Stefan Fenz
Senior Scientist Dipl.-Ing. Mag.rer.soc.oec. Dr.techn.
Research Focus
- Information Systems Engineering: 50%
- Logic and Computation: 50%
About
Stefan (CISSP) is senior scientist at TU Wien, key researcher at SBA Research, and co-founder of Xylem Technologies GmbH. From 2012 to 2015, Stefan was an appointed member of the European Network and Information Security Agency’s (ENISA) Permanent Stakeholder Group.
In 2010, Stefan worked as a visiting scholar at Stanford Center for Biomedical Informatics Research at Stanford University (USA). From 2008 to 2012, Stefan lectured on information security at Peking University (Beijing, China), Beijing Jiaotong University (Beijing, China), Konkuk University (Seoul, Korea) and University of Applied Sciences Technikum Wien (Vienna, Austria).
His research is on organizational information security, semantic technologies, AI and decision support. Stefan received an MSc in software engineering & internet computing from TU Wien, an MSc in political science from University of Vienna, an MSc in business informatics from TU Wien, and a PhD in computer science from TU Wien. He is a member of the IFIP WG 11.1 – Information Security Management, the IEEE Systems, Man, and Cybernetics Society and ISC².
Role
-
Senior Scientist
Data Science, E194-04
Courses
2024W
- Bachelor Thesis / 188.919 / PR
- Interdisciplinary Project in Data Science / 194.147 / PR
- Management of Software Projects / 188.407 / VU
Projects
-
Innov:ATE Austria's Digital Innovation Hub for Agriculture, Timber and Energy
2021 – 2024 / Digital Innovation Hub INNOVATE -
ICT for Decision Making in Farming
2017 – 2021 / Austrian Research Promotion Agency (FFG)
Publication: 199164 -
Identifikation und Managment von Reputationsrisiken und -chancen
2016 – 2018 / Austrian Research Promotion Agency (FFG) -
Formalizing Information Security Risk and Compliance Management
2013 – 2016 / Vienna Science and Technology Fund (WWTF) -
Cloud Security: Guidelines for public authorities and SMEs
2012 – 2014 / FFG - Österr. Forschungsförderungs- gesellschaft mbH -
Semantic Technologies for Energy-efficient Building Planning
2011 – 2015 / Austrian Research Promotion Agency (FFG) -
Information Warfare on the Internet: Data Security Monitoring in Austria
2011 – 2013 / FFG - Österr. Forschungsförderungsgesellschaft mbH -
Recognition and Pseudonymization of Personal Data in Paper-based Heatlth Records
2010 – 2014 / Austrian Research Promotion Agency (FFG) -
Security Ontologies
2008 – 2010 / Austrian Research Promotion Agency (FFG)
Publications: 161670 / 169676 / 176626 / 26836 / 51421 / 51423 / 51565 / 51804 / 51846 / 51916 / 52118 / 52160 / 52370 / 52371 / 52594 / 52595 / 52597 / 52599 / 52622 / 52623 / 52658 / 52659 / 53128 / 53129 / 53130 / 53131 / 53162 / 53363 -
DynamOnt Methodology for Dynamic Ontology Creation
2005 – 2007 / Austrian Research Promotion Agency (FFG)
Publication: 51695
Publications
2023
-
AI- and data-driven pre-crop values and crop rotation matrices
/
Fenz, S., Neubauer, T., Heurix, J., Friedel, J. K., & Wohlmuth, M.-L. (2023). AI- and data-driven pre-crop values and crop rotation matrices. European Journal of Agronomy, 150, Article 126949. https://doi.org/10.1016/j.eja.2023.126949
Download: PDF (6.86 MB) - RenoDSS - a BIM-based building renovation decision support system / Fenz, S., Giannakis, G., Bergmayr, J., & Iousef, S. (2023). RenoDSS - a BIM-based building renovation decision support system. Energy and Buildings, Article 112999. https://doi.org/10.1016/j.enbuild.2023.112999
- AI- and data-driven crop rotation planning / Fenz, S., Neubauer, T., Friedel, J. K., & Wohlmuth, M.-L. (2023). AI- and data-driven crop rotation planning. Computers and Electronics in Agriculture, 212, Article 108160. https://doi.org/10.1016/j.compag.2023.108160
- IFC-based building renovation scenario generator / Fenz, S., Bergmayr, J., & Giannakis, G. (2023). IFC-based building renovation scenario generator. In Proceedings of the 2023 European Conference on Computing in Construction and the 40th International CIB W78 Conference. 2023 European Conference on Computing in Construction and the 40th International CIB W78 Conference, Heraklion, Greece. https://doi.org/10.35490/EC3.2023.170
2021
- Integration of building material databases for IFC-based building performance analysis / Fenz, S., Bergmayr, J., Plattner, N., Chávez-Feria, S., Poveda-Villalón, M., & Giannakis, G. (2021). Integration of building material databases for IFC-based building performance analysis. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0027
- An Integrated Scan-to-BIM Approach for Buildings Energy Performance Evaluation and Retrofitting / Valero, E., Mohanty, D. D., Ceklarz, M., Tao, B., Bosche, F., Giannakis, G. I., Fenz, S., Katsigarakis, K., N. Lilis, G., Rovas, D., & Papanikolaou, A. (2021). An Integrated Scan-to-BIM Approach for Buildings Energy Performance Evaluation and Retrofitting. In Proceedings of the 38th International Symposium on Automation and Robotics in Construction (ISARC). International Association for Automation and Robotics in Construction (IAARC), Austria. International Association for Automation and Robotics in Construction (IAARC). https://doi.org/10.22260/isarc2021/0030
2020
- Supporting Complex Decision Making by Semantic Technologies / Fenz, S. (2020). Supporting Complex Decision Making by Semantic Technologies. In The Semantic Web (pp. 632–647). Springer. https://doi.org/10.1007/978-3-030-49461-2_37
2018
-
Ontology-based information security compliance determination and control selection on the example of ISO 27002
/
Fenz, S., & Neubauer, T. (2018). Ontology-based information security compliance determination and control selection on the example of ISO 27002. Information and Computer Security, 26(5), 551–567. https://doi.org/10.1108/ICS-02-2018-0020
Download: PDF (1.67 MB)
2017
- Stakeholder-oriented energy planning support in cities / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2017). Stakeholder-oriented energy planning support in cities. Sustainable Cities and Society, 28, 482–492. https://doi.org/10.1016/j.scs.2016.08.006
- A Risk Management Framework for Cloud Migration Decision Support / Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010
- BUDANAUB - Building Damages and Diagsnistcs - A novel approach using BIM / Pont, U., Waldmayer, F., Priebernig, H., Fenz, S., & Mahdavi, A. (2017). BUDANAUB - Building Damages and Diagsnistcs - A novel approach using BIM (Einreichung). http://hdl.handle.net/20.500.12708/39181
2016
- Mapping Information Security Standard ISO 27002 to an Ontological Structure / Fenz, S., Plieschnegger, S., & Hobel, H. (2016). Mapping Information Security Standard ISO 27002 to an Ontological Structure. Information and Computer Security, 24(5), 452–473. https://doi.org/10.1108/ics-07-2015-0030
- Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2016). Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV. In Progress in IS. Springer. https://doi.org/10.1007/978-3-319-23455-7
- SEMERGY - Ein Ausflug in die Möglichkeiten semantischer Webtechnologien für die Gebäudesanierung und -Optimierung / Pont, U., Mahdavi, A., Fenz, S., Heurix, J., & Ghiassi, N. (2016). SEMERGY - Ein Ausflug in die Möglichkeiten semantischer Webtechnologien für die Gebäudesanierung und -Optimierung. In Forschungstag 2016 (pp. 66–67). Fakultät für Architektur und Raumplanung, TU Wien. http://hdl.handle.net/20.500.12708/64566
- Recognition and pseudonymisation of medical records for secondary use / Heurix, J., Fenz, S., Rella, A., & Neubauer, T. (2016). Recognition and pseudonymisation of medical records for secondary use. Medical and Biological Engineering and Computing, 54(2–3), 371–383. https://doi.org/10.1007/s11517-015-1322-7
- SEMERGY.net - automatically identifying and optimizing energy-efficient building designs / Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Ghiassi, N., Pont, U., & Mahdavi, A. (2016). SEMERGY.net - automatically identifying and optimizing energy-efficient building designs. Computer Science - Research and Development, 31(3), 135–140. https://doi.org/10.1007/s00450-014-0285-5
- Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners / Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103
