Formalizing information security knowledge S Fenz, A Ekelhart Proceedings of the 4th international Symposium on information, Computer, and …, 2009 | 365 | 2009 |
Current challenges in information security risk management S Fenz, J Heurix, T Neubauer, F Pechstein Information Management & Computer Security 22 (5), 410-430, 2014 | 200 | 2014 |
A taxonomy for privacy enhancing technologies J Heurix, P Zimmermann, T Neubauer, S Fenz Computers & Security 53, 1-17, 2015 | 184 | 2015 |
Security ontologies: Improving quantitative risk analysis A Ekelhart, S Fenz, M Klemen, E Weippl 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 161 | 2007 |
Aurum: A framework for information security risk management A Ekelhart, S Fenz, T Neubauer 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 135 | 2009 |
Information security fortification by ontological mapping of the ISO/IEC 27001 standard S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 111 | 2007 |
An ontology-based approach for constructing Bayesian networks S Fenz Data & Knowledge Engineering 73, 73-88, 2012 | 105 | 2012 |
Security ontology: Simulating threats to corporate assets A Ekelhart, S Fenz, MD Klemen, ER Weippl Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 89 | 2006 |
Information security risk management: In which security solutions is it worth investing? S Fenz, A Ekelhart, T Neubauer Communications of the Association for Information Systems 28 (1), 22, 2011 | 88 | 2011 |
Information security automation: how far can we go? R Montesino, S Fenz 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 86 | 2011 |
Verification, validation, and evaluation in information security risk management S Fenz, A Ekelhart IEEE Security & Privacy 9 (2), 58-65, 2010 | 77 | 2010 |
Toward web-based information security knowledge sharing D Feledi, S Fenz, L Lechner Information security technical report 17 (4), 199-209, 2013 | 72 | 2013 |
Ontology-based generation of bayesian networks S Fenz, AM Tjoa, M Hudec 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 72 | 2009 |
SIEM‐based framework for security controls automation R Montesino, S Fenz, W Baluja Information Management & Computer Security 20 (4), 248-263, 2012 | 68 | 2012 |
Pseudonymization for improving the privacy in e-health applications B Riedl, V Grascher, S Fenz, T Neubauer Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 66 | 2008 |
Integration of an ontological information security concept in risk aware business process management G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 65 | 2008 |
A risk management framework for cloud migration decision support S Islam, S Fenz, E Weippl, H Mouratidis Journal of Risk and Financial Management 10 (2), 10, 2017 | 60 | 2017 |
Ontology-based generation of IT-security metrics S Fenz Proceedings of the 2010 ACM Symposium on Applied Computing, 1833-1839, 2010 | 54 | 2010 |
XML security–A comparative literature review A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl Journal of Systems and Software 81 (10), 1715-1724, 2008 | 51 | 2008 |
Interactive selection of ISO 27001 controls under multiple objectives T Neubauer, A Ekelhart, S Fenz Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 50 | 2008 |