Seguir
Maria Leitner
Título
Citado por
Citado por
Año
A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions
M Leitner, S Rinderle-Ma
Information and Software Technology 56 (3), 273-293, 2014
1032014
An empirical survey of functions and configurations of open-source capture the flag (ctf) environments
S Kucek, M Leitner
Journal of Network and Computer Applications 151, 102470, 2020
502020
Design considerations for cyber security testbeds: A case study on a cyber security testbed for education
M Frank, M Leitner, T Pahi
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
492017
AIT cyber range: flexible cyber security environment for exercises, training and research
M Leitner, M Frank, W Hotwagner, G Langner, O Maurhart, T Pahi, ...
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020
392020
Analysis and assessment of situational awareness models for national cyber security centers
T Pahi, M Leitner, F Skopik
International Conference on Information Systems Security and Privacy 2, 334-345, 2017
352017
An analysis and evaluation of security aspects in the business process model and notation
M Leitner, M Miller, S Rinderle-Ma
2013 international conference on availability, reliability and security, 262-267, 2013
352013
Definition and enactment of instance-spanning process constraints
M Leitner, J Mangler, S Rinderle-Ma
Web Information Systems Engineering-WISE 2012: 13th International Conference …, 2012
292012
AW-RBAC: access control in adaptive workflow systems
M Leitner, S Rinderle-Ma, J Mangler
2011 Sixth International Conference on Availability, Reliability and …, 2011
272011
Digitale Bürgerbeteiligung: Forschung und Praxis–Chancen und Herausforderungen der elektronischen Partizipation
M Leitner
Springer-Verlag, 2018
22*2018
Evaluation methods in process-aware information systems research with a perspective on human orientation
S Kriglstein, M Leitner, S Kabicher-Fuchs, S Rinderle-Ma
Business & Information Systems Engineering 58, 397-414, 2016
172016
An experimental study on the design and modeling of security concepts in business processes
M Leitner, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
The Practice of Enterprise Modeling: 6th IFIP WG 8.1 Working Conference …, 2013
142013
An adaptive heuristic approach to service selection problems in dynamic distributed systems
PP Beran, E Vinek, E Schikuta, M Leitner
2012 ACM/IEEE 13th International Conference on Grid Computing, 66-75, 2012
142012
An experimental approach to reputation in e-participation
I Serov, M Leitner
2016 International Conference on Software Security and Assurance (ICSSA), 37-42, 2016
132016
SPRINT-Responsibilities: design and development of security policies in process-aware information systems
M Leitner, J Mangler, S Rinderle-Ma
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011
132011
A case study on the suitability of process mining to produce current-state RBAC models
M Leitner, A Baumgrass, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
Business Process Management Workshops: BPM 2012 International Workshops …, 2013
122013
Training the human-in-the-loop in industrial cyber ranges
S Kucek, M Leitner
Digital Transformation in Semiconductor Manufacturing: Proceedings of the …, 2020
112020
A training concept based on a digital twin for a wafer transportation system
G Schneider, M Wendl, S Kucek, M Leitner
2021 IEEE 23rd Conference on Business Informatics (CBI) 2, 20-28, 2021
102021
Enabling exercises, education and research with a comprehensive cyber range.
M Leitner, M Frank, G Langner, M Landauer, F Skopik, P Smith, B Akhras, ...
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (4), 37-61, 2021
92021
Situational Awareness for Strategic Decision Making on a National Level
M eitner, T Pahi, F Skopik
Collaborative Cyber Threat Intelligence, 225-276, 2017
92017
Effectively enforcing authorization constraints for emerging space-sensitive technologies
CE Rubio-Medrano, S Jogani, M Leitner, Z Zhao, GJ Ahn
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
82019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20