default search action
Stefan Fenz
Person information
- affiliation: Vienna University of Technology, Austria
- affiliation: Xylem Technologies GmbH
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Stefan Fenz, Thomas Neubauer, Jürgen Kurt Friedel, Marie-Luise Wohlmuth:
AI- and data-driven crop rotation planning. Comput. Electron. Agric. 212: 108160 (2023) - 2020
- [c43]Stefan Fenz:
Supporting Complex Decision Making by Semantic Technologies. ESWC 2020: 632-647
2010 – 2019
- 2018
- [j17]Stefan Fenz, Thomas Neubauer:
Ontology-based information security compliance determination and control selection on the example of ISO 27002. Inf. Comput. Secur. 26(5): 551-567 (2018) - 2016
- [j16]Stefan Fenz, Johannes Heurix, Thomas Neubauer, A Min Tjoa, Neda Ghiassi, Ulrich Pont, Ardeshir Mahdavi:
SEMERGY.net: automatically identifying and optimizing energy-efficient building designs. Comput. Sci. Res. Dev. 31(3): 135-140 (2016) - [j15]Shareeful Islam, Stefan Fenz, Edgar R. Weippl, Christos Kalloniatis:
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners. Int. J. Secur. Softw. Eng. 7(3): 44-73 (2016) - [j14]Stefan Fenz, Stefanie Plieschnegger, Heidi Hobel:
Mapping information security standard ISO 27002 to an ontological structure. Inf. Comput. Secur. 24(5): 452-473 (2016) - [j13]Johannes Heurix, Stefan Fenz, Antonio Rella, Thomas Neubauer:
Recognition and pseudonymisation of medical records for secondary use. Medical Biol. Eng. Comput. 54(2-3): 371-383 (2016) - 2015
- [j12]Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. Comput. Secur. 53: 1-17 (2015) - [j11]Ulrich Pont, Neda Ghiassi, Stefan Fenz, Johannes Heurix, Ardeshir Mahdavi:
SEMERGY: Application of semantic web technologies in performance-guided building design optimization. J. Inf. Technol. Constr. 20: 107-120 (2015) - [c42]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management. ECIS 2015 - 2014
- [j10]Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein:
Current challenges in information security risk management. Inf. Manag. Comput. Secur. 22(5): 410-430 (2014) - [c41]Najd Ouhajjou, Wolfgang Loibl, Stefan Fenz, A Min Tjoa:
Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV. EnviroInfo 2014: 77-84 - [c40]Heidelinde Hobel, Lisa Madlberger, Andreas Thöni, Stefan Fenz:
Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels. SSA-SMILE@ESWC 2014: 43-54 - [c39]Iman Paryudi, Stefan Fenz:
Evaluation of User Interface Design of Semergy System. iiWAS 2014: 469-473 - [c38]Najd Ouhajjou, Wolfgang Loibl, Peter Palensky, Amin Anjomshoaa, Stefan Fenz, A Min Tjoa:
Robustness against data availability problems in urban energy planning support software. RCIS 2014: 1-2 - [c37]Gabriela Varona Cervantes, Stefan Fenz:
How to Assess Confidentiality Requirements of Corporate Assets? SEC 2014: 234-241 - [p1]Kristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel:
A Structured Comparison of Security Standards. Engineering Secure Future Internet Services and Systems 2014: 1-34 - 2013
- [j9]Daniel Feledi, Stefan Fenz, Lukas Lechner:
Toward web-based information security knowledge sharing. Inf. Secur. Tech. Rep. 17(4): 199-209 (2013) - [c36]Stefan Fenz, Thomas Neubauer, Rafael Accorsi, Thomas G. Koslowski:
FORISK: Formalizing information security risk and compliance management. DSN Workshops 2013: 1-4 - [c35]Najd Ouhajjou, Peter Palensky, Matthias Stifter, Jessen Page, Stefan Fenz, A Min Tjoa:
A modular methodology for the development of urban energy planning support software. IECON 2013: 7558-7563 - 2012
- [j8]Stefan Fenz:
An ontology-based approach for constructing Bayesian networks. Data Knowl. Eng. 73: 73-88 (2012) - [j7]Dimitrios Settas, Antonio Cerone, Stefan Fenz:
Enhancing ontology-based antipattern detection using Bayesian networks. Expert Syst. Appl. 39(10): 9041-9053 (2012) - [j6]Raydel Montesino, Stefan Fenz, Walter Baluja:
SIEM-based framework for security controls automation. Inf. Manag. Comput. Secur. 20(4): 248-263 (2012) - [c34]Daniel Feledi, Stefan Fenz:
Challenges of Web-Based Information Security Knowledge Sharing. ARES 2012: 514-521 - [c33]Johannes Heurix, Antonio Rella, Stefan Fenz, Thomas Neubauer:
