Name
Papers
Collaborators
EDGAR WEIPPL
30
53
Citations 
PageRank 
Referers 
20
10.62
69
Referees 
References 
438
134
Search Limit
100438
Title
Citations
PageRank
Year
Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork00.342022
Meta-framework for Automating Static Malware Analysis00.342022
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171).00.342022
Unnecessary Input Heuristics & PayJoin Transactions.00.342022
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies00.342021
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies00.342021
Measuring Cookies and Web Privacy in a Post-GDPR World.40.402019
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.00.342019
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper).10.362018
On Security Research towards Future Mobile Network Generations.20.402018
HydRand: Practical Continuous Distributed Randomness.00.342018
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).00.342018
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid.00.342018
Security Challenges in Cyber-Physical Production Systems.00.342018
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI.10.352018
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques.00.342018
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice.00.342018
Agreement with Satoshi - On the Formalization of Nakamoto Consensus.10.352018
Real-Time Forensics Through Endpoint Visibility00.342017
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.00.342017
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.10.362017
Security assurance assessment methodology for hybrid clouds.50.452017
A Performance Assessment Of Network Address Shuffling In Iot Systems00.342017
Securing the Internet, One HTTP 200 OK at a Time.00.342017
Trend Analysis of Underground Marketplaces.00.342017
PeekaTorrent: Leveraging P2P hash values for digital forensics00.342016
Empirical Research and Research Ethics in Information Security00.342016
Time is on my side40.442016
IPv6 Security: Attacks and Countermeasures in a Nutshell.00.342014
A New Approach To Secure Federated Information Bases Using Agent Technology10.422003