Peter Kieseberg

Affiliations:
  • SBA Research, Austria


According to our database1, Peter Kieseberg authored at least 80 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Guest Editorial: Special Issue on the ARES-Workshops 2020.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Secure Internal Data Markets.
Future Internet, 2021

Security Management and the Slow Adoption of Blockchains.
ERCIM News, 2021

Security and Resilience Issues in Supply Chains - A Research Perspective.
ERCIM News, 2021

k-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers.
CoRR, 2021

Towards Resilient Artificial Intelligence: Survey and Research Issues.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI.
Proceedings of the Machine Learning and Knowledge Extraction, 2021

SoK: Automatic Deobfuscation of Virtualization-protected Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
An Analysis of 5 Million OpenPGP Keys.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks.
J. Internet Serv. Inf. Secur., 2020

Comparing Blockchain Standards and Recommendations.
Future Internet, 2020

Securing Home Automation Systems against Sensor Manipulation.
ERCIM News, 2020

Penetration Testing Artificial Intelligence.
ERCIM News, 2020

KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI.
ERCIM News, 2020

Assessing the sovereignty and security of the Austrian internet.
Proceedings of the International Conference on Software Security and Assurance, 2020

Medical Blockchains and Privacy in Austria - Technical and Legal Aspects.
Proceedings of the International Conference on Software Security and Assurance, 2020

Compiling and Analyzing Open Source Malware for Research Purposes.
Proceedings of the International Conference on Software Security and Assurance, 2020

Explainable Artificial Intelligence: Concepts, Applications, Research Challenges and Visions.
Proceedings of the Machine Learning and Knowledge Extraction, 2020

2019
Distortion in Real-World Analytic Processes.
ERCIM News, 2019

Towards a Flexible and Secure Round-Trip-Engineering Process for Production Systems Engineering with Agile Practices.
Proceedings of the Software Quality: The Complexity and Challenges of Software Engineering and Software Quality in the Cloud, 2019

Fingerprinting using database steganography.
Proceedings of the International Conference on Software Security and Assurance, 2019

Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective.
Proceedings of the International Conference on Software Security and Assurance, 2019

Towards Data Anonymization in Data Mining via Meta-heuristic Approaches.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Securing Information Against Manipulation in the Production Systems Engineering Process.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

2018
Can we Trust Machine Learning Results? Artificial Intelligence in Safety-Critical Decision Support.
ERCIM News, 2018

The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations.
CoRR, 2018

Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten.
Comput. Law Secur. Rev., 2018

Security Challenges in Cyber-Physical Production Systems.
Proceedings of the Software Quality: Methods and Tools for Better Software and Systems, 2018

A Machine Learning Approach for Privacy-preservation in E-business Applications.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Structural Limitations of B+-Tree forensics.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI.
Proceedings of the Machine Learning and Knowledge Extraction, 2018

Explainable AI: The New 42?
Proceedings of the Machine Learning and Knowledge Extraction, 2018

2017
Forensics using Internal Database Structures.
ERCIM News, 2017

Trend Analysis of Underground Marketplaces.
ERCIM News, 2017

Security Testing for Mobile Applications.
ERCIM News, 2017

Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology.
CoRR, 2017

Interactive Anonymization for Privacy aware Machine Learning.
Proceedings of the Workshop and Tutorial on Interactive Adaptive Learning co-located with European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2017), 2017

Real-Time Forensics Through Endpoint Visibility.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

DO NOT DISTURB? Classifier Behavior on Perturbed Datasets.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

The More the Merrier - Federated Learning from Local Sphere Recommendations.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

Privacy by Design Data Exchange Between CSIRTs.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Privacy Aware Machine Learning and the "Right to be Forgotten".
ERCIM News, 2016

Detection of Data Leaks in Collaborative Data Driven Research.
ERCIM News, 2016

Trust for the "Doctor in the Loop".
ERCIM News, 2016

A tamper-proof audit and control system for the doctor in the loop.
Brain Informatics, 2016

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Security and privacy of smartphone messaging applications.
Int. J. Pervasive Comput. Commun., 2015

CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism.
ERCIM News, 2015

A Structured Approach to Defence Simulation Training.
ERCIM News, 2015

Privacy and data protection in smartphone messengers.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding.
Proceedings of the Advances in Digital Forensics XI, 2015

Security tests for mobile applications - Why using TLS/SSL is not enough.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Witnesses for the Doctor in the Loop.
Proceedings of the Brain Informatics and Health - 8th International Conference, 2015

Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach.
Proceedings of the Towards Integrative Machine Learning and Knowledge Extraction, 2015

On Reconnaissance with IPv6: A Pattern-Based Scanning Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Protecting Anonymity in Data-Driven Biomedical Science.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Genie in a Model? Why Model Driven Security will not secure your Web Application.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014

Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.
Digit. Investig., 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Comput. Secur., 2014

InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Using Model Driven Security Approaches in Web Application Development.
Proceedings of the Information and Communication Technology, 2014

QR Code Security: A Survey of Attacks and Challenges for Usable Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

E-voting Authentication with QR-codes.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014

2013
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep., 2013

Using the structure of B+-trees for enhancing logging mechanisms of databases.
Int. J. Web Inf. Syst., 2013

Data Confidentiality using Fragmentation in Cloud Computing.
Int. J. Pervasive Comput. Commun., 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

INMOTOS: extending the ROPE-methodology.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

Digital forensics for enterprise rights management systems.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Proceedings of the Seventh International Conference on Availability, 2012

2011
An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010


  Loading...