Stefan Fenz
Senior Scientist Dipl.-Ing. Mag.rer.soc.oec. Dr.techn.
Research Focus
- Information Systems Engineering: 50%
- Logic and Computation: 50%
Role
-
Senior Scientist
Data Science, E194-04
Courses
2022W
- Bachelor Thesis / 188.919 / PR
- Introduction to Semantic Systems / 188.399 / VU
- Management of Software Projects / 188.407 / VU
2023S
- Bachelor Thesis / 188.919 / PR
Projects
-
Innov:ATE Austria's Digital Innovation Hub for Agriculture, Timber and Energy
2021 – 2024 / Digital Innovation Hub INNOVATE -
ICT for Decision Making in Farming
2017 – 2021 / Austrian Research Promotion Agency (FFG) -
Identifikation und Managment von Reputationsrisiken und -chancen
2016 – 2018 / Austrian Research Promotion Agency (FFG) -
Formalizing Information Security Risk and Compliance Management
2013 – 2016 / Vienna Science and Technology Fund (WWTF) -
Cloud Security: Guidelines for public authorities and SMEs
2012 – 2014 / FFG - Österr. Forschungsförderungs- gesellschaft mbH -
Semantic Technologies for Energy-efficient Building Planning
2011 – 2015 / Austrian Research Promotion Agency (FFG) -
Information Warfare on the Internet: Data Security Monitoring in Austria
2011 – 2013 / FFG - Österr. Forschungsförderungsgesellschaft mbH -
Recognition and Pseudonymization of Personal Data in Paper-based Heatlth Records
2010 – 2014 / Austrian Research Promotion Agency (FFG) -
Security Ontologies
2008 – 2010 / Austrian Research Promotion Agency (FFG) / Publications: 169674, 177734, 184967, 30109, 55080, 55082, 55224, 55463, 55505, 55578, 55780, 55823, 56033, 56034, 56257, 56258, 56260, 56262, 56286, 56288, 56323, 56324, 56795, 56796, 56797, 56798, 56829, 57031 -
DynamOnt Methodology for Dynamic Ontology Creation
2005 – 2007 / Austrian Research Promotion Agency (FFG) / Publication: 55354
Publications
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.
2023
- RenoDSS - a BIM-based building renovation decision support system / Fenz, S., Giannakis, G., Bergmayr, J., & Iousef, S. (2023). RenoDSS - a BIM-based building renovation decision support system. Energy and Buildings, Article 112999. https://doi.org/10.1016/j.enbuild.2023.112999
2021
- Integration of building material databases for IFC-based building performance analysis / Fenz, S., Bergmayr, J., Plattner, N., Chávez-Feria, S., Poveda-Villalón, M., & Giannakis, G. (2021). Integration of building material databases for IFC-based building performance analysis. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0027
- An Integrated Scan-to-BIM Approach for Buildings Energy Performance Evaluation and Retrofitting / Valero, E., Mohanty, D. D., Ceklarz, M., Tao, B., Bosche, F., Giannakis, G. I., Fenz, S., Katsigarakis, K., N. Lilis, G., Rovas, D., & Papanikolaou, A. (2021). An Integrated Scan-to-BIM Approach for Buildings Energy Performance Evaluation and Retrofitting. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0030
2020
- Supporting Complex Decision Making by Semantic Technologies / Fenz, S. (2020). Supporting Complex Decision Making by Semantic Technologies. In The Semantic Web (pp. 632–647). Springer. https://doi.org/10.1007/978-3-030-49461-2_37
2018
- Ontology-based information security compliance determination and control selection on the example of ISO 27002 / Fenz, S., & Neubauer, T. (2018). Ontology-based information security compliance determination and control selection on the example of ISO 27002. Information and Computer Security, 26(5), 551–567. https://doi.org/10.1108/ICS-02-2018-0020
2017
- Stakeholder-oriented energy planning support in cities / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2017). Stakeholder-oriented energy planning support in cities. Sustainable Cities and Society, 28, 482–492. https://doi.org/10.1016/j.scs.2016.08.006
- A Risk Management Framework for Cloud Migration Decision Support / Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010
- BUDANAUB - Building Damages and Diagsnistcs - A novel approach using BIM / Pont, U., Waldmayer, F., Priebernig, H., Fenz, S., & Mahdavi, A. (2017). BUDANAUB - Building Damages and Diagsnistcs - A novel approach using BIM (Einreichung). http://hdl.handle.net/20.500.12708/39181
2016
- Recognition and pseudonymisation of medical records for secondary use / Heurix, J., Fenz, S., Rella, A., & Neubauer, T. (2016). Recognition and pseudonymisation of medical records for secondary use. Medical and Biological Engineering and Computing, 54(2–3), 371–383. https://doi.org/10.1007/s11517-015-1322-7
- Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2016). Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV. In Progress in IS. Springer. https://doi.org/10.1007/978-3-319-23455-7
- SEMERGY.net - automatically identifying and optimizing energy-efficient building designs / Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Ghiassi, N., Pont, U., & Mahdavi, A. (2016). SEMERGY.net - automatically identifying and optimizing energy-efficient building designs. Computer Science - Research and Development, 31(3), 135–140. https://doi.org/10.1007/s00450-014-0285-5
- Mapping Information Security Standard ISO 27002 to an Ontological Structure / Fenz, S., Plieschnegger, S., & Hobel, H. (2016). Mapping Information Security Standard ISO 27002 to an Ontological Structure. Information and Computer Security, 24(5), 452–473. https://doi.org/10.1108/ics-07-2015-0030
- Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners / Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103
- SEMERGY - Ein Ausflug in die Möglichkeiten semantischer Webtechnologien für die Gebäudesanierung und -Optimierung / Pont, U., Mahdavi, A., Fenz, S., Heurix, J., & Ghiassi, N. (2016). SEMERGY - Ein Ausflug in die Möglichkeiten semantischer Webtechnologien für die Gebäudesanierung und -Optimierung. In Fakultät für Arch & RPL (Ed.), Forschungstag 2016 (pp. 66–67). Forschungstag 2016. http://hdl.handle.net/20.500.12708/64566
- Eine Architektur für sichere Smart Grids in Österreich / Jung, O., Fenz, S., Kammerstetter, M., & Hudic, A. (2016). Eine Architektur für sichere Smart Grids in Österreich. In D-A-CH Security 2016 (pp. 1–9). Forschungsgruppe Systemsicherheit. http://hdl.handle.net/20.500.12708/56735
- Forschungsproposal COGENT - A Construction Generation & Evaluation Tool / Pont, U., Waldmayer, F., Wurzer, G., Fenz, S., Swoboda, S., Jonas, A., Priebernig, H., & Mahdavi, A. (2016). Forschungsproposal COGENT - A Construction Generation & Evaluation Tool (No. 1). http://hdl.handle.net/20.500.12708/38927
- Forschungsproposal EMULATE - Energy Modeling for Urban Level Assessment Tools and Environments / Research Studios Austria, 5. Ausschreibung / Mahdavi, A., Ghiassi, N., Vuckovic, M., Taheri, M., Tahmasebi, F., Fenz, S., Kiesel, K., Glawischnig, S., & Pont, U. (2016). Forschungsproposal EMULATE - Energy Modeling for Urban Level Assessment Tools and Environments / Research Studios Austria, 5. Ausschreibung (No. 1). http://hdl.handle.net/20.500.12708/38926
2015
- A taxonomy for privacy enhancing technologies / Heurix, J., Zimmermann, P., Neubauer, T., & Fenz, S. (2015). A taxonomy for privacy enhancing technologies. Computers and Security, 53, 1–17. https://doi.org/10.1016/j.cose.2015.05.002
- Stakeholder-oriented energy planning support in cities / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2015). Stakeholder-oriented energy planning support in cities. Energy Procedia, 78, 1841–1846. https://doi.org/10.1016/j.egypro.2015.11.327
- Performance-based building design and retrofit optimization: The SEMERY approach / Mahdavi, A., Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2015). Performance-based building design and retrofit optimization: The SEMERY approach. Dosya (Dossier) - Bi-Monthly Magazine of the Chamber of Architects / Turkey, DIGITAL OPPORTUNITIES IN ARCHITECTURE(35), 49–57. http://hdl.handle.net/20.500.12708/150569
- SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization / Pont, U., Ghiassi, N., Fenz, S., Heurix, J., & Mahdavi, A. (2015). SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization. Journal of Information Technology in Construction, 20(Special), 107–120. http://hdl.handle.net/20.500.12708/150525
- Semergy - neue Ansätze in der Planung energieeffizienter Gebäude / Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., Hammerberg, K., Neubauer, T., Taheri, M., Sustr, C., Tjoa, A. M., & Mahdavi, A. (2015). Semergy - neue Ansätze in der Planung energieeffizienter Gebäude. In ZIG - HS Luzern (Ed.), 11. ZIG-Planerseminar - Handouts (p. ’?). http://hdl.handle.net/20.500.12708/64374
- How to increase the inventory efficiency in information security risk and compliance management / Fenz, S., Heurix, J., & Neubauer, T. (2015). How to increase the inventory efficiency in information security risk and compliance management. In Proceedings of the European Conference on Information Systems (ECIS) 2015 (pp. 1–12). AIS. https://doi.org/10.18151/7217311
- Application of Semantic Web technology in an energy simulation tool / Paryudi, I., & Fenz, S. (2015). Application of Semantic Web technology in an energy simulation tool. In Information Management in Practice (pp. 53–62). University of Gdańsk. http://hdl.handle.net/20.500.12708/28852
