default search action
Andreas Ekelhart
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart:
Distance-based linkage of personal microbiome records for identification and its privacy implications. Comput. Secur. 136: 103538 (2024) - [j15]Fajar J. Ekaputra, Andreas Ekelhart, Rudolf Mayer, Tomasz Miksa, Tanja Sarcevic, Sotirios Tsepelakis, Laura Waltersdorfer:
Semantic-enabled architecture for auditable privacy-preserving data analysis. Semantic Web 15(3): 675-708 (2024) - [c54]Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. ARES 2024: 69:1-69:11 - [c53]Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl:
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. SECRYPT 2024: 323-333 - [c52]Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl:
Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. SECRYPT 2024: 560-567 - 2023
- [j14]Anna Breit, Laura Waltersdorfer, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Annette ten Teije, Frank van Harmelen:
Combining Machine Learning and Semantic Web: A Systematic Mapping Study. ACM Comput. Surv. 55(14s): 313:1-313:41 (2023) - [j13]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [j12]Matthias Eckhart, Andreas Ekelhart, Stefan Biffl, Arndt Lüder, Edgar R. Weippl:
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Trans. Ind. Informatics 19(4): 5870-5881 (2023) - [c51]Fajar J. Ekaputra, Majlinda Llugiqi, Marta Sabou, Andreas Ekelhart, Heiko Paulheim, Anna Breit, Artem Revenko, Laura Waltersdorfer, Kheir Eddine Farfar, Sören Auer:
Describing and Organizing Semantic Web and Machine Learning Systems in the SWeMLS-KG. ESWC 2023: 372-389 - [c50]Anna Breit, Laura Waltersdorfer, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Frank van Harmelen, Annette ten Teije:
Combining Machine Learning and Semantic Web: A Systematic Mapping Study. NeSy 2023: 424 - [p2]Laura Waltersdorfer, Anna Breit, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Annette ten Teije, Frank van Harmelen:
Semantic Web Machine Learning Systems: An Analysis of System Patterns. Compendium of Neurosymbolic Artificial Intelligence 2023: 77-99 - [i6]Fajar J. Ekaputra, Majlinda Llugiqi, Marta Sabou, Andreas Ekelhart, Heiko Paulheim, Anna Breit, Artem Revenko, Laura Waltersdorfer, Kheir Eddine Farfar, Sören Auer:
Describing and Organizing Semantic Web and Machine Learning Systems in the SWeMLS-KG. CoRR abs/2303.15113 (2023) - [i5]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - 2022
- [j11]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Gerald Quirchmayr, A Min Tjoa:
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data. Comput. Secur. 121: 102828 (2022) - [j10]Gerd Hübscher, Verena Geist, Dagmar Auer, Andreas Ekelhart, Rudolf Mayer, Stefan Nadschläger, Josef Küng:
Graph-based managing and mining of processes and data in the domain of intellectual property. Inf. Syst. 106: 101844 (2022) - [j9]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa:
VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis. Mach. Learn. Knowl. Extr. 4(2): 371-396 (2022) - [j8]Matthias Eckhart, Andreas Ekelhart, Edgar R. Weippl:
Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Trans. Dependable Secur. Comput. 19(3): 1655-1672 (2022) - [c49]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Distance-based Techniques for Personal Microbiome Identification✱. ARES 2022: 3:1-3:13 - [c48]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Efficient Bayesian Network Construction for Increased Privacy on Synthetic Data. IEEE Big Data 2022: 5721-5730 - [c47]Guillermo Alamán Requena, Rudolf Mayer, Andreas Ekelhart:
An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs. IEEE Big Data 2022: 5783-5791 - [c46]Rudolf Mayer, Andreas Ekelhart:
Macro-level Inference in Collaborative Learning. CODASPY 2022: 373-375 - [c45]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Utility and Privacy Assessment of Synthetic Microbiome Data. DBSec 2022: 15-27 - [c44]Guillermo Alamán Requena, Rudolf Mayer, Andreas Ekelhart:
Anonymisation of Heterogeneous Graphs with Multiple Edge Types. DEXA (1) 2022: 130-135 - [c43]Lorenz Wendlinger, Gerd Hübscher, Andreas Ekelhart, Michael Granitzer:
Reconciliation of Mental Concepts with Graph Neural Networks. DEXA (2) 2022: 133-146 - 2021
- [c42]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa:
Virtual Knowledge Graphs for Federated Log Analysis. ARES 2021: 18:1-18:11 - [c41]Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling:
The SLOGERT Framework for Automated Log Knowledge Graph Construction. ESWC 2021: 631-646 - [c40]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling:
An ATT&CK-KG for Linking Cybersecurity Attacks to Adversary Tactics and Techniques. ISWC (Posters/Demos/Industry) 2021 - [i4]Matthias Eckhart, Andreas Ekelhart, Roland Eisl:
Digital Twins for Cyber-Physical Threat Detection and Response. ERCIM News 2021(126): 0 (2021) - [i3]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Privacy Risks and Anonymization of Microbiome Data. ERCIM News 2021(126) (2021) - 2020
- [c39]Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
A Baseline for Attribute Disclosure Risk in Synthetic Data. CODASPY 2020: 133-143 - [c38]Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart:
Privacy-Preserving Anomaly Detection Using Synthetic Data. DBSec 2020: 195-207 - [c37]Kabul Kurniawan, Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling:
Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach. SEC 2020: 384-397 - [c36]Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling:
Automated Knowledge Graph Construction From Raw Log Data. ISWC (Demos/Industry) 2020: 204-209 - [i2]Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer:
Evaluation of Synthetic Data for Privacy-Preserving Machine Learning. ERCIM News 2020(123) (2020)
2010 – 2019
- 2019
- [j7]Matthias Eckhart, Kristof Meixner, Dietmar Winkler, Andreas Ekelhart:
Securing the testing process for industrial automation software. Comput. Secur. 85: 156-180 (2019) - [j6]Matthias Eckhart, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. J. Internet Serv. Inf. Secur. 9(3): 52-73 (2019) - [c35]Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer:
On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks. ARES 2019: 29:1-29:6 - [c34]Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer:
Utility and Privacy Assessments of Synthetic Data for Regression Tasks. IEEE BigData 2019: 5763-5772 - [c33]Claudio Di Ciccio, Fajar J. Ekaputra, Alessio Cecconi, Andreas Ekelhart, Elmar Kiesling:
Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies. CAiSE Forum 2019: 60-74 - [c32]Huma Rehman, Andreas Ekelhart, Rudolf Mayer:
Backdoor Attacks in Neural Networks - A Systematic Evaluation on Multiple Traffic Sign Datasets. CD-MAKE 2019: 285-300 - [c31]Matthias Eckhart, Andreas Ekelhart, Edgar R. Weippl:
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. ETFA 2019: 1222-1225 - [c30]Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Agnes Froschl, Fajar J. Ekaputra:
Semantic Integration and Monitoring of File System Activity. SEMANTiCS (Posters & Demos) 2019 - [c29]Matthias Eckhart, Andreas Ekelhart, Arndt Lüder, Stefan Biffl, Edgar R. Weippl:
Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019: 3004-3011 - [c28]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. IECON 2019: 3012-3017 - [c27]Bernhard Brenner, Edgar R. Weippl, Andreas Ekelhart:
A Versatile Security Layer for AutomationML. INDIN 2019: 358-364 - [c26]Elmar Kiesling, Andreas Ekelhart, Kabul Kurniawan, Fajar J. Ekaputra:
The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity. ISWC (2) 2019: 198-214 - [p1]Matthias Eckhart, Andreas Ekelhart:
Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. Security and Quality in Cyber-Physical Systems Engineering 2019: 383-412 - 2018
- [c25]Matthias Eckhart, Andreas Ekelhart:
A Specification-based State Replication Approach for Digital Twins. CPS-SPC@CCS 2018: 36-47 - [c24]Matthias Eckhart, Andreas Ekelhart:
Towards Security-Aware Virtual Environments for Digital Twins. CPSS@AsiaCCS 2018: 61-72 - [c23]Andreas Ekelhart, Elmar Kiesling, Kabul Kurniawan:
Taming the logs - Vocabularies for semantic security analysis. SEMANTiCS 2018: 109-119 - [i1]Matthias Eckhart, Andreas Ekelhart:
Securing Cyber-Physical Systems through Digital Twins. ERCIM News 2018(115) (2018) - 2015
- [j5]Andreas Ekelhart, Elmar Kiesling, Bernhard Grill, Christine Strauss, Christian Stummer:
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach. Inf. Technol. Manag. 16(3): 221-233 (2015) - 2014
- [c22]Elmar Kiesling, Andreas Ekelhart, Bernhard Grill, Christian Stummer, Christine Strauss:
Evolving Secure Information Systems through Attack Simulation. HICSS 2014: 4868-4877 - [c21]Andreas Ekelhart, Bernhard Grill, Elmar Kiesling, Christine Strauß, Christian Stummer:
Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement. Sicherheit 2014: 345-361 - 2013
- [c20]Elmar Kiesling, Christine Strauss, Andreas Ekelhart, Bernhard Grill, Christian Stummer:
Simulation-based optimization of information security controls: An adversary-centric approach. WSC 2013: 2054-2065 - 2011
- [j4]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Commun. Assoc. Inf. Syst. 28: 22 (2011) - [j3]Stefan Fenz, Andreas Ekelhart:
Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Secur. Priv. 9(2): 58-65 (2011)
2000 – 2009
- 2009
- [c19]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Business Process-Based Resource Importance Determination. BPM 2009: 113-127 - [c18]Stefan Fenz, Andreas Ekelhart:
Formalizing information security knowledge. AsiaCCS 2009: 183-194 - [c17]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10 - [c16]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
Ontology-Based Decision Support for Information Security Risk Management. ICONS 2009: 80-85 - [c15]Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. ITNG 2009: 393-398 - [c14]Thomas Neubauer, Andreas Ekelhart:
An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858 - 2008
- [j2]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl:
XML security - A comparative literature review. J. Syst. Softw. 81(10): 1715-1724 (2008) - [c13]Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl:
Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582 - [c12]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück:
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. HICSS 2008: 377 - [c11]Thomas Neubauer, Andreas Ekelhart, Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492 - 2007
- [j1]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl:
Architectural approach for handling semi-structured data in a user-centred working environment. Int. J. Web Inf. Syst. 3(3): 198-211 (2007) - [c10]Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. ARES 2007: 730-740 - [c9]Andreas Ekelhart, Stefan Fenz, A Min Tjoa, Edgar R. Weippl:
Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13 - [c8]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156 - [c7]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c6]Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A Min Tjoa, Edgar R. Weippl, Dominik Zyskowski:
Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31 - [c5]Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388 - [c4]Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 - 2006
- [c3]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259 - [c2]Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A Min Tjoa:
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151 - [c1]Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A Min Tjoa, Edgar R. Weippl:
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint