Zurück

FH-Prof. Dipl.-Ing. Peter Kieseberg

  • Institutsleiter Institut für IT Sicherheitsforschung
  • FH-Dozent
  • Leiter Josef Ressel Zentrum für Blockchain-Technologien und Sicherheitsmanagement
  • Department Informatik und Security
Arbeitsplatz: B - Campus-Platz 1
T: +43/2742/313 228 696

Studiengänge

  • IT Security (BA)
  • Data Science and Business Analytics (BA)
  • Data Intelligence (MA)
  • Information Security (MA)

Departments

  • Informatik und Security

Kurzprofil

  • 2001 – 2007: Studium der Technischen Mathematik in den Computerwissenschaften an der TU Wien
  • 2007 –2008: Consultant und Projektmanager bei Benmark GmbH
  • 2008 – 2010: Consultant und Projektmanager bei Newcon GmbH
  • Seit 2010: Research Coordinator bei SBA Research
  • Seit November 2017: Dozent an der FH St. Pölten

Download CV

Download Publikationen

Publikationen

Kieseberg, P. (2022, July 10). Wie entlarve ich gefälschte Nachrichten von Banken oder Facebook? [Video]. https://www.p3tv.at/webtv/11652-wie-entlarve-ich-gefaelschte-nachrichten-von-banken-oder-facebook
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2022). 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, August 23–26, 2022 Proceedings. Springer. https://link.springer.com/content/pdf/10.1007/978-3-031-14463-9.pdf
Hoenigsberger, F., Saranti, A., Angerschmid, A., Retzlaff, C. O., Gollob, C., Witzmann, S., Nothdurft, A., Kieseberg, P., Holzinger, A., & Stampfer, K. (2022). Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations. Machine Learning and Knowledge Extraction, Proceedings of the 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, Austria, August 23–26, 2022, LNCS 13480, 362–375.
Kieseberg, P., Buttinger, C., Kaltenbrunner, L., Temper, M., & Tjoa, S. (2022, July 18). Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems. 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Padua.
Anderluh, A., Dam, T., Eigner, O., Herburger, M., Hochstrasser, C., Kieseberg, P., & Wagner, A. (2022, July). Cyber security in resilient multimodal logistics. EUROMA 2022 Papers. EUROMA 2022, Berlin. https://www.dropbox.com/sh/ugxee11d2k3vxy0/AAB6PSRUyN8gG3cMHaF62K8Ja/Papers/189%20Cyber%20security%20in%20resilient%20multimodal%20logistics.pdf?dl=0
Holzinger, A., Stampfer, K., Nothdurft, A., Gollob, C., & Kieseberg, P. (2022). Challenges in Artificial Intelligence for Smart forestry. ERCIM News, 130, 40–41.
Hense, J., Tjoa, S., & Kieseberg, P. (2022). Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula. ERCIM News, 129, 38–39. https://ercim-news.ercim.eu/images/stories/EN129/EN129-web.pdf
Kieseberg, P., & Tjoa, S. (2022). Guest Editorial: Special Issue on the ARES-Workshops 2021. JoWUA, 13(1), 1–3. https://doi.org/DOI:/10.22667/JOWUA.2022.03.31.001
Zanol, J., Buchelt, A., Tjoa, S., & Kieseberg, P. (2022, February 24). What is "AI"? Exploring the scope of the "Artificial Intelligence Act." Tagungsband IRIS 2022. IRIS Internationales Rechtsinformatik Symposium. https://jusletter-it.weblaw.ch/dam/publicationsystem_leges/iris2022/zanoal_et_al_what_is_ai.pdf
Gafic, M., Tjoa, S., & Kieseberg, P. (2022). • A Novel Approach Integrating Design Thinking Techniques in Cyber Exercise Development. Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021, 103–113. https://doi.org/10.1007/978-3-030-95918-0_11
Gafic, M., Tjoa, S., Kieseberg, P., Hellwig, O., & Quirchmayer, G. (2022). Cyber Exercises in Computer Science Education. Proceedings of the 8th International Conference on Information Systems and Privacy (ICISSP), 404–411. https://doi.org/10.5220/0010845800003120
Kieseberg, P., Bechtel, T., & Tjoa, S. (2021, October 11). Evaluation of Password Replacement Schemes. Proceedings 2021 International Conference on Software Security and Assurance (ICSSA), IEEE. 2021 International Conference on Software Security and Assurance (ICSSA), IEEE, Penn State University Altoona, Pennsilvania, USA.
Slijepčević, D., Henzl, M., Klausner, L. D., Dam, T., Kieseberg, P., & Zeppelzauer, M. (2021). k‑Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers. Computers & Security, 111, 19. https://doi.org/10.1016/j.cose.2021.102488
Kieseberg, P. (2021, February 9). Identitätsdiebstahl: Das Geschäft mit gestohlenen Daten im Netz [Onlinesicherheit.at]. https://www.onlinesicherheit.gv.at/Services/News/Identit%C3%A4tsdiebstahl--Das-Gesch%C3%A4ft-mit-gestohlenen-Daten-im-Netz-.html
