Stefan Fenz
Stefan Fenz
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα tuwien.ac.at - Αρχική σελίδα
ΤίτλοςΠαρατίθεται απόΈτος
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
2432009
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1282007
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
972009
Current challenges in information security risk management
S Fenz, J Heurix, T Neubauer, F Pechstein
Information Management & Computer Security, 2014
892014
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
802007
A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz
Computers & Security 53, 1-17, 2015
622015
An ontology-based approach for constructing Bayesian networks
S Fenz
Data & Knowledge Engineering 73, 73-88, 2012
612012
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
602011
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
International Conference on Information Systems Security, 249-259, 2006
572006
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
562008
Ontology-based generation of bayesian networks
S Fenz, AM Tjoa, M Hudec
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
552009
Information security automation: how far can we go?
R Montesino, S Fenz
2011 Sixth International Conference on Availability, Reliability and …, 2011
532011
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
522010
Ontology-based generation of IT-security metrics
S Fenz
Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010
432010
Pseudonymization for improving the privacy in e-health applications
B Riedl, V Grascher, S Fenz, T Neubauer
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
412008
Toward web-based information security knowledge sharing
D Feledi, S Fenz, L Lechner
Information Security Technical Report 17 (4), 199-209, 2013
402013
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
392008
Ontology-based decision support for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 Fourth International Conference on Systems, 80-85, 2009
362009
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
IFIP International Information Security Conference, 477-492, 2008
352008
Business process-based resource importance determination
S Fenz, A Ekelhart, T Neubauer
International Conference on Business Process Management, 113-127, 2009
332009
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20