Andreas Ekelhart
Orcid: 0000-0003-3682-1364
According to our database1,
Andreas Ekelhart
authored at least 75 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Distance-based linkage of personal microbiome records for identification and its privacy implications.
Comput. Secur., January, 2024
Semantic Web, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems.
IEEE Trans. Ind. Informatics, April, 2023
Proceedings of the Compendium of Neurosymbolic Artificial Intelligence, 2023
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023
ACM Comput. Surv., 2023
Describing and Organizing Semantic Web and Machine Learning Systems in the SWeMLS-KG.
Proceedings of the Semantic Web - 20th International Conference, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Mach. Learn. Knowl. Extr., 2022
Graph-based managing and mining of processes and data in the domain of intellectual property.
Inf. Syst., 2022
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data.
Comput. Secur., 2022
Proceedings of the Database and Expert Systems Applications, 2022
Proceedings of the Database and Expert Systems Applications, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Proceedings of the ISWC 2021 Posters, 2021
Proceedings of the Semantic Web - 18th International Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
ERCIM News, 2020
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.
J. Internet Serv. Inf. Secur., 2019
Comput. Secur., 2019
Proceedings of the Semantic Web - ISWC 2019, 2019
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the IECON 2019, 2019
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process.
Proceedings of the IECON 2019, 2019
Proceedings of the Posters and Demo Track of the 15th International Conference on Semantic Systems co-located with 15th International Conference on Semantic Systems (SEMANTiCS 2019), Karlsruhe, Germany, September 9th - to, 2019
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019
Backdoor Attacks in Neural Networks - A Systematic Evaluation on Multiple Traffic Sign Datasets.
Proceedings of the Machine Learning and Knowledge Extraction, 2019
Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies.
Proceedings of the Information Systems Engineering in Responsible Information Systems, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019
2018
Proceedings of the 14th International Conference on Semantic Systems, 2018
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
2015
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.
Inf. Technol. Manag., 2015
2014
Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Simulation-based optimization of information security controls: An adversary-centric approach.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013
2011
IEEE Secur. Priv., 2011
Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
Commun. Assoc. Inf. Syst., 2011
2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Fourth International Conference on Systems, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Business Process Management, 7th International Conference, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Architectural approach for handling semi-structured data in a user-centred working environment.
Int. J. Web Inf. Syst., 2007
Proceedings of the New Approaches for Security, 2007
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
Security aspects in Semantic Web Services Filtering.
Proceedings of the iiWAS'2007, 2007
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Business Information Systems, 10th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
Proceedings of the Ontologies-Based Databases and Information Systems, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006