Maria Leitner
Orcid: 0000-0003-1371-5446Affiliations:
- University of Regensburg, Germany
- University of Vienna, Austria (former)
According to our database1,
Maria Leitner
authored at least 36 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries.
Inf. Secur. J. A Glob. Perspect., September, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the Cooperative Information Systems - 29th International Conference, 2023
2022
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Proceedings of the 23rd Conference on Business Informatics, 2021
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
2020
An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments.
J. Netw. Comput. Appl., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
ERCIM News, 2016
Evaluation Methods in Process-Aware Information Systems Research with a Perspective on Human Orientation.
Bus. Inf. Syst. Eng., 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016
Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
2014
A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions.
Inf. Softw. Technol., 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
2013
An Experimental Study on the Design and Modeling of Security Concepts in Business Processes.
Proceedings of the Practice of Enterprise Modeling, 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012
An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems.
Proceedings of the 13th ACM/IEEE International Conference on Grid Computing, 2012
A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models.
Proceedings of the Business Process Management Workshops, 2012
2011
SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges.
Proceedings of the Sixth International Conference on Availability, 2011
2010
On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010