TU Wien Informatics

Role

Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.

  • Die OCG Initiative Bildung 4.0 / Futschek, G., & Klemen, M. (2017). Die OCG Initiative Bildung 4.0. Digitale Bildung und 20 Jahre ECDL, Wien, Austria. http://hdl.handle.net/20.500.12708/86537
  • Improving Storage Concepts for Semantic Models and Ontologies / Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370
  • Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
  • Security Ontologies: Improving Quantitative Risk Analysis / Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 / Project: SecOnt
  • Business Requirements of Backup Systems / Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394
  • Social Engineering / Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393
  • Secure Business Process Management: A Roadmap / Neubauer, T., Klemen, M., & Biffl, S. (2006). Secure Business Process Management: A Roadmap. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 457–464). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51390
  • Security Ontology: Simulating Threats to Corporate Assets / Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 / Project: SecOnt
  • Implementing IT Security for Small and Medium-Sized Enterprises / Weippl, E., & Klemen, M. (2006). Implementing IT Security for Small and Medium-Sized Enterprises. In Enterprise Information Systems Assurance and System Managerial and Technical Issues. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25386
  • Business process-based valuation of IT-Security / Neubauer, T., Klemen, M., & Biffl, S. (2005). Business process-based valuation of IT-Security. In Proceedings of the 7th International Workshop on Economics-Driven Software Engineering Research EDSER ’05, Volume 30 Issue 4 (pp. 1–5). ACM Press. http://hdl.handle.net/20.500.12708/51240
  • The semantic desktop: A semantic personal information management system based on rdf and topic maps / Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216
  • Semantic storage: A report on performance and flexibility / Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213
  • Content-basierte Zugriffsrechte in E-Learning Systemen / Weippl, E., & Klemen, M. (2004). Content-basierte Zugriffsrechte in E-Learning Systemen. ÖGAI Journal, 23(4), 24–29. http://hdl.handle.net/20.500.12708/174838