Andreas Ekelhart
Titel
Geciteerd door
Geciteerd door
Jaar
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
2992009
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1452007
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
1202009
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
932007
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
712011
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
International Conference on Information Systems Security, 249-259, 2006
662006
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
642008
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
612010
Towards security-aware virtual environments for digital twins
M Eckhart, A Ekelhart
Proceedings of the 4th ACM workshop on cyber-physical system security, 61-72, 2018
512018
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
452008
Ontology-based decision support for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 Fourth International Conference on Systems, 80-85, 2009
422009
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
IFIP International Information Security Conference, 477-492, 2008
412008
Ontological mapping of common criteria’s security assurance requirements
A Ekclhart, S Fenz, G Goluch, E Weippl
IFIP International Information Security Conference, 85-95, 2007
382007
Business process-based resource importance determination
S Fenz, A Ekelhart, T Neubauer
International Conference on Business Process Management, 113-127, 2009
322009
A specification-based state replication approach for digital twins
M Eckhart, A Ekelhart
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and …, 2018
252018
An evaluation of technologies for the pseudonymization of medical data
T Neubauer, M Kolb
Computer and Information Science 2009, 47-60, 2009
252009
Enhancing cyber situational awareness for cyber-physical systems through digital twins
M Eckhart, A Ekelhart, E Weippl
2019 24th IEEE International Conference on Emerging Technologies and Factory …, 2019
192019
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach
A Ekelhart, E Kiesling, B Grill, C Strauss, C Stummer
Information Technology and Management 16 (3), 221-233, 2015
192015
The SEPSES knowledge graph: an integrated resource for cybersecurity
E Kiesling, A Ekelhart, K Kurniawan, F Ekaputra
International Semantic Web Conference, 198-214, 2019
182019
On the utility of synthetic data: An empirical evaluation on machine learning tasks
M Hittmeir, A Ekelhart, R Mayer
Proceedings of the 14th International Conference on Availability …, 2019
172019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20