2014
- Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe / Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Quirchmayr, G., Schatten, A., Neuhold, E., Göllner, J., Meurers, C., & Hitz, W. (Eds.). (2014). Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe. Republik Österreich. Bundesministerium für Landesverteidigung und Sport. http://hdl.handle.net/20.500.12708/176079
- De-identification of unstructured paper-based health records for privacy-preserving secondary use / Fenz, S., Heurix, J., Neubauer, T., & Rella, A. (2014). De-identification of unstructured paper-based health records for privacy-preserving secondary use. Journal of Medical Engineering & Technology, 38(5), 260–268. https://doi.org/10.3109/03091902.2014.913080
- Current challenges in information security risk management / Fenz, S., Heurix, J., Neubauer, T., & Pechstein, F. (2014). Current challenges in information security risk management. Information Management & Computer Security, 22(5), 410–430. https://doi.org/10.1108/imcs-07-2013-0053
- SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment / Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2014). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. Advanced Materials Research, 899, 589–595. https://doi.org/10.4028/www.scientific.net/amr.899.589
- Efficient building design model generation and evaluation: The SEMERGY Approach / Ghiassi, N., Pont, U., Mahdavi, A., Heurix, J., & Fenz, S. (2014). Efficient building design model generation and evaluation: The SEMERGY Approach. In tba (Ed.), Proceedings of the 30th International PLEA Conference - Sustainable Habitat for developing Societies - Choosing the way forward (p. 8). http://hdl.handle.net/20.500.12708/64314
- SEMERGY: Utilizing semantic web technologies for performance-guided building design optimization / Pont, U., Ghiassi, N., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., & Anjomshoaa, A. (2014). SEMERGY: Utilizing semantic web technologies for performance-guided building design optimization. In A. Mahdavi & B. Martens (Eds.), ECPPM 2014. Eigenauflage mit wissenschaftlichem Lektorat. http://hdl.handle.net/20.500.12708/64289
- Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2014). Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV. In Proceedings of the 28th EnviroInfo 2014 Conference (pp. 77–84). BIS-Verlag. http://hdl.handle.net/20.500.12708/55207
- Evaluation criteria for cloud computing based on the upcoming European data protection regulation / Halper, M., Fenz, S., Göllner, J., & Quirchmayr, G. (2014). Evaluation criteria for cloud computing based on the upcoming European data protection regulation. In 2014 Civilisation at the Crossroads Response and Responsibility of the Systems Sciences (pp. 599–603). EMCSR. http://hdl.handle.net/20.500.12708/55989
- Robustness against data availability problems in urban energy planning support software / Tjoa, A. M., Anjomshoaa, A., & Fenz, S. (2014). Robustness against data availability problems in urban energy planning support software. In M. Collard, R. Deneckere, & M. Bajec (Eds.), 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS). IEEE. https://doi.org/10.1109/rcis.2014.6861089
- How to Assess Confidentiality Requirements of Corporate Assets? / Cervantes, G. V., & Fenz, S. (2014). How to Assess Confidentiality Requirements of Corporate Assets? In ICT Systems Security and Privacy Protection (pp. 234–241). IFIP Press. https://doi.org/10.1007/978-3-642-55415-5_19
- SEMERGY - Identifying optimal building refurbishment strategies / Fenz, S., Heurix, J., Neubauer, T., Anjomshoaa, A., Shayeganfar, F., Ghiassi, N., Taheri, M., Hammerberg, K., Wolosiuk, D., Sustr, C., Pont, U., Mahdavi, A., & Tjoa, A. M. (2014). SEMERGY - Identifying optimal building refurbishment strategies. http://hdl.handle.net/20.500.12708/38047
- Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels / Hobel, H., Madlberger, L., Thöni, A., & Fenz, S. (2014). Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels. In Workshop on Social Media and Linked Data for Emergency Response (SMILE2014) 11th Extended Semantic Web Conference (ESWC2014) (pp. 1–12). Online Proceedings for Scientific Workshops. http://hdl.handle.net/20.500.12708/43397
- A Structured Comparison of Security Standards / Beckers, K., Côté, I., Fenz, S., Hatebur, D., & Heisel, M. (2014). A Structured Comparison of Security Standards. In Engineering Secure Future Internet Services and Systems (pp. 1–34). Springer. https://doi.org/10.1007/978-3-319-07452-8_1
