Simon Tjoa
Titel
Zitiert von
Zitiert von
Jahr
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
2009 International Conference on Computational Science and Engineering 3 …, 2009
1532009
Forensics investigations of multimedia data: A review of the state-of-the-art
R Poisel, S Tjoa
2011 Sixth International Conference on IT Security Incident Management and …, 2011
762011
Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology
S Tjoa, S Jakoubi, G Quirchmayr
2008 Third International Conference on Availability, Reliability and …, 2008
682008
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
642008
A formal approach enabling risk-aware business process modeling and simulation
S Tjoa, S Jakoubi, G Goluch, G Kitzler, S Goluch, G Quirchmayr
IEEE Transactions on Services Computing 4 (2), 153-166, 2010
522010
Evidence and Cloud Computing: The Virtual Machine Introspection Approach.
R Poisel, E Malzer, S Tjoa
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (1), 135-152, 2013
492013
Rope: A methodology for enabling the risk-aware modelling and simulation of business processes
S Jakoubi, S Tjoa, G Quirchmayr
492007
Advanced file carving approaches for multimedia files.
R Poisel, S Tjoa, P Tavolato
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (4), 42-58, 2011
482011
The role of ICT to achieve the UN sustainable development goals (SDG)
AM Tjoa, S Tjoa
IFIP World Information Technology Forum, 3-13, 2016
462016
Facebook watchdog: a research agenda for detecting online grooming and bullying activities
M Rybnicek, R Poisel, S Tjoa
2013 IEEE International Conference on Systems, Man, and Cybernetics, 2854-2859, 2013
352013
A reference model for risk-aware business process management
S Jakoubi, S Tjoa
2009 Fourth International Conference on Risks and Security of Internet and …, 2009
352009
A comprehensive literature review of file carving
R Poisel, S Tjoa
2013 International conference on availability, reliability and security, 475-484, 2013
332013
A survey of scientific approaches considering the integration of security and risk aspects into business process management
S Jakoubi, S Tjoa, G Goluch, G Quirchmayr
2009 20th International Workshop on Database and Expert Systems Application …, 2009
312009
Deriving resource requirements applying risk-aware business process modeling and simulation
S Jakoubi, G Goluch, S Tjoa, G Quirchmayr
272008
Roadmap to approaches for carving of fragmented multimedia files
R Poisel, S Tjoa
2011 Sixth International Conference on Availability, Reliability and …, 2011
252011
A novel palm vein recognition approach based on Enhanced Local Gabor Binary Patterns Histogram Sequence
M Fischer, M Rybnicek, S Tjoa
19th International Conference on Systems, Signals and Image Processing …, 2012
212012
Risk-aware business process management—establishing the link between business and security
S Jakoubi, S Tjoa, S Goluch, G Kitzler
Complex intelligent systems and their applications, 109-135, 2010
212010
Touch to authenticate—Continuous biometric authentication on mobile devices
M Temper, S Tjoa, M Kaiser
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
182015
Discussion on the challenges and opportunities of cloud forensics
R Poisel, S Tjoa
International Conference on Availability, Reliability, and Security, 593-608, 2012
172012
A Roadmap to Risk-Aware Business Process Management
S Jakoubi, T Neubauer, S Tjoa
IEEE Asia-Pacific Services Computing Conference (APSCC 2009), 23 - 27, 2009
172009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20