default search action
Simon Tjoa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Simon Tjoa, Melisa Gafic, Peter Kieseberg:
Cyber Resilience Fundamentals. Springer 2024, ISBN 978-3-031-52063-1, pp. 1-124 - [i7]Peter Kieseberg, Simon Tjoa, Andreas Holzinger:
Controllable Artificial Intelligence. ERCIM News 2024(136) (2024) - [i6]Lukas König, Martin Pirker, Simon Tjoa, Peter Kieseberg:
Distributed Information Security Auditing Using Blockchains . ERCIM News 2024(137) (2024) - 2023
- [c41]Lukas König, Martin Pirker, Herfried Geyer, Michael Feldmann, Simon Tjoa, Peter Kieseberg:
DISA - A Blockchain-Based Distributed Information Security Audit. iiWAS 2023: 27-34 - [i5]Peter Kieseberg, Simon Tjoa, Andreas Holzinger:
Procurement of Secure AI - A Practical Guide. ERCIM News 2023(135) (2023) - 2022
- [j11]Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2021. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 1-3 (2022) - [c40]Lukas König, Simon Tjoa:
A Design Thinking Approach on Information Security. AINA (2) 2022: 503-515 - [c39]Christoph Lang-Muhr, Simon Tjoa, Stefan Machhemdl, Daniel Haslinger:
Business Continuity & Disaster Recovery A simulation game for holistic cyber security education. EDUCON 2022: 1296-1302 - [c38]Peter Kieseberg, Christina Buttinger, Laura Kaltenbrunner, Marlies Temper, Simon Tjoa:
Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems. FUZZ-IEEE 2022: 1-7 - [c37]Melisa Gafic, Simon Tjoa, Peter Kieseberg, Otto Hellwig, Gerald Quirchmayr:
Cyber Exercises in Computer Science Education. ICISSP 2022: 404-411 - [i4]Jochen Hense, Simon Tjoa, Peter Kieseberg:
Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula. ERCIM News 2022(129): 0 (2022) - 2021
- [j10]Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2020. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 1-2 (2021) - [c36]Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. CSR 2021: 536-542 - [i3]Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo:
Towards Resilient Artificial Intelligence: Survey and Research Issues. CoRR abs/2109.08904 (2021) - [i2]Peter Kieseberg, Simon Tjoa, Herfried Geyer:
Security Management and the Slow Adoption of Blockchains. ERCIM News 2021(125) (2021) - 2020
- [j9]Lukas König, Yuliia Korobeinikova, Simon Tjoa, Peter Kieseberg:
Comparing Blockchain Standards and Recommendations. Future Internet 12(12): 222 (2020) - [j8]Lukas König, Stefan Unger, Peter Kieseberg, Simon Tjoa:
The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks. J. Internet Serv. Inf. Secur. 10(3): 110-127 (2020) - [j7]Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, Helge Janicke:
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. J. Comput. Virol. Hacking Tech. 16(1): 19-61 (2020) - [c35]Andreas Kolan, Simon Tjoa, Peter Kieseberg:
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects. ICSSA 2020: 1-9 - [i1]Simon Tjoa, Christina Buttinger, Katharina Holzinger, Peter Kieseberg:
Penetration Testing Artificial Intelligence. ERCIM News 2020(123) (2020)
2010 – 2019
- 2018
- [c34]Melisa Geko, Simon Tjoa:
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. CECC 2018: 19:1-19:6 - [c33]Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser:
APT RPG: Design of a Gamified Attacker/Defender Meta Model. ICISSP 2018: 526-537 - [c32]Jungwoo Ryoo, Simon Tjoa, Hojin Ryoo:
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). ICSSA 2018: 49-52 - [c31]David Rieger, Simon Tjoa:
A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. INCoS 2018: 283-293 - 2017
- [j6]Laima Kauspadiene, Antanas Cenys, Nikolaj Goranin, Simon Tjoa, Simona Ramanauskaite:
High-Level Self-Sustaining Information Security Management Framework. Balt. J. Mod. Comput. 5(1): 107-123 (2017) - [c30]Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis:
IoE Security Threats and You. ICSSA 2017: 13-19 - 2016
- [c29]Mathias Wegerer, Simon Tjoa:
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. ICSSA 2016: 6-10 - [c28]Marlies Temper, Simon Tjoa:
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. ICSSA 2016: 17-23 - [c27]A Min Tjoa, Simon Tjoa:
The Role of ICT to Achieve the UN Sustainable Development Goals (SDG). WITFOR 2016: 3-13 - 2015
- [c26]Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll:
An Open Source Code Analyzer and Reviewer (OSCAR) Framework. ARES 2015: 511-515 - [c25]Marlies Temper, Simon Tjoa, Manfred Kaiser:
Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices. ICSSA 2015: 30-35 - [c24]Ulrich Koinig, Simon Tjoa, Jungwoo Ryoo:
Contrology - An Ontology-Based Cloud Assurance Approach. WETICE 2015: 105-107 - 2014
- [c23]Marlies Rybnicek, Simon Tjoa, Rainer Poisel:
Simulation-Based Cyber-Attack Assessment of Critical Infrastructures. EOMAS@CAiSE 2014: 135-150 - [c22]Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois, Paulo Simões, Tiago Cruz:
Keeping an Eye on Your Security Through Assurance Indicators. SECRYPT 2014: 476-483 - 2013
- [j5]Rainer Poisel, Marlies Rybnicek, Bernhard Schildendorfer, Simon Tjoa:
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. Int. J. Mob. Comput. Multim. Commun. 5(3): 50-67 (2013) - [j4]Edgar R. Weippl, A Min Tjoa, Simon Tjoa:
Frontiers in Security and Dependability. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 1-3 (2013) - [j3]Rainer Poisel, Erich Malzer, Simon Tjoa:
Evidence and Cloud Computing: The Virtual Machine Introspection Approach. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 135-152 (2013) - [c21]Rainer Poisel, Simon Tjoa:
A Comprehensive Literature Review of File Carving. ARES 2013: 475-484 - [c20]Rainer Poisel, Marlies Rybnicek, Simon Tjoa:
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures. AINA 2013: 114-120 - [c19]Rainer Poisel, Marlies Rybnicek, Simon Tjoa:
Taxonomy of Data Fragment Classification Techniques. ICDF2C 2013: 67-85 - [c18]Marlies Rybnicek, Rainer Poisel, Simon Tjoa:
Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities. SMC 2013: 2854-2859 - 2012
- [c17]Rainer Poisel, Simon Tjoa:
Discussion on the Challenges and Opportunities of Cloud Forensics. CD-ARES 2012: 593-608 - [c16]Marlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa:
A Generic Approach to Critical Infrastructure Modeling and Simulation. CyberSecurity 2012: 144-151 - 2011
- [j2]Rainer Poisel, Simon Tjoa, Paul Tavolato:
Advanced File Carving Approaches for Multimedia Files. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 42-58 (2011) - [j1]Simon Tjoa, Stefan Jakoubi, Gernot Goluch, Gerhard Kitzler, Sigrun Goluch, Gerald Quirchmayr:
A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation. IEEE Trans. Serv. Comput. 4(2): 153-166 (2011) - [c15]Rainer Poisel, Simon Tjoa:
Roadmap to Approaches for Carving of Fragmented Multimedia Files. ARES 2011: 752-757 - [c14]Rainer Poisel, Simon Tjoa:
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art. IMF 2011: 48-61 - 2010
- [c13]Stefan Jakoubi, Simon Tjoa, Sigrun Goluch, Gerhard Kitzler:
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. ARES 2010: 180-187 - [c12]Simon Tjoa, Stefan Jakoubi, Sigrun Goluch, Gerhard Kitzler:
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. ARES 2010: 268-274
2000 – 2009
- 2009
- [c11]Stefan Jakoubi, Thomas Neubauer, Simon Tjoa:
A roadmap to risk-aware business process management. APSCC 2009: 23-27 - [c10]Thomas Neubauer, Gernot Goluch, Stefan Jakoubi, Simon Tjoa, Martin Wisser:
A process model for RFID based Business Process Analysis. APSCC 2009: 478-483 - [c9]Stefan Jakoubi, Simon Tjoa:
A reference model for risk-aware business process management. CRiSIS 2009: 82-89 - [c8]Markus Huber, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa:
Towards Automating Social Engineering Using Social Networking Sites. CSE (3) 2009: 117-124 - [c7]Stefan Jakoubi, Simon Tjoa, Gernot Goluch, Gerald Quirchmayr:
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management. DEXA Workshops 2009: 127-132 - 2008
- [c6]Simon Tjoa, Stefan Jakoubi, Gerald Quirchmayr:
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. ARES 2008: 179-186 - [c5]Simon Tjoa, Stefan Jakoubi, Gernot Goluch, Gerald Quirchmayr:
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support. AINA 2008: 48-55 - [c4]Stefan Jakoubi, Gernot Goluch, Simon Tjoa, Gerald Quirchmayr:
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation. ECIS 2008: 1542-1554 - [c3]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück:
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. HICSS 2008: 377 - 2007
- [c2]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. ARES 2007: 730-740 - [c1]Stefan Jakoubi, Simon Tjoa, Gerald Quirchmayr:
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes. ECIS 2007: 1596-1607
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint