FH-Prof. Dipl.-Ing. Peter Kieseberg
- Head of Josef Ressel Center for Blockchain-Technologies and Security management
- Senior Researcher Institute of IT Security Research
- Department of Computer Science and Security
Study programmes
- Data Science and Artificial Intelligence* (BA)
- Information Security (MA)
- Data Intelligence (MA)
- IT Security (BA)
Departments
- Computer Science and Security
Short profile
- 2001 – 2007: Technical Mathematics in Computer Science at TU Wien
- 2007 – 2008 Consultant and Project Manager with Benmark GmbH
- 2008 – 2010: Consultant and Project Manager with Newcon GmbH
- Since 2010: Research Coordinator at SBA Research
- Since Nov 2017: Lecturer at FH St. Pölten
Download CV
Download Publications
Publications
Adrowitzer, A., Temper, M., Buchelt, A., Kieseberg, P., & Eigner, O. (2024). Safeguarding the Future of Artificial Intelligence: An AI Blueprint. In Artificial Intelligence for Security (pp. 3–22). Springer Cham. https://doi.org/10.1007/978-3-031-57452-8_1
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Cyber Resilience Fundamentals (Vol. 1). Springer.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Testing and Improving Cyber Resilience. In Cyber Resilience Fundamentals (pp. 105–124). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Building Cyber Resilience. In Cyber Resilience Fundamentals (pp. 61–79). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Cyber Resilience Fundamentals. In Cyber Resilience Fundamentals (pp. 13–21). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Resilient Operations. In Cyber Resilience Fundamentals (pp. 81–89). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Managing the Cyber Resilience Process. In Cyber Resilience Fundamentals (pp. 37–46). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Standards and Best Practices. In Cyber Resilience Fundamentals (pp. 23–35). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Reacting to Cyber Incidents. In Cyber Resilience Fundamentals (pp. 91–104). Springer International Publishing.
Tjoa, S., Gafic, M., & Kieseberg, P. (2024). Analyzing the Organization. In Cyber Resilience Fundamentals (pp. 47–59). Springer International Publishing.
Kieseberg, P., Tjoa, S., & Holzinger, A. (2024). Controllable Artificial Intelligence. ERCIM News, 136, 46–47.
Buchelt, A., Adrowitzer, A., Kieseberg, P., Gollob, C., Nothdurft, A., Eresheim, S., Tschiatschek, S., Stampfer, K., & Holzinger, A. (2024). Exploring artificial intelligence for applications of drones in forest ecology and management. Forest Ecology and Management, 551, 121530. https://doi.org/10.1016/j.foreco.2023.121530
König, L., Pirker, M., Geyer, H., Feldmann, M., Tjoa, S., & Kieseberg, P. (2023). DISA - A Blockchain-Based Distributed Information Security Audit. Information Integration and Web Intelligence, 27–34. https://doi.org/10.1007/978-3-031-48316-5_4
Kieseberg, P. (2023, November 13). Social Engineering - Sicherheit beginnt VOR dem Bildschirm. VHS Science, Planetarium Wien.
Kieseberg, P., Tjoa, S., & Holzinger, A. (2023). AI kontrolliert einsetzen – Trustworthy AI, Controllable AI und Beschaffung sicherer AI. USANCEN, 1, 15–17.
Kieseberg, P. (2023, March 10). AI kontrolliert sicher einsetzen. IKT Sicherheitskonferenz, Linz, Austria.
Kieseberg, P., Tjoa, S., & Holzinger, A. (2023). Procurement of Secure AI – A Practical Guide. ERCIM-News, 135, 36–37.
Kieseberg, P. (2023, September 15). Sicherheit am Computer für selbständige Gesundheits-Dienstleister. InCyt Training, FH St. Pölten / hybrid.
Kieseberg, P. (2023, September 14). Keynote: AI & Security - Research at the interface of two domains. Estonian - Lower Austria Digitalization Symposium, Haus der Digitalisierung, Tulln.
Holzinger, A., Kieseberg, P., Cabitza, F., Campagner, A., Tjoa, A. M., & Weippl, E. (2023). Machine Learning and Knowledge Extraction: 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29. Springer Nature.
Kieseberg, P., Weippl, E., Tjoa, A. M., Cabitza, F., Campagner, A., & Holzinger, A. (2023). Controllable AI-An Alternative to Trustworthiness in Complex AI Systems? International Cross-Domain Conference for Machine Learning and Knowledge Extraction, 1–12. https://doi.org/10.1007/978-3-031-40837-3_1
Kieseberg, P. (2023, June 16). Welcome & Current Topics in Security Research. IRI$ Side-Event Cyber-Security, FH St. Pölten.
Kieseberg, P. (2023, June 16). Beschaffung sicherer AI. IRI$ Side-Event Cyber-Security, FH St. Pölten.
Kieseberg, P. (2023, May 25). Beschaffung sicherer AI-Systeme – Herausforderungen & Praktischer Leitfaden. Beirat DIS, FH St. Pölten.
Kieseberg, P. (2023, April 19). Beschaffung sicherer AI-Systeme – Herausforderungen & Praktischer Leitfaden. FFH Forum, FH St. Pölten.
Kieseberg, P. (2023, April 18). Food Waste Reduction am praktischen Beispiel aus Systemgastronomie und Großküchen. REIF im europäischen Kontext, Remote.
König, L., Feldmann, M., Pirker, M., & Kieseberg, P. (2023, April). Management von Informationssicherheitsaudits mithilfe von Verteilten Systemen und Blockchains. 16. Forschungsforum der Österreichischen Fachhochschulen, St. Pölten. http://ffhoarep.fh-ooe.at/handle/123456789/1732
Kieseberg, P. (2023, March 27). Trends in Security Research. Blended Intensive Program (BIP), St. Pölten / hybrid.
Kieseberg, P. (2023, October 3). Security Testing in Complex AI Systems. Future Network CERT
Kieseberg, P. (2023, September 3). Prognosen zu Umweltrisiken - Klassifizierung von Regenereignissen anhand von Richtungsdaten kommerzieller Mikrowellenverbindungen. Schlumberger Lectures, Tulln, Austria.
Assante, D., Fornaro, C., Hamburg, I., Gokdemir, A., Kieseberg, P., Oz, F., Strzalka, D., Vârtopeanu, G., & Vladut, G. (2023). Cybersecurity Education for SMEs. International Conference on Remote Engineering and Virtual Instrumentation, 763, 569–576.
Weippl, E., Holzinger, A., & Kieseberg, P. (2023). Special Issue “Selected Papers from CD-MAKE 2020 and ARES 2020” (Vol. 1). MDPI.
Steszgal, J., Kieseberg, P., & Holzinger, A. (2023). Food Waste Reduction in Healthcare – Challenges in Integrating usage Data with Scorings. ERCIM-News, 132, 37–38.
Huber, E., Treytl, A., Sauter, T., Ruotsalainen, H., Pospisil, B., Kieseberg, P., & Seeböck, W. (2023). Wie Smart Home Geräte zur Eintrittsfalle für Kriminelle werden können. Fachtagung Kriminologische Zentralstelle (KrimG), 131–148.
Eresheim, S., Kovac, F., & Adrowitzer, A. (2023). Standing Still Is Not an Option: Alternative Baselines for Attainable Utility Preservation. In A. Holzinger, P. Kieseberg, F. Cabitza, A. Campagner, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 14065, pp. 239–257). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-40837-3_15
Priebe, T., Kieseberg, P., Adrowitzer, A., Eigner, O., & Kovac, F. (2023). Sustainability Effects of Robust and Resilient Artificial Intelligence. In A. Holzinger, P. Kieseberg, F. Cabitza, A. Campagner, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 14065, pp. 188–199). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-40837-3_12
Kieseberg, P. (2022, July 10). Wie entlarve ich gefälschte Nachrichten von Banken oder Facebook? [Video]. https://www.p3tv.at/webtv/11652-wie-entlarve-ich-gefaelschte-nachrichten-von-banken-oder-facebook
Hoenigsberger, F., Saranti, A., Angerschmid, A., Retzlaff, C. O., Gollob, C., Witzmann, S., Nothdurft, A., Kieseberg, P., Holzinger, A., & Stampfer, K. (2022). Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations. Machine Learning and Knowledge Extraction, Proceedings of the 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, Austria, August 23–26, 2022, LNCS 13480, 362–375.