- Eine Architektur für sichere Smart Grids in Österreich / Jung, O., Fenz, S., Kammerstetter, M., & Hudic, A. (2016). Eine Architektur für sichere Smart Grids in Österreich. In D-A-CH Security 2016 (pp. 1–9). Forschungsgruppe Systemsicherheit. http://hdl.handle.net/20.500.12708/56735
- Forschungsproposal COGENT - A Construction Generation & Evaluation Tool / Pont, U., Waldmayer, F., Wurzer, G., Fenz, S., Swoboda, S., Jonas, A., Priebernig, H., & Mahdavi, A. (2016). Forschungsproposal COGENT - A Construction Generation & Evaluation Tool (No. 1). http://hdl.handle.net/20.500.12708/38927
- Forschungsproposal EMULATE - Energy Modeling for Urban Level Assessment Tools and Environments / Research Studios Austria, 5. Ausschreibung / Mahdavi, A., Ghiassi, N., Vuckovic, M., Taheri, M., Tahmasebi, F., Fenz, S., Kiesel, K., Glawischnig, S., & Pont, U. (2016). Forschungsproposal EMULATE - Energy Modeling for Urban Level Assessment Tools and Environments / Research Studios Austria, 5. Ausschreibung (No. 1). http://hdl.handle.net/20.500.12708/38926
2015
- Stakeholder-oriented energy planning support in cities / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2015). Stakeholder-oriented energy planning support in cities. Energy Procedia, 78, 1841–1846. https://doi.org/10.1016/j.egypro.2015.11.327
- A taxonomy for privacy enhancing technologies / Heurix, J., Zimmermann, P., Neubauer, T., & Fenz, S. (2015). A taxonomy for privacy enhancing technologies. Computers and Security, 53, 1–17. https://doi.org/10.1016/j.cose.2015.05.002
- Application of Semantic Web technology in an energy simulation tool / Paryudi, I., & Fenz, S. (2015). Application of Semantic Web technology in an energy simulation tool. In Information Management in Practice (pp. 53–62). University of Gdańsk. http://hdl.handle.net/20.500.12708/28852
- How to increase the inventory efficiency in information security risk and compliance management / Fenz, S., Heurix, J., & Neubauer, T. (2015). How to increase the inventory efficiency in information security risk and compliance management. In J. Becker, J. vom Brocke, & M. de Marco (Eds.), Proceedings of the European Conference on Information Systems (ECIS) 2015 (pp. 1–12). AIS. https://doi.org/10.18151/7217311
- Performance-based building design and retrofit optimization: The SEMERY approach / Mahdavi, A., Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2015). Performance-based building design and retrofit optimization: The SEMERY approach. Dosya (Dossier) - Bi-Monthly Magazine of the Chamber of Architects / Turkey, DIGITAL OPPORTUNITIES IN ARCHITECTURE(35), 49–57. http://hdl.handle.net/20.500.12708/150569
- SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization / Pont, U., Ghiassi, N., Fenz, S., Heurix, J., & Mahdavi, A. (2015). SEMERGY: Application of Semantic Web Technologies in Performance-Guided Building Design Optimization. Journal of Information Technology in Construction, 20(Special), 107–120. http://hdl.handle.net/20.500.12708/150525
- Semergy - neue Ansätze in der Planung energieeffizienter Gebäude / Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., Hammerberg, K., Neubauer, T., Taheri, M., Sustr, C., Tjoa, A. M., & Mahdavi, A. (2015). Semergy - neue Ansätze in der Planung energieeffizienter Gebäude. In ZIG - HS Luzern (Ed.), 11. ZIG-Planerseminar - Handouts (p. ’?). http://hdl.handle.net/20.500.12708/64374
2014
- Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe / Fenz, S., Heurix, J., Neubauer, T., Tjoa, A. M., Quirchmayr, G., Schatten, A., Neuhold, E., Göllner, J., Meurers, C., & Hitz, W. (Eds.). (2014). Cloud-Sicherheit. Leitfaden für Behörden und Klein- und Mittelbetriebe. Republik Österreich. Bundesministerium für Landesverteidigung und Sport. http://hdl.handle.net/20.500.12708/176079
- Evaluation criteria for cloud computing based on the upcoming European data protection regulation / Halper, M., Fenz, S., Göllner, J., & Quirchmayr, G. (2014). Evaluation criteria for cloud computing based on the upcoming European data protection regulation. In 2014 Civilisation at the Crossroads Response and Responsibility of the Systems Sciences (pp. 599–603). EMCSR. http://hdl.handle.net/20.500.12708/55989
- Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV / Ouhajjou, N., Loibl, W., Fenz, S., & Tjoa, A. M. (2014). Multi-Actor Urban Energy Planning Support: Building refurbishment and building-integrated Solar PV. In Proceedings of the 28th EnviroInfo 2014 Conference (pp. 77–84). BIS-Verlag. http://hdl.handle.net/20.500.12708/55207
- A Structured Comparison of Security Standards / Beckers, K., Côté, I., Fenz, S., Hatebur, D., & Heisel, M. (2014). A Structured Comparison of Security Standards. In Engineering Secure Future Internet Services and Systems (pp. 1–34). Springer. https://doi.org/10.1007/978-3-319-07452-8_1
- De-identification of unstructured paper-based health records for privacy-preserving secondary use / Fenz, S., Heurix, J., Neubauer, T., & Rella, A. (2014). De-identification of unstructured paper-based health records for privacy-preserving secondary use. Journal of Medical Engineering & Technology, 38(5), 260–268. https://doi.org/10.3109/03091902.2014.913080
- Current challenges in information security risk management / Fenz, S., Heurix, J., Neubauer, T., & Pechstein, F. (2014). Current challenges in information security risk management. Information Management & Computer Security, 22(5), 410–430. https://doi.org/10.1108/imcs-07-2013-0053
- SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment / Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2014). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. Advanced Materials Research, 899, 589–595. https://doi.org/10.4028/www.scientific.net/amr.899.589
- Efficient building design model generation and evaluation: The SEMERGY Approach / Ghiassi, N., Pont, U., Mahdavi, A., Heurix, J., & Fenz, S. (2014). Efficient building design model generation and evaluation: The SEMERGY Approach. In tba (Ed.), Proceedings of the 30th International PLEA Conference - Sustainable Habitat for developing Societies - Choosing the way forward (p. 8). http://hdl.handle.net/20.500.12708/64314
- SEMERGY: Utilizing semantic web technologies for performance-guided building design optimization / Pont, U., Ghiassi, N., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., & Anjomshoaa, A. (2014). SEMERGY: Utilizing semantic web technologies for performance-guided building design optimization. In A. Mahdavi & B. Martens (Eds.), ECPPM 2014. Eigenauflage mit wissenschaftlichem Lektorat. http://hdl.handle.net/20.500.12708/64289
- Robustness against data availability problems in urban energy planning support software / Tjoa, A. M., Anjomshoaa, A., & Fenz, S. (2014). Robustness against data availability problems in urban energy planning support software. In M. Collard, R. Deneckere, & M. Bajec (Eds.), 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS). IEEE. https://doi.org/10.1109/rcis.2014.6861089
- How to Assess Confidentiality Requirements of Corporate Assets? / Cervantes, G. V., & Fenz, S. (2014). How to Assess Confidentiality Requirements of Corporate Assets? In ICT Systems Security and Privacy Protection (pp. 234–241). IFIP Press. https://doi.org/10.1007/978-3-642-55415-5_19
- SEMERGY - Identifying optimal building refurbishment strategies / Fenz, S., Heurix, J., Neubauer, T., Anjomshoaa, A., Shayeganfar, F., Ghiassi, N., Taheri, M., Hammerberg, K., Wolosiuk, D., Sustr, C., Pont, U., Mahdavi, A., & Tjoa, A. M. (2014). SEMERGY - Identifying optimal building refurbishment strategies. http://hdl.handle.net/20.500.12708/38047
- Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels / Hobel, H., Madlberger, L., Thöni, A., & Fenz, S. (2014). Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels. In Workshop on Social Media and Linked Data for Emergency Response (SMILE2014) 11th Extended Semantic Web Conference (ESWC2014) (pp. 1–12). Online Proceedings for Scientific Workshops. http://hdl.handle.net/20.500.12708/43397
2013
