Search - IFIP Open Digital Library Access content directly

Filter your results

34 results
Structure: Internal structure identifier : 263350
Image document

Explainable AI: the new 42?

Randy Goebel , Ajay Chander , Katharina Holzinger , Freddy Lecue , Zeynep Akata , et al.
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.295-303, ⟨10.1007/978-3-319-99740-7_21⟩
Conference papers hal-01934928v1
Image document

USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING

Peter Fruhwirt , Peter Kieseberg , Edgar Weippl
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.179-194, ⟨10.1007/978-3-319-24123-4_11⟩
Conference papers hal-01449058v1
Image document

Who On Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites

Markus Huber , Martin Mulazzani , Edgar Weippl
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.80-89, ⟨10.1007/978-3-642-15257-3_8⟩
Conference papers hal-01054574v1
Image document

Automated Analysis of Underground Marketplaces

Aleksandar Hudic , Katharina Krombholz , Thomas Otterbein , Christian Platzer , Edgar Weippl
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.31-42, ⟨10.1007/978-3-662-44952-3_3⟩
Conference papers hal-01393757v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books hal-02060052v1
Image document

Testing TLS Using Combinatorial Methods and Execution Framework

Dimitris E. Simos , Josip Bozic , Feng Duan , Bernhard Garn , Kristoffer Kleine , et al.
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.162-177, ⟨10.1007/978-3-319-67549-7_10⟩
Conference papers hal-01678990v1
Image document

The More the Merrier - Federated Learning from Local Sphere Recommendations

Bernd Malle , Nicola Giuliani , Peter Kieseberg , Andreas Holzinger
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.367-373, ⟨10.1007/978-3-319-66808-6_24⟩
Conference papers hal-01677145v1
Image document

Backdoor Attacks in Neural Networks – A Systematic Evaluation on Multiple Traffic Sign Datasets

Huma Rehman , Andreas Ekelhart , Rudolf Mayer
3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.285-300, ⟨10.1007/978-3-030-29726-8_18⟩
Conference papers hal-02520034v1
Image document

A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases

Tanja Sarcevic , Rudolf Mayer
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.401-415, ⟨10.1007/978-3-030-58201-2_27⟩
Conference papers hal-03440847v1
Image document

Towards Security-Enhanced and Privacy-Preserving Mashup Compositions

Heidelinde Hobel , Johannes Heurix , Amin Anjomshoaa , Edgar Weippl
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.286-299, ⟨10.1007/978-3-642-39218-4_22⟩
Conference papers hal-01463833v1
Image document

Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas

Wilfried Mayer , Georg Merzdovnik , Edgar Weippl
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.234-247, ⟨10.1007/978-3-030-58201-2_16⟩
Conference papers hal-03440850v1
Image document

Set-Based Algorithms for Combinatorial Test Set Generation

Ludwig Kampel , Dimitris E. Simos
28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.231-240, ⟨10.1007/978-3-319-47443-4_16⟩
Conference papers hal-01643730v1
Image document

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks

Shimon Machida , Adrian Dabrowski , Edgar Weippl , Isao Echizen
16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers hal-01768504v1
Image document

USBlock: Blocking USB-Based Keypress Injection Attacks

Sebastian Neuner , Artemios G. Voyiatzis , Spiros Fotopoulos , Collin Mulliner , Edgar R. Weippl
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.278-295, ⟨10.1007/978-3-319-95729-6_18⟩
Conference papers hal-01954405v1
Image document

Towards Fully Automated Digital Alibis with Social Interaction

Stefanie Beyer , Martin Mulazzani , Sebastian Schrittwieser , Markus Huber , Edgar Weippl
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers hal-01393786v1

Availability, Reliability, and Security in Information Systems

Francesco Buccafurri , Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books hal-01635010v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books hal-02520036v1
Image document

The Future of Information Systems in a Post-COVID World by TC8 (Information Systems)

Isabel Ramos , Dale Mackrell , Alta van Der Merwe , Jan Pries-Heje , Jolita Ralyté , et al.
Advancing Research in Information and Communication Technology, AICT-600, pp.333-360, 2021, ⟨10.1007/978-3-030-81701-5_14⟩
Book sections hal-03325992v1
Image document

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services

Georg Merzdovnik , Klaus Falb , Martin Schmiedecker , Artemios G. Voyiatzis , Edgar Weippl
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers hal-01633686v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books hal-03414737v1

Multidisciplinary Research and Practice for Information Systems

Gerald Quirchmayr , Josef Basl , Ilsun You , Lida Xu , Edgar Weippl
Springer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books hal-01542459v1
Image document

Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI

Andreas Holzinger , Peter Kieseberg , Edgar Weippl , A Min Tjoa
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.1-8, ⟨10.1007/978-3-319-99740-7_1⟩
Conference papers hal-02060058v1
Image document

Privacy-Preserving Anomaly Detection Using Synthetic Data

Rudolf Mayer , Markus Hittmeir , Andreas Ekelhart
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.195-207, ⟨10.1007/978-3-030-49669-2_11⟩
Conference papers hal-03243628v1
Image document

A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing

Dimitris E. Simos , Kristoffer Kleine , Laleh Ghandehari , Bernhard Garn , Yu Lei
28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.70-85, ⟨10.1007/978-3-319-47443-4_5⟩
Conference papers hal-01643723v1
Image document

DO NOT DISTURB? Classifier Behavior on Perturbed Datasets

Bernd Malle , Peter Kieseberg , Andreas Holzinger
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.155-173, ⟨10.1007/978-3-319-66808-6_11⟩
Conference papers hal-01677128v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-10410, 2017, Lecture Notes in Computer Science, 978-3-319-66807-9. ⟨10.1007/978-3-319-66808-6⟩
Books hal-01677131v1
Image document

An HMM-Based Anomaly Detection Approach for SCADA Systems

Kyriakos Stefanidis , Artemios G. Voyiatzis
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.85-99, ⟨10.1007/978-3-319-45931-8_6⟩
Conference papers hal-01639609v1
Image document

Turning Active TLS Scanning to Eleven

Wilfried Mayer , Martin Schmiedecker
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.3-16, ⟨10.1007/978-3-319-58469-0_1⟩
Conference papers hal-01649020v1
Image document

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases

Bernd Malle , Peter Kieseberg , Edgar Weippl , Andreas Holzinger
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.251-266, ⟨10.1007/978-3-319-45507-5_17⟩
Conference papers hal-01635002v1
Image document

Online Ad-fraud in Search Engine Advertising Campaigns

Andreas Mladenow , Niina Maarit Novak , Christine Strauss
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.109-118, ⟨10.1007/978-3-319-24315-3_11⟩
Conference papers hal-01466210v1