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2022). 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, August 23–26, 2022 Proceedings. Springer. https://link.springer.com/content/pdf/10.1007/978-3-031-14463-9.pdf
Kieseberg, P., Buttinger, C., Kaltenbrunner, L., Temper, M., & Tjoa, S. (2022, July 18). Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems. 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Padua.
Holzinger, A., Stampfer, K., Nothdurft, A., Gollob, C., & Kieseberg, P. (2022). Challenges in Artificial Intelligence for Smart forestry. ERCIM News, 130, 40–41. https://ercim-news.ercim.eu/en130/r-i/challenges-in-artificial-intelligence-for-smart-forestry
Anderluh, A., Dam, T., Eigner, O., Herburger, M., Hochstrasser, C., Kieseberg, P., & Wagner, A. (2022, July). Cyber security in resilient multimodal logistics. EUROMA 2022 Papers. EUROMA 2022, Berlin. https://www.dropbox.com/sh/ugxee11d2k3vxy0/AAB6PSRUyN8gG3cMHaF62K8Ja/Papers/189%20Cyber%20security%20in%20resilient%20multimodal%20logistics.pdf?dl=0
Hense, J., Tjoa, S., & Kieseberg, P. (2022). Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula. ERCIM News, 129, 38–39. https://ercim-news.ercim.eu/images/stories/EN129/EN129-web.pdf
Kieseberg, P., & Tjoa, S. (2022). Guest Editorial: Special Issue on the ARES-Workshops 2021. JoWUA, 13(1), 1–3. https://doi.org/DOI:/10.22667/JOWUA.2022.03.31.001
Zanol, J., Buchelt, A., Tjoa, S., & Kieseberg, P. (2022, February 24). What is "AI"? Exploring the scope of the "Artificial Intelligence Act." Tagungsband IRIS 2022. IRIS Internationales Rechtsinformatik Symposium. https://jusletter-it.weblaw.ch/dam/publicationsystem_leges/iris2022/zanoal_et_al_what_is_ai.pdf
Gafic, M., Tjoa, S., & Kieseberg, P. (2022). A Novel Approach Integrating Design Thinking Techniques in Cyber Exercise Development. Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021, 103–113. https://doi.org/10.1007/978-3-030-95918-0_11
Gafic, M., Tjoa, S., Kieseberg, P., Hellwig, O., & Quirchmayer, G. (2022). Cyber Exercises in Computer Science Education. Proceedings of the 8th International Conference on Information Systems and Privacy (ICISSP), 404–411. https://doi.org/10.5220/0010845800003120
Kieseberg, P., Bechtel, T., & Tjoa, S. (2021, October 11). Evaluation of Password Replacement Schemes. Proceedings 2021 International Conference on Software Security and Assurance (ICSSA), IEEE. 2021 International Conference on Software Security and Assurance (ICSSA), IEEE, Penn State University Altoona, Pennsilvania, USA.
Slijepčević, D., Henzl, M., Klausner, L. D., Dam, T., Kieseberg, P., & Zeppelzauer, M. (2021). k‑Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers. Computers & Security, 111, 19. https://doi.org/10.1016/j.cose.2021.102488
Kieseberg, P. (2021, February 9). Identitätsdiebstahl: Das Geschäft mit gestohlenen Daten im Netz [Onlinesicherheit.at]. https://www.onlinesicherheit.gv.at/Services/News/Identit%C3%A4tsdiebstahl--Das-Gesch%C3%A4ft-mit-gestohlenen-Daten-im-Netz-.html
Stöger, K., Schneeberger, D., Kieseberg, P., & Holzinger, A. (2021). Legal aspects of data cleansing in medical AI. Computer Law & Security Review, 42. https://doi.org/https://doi.org/10.1016/j.clsr.2021.105587
Kochberger, P., Schrittwieser, S., Schweighofer, S., Kieseberg, P., & Weippl, E. R. (2021, August 18). SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: The 16th International Conference on Availability, Reliability and Security. https://doi.org/10/gnhmbr
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021, August 17). Digital Transformation for Sustainable Development Goals (SDGs)-A Security, Safety and Privacy Perspective on AI. International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE).
