Edgar Weippl
Universität Wien
H-index: 49
Europe-Austria
Top articles of Edgar Weippl
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Tabular Reinforcement learning for Robust, Explainable CropRotation Policies Matching Deep Reinforcement LearningPerformance | Georg Goldenits Kevin Mallinger Thomas Neubauer Edgar Weippl | 2024/3/7 | |
Introduction to Security and Privacy | Hannes Werthner· Carlo Ghezzi· Jeff Kramer· Julian Nida-Rümelin· Bashar Nuseibeh· Erich Prem· | Edgar Weippl Sebastian Schrittwieser | 2024 |
A logging maturity and decision model for the selection of intrusion detection cyber security solutions | Computers & Security | Manuel Kern Max Landauer Florian Skopik Edgar Weippl | 2024/4/9 |
Analyzing UTXO-Based Blockchain Privacy Threats | Cryptology ePrint Archive | Simin Ghesmati Walid Fdhila Edgar Weippl | 2023 |
Controllable AI-An Alternative to Trustworthiness in Complex AI Systems? | Peter Kieseberg Edgar Weippl A Min Tjoa Federico Cabitza Andrea Campagner | 2023/8/22 | |
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation | Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings | Caroline Lawitschka Philip König Edgar R Weippl | 2023 |
Machine Learning and Knowledge Extraction: 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 … | Andreas Holzinger Peter Kieseberg Federico Cabitza Andrea Campagner A Min Tjoa | 2023/8/21 | |
Blockchain-Babel: Herausforderungen bei der Entwicklung präziser Begrifflichkeiten zwischen Recht und Technik im Kontext von Kryptowährungen und Distributed-Ledger-Technologien | Nicholas Stifter Aljosha Judmayer Evelyne Putz Georg Brameshuber Edgar R Weippl | 2023/10/16 | |
Check for updates User-Perceived Privacy in Blockchain | Financial Cryptography and Data Security. FC 2022 International Workshops: CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers | Simin Ghesmati¹ Walid Fdhila Edgar Weippl | 2023/7/21 |
Modeling Obfuscation Stealth through Code Complexity | Sebastian Schrittwieser Elisabeth Wimmer Kevin Mallinger Patrick Kochberger Caroline Lawitschka | 2023/9/25 | |
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI’s GPT-3.5 on C Source Code | Patrick Kochberger Maximilian Gramberger Sebastian Schrittwieser Caroline Lawitschka Edgar Weippl | 2023/7/3 | |
Special issue “selected papers from CD-MAKE 2020 and ARES 2020” | Edgar R Weippl Andreas Holzinger Peter Kieseberg | 2023/1/20 | |
An extended view on measuring tor AS-level adversaries | Computers & Security | Gabriel K Gegenhuber Markus Maier Florian Holzbauer Wilfried Mayer Georg Merzdovnik | 2023/9/1 |
Information Systems Security and Privacy: 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers | Steven Furnell Paolo Mori Edgar Weippl Olivier Camp | 2022/1/19 | |
Managing Industrial Control Systems Security Risks for Cyber Insurance (Dagstuhl Seminar 21451) | Simon Dejung Mingyan Liu Arndt Lüder Edgar Weippl | 2022 | |
User-perceived privacy in blockchain | Simin Ghesmati Walid Fdhila Edgar Weippl | 2022/5/6 | |
Machine Learning and Knowledge Extraction: 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022, Vienna, Austria, August 23–26 … | Andreas Holzinger Peter Kieseberg A Min Tjoa Edgar Weippl | 2022/8/10 | |
IoT data processing: The different archetypes and their security and privacy assessment | Pijush Kanti Dutta Pramanik Prasenjit Choudhury | 2022/9/1 | |
Cybersecurity is more than a Technological Matter–Towards Considering Critical Infrastructures as Socio-Technical Systems | Applied Cybersecurity & Internet Governance | Veronika Nowak Johanna Ullrich Edgar Weippl | 2022 |
Usability of cryptocurrency wallets providing coinjoin transactions | Simin Ghesmati Walid Fdhila Edgar R Weippl | 2022 |