Simon Tjoa
TitleCited byYear
Towards automating social engineering using social networking sites
M Huber, S Kowalski, M Nohlberg, S Tjoa
2009 International Conference on Computational Science and Engineering 3 …, 2009
1212009
Forensics investigations of multimedia data: A review of the state-of-the-art
R Poisel, S Tjoa
2011 Sixth International Conference on IT Security Incident Management and …, 2011
632011
Enhancing business impact analysis and risk assessment applying a risk-aware business process modeling and simulation methodology
S Tjoa, S Jakoubi, G Quirchmayr
2008 Third International Conference on Availability, Reliability and …, 2008
582008
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
552008
A formal approach enabling risk-aware business process modeling and simulation
S Tjoa, S Jakoubi, G Goluch, G Kitzler, S Goluch, G Quirchmayr
IEEE Transactions on Services Computing 4 (2), 153-166, 2010
432010
Advanced file carving approaches for multimedia files.
R Poisel, S Tjoa, P Tavolato
JoWUA 2 (4), 42-58, 2011
392011
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
S Jakoubi, S Tjoa, G Quirchmayr
ECIS, 1596-1607, 2007
392007
Evidence and Cloud Computing: The Virtual Machine Introspection Approach.
R Poisel, E Malzer, S Tjoa
JoWUA 4 (1), 135-152, 2013
382013
A reference model for risk-aware business process management
S Jakoubi, S Tjoa
2009 Fourth International Conference on Risks and Security of Internet and …, 2009
322009
A survey of scientific approaches considering the integration of security and risk aspects into business process management
S Jakoubi, S Tjoa, G Goluch, G Quirchmayr
2009 20th International Workshop on Database and Expert Systems Application …, 2009
312009
Facebook watchdog: a research agenda for detecting online grooming and bullying activities
M Rybnicek, R Poisel, S Tjoa
2013 IEEE International Conference on Systems, Man, and Cybernetics, 2854-2859, 2013
262013
A comprehensive literature review of file carving
R Poisel, S Tjoa
2013 International Conference on Availability, Reliability and Security, 475-484, 2013
262013
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
S Jakoubi, G Goluch, S Tjoa, G Quirchmayr
ECIS, 1542-1554, 2008
242008
Roadmap to approaches for carving of fragmented multimedia files
R Poisel, S Tjoa
2011 Sixth International Conference on Availability, Reliability and …, 2011
182011
A Roadmap to Risk-Aware Business Process Management
S Jakoubi, T Neubauer, S Tjoa
IEEE Asia-Pacific Services Computing Conference (APSCC 2009), 23 - 27, 2009
162009
The role of ICT to achieve the UN Sustainable Development Goals (SDG)
AM Tjoa, S Tjoa
IFIP World Information Technology Forum, 3-13, 2016
152016
A novel palm vein recognition approach based on Enhanced Local Gabor Binary Patterns Histogram Sequence
M Fischer, M Rybnicek, S Tjoa
19th International Conference on Systems, Signals and Image Processing …, 2012
152012
Extension of a methodology for risk-aware business process modeling and simulation enabling process-oriented incident handling support
S Tjoa, S Jakoubi, G Goluch, G Quirchmayr
22nd International Conference on Advanced Information Networking and …, 2008
142008
Discussion on the challenges and opportunities of cloud forensics
R Poisel, S Tjoa
International Conference on Availability, Reliability, and Security, 593-608, 2012
132012
Risk-aware business process management—establishing the link between business and security
S Jakoubi, S Tjoa, S Goluch, G Kitzler
Complex Intelligent Systems and Their Applications, 109-135, 2010
132010
The system can't perform the operation now. Try again later.
Articles 1–20