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2021). 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021 Virtual Event, August 17–20, 2021 Proceedings. Springer. https://link.springer.com/book/10.1007/978-3-030-84060-0?utm_medium=referral&utm_source=google_books&utm_campaign=3_pier05_buy_print&utm_content=en_08082017
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2021). Secure Internal Data Markets. Future Internet, 13(8). https://doi.org/https://doi.org/10.3390/fi13080208
Kieseberg, P., Tjoa, S., & Geyer, H. (2021). Security Management and the Slow Adoption of Blockchains. ERCIM News, 125, 47–48.
Kieseberg, P., & Tjoa, S. (2021). Guest Editorial: Special Issue on the ARES-Workshops 2020. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 12(1), 1–2. https://doi.org/10/gn4zmk
Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., Mercaldo, F., & Priebe, T. (2021). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, 536–542. https://doi.org/10.1109/CSR51186.2021.9527986
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 1–20). Springer International Publishing.
König, L., Korobeinikova, Y., Kieseberg, P., & Tjoa, S. (2020). Comparing Blockchain Standards and Recommendations. Future Internet 2020, Future Internet 2020. https://doi.org/10.3390/fi12120222
Judt, D., Kochberger, P., Kieseberg, P., & Schrittwieser, S. (2020, October 28). Compiling and Analyzing Open Source Malware for Research Purposes. 2020 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA. https://doi.org/10.1109/ICSSA51305.2020.00013
Tjoa, S., Buttinger, C., Holzinger, K., & Kieseberg, P. (2020). Penetration Testing Artificial Intelligence. ERCIM News, 123, 36–37. https://phaidra.fhstp.ac.at/o:4338
Kieseberg, P. (2020, September 24). Forschung an Blockchains – was und warum? Digitalisierung, Blockchain, Cloud-based Integration, EuroPlaza 2.
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Longo, L., Goebel, R., Lecue, F., Kieseberg, P., & Holzinger, A. (2020, August 27). Explainable Artificial Intelligence: Concepts, Applications, Research Challenges and Visions. International Cross-Domain Conference for Machine Learning and Knowledge Extraction, Virtuell.
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2020). Machine Learning and Knowledge Extraction: Fourth IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2020. Springer. https://link.springer.com/book/10.1007/978-3-030-57321-8
Treytl, A., Huber, E., Sauter, T., & Kieseberg, P. (2020). Securing home automation Systems against Sensor Manipulation. ERCIM News, 122, 57–58. https://phaidra.fhstp.ac.at/o:4337
Kieseberg, P. (2020, May 20). Datenschutz & Datensicherheit im Homeoffice [Video recording]. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, August 5). Sicheres gemeinsames Arbeiten an Dokumenten [Video recording]. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, April 30). Sichere Audio- & Videokonferenzen [Video recording]. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, April 22). Hardware- & Softwareanforderungen an sicheres Homeoffice [Video recording]. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, March 3). IT-gerechte Blockchain im Sicherheitsmanagement. Blockchain Summit.
Holzinger, A., Kieseberg, P., & Müller, H. (2020). KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI. ERCIM-News, 120, 41–42. https://phaidra.fhstp.ac.at/o:4336
Kieseberg, P. (2020, January 29). Pass auf, an wen Du Dich für ewig kettest. Datenschutzcafé, FH St. Pölten.
Kieseberg, P. (2020, January 28). Forschung an Blockchains – was und warum? Security Day, FH St. Pölten.
Kieseberg, P. (2020, January 27). Application of Blockchain-Technologies in hospitals – a study. Workshop Blockchain and Anonymization as AI-Enabler, FH St. Pölten.
Kieseberg, P. (2020, January 27). Research Agenda in the JRC BLOCKCHAINS. Workshop Blockchain and Anonymization as AI-Enabler, FH St. Pölten.
Pellegrini, T., Blomqvist, E., Groth, P., de Boer, V., Alam, M., Käfer, T., Kieseberg, P., Kirrane, S., Meroño-Peñuela, A., & Pandit, H. J. (Eds.). (2020). Semantic Systems. In the Era of Knowledge Graphs: 16th International Conference on Semantic Systems, SEMANTiCS 2020, Amsterdam, The Netherlands, September 7–10, 2020, Proceedings (Vol. 12378). Springer International Publishing. https://doi.org/10.1007/978-3-030-59833-4
König, L., Unger, S., Kieseberg, P., & Tjoa, S. (2020). The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks. Journal of Internet Services and Information Security (JISIS), Volume: 10, Number: 3, Volume 10, 110–127. https://doi.org/10.22667/JISIS.2020.08.31.110
Kieseberg, P. (2019, August 11). Josef Ressel Zentrum für Blockchain-Technologien & Sicherheitsmanagement - Offizielle Eröffnung. Offizielle Eröffnung JRC Blockchains, FH St. Pölten.
