part of his studies on Computer security, Edgar Weippl frequently links adjacent subjects like The Internet. His World Wide Web research focuses on Web service, Web application security and Web development.

In his study, Security through obscurity and Asset is inextricably linked to Security service, which falls within the broad field of Cloud computing security. His Computer security model course of study focuses on Software security assurance and Security testing. His study looks at the relationship between Social engineering and topics such as Bring your own device, which overlap with Young professional.

He most often published in these fields:

  • Computer security (39.32%)
  • Internet privacy (14.25%)
  • World Wide Web (13.39%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (39.32%)
  • Cyber-physical system (4.84%)
  • The Internet (6.55%)

In recent papers he was focusing on the following fields of study:

Edgar Weippl focuses on Computer security, Cyber-physical system, The Internet, Cryptocurrency and Internet privacy. His Computer security study integrates concerns from other disciplines, such as Cloud computing and Cloud computing security. The Cyber-physical system study combines topics in areas such as Information technology, Information security, Risk analysis, Communications security and Use case.

The concepts of his The Internet study are interwoven with issues in Online discussion, Control, Certificate authority, Network security and Variety. His work carried out in the field of Cryptocurrency brings together such families of science as Blockchain, Data mining and Cryptography. His Internet privacy research is multidisciplinary, incorporating perspectives in World Wide Web and Man-in-the-middle attack.

Between 2015 and 2021, his most popular works were:

  • Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? (93 citations)
  • Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools (76 citations)
  • Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI (67 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer security

Computer security, Internet privacy, The Internet, Cryptocurrency and Cloud computing are his primary areas of study. Edgar Weippl has researched Computer security in several fields, including Protocol and Robustness. The study incorporates disciplines such as Authentication, Control, Legislature and Personally identifiable information in addition to Internet privacy.

The various areas that Edgar Weippl examines in his The Internet study include Address space, Server, Exploit and Network security. His work in Cryptocurrency addresses issues such as Scheme, which are connected to fields such as Data science. His work in the fields of Cloud computing, such as Cloud computing security, overlaps with other areas such as Business value.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Advanced social engineering attacks

Katharina Krombholz;Heidelinde Hobel;Markus Huber;Edgar Weippl.
workshop on information security applications (2015)

591 Citations

Dark clouds on the horizon: using cloud storage as attack vector and online slack space

Martin Mulazzani;Sebastian Schrittwieser;Manuel Leithner;Markus Huber.
usenix security symposium (2011)

257 Citations

QR code security

Peter Kieseberg;Manuel Leithner;Martin Mulazzani;Lindsay Munroe.
advances in mobile multimedia (2010)

221 Citations

Security in E-Learning

Edgar R. Weippl.
(2005)

187 Citations

A frame of reference for research of integrated governance, risk and compliance (GRC)

Nicolas Racz;Edgar Weippl;Andreas Seufert.
international conference on communications (2010)

169 Citations

Fake identities in social media: A case study on the sustainability of the Facebook business model

Katharina Krombholz;Dieter Merkl;Edgar R. Weippl.
Journal of Service Science Research (2012)

163 Citations

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?

Sebastian Schrittwieser;Stefan Katzenbeisser;Johannes Kinder;Georg Merzdovnik.
ACM Computing Surveys (2016)

160 Citations

Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI

Andreas Holzinger;Andreas Holzinger;Peter Kieseberg;Edgar R. Weippl;A Min Tjoa.
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE) (2018)

156 Citations

Security Ontologies: Improving Quantitative Risk Analysis

A. Ekelhart;S. Fenz;M. Klemen;E. Weippl.
hawaii international conference on system sciences (2007)

150 Citations

Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.

Sebastian Schrittwieser;Peter Frühwirt;Peter Kieseberg;Manuel Leithner.
network and distributed system security symposium (2012)

149 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Edgar R. Weippl

Andreas Holzinger

Andreas Holzinger

University of Natural Resources and Life Sciences

Publications: 72

Martina Ziefle

Martina Ziefle

RWTH Aachen University

Publications: 12

Benjamin Livshits

Benjamin Livshits

Imperial College London

Publications: 11

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 10

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 10

Fatos Xhafa

Fatos Xhafa

Universitat Politècnica de Catalunya

Publications: 10

Stefanos Gritzalis

Stefanos Gritzalis

University of Piraeus

Publications: 10

A Min Tjoa

A Min Tjoa

TU Wien

Publications: 9

Alfredo Cuzzocrea

Alfredo Cuzzocrea

University of Calabria

Publications: 9

Patrick P. C. Lee

Patrick P. C. Lee

Chinese University of Hong Kong

Publications: 8

Mauro Conti

Mauro Conti

University of Padua

Publications: 8

Eduardo Fernández-Medina

Eduardo Fernández-Medina

University of Castilla-La Mancha

Publications: 7

Ruth BREU

Ruth BREU

University of Innsbruck

Publications: 7

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 7

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 7

Xiaofeng Wang

Xiaofeng Wang

Free University of Bozen-Bolzano

Publications: 7

Trending Scientists

Koray Kavukcuoglu

Koray Kavukcuoglu

DeepMind (United Kingdom)

Antonio Orlandi

Antonio Orlandi

University of L'Aquila

Jacek Tejchman

Jacek Tejchman

Gdańsk University of Technology

Makoto Kumada

Makoto Kumada

Kyoto University

Krishna Kadirvelu

Krishna Kadirvelu

Bharathiar University

Nianqiang Wu

Nianqiang Wu

University of Massachusetts Amherst

Oki Gunawan

Oki Gunawan

IBM (United States)

Jeffrey C. Murray

Jeffrey C. Murray

University of Iowa

Bronwyn M. Gillanders

Bronwyn M. Gillanders

University of Adelaide

Eoin J. O'Gorman

Eoin J. O'Gorman

University of Essex

Xiaoling Li

Xiaoling Li

Ministry of Education of the People's Republic of China

José Paulo Gagliardi Leite

José Paulo Gagliardi Leite

Oswaldo Cruz Foundation

Jochen Bundschuh

Jochen Bundschuh

University of Southern Queensland

Mark Giordano

Mark Giordano

Georgetown University

Manuel F. Varela

Manuel F. Varela

Eastern New Mexico University

Neil R. Cooper

Neil R. Cooper

Scripps Research Institute

Something went wrong. Please try again later.