TY - JOUR A1 - Wenzl, Matthias A1 - Merzdovnik, Georg A1 - Weippl, Edgar T1 - ISaFe - Injecting Security Features into Constrained Embedded Firmware JF - ERCIM News KW - Binary rewriting KW - Binary Hardening KW - Embedded Systems KW - Embedded Firmware Y1 - 2019 VL - 2019 IS - 119 (2019) SP - 25 EP - 26 ER - TY - CHAP A1 - Tabatabai Irani, Mohammad A1 - Weippl, Edgar T1 - Automation of Post-Exploitation T2 - Proceedings of International Conference on Security Technology (SecTech) KW - Automation Y1 - 2019 ER - TY - CHAP A1 - Huber, Markus A1 - Mulazzani, Martin A1 - Weippl, Edgar T1 - Tor HTTP usage and information leakage T2 - Proceedings of IFIP CMS KW - HTTP Y1 - 2019 PB - Springer ER - TY - JOUR A1 - Wenzl, Matthias A1 - Merzdovnik, Georg A1 - Ullrich, Johann A1 - Weippl, Edgar T1 - From Hack to Elaborate Technique - A Survey on Binary Rewriting JF - ACM Computing Surveys (CSUR) KW - Binary rewriting KW - Binary Hardening KW - Dynamic Rewriting KW - Reassembly KW - Static Rewriting Y1 - 2019 VL - Volume 52 IS - Number 3 (2019) SP - 49:1 EP - 49:37 ER - TY - CHAP A1 - Asfand-e-yar, Muhammad A1 - Anjomshoaa, Amin A1 - Weippl, Edgar A1 - Tjoa, A Min T1 - Blending the Sketched Use Case Scenario with License Agreements using Semantics T2 - Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS) / LNCS/LNAI KW - License Agreements KW - Semantics Y1 - 2019 PB - Springer ER - TY - CHAP A1 - Frühwirt, Peter A1 - Huber, Markus A1 - Mulazzani, Martin A1 - Weippl, Edgar T1 - InnoDB Database Forensics T2 - Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia KW - Database KW - Forensics Y1 - 2019 ER - TY - JOUR A1 - Mulazzani, Martin A1 - Huber, Markus A1 - Weippl, Edgar T1 - Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System JF - IEEE Transactions on Systems Man and Cybernetics Part C KW - Anonymity System Y1 - 2019 ER - TY - CHAP A1 - Racz, Nicolas A1 - Seufert, Andreas A1 - Weippl, Edgar T1 - A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC) T2 - Proceedings of IFIP CMS KW - Compliance KW - Risk KW - Governance Y1 - 2019 PB - Springer ER - TY - CHAP A1 - Holzinger, Katharina A1 - Holzinger, Andreas A1 - Safran, Christian A1 - Koiner, Gabriele A1 - Weippl, Edgar T1 - Use of Wiki Systems in archaeology: Privacy, Security and data protection as key problems T2 - Proceedings of the International Conference on e-Business (ICEB ) KW - Wiki KW - Privacy KW - Security KW - Data Protection Y1 - 2019 ER - TY - JOUR A1 - Weippl, Edgar T1 - Exploiting Ontology for Software License Agreements JF - International Journal of Software and Informatics KW - Ontology KW - Software License KW - Intellectual Property Y1 - 2019 ER - TY - CHAP A1 - Böck, Benjamin A1 - Weippl, Edgar T1 - Social Engineering T2 - The Handbook of Technology Management KW - Social Engineering Y1 - 2019 ER - TY - CHAP A1 - Ali Khan, Farman A1 - Anjomshoaa, Amin A1 - Weippl, Edgar A1 - Tjoa, A Min T1 - Blending the Sketched Use Case Scenario with License Agreements using Semantics T2 - Proceedings of the 3rd International Conference on Knowledge Science, Engineering and Management / (KSEM Lecture Notes in Artificial Intelligence (LNAI) KW - License Agreements KW - Semantics Y1 - 2019 SP - 275 EP - 284 PB - Springer ER - TY - CHAP A1 - Kalchgruber, Peter A1 - Weippl, Edgar T1 - Can End-to-End Verifiable E-Voting be Explained Easily? T2 - Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS) / Workshop on Emerging Research Projects / Applications and Services (ERPAS) KW - E-Voting Y1 - 2019 ER - TY - CHAP A1 - Ali Khan, Farman A1 - Graf, Sabine A1 - Weippl, Edgar A1 - Tjoa, A Min T1 - Integrated Approach for the Detection of Learning Styles and Affective States T2 - Proceedings of ED-MEDIA KW - Learning Styles KW - Affective States Y1 - 2019 SP - 753 EP - 761 ER - TY - JOUR A1 - Tabatabai Irani, Mohammad A1 - Weippl, Edgar T1 - Automation Of Post-Exploitation JF - International Journal of Web Information Systems (IJWIS) KW - Automation KW - Post-Exploitation Y1 - 2019 VL - 2009 IS - Vol 5(4) SP - 518 EP - 536 ER - TY - CHAP A1 - Ali Khan, Farman A1 - Weippl, Edgar T1 - An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System T2 - Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009) KW - Learning Management System Y1 - 2019 ER - TY - CHAP A1 - Weippl, Edgar T1 - Security in Data Warehouses. Information Science Reference T2 - Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction / Bellatreche, L. / 2009 / IGI Global KW - Security KW - Data Warehouse Y1 - 2019 SP - 272 EP - 279 ER - TY - CHAP A1 - Schnabl, Stefan A1 - Weippl, Edgar T1 - Screen Recording for E-Learning T2 - Proceedings of ED-MEDIA 2009 KW - E-Learning Y1 - 2019 SP - 1271 EP - 1277 ER - TY - CHAP A1 - Fenz, Stefan A1 - Ekelhart, Andreas A1 - Weippl, Edgar T1 - Fortification of IT security by automatic security advisory processing T2 - Proceeding of the 22nd International Conference on Advanced Information Networking and Applications / AINA2008 IEEE Computer Society KW - Security Y1 - 2019 ER - TY - CHAP A1 - Weippl, Edgar A1 - Klemen, Markus A1 - Raffeiner, Stefan T1 - Improving Storage Concepts for Semantic Models and Ontologies T2 - The Semantic Web for Knowledge and Data Management / Technologies and Practices KW - Storage Y1 - 2019 SP - 38 EP - 48 ER -