Security ontologies: Improving quantitative risk analysis A Ekelhart, S Fenz, M Klemen, E Weippl 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 162 | 2007 |
Security ontology: Simulating threats to corporate assets A Ekelhart, S Fenz, MD Klemen, ER Weippl Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 84 | 2006 |
Secure business process management: a roadmap T Neubauer, M Klemen, S Biffl First International Conference on Availability, Reliability and Security …, 2006 | 63 | 2006 |
Business process-based valuation of IT-security T Neubauer, M Klemen, S Biffl Proceedings of the seventh international workshop on Economics-driven …, 2005 | 62 | 2005 |
Implementing IT Security for Small and Medium Sized Enterprises ER Weippl, M Klemen Enterprise Information Systems Assurance and System Security: Managerial and …, 2006 | 10 | 2006 |
Social engineering B Böck, E Weippl The Handbook of Technology Management, 2010 | 5 | 2010 |
Ontology-based business knowledge for simulating threats to corporate assets A Ekelhart, S Fenz, MD Klemen, AM Tjoa, ER Weippl Practical Aspects of Knowledge Management: 6th International Conference …, 2006 | 5 | 2006 |
The semantic desktop: A semantic personal information management system based on rdf and topic maps ER Weippl, M Klemen, S Fenz, A Ekelhart, AM Tjoa Workshop on Ontologies-based techniques for DataBases and Information …, 2005 | 5 | 2005 |
Economic aspects and needs in IT-security risk management for SMEs M Klemen, S Biffl na, 2004 | 5 | 2004 |
Semantic storage: A report on performance and flexibility ER Weippl, M Klemen, M Linnert, S Fenz, G Goluch, AM Tjoa Database and Expert Systems Applications: 16th International Conference …, 2005 | 4 | 2005 |
Potential threats of human digital twins for digital sovereignty and the sustainable development goals K Mallinger, A Schatten, G Sendera, M Klemen, AM Tjoa UN IATT Report, 2021 | 3 | 2021 |
Improving storage concepts for semantic models and ontologies ER Weippl, MD Klemen, S Raffeiner Database Technologies: Concepts, Methodologies, Tools, and Applications …, 2009 | 2 | 2009 |
Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation L Meyer, M Auer, M Klemen, S Biffl 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 1 | 2011 |
Social Engineering M Klemen, E Weippl The Handbook of Computer Networks, 2007 | 1 | 2007 |
Towards Software Sustainability A Ekelhart, M Klemen, V Nowak, A Schatten | | 2022 |
Crisis and disaster management-Semantic and syntactic interoperability G Neubauer, M Egly, P Zwickl, T Seltsam, AR Uschok, H Linke, D Lund, ... European committee for standardization, 2020 | | 2020 |
Die OCG Initiative Bildung 4.0 G Futschek, M Klemen | | 2017 |
Business Requirements of Backup Systems M Klemen, T Neubauer, ER Weippl Handbook of Computer Networks: Distributed Networks, Network Planning …, 2007 | | 2007 |
Architectural approach for handling semi‐structured data in a user‐centred working environment A Ekelhart, S Fenz, G Goluch, MD Klemen, ER Weippl International Journal of Web Information Systems 3 (3), 198-211, 2007 | | 2007 |
Content-basierte Zugriffsrechte in E-Learning Systemen E Weippl, M Klemen ÖGAI Journal 23 (4), 24-29, 2004 | | 2004 |