Automated Transformation of Semi-Structured Text Elements. AMCIS 2012 - [c32]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. BIS 2012: 153-164 - [c31]Andreas Kronabeter, Stefan Fenz:
Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation. CloudComp 2012: 114-123 - 2011
- [j5]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Commun. Assoc. Inf. Syst. 28: 22 (2011) - [j4]Stefan Fenz, Andreas Ekelhart:
Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Secur. Priv. 9(2): 58-65 (2011) - [j3]Stefan Fenz, Simon Edward Parkin, Aad P. A. van Moorsel:
A Community Knowledge Base for IT Security. IT Prof. 13(3): 24-30 (2011) - [c30]Raydel Montesino, Stefan Fenz:
Information Security Automation: How Far Can We Go? ARES 2011: 280-285 - [c29]Stefan Fenz:
An ontology- and Bayesian-based approach for determining threat probabilities. AsiaCCS 2011: 344-354 - [c28]Raydel Montesino, Stefan Fenz:
Automation Possibilities in Information Security Management. EISIC 2011: 259-262 - [c27]Dimitrios Settas, Antonio Cerone, Stefan Fenz:
Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models. SERA 2011: 46-53 - 2010
- [c26]Stefan Fenz:
From the Resource to the Business Process Risk Level. SAISMC 2010: 100-109 - [c25]Stefan Fenz:
Ontology-based generation of IT-security metrics. SAC 2010: 1833-1839
2000 – 2009
- 2009
- [c24]Stefan Fenz, Thomas Pruckner, Arman Manutscheri:
Ontological Mapping of Information Security Best-Practice Guidelines. BIS 2009: 49-60 - [c23]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Business Process-Based Resource Importance Determination. BPM 2009: 113-127 - [c22]Stefan Fenz, Andreas Ekelhart:
Formalizing information security knowledge. AsiaCCS 2009: 183-194 - [c21]Stefan Fenz, A Min Tjoa, Marcus Hudec:
Ontology-Based Generation of Bayesian Networks. CISIS 2009: 712-717 - [c20]Stefan Fenz, Thomas Neubauer:
How to determine threat probabilities using ontologies and Bayesian networks. CSIIRW 2009: 69 - [c19]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10 - [c18]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
Ontology-Based Decision Support for Information Security Risk Management. ICONS 2009: 80-85 - [c17]Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. ITNG 2009: 393-398 - 2008
- [j2]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl:
XML security - A comparative literature review. J. Syst. Softw. 81(10): 1715-1724 (2008) - [c16]Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl:
Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582 - [c15]Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications. HICSS 2008: 255 - [c14]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück:
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. HICSS 2008: 377 - [c13]Thomas Neubauer, Andreas Ekelhart, Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492 - 2007
- [j1]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl:
Architectural approach for handling semi-structured data in a user-centred working environment. Int. J. Web Inf. Syst. 3(3): 198-211 (2007) - [c12]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. ARES 2007: 730-740 - [c11]Andreas Ekelhart, Stefan Fenz, A Min Tjoa, Edgar R. Weippl:
Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13 - [c10]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156 - [c9]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c8]Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A Min Tjoa, Edgar R. Weippl, Dominik Zyskowski:
Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31 - [c7]Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388 - [c6]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 - 2006
- [c5]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259 - [c4]Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A Min Tjoa:
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151 - [c3]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A Min Tjoa, Edgar R. Weippl:
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48 - [c2]Stefan Fenz, Edgar R. Weippl:
Ontology based IT-security planning. PRDC 2006: 389-390 - 2005
- [c1]Edgar R. Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A Min Tjoa:
Semantic Storage: A Report on Performance and Flexibility. DEXA 2005: 586-595
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint