Name
Affiliation
Papers
PETER KIESEBERG
SBA Research Favoritenstrasse
61
Collaborators
Citations 
PageRank 
75
187
29.39
Referers 
Referees 
References 
477
825
372
Search Limit
100825
Title
Citations
PageRank
Year
Legal aspects of data cleansing in medical AI10.352021
Secure Internal Data Markets00.342021
k -Anonymity in practice: How generalisation and suppression affect machine learning classifiers00.342021
KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI.00.342020
Explainable Artificial Intelligence - Concepts, Applications, Research Challenges and Visions.50.492020
Distortion in Real-World Analytic Processes.00.342019
Towards Data Anonymization In Data Mining Via Meta-Heuristic Approaches00.342019
The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations.10.352018
Can we Trust Machine Learning Results? Artificial Intelligence in Safety-Critical Decision Support.20.392018
Security Challenges in Cyber-Physical Production Systems.00.342018
Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten50.512018
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI.10.352018
Structural Limitations of B+-Tree forensics.00.342018
Explainable AI: The New 42?30.432018
A Machine Learning Approach for Privacy-preservation in E-business Applications.00.342018
Real-Time Forensics Through Endpoint Visibility00.342017
The More the Merrier - Federated Learning from Local Sphere Recommendations.20.382017
Privacy By Design Data Exchange Between Csirts00.342017
Security Testing for Mobile Applications.00.342017
DO NOT DISTURB? Classifier Behavior on Perturbed Datasets.10.352017
Interactive Anonymization for Privacy aware Machine Learning.00.342017
Trend Analysis of Underground Marketplaces.00.342017
Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology.50.472017
Forensics using Internal Database Structures.00.342017
Trust for the "Doctor in the Loop".00.342016
Detection of Data Leaks in Collaborative Data Driven Research.00.342016
Privacy Aware Machine Learning and the "Right to be Forgotten".20.372016
A tamper-proof audit and control system for the doctor in the loop.20.372016
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases.50.462016
Security tests for mobile applications — Why using TLS/SSL is not enough10.372015
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems00.342015
A Structured Approach to Defence Simulation Training.00.342015
Security And Privacy Of Smartphone Messaging Applications30.442015
Privacy and data protection in smartphone messengers.10.352015
Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach10.362015
CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism.00.342015
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach70.572015
Witnesses for the Doctor in the Loop60.512015
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding.00.342015
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.30.482014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.70.502014
E-voting Authentication with QR-codes20.412014
What'S New With Whatsapp & Co.? Revisiting The Security Of Smartphone Messaging Applications30.552014
Covert Computation - Hiding code in code through compile-time obfuscation.40.412014
QR Code Security: A Survey of Attacks and Challenges for Usable Security120.832014
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.00.342014
AES-SEC: Improving Software Obfuscation through Hardware-Assistance20.392014
Genie in a Model? Why Model Driven Security will not secure your Web Application.00.342014
Quantifying Windows File Slack Size and Stability.10.482013
Covert computation: hiding code in code for obfuscation purposes50.522013
  • 1
  • 2