Formalizing information security knowledge S Fenz, A Ekelhart Proceedings of the 4th international Symposium on information, Computer, and …, 2009 | 359 | 2009 |
Towards security-aware virtual environments for digital twins M Eckhart, A Ekelhart Proceedings of the 4th ACM workshop on cyber-physical system security, 61-72, 2018 | 165 | 2018 |
Security ontologies: Improving quantitative risk analysis A Ekelhart, S Fenz, M Klemen, E Weippl 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 159 | 2007 |
Aurum: A framework for information security risk management A Ekelhart, S Fenz, T Neubauer 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 134 | 2009 |
Digital twins for cyber-physical systems security: State of the art and outlook M Eckhart, A Ekelhart Security and Quality in Cyber-Physical Systems Engineering: With Forewords …, 2019 | 128 | 2019 |
Information security fortification by ontological mapping of the ISO/IEC 27001 standard S Fenz, G Goluch, A Ekelhart, B Riedl, E Weippl 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007 …, 2007 | 109 | 2007 |
On the utility of synthetic data: An empirical evaluation on machine learning tasks M Hittmeir, A Ekelhart, R Mayer Proceedings of the 14th International Conference on Availability …, 2019 | 103 | 2019 |
A specification-based state replication approach for digital twins M Eckhart, A Ekelhart Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018 | 98 | 2018 |
The SEPSES knowledge graph: an integrated resource for cybersecurity E Kiesling, A Ekelhart, K Kurniawan, F Ekaputra International Semantic Web Conference, 198-214, 2019 | 90 | 2019 |
Security ontology: Simulating threats to corporate assets A Ekelhart, S Fenz, MD Klemen, ER Weippl Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 89 | 2006 |
Information security risk management: In which security solutions is it worth investing? S Fenz, A Ekelhart, T Neubauer Communications of the Association for Information Systems 28 (1), 22, 2011 | 87 | 2011 |
Verification, validation, and evaluation in information security risk management S Fenz, A Ekelhart IEEE Security & Privacy 9 (2), 58-65, 2010 | 76 | 2010 |
Integration of an ontological information security concept in risk aware business process management G Goluch, A Ekelhart, S Fenz, S Jakoubi, S Tjoa, T Muck Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 65 | 2008 |
Enhancing cyber situational awareness for cyber-physical systems through digital twins M Eckhart, A Ekelhart, E Weippl 2019 24th IEEE International Conference on Emerging Technologies and Factory …, 2019 | 59 | 2019 |
XML security–A comparative literature review A Ekelhart, S Fenz, G Goluch, M Steinkellner, E Weippl Journal of Systems and Software 81 (10), 1715-1724, 2008 | 50 | 2008 |
Interactive selection of ISO 27001 controls under multiple objectives T Neubauer, A Ekelhart, S Fenz Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 50 | 2008 |
Ontology-based decision support for information security risk management A Ekelhart, S Fenz, T Neubauer 2009 Fourth International Conference on Systems, 80-85, 2009 | 48 | 2009 |
Ontological mapping of common criteria’s security assurance requirements A Ekclhart, S Fenz, G Goluch, E Weippl New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 46 | 2007 |
Utility and privacy assessments of synthetic data for regression tasks M Hittmeir, A Ekelhart, R Mayer 2019 IEEE International Conference on Big Data (Big Data), 5763-5772, 2019 | 44 | 2019 |
Combining Machine Learning and Semantic Web: A Systematic Mapping Study A Breit, L Waltersdorfer, FJ Ekaputra, M Sabou, A Ekelhart, A Iana, ... ACM Computing Surveys, 2023 | 41 | 2023 |