Amiri, F., Quirchmayr, G., Kieseberg, P., Weippl, E., & Bertone, A. (2019). Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. Data Privacy Management, Cryptocurrencies and Blockchain Technology, 39–48.
Kieseberg, P. (2019, May 9). JR Center for Blockchain Technologies & Security Management. Beirat, A1.
Kieseberg, P. (2019, August 29). Keynote: Authentication of the future - a challenge to privacy? [Invited talk]. BASS-Workshop, Canterbury, United Kingdom.
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2019). Machine Learning and Knowledge Extraction: Third IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2019. Springer. https://link.springer.com/book/10.1007/978-3-030-29726-8
Amiri, F., Quirchmayr, G., Kieseberg, P., Bertone, A., & Weippl, E. (2019). Efficiently Vectorized Anonymization in Data Mining using Genetic Algorithms. Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection-IFIP SEC 2019.
Kieseberg, P. (2019, May 16). Coineater – Automatische Erkennung von Cryptojacking. Security Summit .at.
Kieseberg, P. (2019, April 24). Die DSGVO und das Problem der Löschung von Daten in Datenbanken. FFH Forum, FH Wiener Neustadt.
Kieseberg, P. (2019, January 29). Bitcoin vs. Blockchain. Security Day, Fachhochschule St. Pölten.
Kieseberg, P., Klausner, L. D., & Holzinger, A. (2019). Distortion in Real-World Analytic Processes. ERCIM News, 118, 49–50.
Kieseberg, P. (2019, February 21). Federated Machine Learning in Health Informatics. Beirat, Fachhochschule St. Pölten.
Kieseberg, P. (2019, January 29). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Winkler, D., Rinker, F., & Kieseberg, P. (2019). Towards a Flexible and Secure Round-Trip-Engineering Process for Production Systems Engineering with Agile Practices. Software Quality - The Complexity and Challenges of Software Engineering and Software Quality in the Cloud, LNBIP 338, 14–130.
Kieseberg, P., & Weippl, E. (2019). Securing Information Against Manipulation in the Production Systems Engineering Process. In S. Biffl, M. Eckhart, A. Lüder, & E. Weippl (Eds.), Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb (pp. 335–356). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_12
Kieseberg, P. (2019, May 8). Privacy Aware Machine Learning in Health Informatics. Fachkonferenz DIGITAL SAFETY + CYBER SECURITY, Novomatic Forum, Vienna, Austria.
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering. 9.
Malle, B., Giuliani, N., Kieseberg, P., & Holzinger, A. (2018). The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations. ArXiv:1802.03707 [Cs, Stat]. http://arxiv.org/abs/1802.03707
Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Phyiscal Production Systems. 14.
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). A Machine Learning Approach for Privacy-preservation in E-business Applications: Proceedings of the 15th International Joint Conference on E-Business and Telecommunications, 443–452. https://doi.org/10/gh38cd
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 11015, pp. 1–8). Springer International Publishing. https://doi.org/10.1007/978-3-319-99740-7_1
Goebel, R., Chander, A., Holzinger, K., Lecue, F., Akata, Z., Stumpf, S., Kieseberg, P., & Holzinger, A. (2018). Explainable AI: The New 42? In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 11015, pp. 295–303). Springer International Publishing. https://doi.org/10.1007/978-3-319-99740-7_21
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. Proceedings of the Central European Cybersecurity Conference 2018 on - CECC 2018, 1–4. https://doi.org/10/gh372c
Holzinger, K., Mak, K., Kieseberg, P., & Holzinger, A. (2018). Can we trust Machine Learning Results? Artificial Intelligence in Safety-Critical decision Support. ERCIM News, 112(1), 42–43.
CD-MAKE. (2018). Machine learning and knowledge extraction: Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12.9, International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018: proceedings (A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. R. Weippl, Eds.). Springer.