2013
- Towards web-based information security knowledge sharing / Feledi, D., Fenz, S., & Lechner, L. (2013). Towards web-based information security knowledge sharing. Journal of Information Security and Applications, 17(4), 199–209. https://doi.org/10.1016/j.istr.2013.03.004
- A Rule-Based Transformation System for Converting Semi-Structured Medical Documents / Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2013). A Rule-Based Transformation System for Converting Semi-Structured Medical Documents. Health and Technology, 3(1), 51–63. https://doi.org/10.1007/s12553-013-0040-0
- SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment / Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2013). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. In J. Hraska (Ed.), enviBUILD 2013 - Buildings and Environment (p. 6). STU - Nakladateľstvo STU, Bratislava 2013. http://hdl.handle.net/20.500.12708/64207
- An ontology-aided Optimization Approach to Eco-Efficient Building Design / Shayeganfar, F., Anjomshoaa, A., Heurix, J., Sustr, C., Ghiassi, N., Pont, U., Fenz, S., Neubauer, T., Tjoa, A. M., & Mahdavi, A. (2013). An ontology-aided Optimization Approach to Eco-Efficient Building Design. In IBPSA (Ed.), Building Simulation 2013 - 13th International Conference of the International Building Performance Simulation Association. (pp. 2193–2199). IBPSA. http://hdl.handle.net/20.500.12708/64187
- A comprehensive building model for performance-guided decision support / Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Heurix, J., Fenz, S., Anjomshoaa, A., & Tjoa, A. M. (2013). A comprehensive building model for performance-guided decision support. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 35–42). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64163
- Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit / Heurix, J., Fenz, S., Anjomshoaa, A., Neubauer, T., Tjoa, A. M., Taheri, M., Shayeganfar, F., Pont, U., Ghiassi, N., Sustr, C., & Mahdavi, A. (2013). Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 27–34). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64162
- Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment / Pont, U., Shayeganfar, F., Ghiassi, N., Taheri, M., Sustr, C., Mahdavi, A., Heurix, J., Fenz, S., Neubauer, T., Tjoa, A. M., & Anjomshoaa, A. (2013). Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 19–26). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64161
- A modular methodology for the development of urban energy planning support software / Ouhajjou, N., Palensky, P., Stifter, M., Page, J., Fenz, S., & Tjoa, A. M. (2013). A modular methodology for the development of urban energy planning support software. In IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society. https://doi.org/10.1109/iecon.2013.6700392
- FORISK: Formalizing information security risk and compliance management / Fenz, S., Neubauer, T., Accorsi, R., & Koslowski, T. (2013). FORISK: Formalizing information security risk and compliance management. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, EU. https://doi.org/10.1109/dsnw.2013.6615533
2012
- SIEM-based framework for security controls automation / Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM-based framework for security controls automation. Information Management & Computer Security, 20(4), 248–263. https://doi.org/10.1108/09685221211267639
- Enhancing Ontology-based Antipattern Detection using Bayesian Networks / Settas, D., Cerone, A., & Fenz, S. (2012). Enhancing Ontology-based Antipattern Detection using Bayesian Networks. Expert Systems with Applications, 39(10), 9041–9053. https://doi.org/10.1016/j.eswa.2012.02.049
- An ontology-based approach for constructing Bayesian networks / Fenz, S. (2012). An ontology-based approach for constructing Bayesian networks. Data & Knowledge Engineering, 73, 73–88. https://doi.org/10.1016/j.datak.2011.12.001
- Increasing Knowledge Capturing Efficiency by Enterprise Portals / Fenz, S. (2012). Increasing Knowledge Capturing Efficiency by Enterprise Portals. VINE, 42(2), 237–250. https://doi.org/10.1108/03055721211227264
- Energy efficient buildings for a greener future - computer science meets building physics / Fenz, S. (2012). Energy efficient buildings for a greener future - computer science meets building physics. International Conference on Computer Science, Electronics, and Instrumentation (ICCSE2012), Yogyakarta, Non-EU. http://hdl.handle.net/20.500.12708/85398
