Simon Tjoa
Orcid: 0000-0003-2280-9604
According to our database1,
Simon Tjoa
authored at least 59 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
2
1
2
2
4
1
3
2
1
4
1
1
4
1
3
3
2
4
2
2
2
5
4
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on fhstp.ac.at
On csauthors.net:
Bibliography
2024
2023
Proceedings of the Information Integration and Web Intelligence, 2023
2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula.
ERCIM News, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022
Business Continuity & Disaster Recovery A simulation game for holistic cyber security education.
Proceedings of the IEEE Global Engineering Education Conference, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020
J. Internet Serv. Inf. Secur., 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
2018
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security.
Proceedings of the Central European Cybersecurity Conference 2018, 2018
2017
Balt. J. Mod. Comput., 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
Proceedings of the ICT for Promoting Human Development and Protecting the Environment, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
2015
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Enterprise and Organizational Modeling and Simulation, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach.
Int. J. Mob. Comput. Multim. Commun., 2013
Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities.
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Serv. Comput., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach.
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management.
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the CRiSIS 2009, 2009
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009
2008
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
Proceedings of the 16th European Conference on Information Systems, 2008
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
Proceedings of the The Third International Conference on Availability, 2008
2007
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
Proceedings of the Fifteenth European Conference on Information Systems, 2007
Proceedings of the The Second International Conference on Availability, 2007