Author Archives: Stefan

ICSSE 2012 Keynote

Today, Stefan gave a keynote on “Energy-efficient buildings for a greener future” at the ICSSE 2012 conference in Yogyakarta‎. Download the slides here.

Posted in Uncategorized | Comments Off on ICSSE 2012 Keynote

Joining ENISA’s Permanent Stakeholder Group

Today I attended my first ENISA PSG meeting. Learn more about the ENISA PSG from the ENISA News Feed: The Permanent Stakeholders’ Group (PSG) consisting of 30 top IT-security experts, has been appointed following an open Call for Expression of … Continue reading

Posted in Uncategorized | Comments Off on Joining ENISA’s Permanent Stakeholder Group

Security Ontology Engineering Challenges

On August 23, 2012 we conducted the first international workshop on security ontologies and taxonomies at the ARES 2012 conference in Prague. In two sessions the latest security ontology research results were presented and the following overall challenges were identified … Continue reading

Posted in Information Security Risk Management, Security Ontology | Comments Off on Security Ontology Engineering Challenges

The First International Workshop on Security Ontologies and Taxonomies (SecOnT 2012)

The First International Workshop on Security Ontologies and Taxonomies (co-located with the International Conference on Availability, Reliability and Security) will bring together researchers and practitioners in the area of security ontologies and taxonomies. SecOnT aims at establishing a highly specialized … Continue reading

Posted in Security Ontology | Comments Off on The First International Workshop on Security Ontologies and Taxonomies (SecOnT 2012)

Creating PDFs on Android – an evaluation

Together with Michael Schöner we evaluated 14 Java PDF libraries regarding their Android compatibility. 3 of 14 evaluated libraries were compatible with Android and allowed us to create PDFs on the Android platform.

Posted in Android | Comments Off on Creating PDFs on Android – an evaluation

Generation of Bayesian Networks using the Antipatten Ontology

This paper is joint work with Dimitrios Settas and Antonio Cerone from United Nations University (Macau). It will be presented at the 9th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2011) in Baltimore, Maryland, USA. You … Continue reading

Posted in Bayesian Networks | Comments Off on Generation of Bayesian Networks using the Antipatten Ontology

Information security automation: how far can we go?

This paper is joint work with Raydel Montesino from University of Informatics Sciences (Cuba). It will be presented at the Sixth International Conference on Availability, Reliability and Security (ARES) in Vienna, Austria. You can download the full paper from the … Continue reading

Posted in Information Security Risk Management | Comments Off on Information security automation: how far can we go?

A Community Knowledge Base for IT Security

This article is joint work with Simon Parkin and Aad van Moorsel from Newcastle University (UK). It will appear in May 2011 in IEEE IT Professional. Abstract: Corporate IT security managers have a difficult time staying on top of the … Continue reading

Posted in Information Security Risk Management, Security Ontology | Comments Off on A Community Knowledge Base for IT Security

Information Security Risk Management: In which security solutions is it worth investing?

The article has been accepted for publication in the Communications of the Association for Information Systems (CAIS). Click here to download the article from the CAIS website. Abstract: As companies are increasingly exposed to information security threats, decision makers are … Continue reading

Posted in Information Security Risk Management, Security Ontology | Comments Off on Information Security Risk Management: In which security solutions is it worth investing?

Information Security Knowledge Management Survey

We kindly ask you to participate in our information security knowledge management survey. The survey is conducted by publicly-funded research institutions SBA Research (AT), Newcastle University (UK), and Vienna University of Technology (AT). We conduct the survey to explore potential … Continue reading

Posted in Information Security Risk Management, Security Ontology | Comments Off on Information Security Knowledge Management Survey