Journal Articles
Fenz, S., Giannakis, G., Bergmayr, J., & Iousef, S. (2023). RenoDSS - a BIM-based building renovation decision support system. Energy and Buildings, Article 112999. https://doi.org/10.1016/j.enbuild.2023.112999 ( reposiTUm)
Fenz, S., Neubauer, T., Heurix, J., Friedel, J. K., & Wohlmuth, M.-L. (2023). AI- and data-driven pre-crop values and crop rotation matrices. European Journal of Agronomy, 150, Article 126949. https://doi.org/10.1016/j.eja.2023.126949 ( reposiTUm)
Fenz, S., Neubauer, T., Friedel, J. K., & Wohlmuth, M.-L. (2023). AI- and data-driven crop rotation planning. Computers and Electronics in Agriculture, 212, Article 108160. https://doi.org/10.1016/j.compag.2023.108160 ( reposiTUm)
Fenz, S., & Neubauer, T. (2018). Ontology-based information security compliance determination and control selection on the example of ISO 27002. Information and Computer Security, 26(5), 551–567. https://doi.org/10.1108/ICS-02-2018-0020 ( reposiTUm)
Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2017). Stakeholder-oriented energy planning support in cities. Sustainable Cities and Society, 28, 482–492. https://doi.org/10.1016/j.scs.2016.08.006 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103 ( reposiTUm)
Fenz, S., Plieschnegger, S., & Hobel, H. (2016). Mapping Information Security Standard ISO 27002 to an Ontological Structure. Information and Computer Security, 24(5), 452–473. https://doi.org/10.1108/ics-07-2015-0030 ( reposiTUm)
Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Ghiassi, N., Pont, U., & Mahdavi, A. (2016). SEMERGY.net - automatically identifying and optimizing energy-efficient building designs. Computer Science - Research and Development, 31(3), 135–140. https://doi.org/10.1007/s00450-014-0285-5 ( reposiTUm)
Heurix, J., Fenz, S., Rella, A., & Neubauer, T. (2016). Recognition and pseudonymisation of medical records for secondary use. Medical and Biological Engineering and Computing, 54(2–3), 371–383. https://doi.org/10.1007/s11517-015-1322-7 ( reposiTUm)
Pont, U., Ghiassi, N., Fenz, S., Heurix, J., & Mahdavi, A. (2015). SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization. Journal of Information Technology in Construction, 20(Special), 107–120. http://hdl.handle.net/20.500.12708/150525 ( reposiTUm)
Mahdavi, A., Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2015). Performance-based building design and retrofit optimization: The SEMERY approach. Dosya (Dossier) - Bi-Monthly Magazine of the Chamber of Architects / Turkey, DIGITAL OPPORTUNITIES IN ARCHITECTURE(35), 49–57. http://hdl.handle.net/20.500.12708/150569 ( reposiTUm)
Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2015). Stakeholder-oriented energy planning support in cities. Energy Procedia, 78, 1841–1846. https://doi.org/10.1016/j.egypro.2015.11.327 ( reposiTUm)
Heurix, J., Zimmermann, P., Neubauer, T., & Fenz, S. (2015). A taxonomy for privacy enhancing technologies. Computers and Security, 53, 1–17. https://doi.org/10.1016/j.cose.2015.05.002 ( reposiTUm)
Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2014). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. Advanced Materials Research, 899, 589–595. https://doi.org/10.4028/www.scientific.net/amr.899.589 ( reposiTUm)
Fenz, S., Heurix, J., Neubauer, T., & Pechstein, F. (2014). Current challenges in information security risk management. Information Management & Computer Security, 22(5), 410–430. https://doi.org/10.1108/imcs-07-2013-0053 ( reposiTUm)
Fenz, S., Heurix, J., Neubauer, T., & Rella, A. (2014). De-identification of unstructured paper-based health records for privacy-preserving secondary use. Journal of Medical Engineering & Technology, 38(5), 260–268. https://doi.org/10.3109/03091902.2014.913080 ( reposiTUm)
Feledi, D., Fenz, S., & Lechner, L. (2013). Towards web-based information security knowledge sharing. Journal of Information Security and Applications, 17(4), 199–209. https://doi.org/10.1016/j.istr.2013.03.004 ( reposiTUm)
Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2013). A Rule-Based Transformation System for Converting Semi-Structured Medical Documents. Health and Technology, 3(1), 51–63. https://doi.org/10.1007/s12553-013-0040-0 ( reposiTUm)
Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM-based framework for security controls automation. Information Management & Computer Security, 20(4), 248–263. https://doi.org/10.1108/09685221211267639 ( reposiTUm)
Fenz, S. (2012). Increasing Knowledge Capturing Efficiency by Enterprise Portals. VINE, 42(2), 237–250. https://doi.org/10.1108/03055721211227264 ( reposiTUm)
Fenz, S. (2012). An ontology-based approach for constructing Bayesian networks. Data & Knowledge Engineering, 73, 73–88. https://doi.org/10.1016/j.datak.2011.12.001 ( reposiTUm)
Settas, D., Cerone, A., & Fenz, S. (2012). Enhancing Ontology-based Antipattern Detection using Bayesian Networks. Expert Systems with Applications, 39(10), 9041–9053. https://doi.org/10.1016/j.eswa.2012.02.049 ( reposiTUm)
Fenz, S., Ekelhart, A., & Neubauer, T. (2011). Information Security Risk Management: In which security solutions is it worth investing? Communications of the Association for Information Systems, 28(1), 329–356. http://hdl.handle.net/20.500.12708/161667 ( reposiTUm)
Fenz, S., & Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security and Privacy, 9(2), 58–65. https://doi.org/10.1109/msp.2010.117 ( reposiTUm)
Fenz, S., Parkin, S., & Moorsel, A. van. (2011). A Community Knowledge Base for IT Security. IT Professional, 13(3), 24–30. https://doi.org/10.1109/mitp.2011.35 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637 ( reposiTUm)
Conference Proceedings Contributions
Fenz, S., Bergmayr, J., & Giannakis, G. (2023). IFC-based building renovation scenario generator. In Proceedings of the 2023 European Conference on Computing in Construction and the 40th International CIB W78 Conference. 2023 European Conference on Computing in Construction and the 40th International CIB W78 Conference, Heraklion, Greece. https://doi.org/10.35490/EC3.2023.170 ( reposiTUm)
Fenz, S., Bergmayr, J., Plattner, N., Chávez-Feria, S., Poveda-Villalón, M., & Giannakis, G. (2021). Integration of building material databases for IFC-based building performance analysis. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0027 ( reposiTUm)
Valero, E., Mohanty, D. D., Ceklarz, M., Tao, B., Bosche, F., Giannakis, G. I., Fenz, S., Katsigarakis, K., N. Lilis, G., Rovas, D., & Papanikolaou, A. (2021). An Integrated Scan-to-BIM Approach for Buildings Energy Performance Evaluation and Retrofitting. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0030 ( reposiTUm)
Fenz, S. (2020). Supporting Complex Decision Making by Semantic Technologies. In The Semantic Web (pp. 632–647). Springer. https://doi.org/10.1007/978-3-030-49461-2_37 ( reposiTUm)
Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2016). Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV. In Progress in IS. Springer. https://doi.org/10.1007/978-3-319-23455-7 ( reposiTUm)
Jung, O., Fenz, S., Kammerstetter, M., & Hudic, A. (2016). Eine Architektur für sichere Smart Grids in Österreich. In D-A-CH Security 2016 (pp. 1–9). Forschungsgruppe Systemsicherheit. http://hdl.handle.net/20.500.12708/56735 ( reposiTUm)
Pont, U., Mahdavi, A., Fenz, S., Heurix, J., & Ghiassi, N. (2016). SEMERGY - Ein Ausflug in die Möglichkeiten semantischer Webtechnologien für die Gebäudesanierung und -Optimierung. In Forschungstag 2016 (pp. 66–67). Fakultät für Architektur und Raumplanung, TU Wien. http://hdl.handle.net/20.500.12708/64566 ( reposiTUm)
Fenz, S., Heurix, J., & Neubauer, T. (2015). How to increase the inventory efficiency in information security risk and compliance management. In J. Becker, J. vom Brocke, & M. de Marco (Eds.), Proceedings of the European Conference on Information Systems (ECIS) 2015 (pp. 1–12). AIS. https://doi.org/10.18151/7217311 ( reposiTUm)
Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., Hammerberg, K., Neubauer, T., Taheri, M., Sustr, C., Tjoa, A. M., & Mahdavi, A. (2015). Semergy - neue Ansätze in der Planung energieeffizienter Gebäude. In ZIG - HS Luzern (Ed.), 11. ZIG-Planerseminar - Handouts (p. ’?). http://hdl.handle.net/20.500.12708/64374 ( reposiTUm)
Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2014). Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV. In Proceedings of the 28th EnviroInfo 2014 Conference (pp. 77–84). BIS-Verlag. http://hdl.handle.net/20.500.12708/55207 ( reposiTUm)
Hobel, H., Madlberger, L., Thöni, A., & Fenz, S. (2014). Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels. In Workshop on Social Media and Linked Data for Emergency Response (SMILE2014) 11th Extended Semantic Web Conference (ESWC2014) (pp. 1–12). Online Proceedings for Scientific Workshops. http://hdl.handle.net/20.500.12708/43397 ( reposiTUm)
Cervantes, G. V., & Fenz, S. (2014). How to Assess Confidentiality Requirements of Corporate Assets? In ICT Systems Security and Privacy Protection (pp. 234–241). IFIP Press. https://doi.org/10.1007/978-3-642-55415-5_19 ( reposiTUm)
Halper, M., Fenz, S., Göllner, J., & Quirchmayr, G. (2014). Evaluation criteria for cloud computing based on the upcoming European data protection regulation. In 2014 Civilisation at the Crossroads Response and Responsibility of the Systems Sciences (pp. 599–603). EMCSR. http://hdl.handle.net/20.500.12708/55989 ( reposiTUm)
Tjoa, A. M., Anjomshoaa, A., & Fenz, S. (2014). Robustness against data availability problems in urban energy planning support software. In M. Collard, R. Deneckere, & M. Bajec (Eds.), 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS). IEEE. https://doi.org/10.1109/rcis.2014.6861089 ( reposiTUm)
Pont, U., Ghiassi, N., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., & Anjomshoaa, A. (2014). SEMERGY: Utilizing semantic web technologies for performance-guided building design optimization. In A. Mahdavi & B. Martens (Eds.), ECPPM 2014. Eigenauflage mit wissenschaftlichem Lektorat. http://hdl.handle.net/20.500.12708/64289 ( reposiTUm)
Ghiassi, N., Pont, U., Mahdavi, A., Heurix, J., & Fenz, S. (2014). Efficient building design model generation and evaluation: The SEMERGY Approach. In tba (Ed.), Proceedings of the 30th International PLEA Conference - Sustainable Habitat for developing Societies - Choosing the way forward (p. 8). http://hdl.handle.net/20.500.12708/64314 ( reposiTUm)
Fenz, S., Neubauer, T., Accorsi, R., & Koslowski, T. (2013). FORISK: Formalizing information security risk and compliance management. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, EU. https://doi.org/10.1109/dsnw.2013.6615533 ( reposiTUm)
Ouhajjou, N., Palensky, P., Stifter, M., Page, J., Fenz, S., & Tjoa, A. M. (2013). A modular methodology for the development of urban energy planning support software. In IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society. https://doi.org/10.1109/iecon.2013.6700392 ( reposiTUm)
Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Heurix, J., Fenz, S., Anjomshoaa, A., & Tjoa, A. M. (2013). A comprehensive building model for performance-guided decision support. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 35–42). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64163 ( reposiTUm)
Pont, U., Shayeganfar, F., Ghiassi, N., Taheri, M., Sustr, C., Mahdavi, A., Heurix, J., Fenz, S., Neubauer, T., Tjoa, A. M., & Anjomshoaa, A. (2013). Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 19–26). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64161 ( reposiTUm)
Heurix, J., Fenz, S., Anjomshoaa, A., Neubauer, T., Tjoa, A. M., Taheri, M., Shayeganfar, F., Pont, U., Ghiassi, N., Sustr, C., & Mahdavi, A. (2013). Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 27–34). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64162 ( reposiTUm)
Shayeganfar, F., Anjomshoaa, A., Heurix, J., Sustr, C., Ghiassi, N., Pont, U., Fenz, S., Neubauer, T., Tjoa, A. M., & Mahdavi, A. (2013). An ontology-aided Optimization Approach to Eco-Efficient Building Design. In IBPSA (Ed.), Building Simulation 2013 - 13th International Conference of the International Building Performance Simulation Association. (pp. 2193–2199). IBPSA. http://hdl.handle.net/20.500.12708/64187 ( reposiTUm)
Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2013). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. In J. Hraska (Ed.), enviBUILD 2013 - Buildings and Environment (p. 6). STU - Nakladateľstvo STU, Bratislava 2013. http://hdl.handle.net/20.500.12708/64207 ( reposiTUm)
Kronabeter, A., & Fenz, S. (2012). Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation. In Proceedings of the 2012 CloudComp Conference (pp. 1–10). http://hdl.handle.net/20.500.12708/54643 ( reposiTUm)
Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., Neubauer, T., & Tjoa, A. M. (2012). Improving the usability of energy simulation applications in processing common building performance inquiries. In O. Sikula & J. Hirs (Eds.), Simulace Budov a Techniky Prostredi (p. 6). Ceska Technika - nakladatelstvi CVUT. http://hdl.handle.net/20.500.12708/64058 ( reposiTUm)
Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). SEMERGY: Semantic web technology support for comprehensive building design assessment. In G. Gudnason & R. Scherer (Eds.), eWork and eBusiness in Architecture, Engineering and Construction (pp. 363–370). Taylor & Francis. http://hdl.handle.net/20.500.12708/64030 ( reposiTUm)
Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. In Business Information Systems (pp. 153–164). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30359-3_14 ( reposiTUm)
Song, X., Huang, L., & Fenz, S. (2012). Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions. In Internet of Things (pp. 565–571). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32427-7_81 ( reposiTUm)
Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2012). Automated Transformation of Semi-Structured Text Elements. In AMCIS 2012 Proceedings (pp. 1–11). http://hdl.handle.net/20.500.12708/54223 ( reposiTUm)
Feledi, D., & Fenz, S. (2012). Challenges of Web-Based Information Security Knowledge Sharing. In 2012 Seventh International Conference on Availability, Reliability and Security. Seventh International Conference on Availability, Reliability, and Security (ARES 2012), Prague, EU. IEEE. https://doi.org/10.1109/ares.2012.59 ( reposiTUm)
Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Privacy Preservation of Paper-based Health Records. In Quality of Life through Quality of Information - Proceedings of MIE2012 (pp. 751–755). http://hdl.handle.net/20.500.12708/54227 ( reposiTUm)
Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). Exploring the utility of semantic web technology in building performance simulation. In C. Nytsch-Geusen (Ed.), BauSIM 2012 - “Gebäudesimulation auf den Größenskalen Bauteil, Raum, Gebäude, Stadtquartier” (p. 7). Eigenverlag / wissenschaftliches Kommittee der IBPSA Germany-Austria. http://hdl.handle.net/20.500.12708/64042 ( reposiTUm)
Fenz, S. (2011). An ontology- and Bayesian-based approach for determining threat probabilities. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’11. ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2011), Hongkong, Non-EU. ACM. https://doi.org/10.1145/1966913.1966958 ( reposiTUm)
Montesino, R., & Fenz, S. (2011). Automation Possibilities in Information Security Management. In 2011 European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. https://doi.org/10.1109/eisic.2011.39 ( reposiTUm)
Montesino, R., & Fenz, S. (2011). Information Security Automation: How Far Can We Go? In 2011 Sixth International Conference on Availability, Reliability and Security. Sixth International Conference on Availability, Reliability, and Security (ARES 2011), Vienna, Austria. IEEE. https://doi.org/10.1109/ares.2011.48 ( reposiTUm)