- FORISK: Formalizing information security risk and compliance management / Fenz, S., Neubauer, T., Accorsi, R., & Koslowski, T. (2013). FORISK: Formalizing information security risk and compliance management. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, EU. https://doi.org/10.1109/dsnw.2013.6615533
- SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment / Wolosiuk, D., Ghiassi, N., Pont, U., Shayeganfar, F., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., & Tjoa, A. M. (2013). SEMERGY: Performance-Guided Building Design and Refurbishment within a Semantically Augmented Optimization Environment. In J. Hraska (Ed.), enviBUILD 2013 - Buildings and Environment (p. 6). STU - Nakladateľstvo STU, Bratislava 2013. http://hdl.handle.net/20.500.12708/64207
- Towards web-based information security knowledge sharing / Feledi, D., Fenz, S., & Lechner, L. (2013). Towards web-based information security knowledge sharing. Journal of Information Security and Applications, 17(4), 199–209. https://doi.org/10.1016/j.istr.2013.03.004
- A Rule-Based Transformation System for Converting Semi-Structured Medical Documents / Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2013). A Rule-Based Transformation System for Converting Semi-Structured Medical Documents. Health and Technology, 3(1), 51–63. https://doi.org/10.1007/s12553-013-0040-0
- An ontology-aided Optimization Approach to Eco-Efficient Building Design / Shayeganfar, F., Anjomshoaa, A., Heurix, J., Sustr, C., Ghiassi, N., Pont, U., Fenz, S., Neubauer, T., Tjoa, A. M., & Mahdavi, A. (2013). An ontology-aided Optimization Approach to Eco-Efficient Building Design. In IBPSA (Ed.), Building Simulation 2013 - 13th International Conference of the International Building Performance Simulation Association. (pp. 2193–2199). IBPSA. http://hdl.handle.net/20.500.12708/64187
- A comprehensive building model for performance-guided decision support / Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Heurix, J., Fenz, S., Anjomshoaa, A., & Tjoa, A. M. (2013). A comprehensive building model for performance-guided decision support. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 35–42). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64163
- Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit / Heurix, J., Fenz, S., Anjomshoaa, A., Neubauer, T., Tjoa, A. M., Taheri, M., Shayeganfar, F., Pont, U., Ghiassi, N., Sustr, C., & Mahdavi, A. (2013). Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 27–34). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64162
- Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment / Pont, U., Shayeganfar, F., Ghiassi, N., Taheri, M., Sustr, C., Mahdavi, A., Heurix, J., Fenz, S., Neubauer, T., Tjoa, A. M., & Anjomshoaa, A. (2013). Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 19–26). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64161
- A modular methodology for the development of urban energy planning support software / Ouhajjou, N., Palensky, P., Stifter, M., Page, J., Fenz, S., & Tjoa, A. M. (2013). A modular methodology for the development of urban energy planning support software. In IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society. https://doi.org/10.1109/iecon.2013.6700392
2012
- Enhancing Ontology-based Antipattern Detection using Bayesian Networks / Settas, D., Cerone, A., & Fenz, S. (2012). Enhancing Ontology-based Antipattern Detection using Bayesian Networks. Expert Systems with Applications, 39(10), 9041–9053. https://doi.org/10.1016/j.eswa.2012.02.049
- An ontology-based approach for constructing Bayesian networks / Fenz, S. (2012). An ontology-based approach for constructing Bayesian networks. Data & Knowledge Engineering, 73, 73–88. https://doi.org/10.1016/j.datak.2011.12.001
- Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation / Kronabeter, A., & Fenz, S. (2012). Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation. In Proceedings of the 2012 CloudComp Conference (pp. 1–10). http://hdl.handle.net/20.500.12708/54643
- SIEM-based framework for security controls automation / Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM-based framework for security controls automation. Information Management & Computer Security, 20(4), 248–263. https://doi.org/10.1108/09685221211267639
