Weippl, Edgar R.
200  Ergebnisse:
Personensuche X
?
1

Modeling Obfuscation Stealth Through Code Complexity:

, In: Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science,
 
?
2

Special Issue "Selected Papers from CD-MAKE 2020 and ARES 2..:

Weippl, Edgar R. ; Holzinger, Andreas ; Kieseberg, Peter
Machine Learning and Knowledge Extraction.  5 (2023)  1 - p. 173-174 , 2023
 
?
3

Obfuscation-Resilient Semantic Functionality Identification..:

, In: Secure IT Systems; Lecture Notes in Computer Science,
 
?
4

Better Keep Cash in Your Boots - Hardware Wallets are the N..:

, In: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security,
 
?
7

Botnets causing blackouts: how coordinated load attacks can..:

Dabrowski, Adrian ; Ullrich, Johanna ; Weippl, Edgar R.
e & i Elektrotechnik und Informationstechnik.  135 (2018)  3 - p. 250-255 , 2018
 
?
10

Timestamp hiccups : Detecting manipulated filesystem tim..:

, In: Proceedings of the 12th International Conference on Availability, Reliability and Security,
 
?
11

Grid Shock : Coordinated Load-Changing Attacks on Power ..:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
 
?
14

Protection through isolation:

, In: The Cloud Security Ecosystem,
Ullrich, Johanna ; Weippl, Edgar R. - p. 129-147 , 2015
 
?
15

Contributors:

, In: The Cloud Security Ecosystem,
Agrawal, Vivek ; Ali, Abdussalam ; Bergmann, Olaf... - p. xix-xxi , 2015
 
1-15