Settas, D., Cerone, A., & Fenz, S. (2011). Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models. In 2011 Ninth International Conference on Software Engineering Research, Management and Applications. 9th International Conference on Software Engineering Research, Management and Applications (SERA 2011), Baltimore, Maryland USA, Non-EU. https://doi.org/10.1109/sera.2011.15 ( reposiTUm)
Fenz, S. (2010). Ontology-based generation of IT-security metrics. In Proceedings of the 2010 ACM Symposium on Applied Computing - SAC ’10. 25th ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, Non-EU. ACM. https://doi.org/10.1145/1774088.1774478 ( reposiTUm)
Fenz, S. (2010). From the Resource to the Business Process Risk Level. In Proceedings of the South African Information Security Multi-Conference (SAISMC’2010) (pp. 100–109). http://hdl.handle.net/20.500.12708/53131 ( reposiTUm)
Neubauer, T., Ekelhart, A., & Fenz, S. (2009). AURUM: A Framework for Information Security Risk Management. In Proceedings of the 42th Hawaii International Conference on System Sciences (HICSS’09) (pp. 1–10). http://hdl.handle.net/20.500.12708/52370 ( reposiTUm)
Fenz, S., & Neubauer, T. (2009). How to determine threat probabilities using ontologies and Bayesian networks. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW ’09. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, Non-EU. ACM New York. https://doi.org/10.1145/1558607.1558686 ( reposiTUm)
Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Business Process-Based Resource Importance Determination. In Business Process Management (pp. 113–127). Springer. https://doi.org/10.1007/978-3-642-03848-8_9 ( reposiTUm)
Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Ontologiebasiertes IT Risikomanagement. In D.A.CH Security 2009 (pp. 14–24). Heise Zeitschriften Verlag GmbH & Co. KG. http://hdl.handle.net/20.500.12708/53162 ( reposiTUm)
Fenz, S., Tjoa, A. M., & Hudec, M. (2009). Ontology-based generation of Bayesian networks. In Proceedings of the Third International Conference on Complex, Intelligent and Software Intensive Systems - International Workshop on Ontology Alignment and Visualization - OnAV’09 (pp. 712–717). http://hdl.handle.net/20.500.12708/52599 ( reposiTUm)
Fenz, S., & Ekelhart, A. (2009). Formalizing information security knowledge. In Proceedings of the 2009 ACM symposium on Information, computer and communications security (pp. 183–194). http://hdl.handle.net/20.500.12708/52594 ( reposiTUm)
Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Ontology-based Decision Support for Information Security Risk Management. In Proceedings of the 4th International Conference on Systems (pp. 80–85). http://hdl.handle.net/20.500.12708/52623 ( reposiTUm)
Fenz, S., Pruckner, T., & Manutscheri, A. (2009). Ontological Mapping of Information Security Best-Practice Guidelines. In Proceedings of the 12th International Conference on Business Information Systems (pp. 49–60). http://hdl.handle.net/20.500.12708/52659 ( reposiTUm)
Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Automated Risk and Utility Management. In Proceedings of the Sixth International Conference on Information Technology: New Generations (pp. 393–398). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52658 ( reposiTUm)
Neubauer, T., Riedl, B., Fenz, S., & Grascher, V. (2008). Pseudonymization for improving the Privacy in E-Health Applications. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.366 ( reposiTUm)
Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive Selection of ISO 27001 Controls under Multiple Objectives. In Proceedings of The Ifip Tc 11 23rd International Information Security Conference (pp. 477–492). Springer-Verlag GmbH. https://doi.org/10.1007/978-0-387-09699-5_31 ( reposiTUm)
Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160 ( reposiTUm)
Fenz, S., & Tjoa, A. M. (2008). Ontology- and Bayesian-based Threat Probability Determination. In Proceedings of the Junior Scientist Conference 2008 (pp. 69–70). http://hdl.handle.net/20.500.12708/52597 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69 ( reposiTUm)
Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., & Mück, T. (2008). Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.211 ( reposiTUm)
Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 ( reposiTUm)
Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916 ( reposiTUm)
Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804 ( reposiTUm)
Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1 ( reposiTUm)
Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164 ( reposiTUm)
Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., Riedl, B., & Tjoa, S. (2007). CASSIS - Computer-based Academy for Security and Safety in Information Systems. In Proceedings of the 2nd Conference on Availability, Reliability and Security, ARES2007 (pp. 730–740). http://hdl.handle.net/20.500.12708/53163 ( reposiTUm)
Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 ( reposiTUm)
Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421 ( reposiTUm)
Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626 ( reposiTUm)
Book Contributions
Paryudi, I., & Fenz, S. (2015). Application of Semantic Web technology in an energy simulation tool. In Information Management in Practice (pp. 53–62). University of Gdańsk. http://hdl.handle.net/20.500.12708/28852 ( reposiTUm)
Beckers, K., Côté, I., Fenz, S., Hatebur, D., & Heisel, M. (2014). A Structured Comparison of Security Standards. In Engineering Secure Future Internet Services and Systems (pp. 1–34). Springer. https://doi.org/10.1007/978-3-319-07452-8_1 ( reposiTUm)
Fenz, S. (2011). E-Business and Information Security Risk Management. In E. Kajan (Ed.), Electronic Business Interoperability (pp. 596–614). IGI Global. https://doi.org/10.4018/978-1-60960-485-1.ch024 ( reposiTUm)
Books
Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Quirchmayr, G., Schatten, A., Neuhold, E., Göllner, J., Meurers, C., & Hitz, W. (Eds.). (2014). Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe. Republik Österreich. Bundesministerium für Landesverteidigung und Sport. http://hdl.handle.net/20.500.12708/176079 ( reposiTUm)
Presentations
Fenz, S. (2012). Energy efficient buildings for a greener future - computer science meets building physics. International Conference on Computer Science, Electronics, and Instrumentation (ICCSE2012), Yogyakarta, Non-EU. http://hdl.handle.net/20.500.12708/85398 ( reposiTUm)
Reports
Pont, U., Waldmayer, F., Priebernig, H., Fenz, S., & Mahdavi, A. (2017). BUDANAUB - Building Damages and Diagsnistcs - A novel approach using BIM (Einreichung). http://hdl.handle.net/20.500.12708/39181 ( reposiTUm)
Pont, U., Waldmayer, F., Wurzer, G., Fenz, S., Swoboda, S., Jonas, A., Priebernig, H., & Mahdavi, A. (2016). Forschungsproposal COGENT - A Construction Generation & Evaluation Tool (No. 1). http://hdl.handle.net/20.500.12708/38927 ( reposiTUm)
Mahdavi, A., Ghiassi, N., Vuckovic, M., Taheri, M., Tahmasebi, F., Fenz, S., Kiesel, K., Glawischnig, S., & Pont, U. (2016). Forschungsproposal EMULATE - Energy Modeling for Urban Level Assessment Tools and Environments / Research Studios Austria, 5. Ausschreibung (No. 1). http://hdl.handle.net/20.500.12708/38926 ( reposiTUm)
Fenz, S., Heurix, J., Neubauer, T., Anjomshoaa, A., Shayeganfar, F., Ghiassi, N., Taheri, M., Hammerberg, K., Wolosiuk, D., Sustr, C., Pont, U., Mahdavi, A., & Tjoa, A. M. (2014). SEMERGY - Identifying optimal building refurbishment strategies. http://hdl.handle.net/20.500.12708/38047 ( reposiTUm)
Theses
Fenz, S. (2008). Ontology- and Bayesian-based information security risk management [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179784 ( reposiTUm)
Fenz, S. (2006). Security ontologies : improving quantitative risk analysis [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184418 ( reposiTUm)
Fenz, S. (2005). The Blackman Project : gathering and storing semi-structured data for the “Semantik Desktop” [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/182917 ( reposiTUm)