


Остановите войну!
for scientists:
Andreas Ekelhart
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Gerd Hübscher, Verena Geist, Dagmar Auer
, Andreas Ekelhart
, Rudolf Mayer
, Stefan Nadschläger, Josef Küng:
Graph-based managing and mining of processes and data in the domain of intellectual property. Inf. Syst. 106: 101844 (2022) - [j8]Matthias Eckhart
, Andreas Ekelhart
, Edgar R. Weippl
:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1655-1672 (2022) - [c46]Rudolf Mayer, Andreas Ekelhart:
Macro-level Inference in Collaborative Learning. CODASPY 2022: 373-375 - [c45]Markus Hittmeir
, Rudolf Mayer
, Andreas Ekelhart
:
Utility and Privacy Assessment of Synthetic Microbiome Data. DBSec 2022: 15-27 - [c44]Guillermo Alamán Requena, Rudolf Mayer
, Andreas Ekelhart
:
Anonymisation of Heterogeneous Graphs with Multiple Edge Types. DEXA (1) 2022: 130-135 - [c43]Lorenz Wendlinger
, Gerd Hübscher
, Andreas Ekelhart
, Michael Granitzer
:
Reconciliation of Mental Concepts with Graph Neural Networks. DEXA (2) 2022: 133-146 - 2021
- [c42]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa:
Virtual Knowledge Graphs for Federated Log Analysis. ARES 2021: 18:1-18:11 - [c41]Andreas Ekelhart
, Fajar J. Ekaputra
, Elmar Kiesling
:
The SLOGERT Framework for Automated Log Knowledge Graph Construction. ESWC 2021: 631-646 - [c40]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling:
An ATT&CK-KG for Linking Cybersecurity Attacks to Adversary Tactics and Techniques. ISWC (Posters/Demos/Industry) 2021 - [i4]Matthias Eckhart, Andreas Ekelhart, Roland Eisl:
Digital Twins for Cyber-Physical Threat Detection and Response. ERCIM News 2021(126): 0 (2021) - [i3]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Privacy Risks and Anonymization of Microbiome Data. ERCIM News 2021(126) (2021) - 2020
- [c39]Markus Hittmeir
, Rudolf Mayer
, Andreas Ekelhart:
A Baseline for Attribute Disclosure Risk in Synthetic Data. CODASPY 2020: 133-143 - [c38]Rudolf Mayer
, Markus Hittmeir
, Andreas Ekelhart
:
Privacy-Preserving Anomaly Detection Using Synthetic Data. DBSec 2020: 195-207 - [c37]Kabul Kurniawan
, Andreas Ekelhart
, Fajar J. Ekaputra
, Elmar Kiesling
:
Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach. SEC 2020: 384-397 - [c36]Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling:
Automated Knowledge Graph Construction From Raw Log Data. ISWC (Demos/Industry) 2020: 204-209 - [i2]Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer:
Evaluation of Synthetic Data for Privacy-Preserving Machine Learning. ERCIM News 2020(123) (2020)
2010 – 2019
- 2019
- [j7]Matthias Eckhart
, Kristof Meixner
, Dietmar Winkler, Andreas Ekelhart
:
Securing the testing process for industrial automation software. Comput. Secur. 85: 156-180 (2019) - [j6]Matthias Eckhart
, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9(3): 52-73 (2019) - [c35]Markus Hittmeir
, Andreas Ekelhart, Rudolf Mayer
:
On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks. ARES 2019: 29:1-29:6 - [c34]Markus Hittmeir
, Andreas Ekelhart, Rudolf Mayer
:
Utility and Privacy Assessments of Synthetic Data for Regression Tasks. IEEE BigData 2019: 5763-5772 - [c33]Claudio Di Ciccio
, Fajar J. Ekaputra
, Alessio Cecconi
, Andreas Ekelhart
, Elmar Kiesling:
Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies. CAiSE Forum 2019: 60-74 - [c32]Huma Rehman
, Andreas Ekelhart
, Rudolf Mayer
:
Backdoor Attacks in Neural Networks - A Systematic Evaluation on Multiple Traffic Sign Datasets. CD-MAKE 2019: 285-300 - [c31]Matthias Eckhart
, Andreas Ekelhart, Edgar R. Weippl:
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. ETFA 2019: 1222-1225 - [c30]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Agnes Froschl, Fajar J. Ekaputra:
Semantic Integration and Monitoring of File System Activity. SEMANTiCS Posters&Demos 2019 - [c29]Matthias Eckhart
, Andreas Ekelhart, Arndt Lüder, Stefan Biffl, Edgar R. Weippl:
Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019: 3004-3011 - [c28]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. IECON 2019: 3012-3017 - [c27]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
A Versatile Security Layer for AutomationML. INDIN 2019: 358-364 - [c26]Elmar Kiesling
, Andreas Ekelhart
, Kabul Kurniawan
, Fajar J. Ekaputra
:
The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity. ISWC (2) 2019: 198-214 - [p1]Matthias Eckhart, Andreas Ekelhart:
Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. Security and Quality in Cyber-Physical Systems Engineering 2019: 383-412 - 2018
- [c25]Matthias Eckhart
, Andreas Ekelhart
:
A Specification-based State Replication Approach for Digital Twins. CPS-SPC@CCS 2018: 36-47 - [c24]Matthias Eckhart
, Andreas Ekelhart
:
Towards Security-Aware Virtual Environments for Digital Twins. CPSS@AsiaCCS 2018: 61-72 - [c23]Andreas Ekelhart, Elmar Kiesling, Kabul Kurniawan
:
Taming the logs - Vocabularies for semantic security analysis. SEMANTiCS 2018: 109-119 - [i1]Matthias Eckhart, Andreas Ekelhart:
Securing Cyber-Physical Systems through Digital Twins. ERCIM News 2018(115) (2018) - 2015
- [j5]Andreas Ekelhart, Elmar Kiesling, Bernhard Grill, Christine Strauss, Christian Stummer:
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach. Inf. Technol. Manag. 16(3): 221-233 (2015) - 2014
- [c22]Elmar Kiesling, Andreas Ekelhart, Bernhard Grill, Christian Stummer, Christine Strauss:
Evolving Secure Information Systems through Attack Simulation. HICSS 2014: 4868-4877 - [c21]Andreas Ekelhart, Bernhard Grill, Elmar Kiesling, Christine Strauß, Christian Stummer:
Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement. Sicherheit 2014: 345-361 - 2013
- [c20]Elmar Kiesling, Christine Strauss, Andreas Ekelhart, Bernhard Grill, Christian Stummer:
Simulation-based optimization of information security controls: An adversary-centric approach. WSC 2013: 2054-2065 - 2011
- [j4]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Commun. Assoc. Inf. Syst. 28: 22 (2011) - [j3]Stefan Fenz, Andreas Ekelhart
:
Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Secur. Priv. 9(2): 58-65 (2011)
2000 – 2009
- 2009
- [c19]Stefan Fenz
, Andreas Ekelhart
, Thomas Neubauer:
Business Process-Based Resource Importance Determination. BPM 2009: 113-127 - [c18]Stefan Fenz, Andreas Ekelhart
:
Formalizing information security knowledge. AsiaCCS 2009: 183-194 - [c17]Andreas Ekelhart
, Stefan Fenz
, Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10 - [c16]Andreas Ekelhart
, Stefan Fenz
, Thomas Neubauer:
Ontology-Based Decision Support for Information Security Risk Management. ICONS 2009: 80-85 - [c15]Andreas Ekelhart
, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. ITNG 2009: 393-398 - [c14]Thomas Neubauer, Andreas Ekelhart
:
An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858 - 2008
- [j2]Andreas Ekelhart
, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl:
XML security - A comparative literature review. J. Syst. Softw. 81(10): 1715-1724 (2008) - [c13]Stefan Fenz, Andreas Ekelhart
, Edgar R. Weippl:
Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582 - [c12]Gernot Goluch, Andreas Ekelhart
, Stefan Fenz, Stefan Jakoubi, Simon Tjoa
, Thomas Mück:
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. HICSS 2008: 377 - [c11]Thomas Neubauer, Andreas Ekelhart
, Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492 - 2007
- [j1]Andreas Ekelhart
, Stefan Fenz
, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl:
Architectural approach for handling semi-structured data in a user-centred working environment. Int. J. Web Inf. Syst. 3(3): 198-211 (2007) - [c10]Gernot Goluch, Andreas Ekelhart
, Stefan Fenz
, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa
:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. ARES 2007: 730-740 - [c9]Andreas Ekelhart
, Stefan Fenz
, A Min Tjoa, Edgar R. Weippl:
Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13 - [c8]Andreas Ekelhart
, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156 - [c7]Andreas Ekelhart
, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c6]Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A Min Tjoa, Edgar R. Weippl, Dominik Zyskowski:
Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31 - [c5]Stefan Fenz, Gernot Goluch, Andreas Ekelhart
, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388 - [c4]Andreas Ekelhart
, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 - 2006
- [c3]Andreas Ekelhart
, Stefan Fenz
, Markus D. Klemen, Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259 - [c2]Edgar R. Weippl, Markus D. Klemen, Stefan Fenz
, Andreas Ekelhart
, A Min Tjoa
:
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151 - [c1]Andreas Ekelhart
, Stefan Fenz
, Markus D. Klemen, A Min Tjoa
, Edgar R. Weippl:
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-08-09 23:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint