Author Archives: Stefan
Today, Stefan gave a keynote on “Energy-efficient buildings for a greener future” at the ICSSE 2012 conference in Yogyakarta. Download the slides here.
Today I attended my first ENISA PSG meeting. Learn more about the ENISA PSG from the ENISA News Feed: The Permanent Stakeholders’ Group (PSG) consisting of 30 top IT-security experts, has been appointed following an open Call for Expression of … Continue reading
On August 23, 2012 we conducted the first international workshop on security ontologies and taxonomies at the ARES 2012 conference in Prague. In two sessions the latest security ontology research results were presented and the following overall challenges were identified … Continue reading
The First International Workshop on Security Ontologies and Taxonomies (co-located with the International Conference on Availability, Reliability and Security) will bring together researchers and practitioners in the area of security ontologies and taxonomies. SecOnT aims at establishing a highly specialized … Continue reading
Together with Michael Schöner we evaluated 14 Java PDF libraries regarding their Android compatibility. 3 of 14 evaluated libraries were compatible with Android and allowed us to create PDFs on the Android platform.
This paper is joint work with Dimitrios Settas and Antonio Cerone from United Nations University (Macau). It will be presented at the 9th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2011) in Baltimore, Maryland, USA. You … Continue reading
This paper is joint work with Raydel Montesino from University of Informatics Sciences (Cuba). It will be presented at the Sixth International Conference on Availability, Reliability and Security (ARES) in Vienna, Austria. You can download the full paper from the … Continue reading
This article is joint work with Simon Parkin and Aad van Moorsel from Newcastle University (UK). It will appear in May 2011 in IEEE IT Professional. Abstract: Corporate IT security managers have a difficult time staying on top of the … Continue reading
The article has been accepted for publication in the Communications of the Association for Information Systems (CAIS). Click here to download the article from the CAIS website. Abstract: As companies are increasingly exposed to information security threats, decision makers are … Continue reading
We kindly ask you to participate in our information security knowledge management survey. The survey is conducted by publicly-funded research institutions SBA Research (AT), Newcastle University (UK), and Vienna University of Technology (AT). We conduct the survey to explore potential … Continue reading