- Improving the usability of energy simulation applications in processing common building performance inquiries / Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., Neubauer, T., & Tjoa, A. M. (2012). Improving the usability of energy simulation applications in processing common building performance inquiries. In O. Sikula & J. Hirs (Eds.), Simulace Budov a Techniky Prostredi (p. 6). Ceska Technika - nakladatelstvi CVUT. http://hdl.handle.net/20.500.12708/64058
- Exploring the utility of semantic web technology in building performance simulation / Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). Exploring the utility of semantic web technology in building performance simulation. In C. Nytsch-Geusen (Ed.), BauSIM 2012 - “Gebäudesimulation auf den Größenskalen Bauteil, Raum, Gebäude, Stadtquartier” (p. 7). Eigenverlag / wissenschaftliches Kommittee der IBPSA Germany-Austria. http://hdl.handle.net/20.500.12708/64042
- SEMERGY: Semantic web technology support for comprehensive building design assessment / Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). SEMERGY: Semantic web technology support for comprehensive building design assessment. In G. Gudnason & R. Scherer (Eds.), eWork and eBusiness in Architecture, Engineering and Construction (pp. 363–370). Taylor & Francis. http://hdl.handle.net/20.500.12708/64030
- Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation / Kronabeter, A., & Fenz, S. (2012). Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation. In Proceedings of the 2012 CloudComp Conference (pp. 1–10). http://hdl.handle.net/20.500.12708/54643
- Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions / Song, X., Huang, L., & Fenz, S. (2012). Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions. In Internet of Things (pp. 565–571). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32427-7_81
- Challenges of Web-Based Information Security Knowledge Sharing / Feledi, D., & Fenz, S. (2012). Challenges of Web-Based Information Security Knowledge Sharing. In 2012 Seventh International Conference on Availability, Reliability and Security. Seventh International Conference on Availability, Reliability, and Security (ARES 2012), Prague, EU. IEEE. https://doi.org/10.1109/ares.2012.59
- Recognition and Privacy Preservation of Paper-based Health Records / Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Privacy Preservation of Paper-based Health Records. In Quality of Life through Quality of Information - Proceedings of MIE2012 (pp. 751–755). http://hdl.handle.net/20.500.12708/54227
- Automated Transformation of Semi-Structured Text Elements / Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2012). Automated Transformation of Semi-Structured Text Elements. In AMCIS 2012 Proceedings (pp. 1–11). http://hdl.handle.net/20.500.12708/54223
- Recognition and Pseudonymization of Personal Data in Paper-Based Health Records / Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. In Business Information Systems (pp. 153–164). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30359-3_14
2011
- A Community Knowledge Base for IT Security / Fenz, S., Parkin, S., & Moorsel, A. van. (2011). A Community Knowledge Base for IT Security. IT Professional, 13(3), 24–30. https://doi.org/10.1109/mitp.2011.35
- Verification, Validation, and Evaluation in Information Security Risk Management / Fenz, S., & Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security and Privacy, 9(2), 58–65. https://doi.org/10.1109/msp.2010.117 / Project: SecOnt
- Information Security Risk Management: In which security solutions is it worth investing? / Fenz, S., Ekelhart, A., & Neubauer, T. (2011). Information Security Risk Management: In which security solutions is it worth investing? Communications of the Association for Information Systems, 28(1), 329–356. http://hdl.handle.net/20.500.12708/161667
- Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models / Settas, D., Cerone, A., & Fenz, S. (2011). Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models. In 2011 Ninth International Conference on Software Engineering Research, Management and Applications. 9th International Conference on Software Engineering Research, Management and Applications (SERA 2011), Baltimore, Maryland USA, Non-EU. https://doi.org/10.1109/sera.2011.15
- Information Security Automation: How Far Can We Go? / Montesino, R., & Fenz, S. (2011). Information Security Automation: How Far Can We Go? In 2011 Sixth International Conference on Availability, Reliability and Security. Sixth International Conference on Availability, Reliability, and Security (ARES 2011), Vienna, Austria. IEEE. https://doi.org/10.1109/ares.2011.48
