Thomas Neubauer

Orcid: 0000-0002-9814-6045

According to our database1, Thomas Neubauer authored at least 69 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Current applications and potential future directions of reinforcement learning-based Digital Twins in agriculture.
CoRR, 2024

2023
Unsupervised and supervised machine learning approach to assess user readiness levels for precision livestock farming technology adoption in the pig and poultry industries.
Comput. Electron. Agric., October, 2023

AI- and data-driven crop rotation planning.
Comput. Electron. Agric., September, 2023

Combining Fractional Derivatives and Machine Learning: A Review.
Entropy, January, 2023

Verification of Standardized Rel-15 Requirements for Drone's Command-and-Control Link Reliability.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
Interpolating Strange Attractors via Fractional Brownian Bridges.
Entropy, 2022

An Exploratory Study on the Complexity and Machine Learning Predictability of Stock Market Data.
Entropy, 2022

2021
A fractal interpolation approach to improve neural network predictions for difficult time series data.
Expert Syst. Appl., 2021

Combining Measures of Signal Complexity and Machine Learning for Time Series Analyis: A Review.
Entropy, 2021

Taming the Chaos in Neural Network Time Series Predictions.
Entropy, 2021

2020
Machine Learning and Chaos Theory in Agriculture.
ERCIM News, 2020

2018
Ontology-based information security compliance determination and control selection on the example of ISO 27002.
Inf. Comput. Secur., 2018

2016
Recognition and pseudonymisation of medical records for secondary use.
Medical Biol. Eng. Comput., 2016

SEMERGY.net: automatically identifying and optimizing energy-efficient building designs.
Comput. Sci. Res. Dev., 2016

2015
The Role of ICT in a Low Carbon Society.
IEEE Technol. Soc. Mag., 2015

A taxonomy for privacy enhancing technologies.
Comput. Secur., 2015

How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Current challenges in information security risk management.
Inf. Manag. Comput. Secur., 2014

2013
FORISK: Formalizing information security risk and compliance management.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records.
Proceedings of the Business Information Systems - 15th International Conference, 2012

Automated Transformation of Semi-Structured Text Elements.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
A methodology for the pseudonymization of medical data.
Int. J. Medical Informatics, 2011

Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
Commun. Assoc. Inf. Syst., 2011

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Model-Driven Development Meets Security: An Evaluation of Current Approaches.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Data Models for the Pseudonymization of DICOM Data.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Interactive selection of Web services under multiple objectives.
Inf. Technol. Manag., 2010

Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten.
Elektrotech. Informationstechnik, 2010

Workshop-Based Risk Assessment for the Definition of Secure Business Processes.
Proceedings of the Second International Conference on Information, 2010

On the Security of Outsourced and Untrusted Databases.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
An Evaluation of Technologies for the Pseudonymization of Medical Data.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009

An empirical study about the status of business process management.
Bus. Process. Manag. J., 2009

An evaluation of technologies for the pseudonymization of medical data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Automated Risk and Utility Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation.
Proceedings of the Fourth International Conference on Systems, 2009

Ontology-Based Decision Support for Information Security Risk Management.
Proceedings of the Fourth International Conference on Systems, 2009

A Comparison of Security Safeguard Selection Methods.
Proceedings of the ICEIS 2009, 2009

AURUM: A Framework for Information Security Risk Management.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

How to determine threat probabilities using ontologies and Bayesian networks.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Business Process-Based Resource Importance Determination.
Proceedings of the Business Process Management, 7th International Conference, 2009

A process model for RFID based Business Process Analysis.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

A roadmap to risk-aware business process management.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

On the Singularity of Valuating IT Security Investments.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
J. Softw., 2008

Multiobjective decision support for defining secure business processes: a case study.
Int. J. Bus. Intell. Data Min., 2008

Interaktive Portfolioauswahl im IT-Servicemanagement.
HMD Prax. Wirtsch., 2008

Interactive Selection of ISO 27001 Controls under Multiple Objectives.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Improving Patients Privacy with Pseudonymization.
Proceedings of the eHealth Beyond the Horizon, 2008

Pseudonymization for improving the Privacy in E-Health Applications.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

A Case Study on the Multicriteria Selection of Software Components.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
Proceedings of the The Third International Conference on Availability, 2008

Defining Secure Business Processes with Respect to Multiple Objectives.
Proceedings of the The Third International Conference on Availability, 2008

Objective Types for the Valuation of Secure Business Processes.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Extending business process management to determine efficient IT investments.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Applying a Threshold Scheme to the Pseudonymization of Health Data.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Multiobjective Decision Support for defining Secure Business Processes.
Proceedings of the iiWAS'2007, 2007

Formal threat descriptions for enhancing governmental risk assessment.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Interactive Decision Support for Multiobjective COTS Selection.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A secure architecture for the pseudonymization of medical data.
Proceedings of the The Second International Conference on Availability, 2007

A research agenda for Autonomous Business Process Management.
Proceedings of the The Second International Conference on Availability, 2007

2006
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
Proceedings of the The First International Conference on Availability, 2006

Workshop-based Multiobjective Security Safeguard Selection.
Proceedings of the The First International Conference on Availability, 2006

Secure Business Process Management: A Roadmap.
Proceedings of the The First International Conference on Availability, 2006

2005
Business process-based valuation of IT-security.
ACM SIGSOFT Softw. Eng. Notes, 2005

2002
Performance of downlink beam switching for UMTS FDD in the presence of angular spread.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Smart-antenna space-time UMTS uplink processing for system capacity enhancement.
Ann. des Télécommunications, 2001

2000
Increasing mixed service uplink capacity of UMTS by smart antennas.
J. Commun. Networks, 2000


  Loading...