Stefan Fenz
Stefan Fenz
Dirección de correo verificada de - Página principal
Citado por
Citado por
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
Current challenges in information security risk management
S Fenz, J Heurix, T Neubauer, F Pechstein
Information Management & Computer Security 22 (5), 410-430, 2014
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz
Computers & Security 53, 1-17, 2015
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
An ontology-based approach for constructing Bayesian networks
S Fenz
Data & Knowledge Engineering 73, 73-88, 2012
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
ICISS, 249-259, 2006
Information security automation: how far can we go?
R Montesino, S Fenz
2011 Sixth International Conference on Availability, Reliability and …, 2011
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
Toward web-based information security knowledge sharing
D Feledi, S Fenz, L Lechner
Information security technical report 17 (4), 199-209, 2013
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
Ontology-based generation of bayesian networks
S Fenz, AM Tjoa, M Hudec
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
Pseudonymization for improving the privacy in e-health applications
B Riedl, V Grascher, S Fenz, T Neubauer
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
SIEM‐based framework for security controls automation
R Montesino, S Fenz, W Baluja
Information Management & Computer Security 20 (4), 248-263, 2012
Ontology-based generation of IT-security metrics
S Fenz
Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010
A risk management framework for cloud migration decision support
S Islam, S Fenz, E Weippl, H Mouratidis
Journal of Risk and Financial Management 10 (2), 10, 2017
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20