Kieseberg, P., Skopik, F., Pahi, T., Leitner, M., & Fiedler, R. (2018). Informationsanalysekonzept zur Erstellung von Cyber-Lagebildern in PPPs. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 237–291). Springer Vieweg, Berlin, Heidelberg.
Kaundert, M., Ziegler, L., Pahi, T., Skopik, F., Leitner, M., Kieseberg, P., Schwanzer, B., & Ampia-Addison, J. K. (2018). Evaluierung des Cyber Lagebildkonzepts im praktischen Einsatz. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 293–344). Springer Vieweg, Berlin, Heidelberg.
Pahi, T., Skopik, F., Kieseberg, P., & Leitner, M. (2018). Erhebung von Informations-und Datenquellen für Cyber-Lagebilder. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 191–236). Springer Vieweg, Berlin, Heidelberg.
Kieseberg, P. (2018, January 30). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Kieseberg, P., Schrittwieser, S., Malle, B., & Weippl, E. (2017). Das Testen von Algorithmen in sensibler datengetriebener Forschung. Rundbrief Des Fachausschusses Management Der Anwendungsentwicklung Und -Wartung (WI-MAW). http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf
Kieseberg, P., Neuner, S., Schrittwieser, S., & Schmiedecker, M. (2017). Real-time Forensics through Endpoint Visibility. International Conference on Digital Forensics & Cyber Crime (ICDF2C). https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf
Kieseberg, P., Frühwirt, P., & Schrittwieser, S. (2017). Security Testing for Mobile Applications. ERCIM News, 109, 52–53. https://www.sba-research.org/wp-content/uploads/publications/201704 - KIESEBERG - Pages from EN109-web.pdf
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2017). Forensics using Internal Database Structures. ERCIM News, 108. http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf
Malle, B., Kieseberg, P., Schrittwieser, S., & Holzinger, A. (2016). Privacy Aware Machine Learning and the Right to be Forgotten. ERCIM News, 107.
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News, 105.
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Forensics using Internal Database Structures. ERCIM News, 108.
Kieseberg, P., Fruehwirt, P., Schrittwieser, S., & Weippl, E. R. (2015). Security tests for mobile applications - Why using TLS or SSL is not enough. 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW). https://doi.org/10/gnt2t7
Fadai, T., Schrittwieser, S., Kieseberg, P., & Mulazzani, M. (2015). Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems. International Conference on Availability, Reliability and Security (ARES).
Rottermanner, C., Kieseberg, P., Huber, M., Schmiedecker, M., & Schrittwieser, S. (2015). Privacy and Data Protection in Smartphone Messengers. Proceedings of the 17th International Conference on Information Integration and Web-Based Applications Services (IiWAS2015). https://doi.org/10/gh3746
Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., & Weippl, E. (2015). Security and privacy of smartphone messaging applications. International Journal of Pervasive Computing and Communications, 11. https://doi.org/10/gh372v
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Special Issue on Security and Privacy in Business Networking.
Fruehwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik – Rekonstruktion von Abfragen über Datenbank-interne Logfiles. GI Sicherheit 2014.
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (n.d.). Preface to the 6th Cross-Domain Conference on Machine Learning & Knowledge Extraction. Proceedings of the 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, Austria, August 23–26, 2022, 13480.
Projects
- ADAL
- SSCCS - Secure Supply Chains for Critical Systems
- SBA Research
- "ACCESS POINT" for basic oncological research in Lower Austria
- Josef Ressel Center for Blockchain-Technologies & Security Management
- A3 - AI Act for Austria
- Dataskop - Sensor-Based Data Economy in Lower Austria
- InCyt - Interdisciplinary Cyber Training
- necta against Food Waste
- Trustworthy AI - Innovationcamp for Biotech & Health
- APOCRAT-ID
- Beyond Coding -Software Development of the Future
- Resilient Rail – Resilient sensor infrastructure in railroads
- ARES - Attack resilience for IoT-Based sensor devices in home automation
- SecureMart - Secure & Trustworthy on premise Data Markets
- CR-Bootcamp - Bootcamp Cyber-Resilience for Medical Applications
- Big-Data Analytics
- Data Science Bootcamp
- InduSec
- Webinar Series "Secure Home Office”