- Automation Possibilities in Information Security Management / Montesino, R., & Fenz, S. (2011). Automation Possibilities in Information Security Management. In 2011 European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. https://doi.org/10.1109/eisic.2011.39
- An ontology- and Bayesian-based approach for determining threat probabilities / Fenz, S. (2011). An ontology- and Bayesian-based approach for determining threat probabilities. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’11. ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2011), Hongkong, Non-EU. ACM. https://doi.org/10.1145/1966913.1966958 / Project: SecOnt
- E-Business and Information Security Risk Management / Fenz, S. (2011). E-Business and Information Security Risk Management. In E. Kajan (Ed.), Electronic Business Interoperability (pp. 596–614). IGI Global. https://doi.org/10.4018/978-1-60960-485-1.ch024 / Project: SecOnt
2010
- From the Resource to the Business Process Risk Level / Fenz, S. (2010). From the Resource to the Business Process Risk Level. In Proceedings of the South African Information Security Multi-Conference (SAISMC’2010) (pp. 100–109). http://hdl.handle.net/20.500.12708/53131 / Project: SecOnt
- Ontology-based generation of IT-security metrics / Fenz, S. (2010). Ontology-based generation of IT-security metrics. In Proceedings of the 2010 ACM Symposium on Applied Computing - SAC ’10. 25th ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, Non-EU. ACM. https://doi.org/10.1145/1774088.1774478 / Project: SecOnt
2009
- Ontologiebasiertes IT Risikomanagement / Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Ontologiebasiertes IT Risikomanagement. In D.A.CH Security 2009 (pp. 14–24). Heise Zeitschriften Verlag GmbH & Co. KG. http://hdl.handle.net/20.500.12708/53162 / Project: SecOnt
- Business Process-Based Resource Importance Determination / Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Business Process-Based Resource Importance Determination. In Lecture Notes in Computer Science (pp. 113–127). Springer. https://doi.org/10.1007/978-3-642-03848-8_9 / Project: SecOnt
- How to determine threat probabilities using ontologies and Bayesian networks / Fenz, S., & Neubauer, T. (2009). How to determine threat probabilities using ontologies and Bayesian networks. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW ’09. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, Non-EU. ACM New York. https://doi.org/10.1145/1558607.1558686 / Project: SecOnt
- Ontological Mapping of Information Security Best-Practice Guidelines / Fenz, S., Pruckner, T., & Manutscheri, A. (2009). Ontological Mapping of Information Security Best-Practice Guidelines. In Proceedings of the 12th International Conference on Business Information Systems (pp. 49–60). http://hdl.handle.net/20.500.12708/52659 / Project: SecOnt
- Automated Risk and Utility Management / Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Automated Risk and Utility Management. In Proceedings of the Sixth International Conference on Information Technology: New Generations (pp. 393–398). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52658 / Project: SecOnt
- Ontology-based Decision Support for Information Security Risk Management / Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Ontology-based Decision Support for Information Security Risk Management. In Proceedings of the 4th International Conference on Systems (pp. 80–85). http://hdl.handle.net/20.500.12708/52623 / Project: SecOnt
- Ontology-based generation of Bayesian networks / Fenz, S., Tjoa, A. M., & Hudec, M. (2009). Ontology-based generation of Bayesian networks. In Proceedings of the Third International Conference on Complex, Intelligent and Software Intensive Systems - International Workshop on Ontology Alignment and Visualization - OnAV’09 (pp. 712–717). http://hdl.handle.net/20.500.12708/52599 / Project: SecOnt
- Formalizing information security knowledge / Fenz, S., & Ekelhart, A. (2009). Formalizing information security knowledge. In Proceedings of the 2009 ACM symposium on Information, computer and communications security (pp. 183–194). http://hdl.handle.net/20.500.12708/52594 / Project: SecOnt
- AURUM: A Framework for Information Security Risk Management / Neubauer, T., Ekelhart, A., & Fenz, S. (2009). AURUM: A Framework for Information Security Risk Management. In Proceedings of the 42th Hawaii International Conference on System Sciences (HICSS’09) (pp. 1–10). http://hdl.handle.net/20.500.12708/52370 / Project: SecOnt
2008
