Seguir
Stefan Fenz
Stefan Fenz
Dirección de correo verificada de tuwien.ac.at - Página principal
Título
Citado por
Citado por
Año
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
3572009
Current challenges in information security risk management
S Fenz, J Heurix, T Neubauer, F Pechstein
Information Management & Computer Security 22 (5), 410-430, 2014
1902014
A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz
Computers & Security 53, 1-17, 2015
1662015
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1622007
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
1362009
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
1082007
An ontology-based approach for constructing Bayesian networks
S Fenz
Data & Knowledge Engineering 73, 73-88, 2012
992012
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
862011
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
842006
Information security automation: how far can we go?
R Montesino, S Fenz
2011 Sixth International Conference on Availability, Reliability and …, 2011
832011
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
732010
Toward web-based information security knowledge sharing
D Feledi, S Fenz, L Lechner
Information security technical report 17 (4), 199-209, 2013
712013
Ontology-based generation of bayesian networks
S Fenz, AM Tjoa, M Hudec
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
692009
SIEM‐based framework for security controls automation
R Montesino, S Fenz, W Baluja
Information Management & Computer Security 20 (4), 248-263, 2012
662012
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
652008
Pseudonymization for improving the privacy in e-health applications
B Riedl, V Grascher, S Fenz, T Neubauer
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
642008
A risk management framework for cloud migration decision support
S Islam, S Fenz, E Weippl, H Mouratidis
Journal of Risk and Financial Management 10 (2), 10, 2017
582017
Ontology-based generation of IT-security metrics
S Fenz
Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010
532010
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
492008
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
482008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20