Stefan Fenz
Stefan Fenz
Verified email at - Homepage
Cited by
Cited by
Formalizing information security knowledge
S Fenz, A Ekelhart
Proceedings of the 4th international Symposium on information, Computer, and …, 2009
Current challenges in information security risk management
S Fenz, J Heurix, T Neubauer, F Pechstein
Information Management & Computer Security 22 (5), 410-430, 2014
A taxonomy for privacy enhancing technologies
J Heurix, P Zimmermann, T Neubauer, S Fenz
Computers & Security 53, 1-17, 2015
Security ontologies: Improving quantitative risk analysis
A Ekelhart, S Fenz, M Klemen, E Weippl
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Aurum: A framework for information security risk management
A Ekelhart, S Fenz, T Neubauer
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007
An ontology-based approach for constructing Bayesian networks
S Fenz
Data & Knowledge Engineering 73, 73-88, 2012
Information security automation: how far can we go?
R Montesino, S Fenz
2011 Sixth International Conference on Availability, Reliability and …, 2011
Information security risk management: In which security solutions is it worth investing?
S Fenz, A Ekelhart, T Neubauer
Communications of the Association for Information Systems 28 (1), 22, 2011
Security ontology: Simulating threats to corporate assets
A Ekelhart, S Fenz, MD Klemen, ER Weippl
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
Verification, validation, and evaluation in information security risk management
S Fenz, A Ekelhart
IEEE Security & Privacy 9 (2), 58-65, 2010
Toward web-based information security knowledge sharing
D Feledi, S Fenz, L Lechner
Information security technical report 17 (4), 199-209, 2013
Ontology-based generation of bayesian networks
S Fenz, AM Tjoa, M Hudec
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
SIEM‐based framework for security controls automation
R Montesino, S Fenz, W Baluja
Information Management & Computer Security 20 (4), 248-263, 2012
Pseudonymization for improving the privacy in e-health applications
B Riedl, V Grascher, S Fenz, T Neubauer
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
Integration of an ontological information security concept in risk aware business process management
G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
A risk management framework for cloud migration decision support
S Islam, S Fenz, E Weippl, H Mouratidis
Journal of Risk and Financial Management 10 (2), 10, 2017
Ontology-based generation of IT-security metrics
S Fenz
Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010
XML security–A comparative literature review
A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl
Journal of Systems and Software 81 (10), 1715-1724, 2008
Interactive selection of ISO 27001 controls under multiple objectives
T Neubauer, A Ekelhart, S Fenz
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20