- XML Security - A Comparative Literature Review / Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763 / Project: SecOnt
- Integration of an Ontological Information Security Concept in Risk Aware Business Process Management / Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., & Mück, T. (2008). Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.211 / Project: SecOnt
- Ontology- and Bayesian-based Threat Probability Determination / Fenz, S., & Tjoa, A. M. (2008). Ontology- and Bayesian-based Threat Probability Determination. In Proceedings of the Junior Scientist Conference 2008 (pp. 69–70). http://hdl.handle.net/20.500.12708/52597 / Project: SecOnt
- Fortification of IT Security by Automatic Security Advisory Processing / Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69 / Project: SecOnt
- Interactive Selection of ISO 27001 Controls under Multiple Objectives / Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive Selection of ISO 27001 Controls under Multiple Objectives. In Proceedings of The Ifip Tc 11 23rd International Information Security Conference (pp. 477–492). Springer-Verlag GmbH. https://doi.org/10.1007/978-0-387-09699-5_31 / Project: SecOnt
- Semantic Potential of existing Security Advisory Standards / Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160 / Project: SecOnt
- Pseudonymization for improving the Privacy in E-Health Applications / Neubauer, T., Riedl, B., Fenz, S., & Grascher, V. (2008). Pseudonymization for improving the Privacy in E-Health Applications. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.366
2007
- Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
- Security Ontologies: Improving Quantitative Risk Analysis / Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 / Project: SecOnt
- Ontological Mapping of Common Criteria's Security Assurance Requirements / Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164
- CASSIS - Computer-based Academy for Security and Safety in Information Systems / Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., Riedl, B., & Tjoa, S. (2007). CASSIS - Computer-based Academy for Security and Safety in Information Systems. In Proceedings of the 2nd Conference on Availability, Reliability and Security, ARES2007 (pp. 730–740). http://hdl.handle.net/20.500.12708/53163
- Formal Threat Descriptions for Enhancing Governmental Risk Assessment / Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161
- Security Issues for the Use of Semantic Web in E-Commerce / Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1 / Project: SecOnt
- Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard / Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29 / Project: SecOnt
- Security Ontologies: How to Improve Understanding of Complex Relationships / Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804 / Project: SecOnt
- Security Aspects In Semantic Web Services Filtering / Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916 / Project: SecOnt
2006
- Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets / Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626 / Project: SecOnt
- Security Ontology: Simulating Threats to Corporate Assets / Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 / Project: SecOnt
- Ontology-based IT-Security planning / Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421 / Project: SecOnt
Supervisions
Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.
- Multi-objective optimization of energy networks / Deutsch, D. (2016). Multi-objective optimization of energy networks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79703
- Guidelines for using and implementing cloud computing services in small and medium-sized enterprises / Trajanovski, R. (2014). Guidelines for using and implementing cloud computing services in small and medium-sized enterprises [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159149
- IKT-Sicherheitsrisiken an Schulen : Analyse und Darstellung möglicher Handlungsempfehlungen für ein Schul-CERT / Mischitz, T. (2014). IKT-Sicherheitsrisiken an Schulen : Analyse und Darstellung möglicher Handlungsempfehlungen für ein Schul-CERT [Diploma Thesis]. reposiTUm. https://doi.org/10.34726/hss.2014.22113
- Challenges of Web-based information security knowledge sharing / Feledi, D. (2012). Challenges of Web-based information security knowledge sharing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-46490
- Mapping security frameworks into SecOnt / Manutscheri, A. (2008). Mapping security frameworks into SecOnt [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-24144