Stöger, K., Schneeberger, D., Kieseberg, P., & Holzinger, A. (2021). Legal aspects of data cleansing in medical AI. Computer Law & Security Review, 42. https://doi.org/https://doi.org/10.1016/j.clsr.2021.105587
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021, August 17). Digital Transformation for Sustainable Development Goals (SDGs)-A Security, Safety and Privacy Perspective on AI. International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE).
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2021). 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021 Virtual Event, August 17–20, 2021 Proceedings. Springer. https://link.springer.com/book/10.1007/978-3-030-84060-0?utm_medium=referral&utm_source=google_books&utm_campaign=3_pier05_buy_print&utm_content=en_08082017
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2021). Secure Internal Data Markets. Future Internet, 13(8). https://doi.org/https://doi.org/10.3390/fi13080208
Kieseberg, P., Tjoa, S., & Geyer, H. (2021). Security Management and the Slow Adoption of Blockchains. ERCIM News, 125, 47–48.
Kieseberg, P., & Tjoa, S. (2021). Guest Editorial: Special Issue on the ARES-Workshops 2020. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 12(1), 1–2. https://doi.org/10/gn4zmk
Kieseberg, P. (2021). Big Data Analytics. Cyber-Security-Guide.
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 1–20). Springer International Publishing.
Kochberger, P., Schrittwieser, S., Schweighofer, S., Kieseberg, P., & Weippl, E. R. (2021, August 18). SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: The 16th International Conference on Availability, Reliability and Security. https://doi.org/10/gnhmbr
Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L. D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., Mercaldo, F., & Priebe, T. (2021). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, 536–542. https://doi.org/10.1109/CSR51186.2021.9527986
Tjoa, S., Buttinger, C., Holzinger, K., & Kieseberg, P. (2020). Penetration Testing Artificial Intelligence. ERCIM News, 123, 36–37. https://phaidra.fhstp.ac.at/o:4338
Kieseberg, P. (2020, September 24). Forschung an Blockchains – was und warum? Digitalisierung, Blockchain, Cloud-based Integration, EuroPlaza 2.
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Longo, L., Goebel, R., Lecue, F., Kieseberg, P., & Holzinger, A. (2020, August 27). Explainable Artificial Intelligence: Concepts, Applications, Research Challenges and Visions. International Cross-Domain Conference for Machine Learning and Knowledge Extraction, Virtuell.
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2020). Machine Learning and Knowledge Extraction: Fourth IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2020. Springer. https://link.springer.com/book/10.1007/978-3-030-57321-8
Treytl, A., Huber, E., Sauter, T., & Kieseberg, P. (2020). Securing home automation Systems against Sensor Manipulation. ERCIM News, 122, 57–58. https://phaidra.fhstp.ac.at/o:4337
Kieseberg, P. (2020, May 20). Datenschutz & Datensicherheit im Homeoffice. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, August 5). Sicheres gemeinsames Arbeiten an Dokumenten. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, April 30). Sichere Audio- & Videokonferenzen. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, April 22). Hardware- & Softwareanforderungen an sicheres Homeoffice. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Kieseberg, P. (2020, March 3). IT-gerechte Blockchain im Sicherheitsmanagement. Blockchain Summit.
Holzinger, A., Kieseberg, P., & Müller, H. (2020). KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI. ERCIM-News, 120, 41–42. https://phaidra.fhstp.ac.at/o:4336
Kieseberg, P. (2020, January 29). Pass auf, an wen Du Dich für ewig kettest. Datenschutzcafé, FH St. Pölten.
Kieseberg, P. (2020, January 29). Internet Privacy. Security Day, FH St. Pölten.
Kieseberg, P. (2020, January 28). Forschung an Blockchains – was und warum? Security Day, FH St. Pölten.
Kieseberg, P. (2020, January 27). Application of Blockchain-Technologies in hospitals – a study. Workshop Blockchain and Anonymization as AI-Enabler, FH St. Pölten.
Kieseberg, P. (2020, January 27). Research Agenda in the JRC BLOCKCHAINS. Workshop Blockchain and Anonymization as AI-Enabler, FH St. Pölten.
