Formalizing information security knowledge S Fenz, A Ekelhart Proceedings of the 4th international Symposium on information, Computer, and …, 2009 | 270 | 2009 |
Security ontologies: Improving quantitative risk analysis A Ekelhart, S Fenz, M Klemen, E Weippl 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 137 | 2007 |
Current challenges in information security risk management S Fenz, J Heurix, T Neubauer, F Pechstein Information Management & Computer Security, 2014 | 110 | 2014 |
Aurum: A framework for information security risk management A Ekelhart, S Fenz, T Neubauer 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 109 | 2009 |
Information security fortification by ontological mapping of the ISO/IEC 27001 standard S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 88 | 2007 |
A taxonomy for privacy enhancing technologies J Heurix, P Zimmermann, T Neubauer, S Fenz Computers & Security 53, 1-17, 2015 | 81 | 2015 |
An ontology-based approach for constructing Bayesian networks S Fenz Data & Knowledge Engineering 73, 73-88, 2012 | 65 | 2012 |
Information security risk management: In which security solutions is it worth investing? S Fenz, A Ekelhart, T Neubauer Communications of the Association for Information Systems 28 (1), 22, 2011 | 65 | 2011 |
Security ontology: Simulating threats to corporate assets A Ekelhart, S Fenz, MD Klemen, ER Weippl International Conference on Information Systems Security, 249-259, 2006 | 63 | 2006 |
Information security automation: how far can we go? R Montesino, S Fenz 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 62 | 2011 |
Verification, validation, and evaluation in information security risk management S Fenz, A Ekelhart IEEE Security & Privacy 9 (2), 58-65, 2010 | 59 | 2010 |
Ontology-based generation of bayesian networks S Fenz, AM Tjoa, M Hudec 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 59 | 2009 |
Integration of an ontological information security concept in risk aware business process management G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 59 | 2008 |
Toward web-based information security knowledge sharing D Feledi, S Fenz, L Lechner Information security technical report 17 (4), 199-209, 2013 | 53 | 2013 |
Pseudonymization for improving the privacy in e-health applications B Riedl, V Grascher, S Fenz, T Neubauer Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 49 | 2008 |
Ontology-based generation of IT-security metrics S Fenz Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010 | 48 | 2010 |
XML security–A comparative literature review A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl Journal of Systems and Software 81 (10), 1715-1724, 2008 | 42 | 2008 |
Ontology-based decision support for information security risk management A Ekelhart, S Fenz, T Neubauer 2009 Fourth International Conference on Systems, 80-85, 2009 | 41 | 2009 |
SIEM‐based framework for security controls automation R Montesino, S Fenz, W Baluja Information Management & Computer Security, 2012 | 40 | 2012 |
Interactive selection of ISO 27001 controls under multiple objectives T Neubauer, A Ekelhart, S Fenz IFIP International Information Security Conference, 477-492, 2008 | 39 | 2008 |