Stefan Fenz
Stefan Fenz
Verified email at tuwien.ac.at - Homepage
Title
Cited by
Cited by
Year
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
2602009
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1322007
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
1052009
Current challenges in information security risk management
S Fenz, J Heurix, T Neubauer, F Pechstein
Information Management & Computer Security, 2014
1032014
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
862007
A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz
Computers & Security 53, 1-17, 2015
762015
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
642011
An ontology-based approach for constructing Bayesian networks
S Fenz
Data & Knowledge Engineering 73, 73-88, 2012
632012
Information security automation: how far can we go?
R Montesino, S Fenz
2011 Sixth International Conference on Availability, Reliability and …, 2011
602011
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
International Conference on Information Systems Security, 249-259, 2006
592006
Ontology-based generation of bayesian networks
S Fenz, AM Tjoa, M Hudec
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
582009
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
582008
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
562010
Toward web-based information security knowledge sharing
D Feledi, S Fenz, L Lechner
Information security technical report 17 (4), 199-209, 2013
502013
Ontology-based generation of IT-security metrics
S Fenz
Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010
482010
Pseudonymization for improving the privacy in e-health applications
B Riedl, V Grascher, S Fenz, T Neubauer
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
442008
Ontology-based decision support for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 Fourth International Conference on Systems, 80-85, 2009
412009
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
412008
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
IFIP International Information Security Conference, 477-492, 2008
382008
SIEM‐based framework for security controls automation
R Montesino, S Fenz, W Baluja
Information Management & Computer Security, 2012
362012
The system can't perform the operation now. Try again later.
Articles 1–20