Pellegrini, T., Blomqvist, E., Groth, P., de Boer, V., Alam, M., Käfer, T., Kieseberg, P., Kirrane, S., Meroño-Peñuela, A., & Pandit, H. J. (Eds.). (2020). Semantic Systems. In the Era of Knowledge Graphs: 16th International Conference on Semantic Systems, SEMANTiCS 2020, Amsterdam, The Netherlands, September 7–10, 2020, Proceedings (Vol. 12378). Springer International Publishing. https://doi.org/10.1007/978-3-030-59833-4
Kieseberg, P. (2019, August 11). Josef Ressel Zentrum für Blockchain-Technologien & Sicherheitsmanagement - Offizielle Eröffnung. Offizielle Eröffnung JRC Blockchains, FH St. Pölten.
Amiri, F., Quirchmayr, G., Kieseberg, P., Weippl, E., & Bertone, A. (2019). Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. Data Privacy Management, Cryptocurrencies and Blockchain Technology, 39–48.
Kieseberg, P. (2019, May 9). JR Center for Blockchain Technologies & Security Management. Beirat, A1.
Kieseberg, P. (2019, August 29). Keynote: Authentication of the future - a challenge to privacy? [Invited talk]. BASS-Workshop, Canterbury, United Kingdom.
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (2019). Machine Learning and Knowledge Extraction: Third IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2019. Springer. https://link.springer.com/book/10.1007/978-3-030-29726-8
Amiri, F., Quirchmayr, G., Kieseberg, P., Bertone, A., & Weippl, E. (2019). Efficiently Vectorized Anonymization in Data Mining using Genetic Algorithms. Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection-IFIP SEC 2019.
Kieseberg, P. (2019, May 16). Coineater – Automatische Erkennung von Cryptojacking. Security Summit .at.
Kieseberg, P. (2019, April 24). Die DSGVO und das Problem der Löschung von Daten in Datenbanken. FFH Forum, FH Wiener Neustadt.
Kieseberg, P. (2019, March 29). Das Darknet. VHS, Science, Planetarium Wien.
Kieseberg, P. (2019, January 29). Bitcoin vs. Blockchain. Security Day, Fachhochschule St. Pölten.
Kieseberg, P. (2019, May 8). Privacy Aware Machine Learning in Health Informatics. Fachkonferenz DIGITAL SAFETY + CYBER SECURITY, Novomatic Forum, Vienna, Austria.
Kieseberg, P. (2019, February 21). Federated Machine Learning in Health Informatics. Beirat, Fachhochschule St. Pölten.
Kieseberg, P. (2019, January 29). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Kieseberg, P., & Weippl, E. (2019). Securing Information Against Manipulation in the Production Systems Engineering Process. In S. Biffl, M. Eckhart, A. Lüder, & E. Weippl (Eds.), Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb (pp. 335–356). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_12
Winkler, D., Rinker, F., & Kieseberg, P. (2019). Towards a Flexible and Secure Round-Trip-Engineering Process for Production Systems Engineering with Agile Practices. Software Quality - The Complexity and Challenges of Software Engineering and Software Quality in the Cloud, LNBIP 338, 14–130.
Kieseberg, P., Klausner, L. D., & Holzinger, A. (2019). Distortion in Real-World Analytic Processes. ERCIM News, 118, 49–50.
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). Sensitive Data Anonymization Using Genetic Algorithms for SOM-based Clustering. 9.
Kieseberg, P. (2018, January 5). Data Literacy. ÖKZ.
Kieseberg, P. (2018, April 14). Datenschutzmanagement und - organisation.
Kieseberg, P. (2018, November 4). Das Darknet. Lecture, Vienna, VHS Urania.
Malle, B., Giuliani, N., Kieseberg, P., & Holzinger, A. (2018). The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations. ArXiv:1802.03707 [Cs, Stat]. http://arxiv.org/abs/1802.03707
Kieseberg, P. (2018, January 18). Digitale Forensik.
Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Phyiscal Production Systems. 14.
Kieseberg, P. (2018, January 30). Privacy Diskussion: Wie viel sind Sie wert? Security Day, FH St. Pölten.
Kieseberg, P., Skopik, F., Pahi, T., Leitner, M., & Fiedler, R. (2018). Informationsanalysekonzept zur Erstellung von Cyber-Lagebildern in PPPs. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 237–291). Springer Vieweg, Berlin, Heidelberg.
Kaundert, M., Ziegler, L., Pahi, T., Skopik, F., Leitner, M., Kieseberg, P., Schwanzer, B., & Ampia-Addison, J. K. (2018). Evaluierung des Cyber Lagebildkonzepts im praktischen Einsatz. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 293–344). Springer Vieweg, Berlin, Heidelberg.
Pahi, T., Skopik, F., Kieseberg, P., & Leitner, M. (2018). Erhebung von Informations-und Datenquellen für Cyber-Lagebilder. In Cyber Situational Awareness in Public-Private-Partnerships (pp. 191–236). Springer Vieweg, Berlin, Heidelberg.
