Follow
Simon Tjoa
Title
Cited by
Cited by
Year
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
2009 International Conference on Computational Science and Engineering 3 …, 2009
1722009
Forensics investigations of multimedia data: A review of the state-of-the-art
R Poisel, S Tjoa
2011 Sixth International Conference on IT Security Incident Management and …, 2011
782011
The role of ICT to achieve the UN Sustainable Development Goals (SDG)
AM Tjoa, S Tjoa
IFIP world information technology forum, 3-13, 2016
772016
Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology
S Tjoa, S Jakoubi, G Quirchmayr
2008 Third International Conference on Availability, Reliability and …, 2008
752008
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
642008
A formal approach enabling risk-aware business process modeling and simulation
S Tjoa, S Jakoubi, G Goluch, G Kitzler, S Goluch, G Quirchmayr
IEEE Transactions on Services Computing 4 (2), 153-166, 2010
582010
Rope: A methodology for enabling the risk-aware modelling and simulation of business processes
S Jakoubi, S Tjoa, G Quirchmayr
522007
Evidence and Cloud Computing: The Virtual Machine Introspection Approach.
R Poisel, E Malzer, S Tjoa
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (1), 135-152, 2013
502013
Advanced file carving approaches for multimedia files.
R Poisel, S Tjoa, P Tavolato
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (4), 42-58, 2011
482011
Facebook watchdog: a research agenda for detecting online grooming and bullying activities
M Rybnicek, R Poisel, S Tjoa
2013 IEEE International Conference on Systems, Man, and Cybernetics, 2854-2859, 2013
382013
A reference model for risk-aware business process management
S Jakoubi, S Tjoa
2009 Fourth International Conference on Risks and Security of Internet and …, 2009
372009
A comprehensive literature review of file carving
R Poisel, S Tjoa
2013 International conference on availability, reliability and security, 475-484, 2013
352013
A survey of scientific approaches considering the integration of security and risk aspects into business process management
S Jakoubi, S Tjoa, G Goluch, G Quirchmayr
2009 20th International Workshop on Database and Expert Systems Application …, 2009
332009
Deriving resource requirements applying risk-aware business process modeling and simulation
S Jakoubi, G Goluch, S Tjoa, G Quirchmayr
282008
A novel palm vein recognition approach based on Enhanced Local Gabor Binary Patterns Histogram Sequence
M Fischer, M Rybnicek, S Tjoa
19th International Conference on Systems, Signals and Image Processing …, 2012
272012
Risk-aware business process management—establishing the link between business and security
S Jakoubi, S Tjoa, S Goluch, G Kitzler
Complex intelligent systems and their applications, 109-135, 2010
252010
Roadmap to approaches for carving of fragmented multimedia files
R Poisel, S Tjoa
2011 Sixth International Conference on Availability, Reliability and …, 2011
242011
A Roadmap to Risk-Aware Business Process Management
S Jakoubi, T Neubauer, S Tjoa
IEEE Asia-Pacific Services Computing Conference (APSCC 2009), 23 - 27, 2009
202009
Touch to authenticate—Continuous biometric authentication on mobile devices
M Temper, S Tjoa, M Kaiser
2015 1st International Conference on Software Security and Assurance (ICSSA …, 2015
192015
Discussion on the challenges and opportunities of cloud forensics
R Poisel, S Tjoa
International Conference on Availability, Reliability, and Security, 593-608, 2012
192012
The system can't perform the operation now. Try again later.
Articles 1–20