CD-MAKE. (2018). Machine learning and knowledge extraction: Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12.9, International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018: proceedings (A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. R. Weippl, Eds.). Springer.
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 11015, pp. 1–8). Springer International Publishing. https://doi.org/10.1007/978-3-319-99740-7_1
Goebel, R., Chander, A., Holzinger, K., Lecue, F., Akata, Z., Stumpf, S., Kieseberg, P., & Holzinger, A. (2018). Explainable AI: The New 42? In A. Holzinger, P. Kieseberg, A. M. Tjoa, & E. Weippl (Eds.), Machine Learning and Knowledge Extraction (Vol. 11015, pp. 295–303). Springer International Publishing. https://doi.org/10.1007/978-3-319-99740-7_21
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. Proceedings of the Central European Cybersecurity Conference 2018 on - CECC 2018, 1–4. https://doi.org/10/gh372c
Holzinger, K., Mak, K., Kieseberg, P., & Holzinger, A. (2018). Can we trust Machine Learning Results? Artificial Intelligence in Safety-Critical decision Support. ERCIM News, 112(1), 42–43.
Amiri, F., Quirchmayr, G., & Kieseberg, P. (2018). A Machine Learning Approach for Privacy-preservation in E-business Applications: Proceedings of the 15th International Joint Conference on E-Business and Telecommunications, 443–452. https://doi.org/10/gh38cd
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2017). Forensics using Internal Database Structures. ERCIM News, 108. http://ercim-news.ercim.eu/images/stories/EN108/EN108-web.pdf
Kieseberg, P., Frühwirt, P., & Schrittwieser, S. (2017). Security Testing for Mobile Applications. ERCIM News, 109, 52–53. https://www.sba-research.org/wp-content/uploads/publications/201704 - KIESEBERG - Pages from EN109-web.pdf
Kieseberg, P., Schrittwieser, S., Malle, B., & Weippl, E. (2017). Das Testen von Algorithmen in sensibler datengetriebener Forschung. Rundbrief Des Fachausschusses Management Der Anwendungsentwicklung Und -Wartung (WI-MAW). http://fa-wi-maw.gi.de/fileadmin/gliederungen/fg-maw/Rundbriefe/GI_Rundbrief_41_JG23_Online.pdf
Kieseberg, P., Neuner, S., Schrittwieser, S., & Schmiedecker, M. (2017). Real-time Forensics through Endpoint Visibility. International Conference on Digital Forensics & Cyber Crime (ICDF2C). https://www.sba-research.org/wp-content/uploads/publications/fleetForensics.pdf
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Forensics using Internal Database Structures. ERCIM News, 108.
Malle, B., Kieseberg, P., Schrittwieser, S., & Holzinger, A. (2016). Privacy Aware Machine Learning and the Right to be Forgotten. ERCIM News, 107.
Kieseberg, P., Weippl, E., & Schrittwieser, S. (2016). Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News, 105.
Kieseberg, P., Fruehwirt, P., Schrittwieser, S., & Weippl, E. R. (2015). Security tests for mobile applications - Why using TLS or SSL is not enough. 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW). https://doi.org/10/gnt2t7
Fadai, T., Schrittwieser, S., Kieseberg, P., & Mulazzani, M. (2015). Trust me, I am a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems. International Conference on Availability, Reliability and Security (ARES).
Rottermanner, C., Kieseberg, P., Huber, M., Schmiedecker, M., & Schrittwieser, S. (2015). Privacy and Data Protection in Smartphone Messengers. Proceedings of the 17th International Conference on Information Integration and Web-Based Applications Services (IiWAS2015). https://doi.org/10/gh3746
Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., & Weippl, E. (2015). Security and privacy of smartphone messaging applications. International Journal of Pervasive Computing and Communications, 11. https://doi.org/10/gh372v
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Special Issue on Security and Privacy in Business Networking.
Fruehwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik – Rekonstruktion von Abfragen über Datenbank-interne Logfiles. GI Sicherheit 2014.
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (n.d.). Preface to the 6th Cross-Domain Conference on Machine Learning & Knowledge Extraction. Proceedings of the 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2022 Vienna, Austria, August 23–26, 2022, 13480.

Projekte

Link