- Increasing Knowledge Capturing Efficiency by Enterprise Portals / Fenz, S. (2012). Increasing Knowledge Capturing Efficiency by Enterprise Portals. VINE, 42(2), 237–250. https://doi.org/10.1108/03055721211227264
- Energy efficient buildings for a greener future - computer science meets building physics / Fenz, S. (2012). Energy efficient buildings for a greener future - computer science meets building physics. International Conference on Computer Science, Electronics, and Instrumentation (ICCSE2012), Yogyakarta, Non-EU. http://hdl.handle.net/20.500.12708/85398
- Improving the usability of energy simulation applications in processing common building performance inquiries / Ghiassi, N., Shayeganfar, F., Pont, U., Mahdavi, A., Fenz, S., Heurix, J., Anjomshoaa, A., Neubauer, T., & Tjoa, A. M. (2012). Improving the usability of energy simulation applications in processing common building performance inquiries. In O. Sikula & J. Hirs (Eds.), Simulace Budov a Techniky Prostredi (p. 6). Ceska Technika - nakladatelstvi CVUT. http://hdl.handle.net/20.500.12708/64058
- Exploring the utility of semantic web technology in building performance simulation / Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). Exploring the utility of semantic web technology in building performance simulation. In C. Nytsch-Geusen (Ed.), BauSIM 2012 - “Gebäudesimulation auf den Größenskalen Bauteil, Raum, Gebäude, Stadtquartier” (p. 7). Eigenverlag / wissenschaftliches Kommittee der IBPSA Germany-Austria. http://hdl.handle.net/20.500.12708/64042
- SEMERGY: Semantic web technology support for comprehensive building design assessment / Mahdavi, A., Pont, U., Shayeganfar, F., Ghiassi, N., Anjomshoaa, A., Fenz, S., Heurix, J., Neubauer, T., & Tjoa, A. M. (2012). SEMERGY: Semantic web technology support for comprehensive building design assessment. In G. Gudnason & R. Scherer (Eds.), eWork and eBusiness in Architecture, Engineering and Construction (pp. 363–370). Taylor & Francis. http://hdl.handle.net/20.500.12708/64030
- Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions / Song, X., Huang, L., & Fenz, S. (2012). Internet of Things Applications in Bulk Shipping Logistics: Problems and Potential Solutions. In Internet of Things (pp. 565–571). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32427-7_81
- Challenges of Web-Based Information Security Knowledge Sharing / Feledi, D., & Fenz, S. (2012). Challenges of Web-Based Information Security Knowledge Sharing. In 2012 Seventh International Conference on Availability, Reliability and Security. Seventh International Conference on Availability, Reliability, and Security (ARES 2012), Prague, EU. IEEE. https://doi.org/10.1109/ares.2012.59
- Recognition and Privacy Preservation of Paper-based Health Records / Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Privacy Preservation of Paper-based Health Records. In Quality of Life through Quality of Information - Proceedings of MIE2012 (pp. 751–755). http://hdl.handle.net/20.500.12708/54227
- Automated Transformation of Semi-Structured Text Elements / Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2012). Automated Transformation of Semi-Structured Text Elements. In AMCIS 2012 Proceedings (pp. 1–11). http://hdl.handle.net/20.500.12708/54223
- Recognition and Pseudonymization of Personal Data in Paper-Based Health Records / Fenz, S., Heurix, J., & Neubauer, T. (2012). Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. In Business Information Systems (pp. 153–164). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-30359-3_14
2011
-
Verification, Validation, and Evaluation in Information Security Risk Management
/
Fenz, S., & Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security and Privacy, 9(2), 58–65. https://doi.org/10.1109/msp.2010.117
Project: SecOnt (2008–2010) -
E-Business and Information Security Risk Management
/
Fenz, S. (2011). E-Business and Information Security Risk Management. In E. Kajan (Ed.), Electronic Business Interoperability (pp. 596–614). IGI Global. https://doi.org/10.4018/978-1-60960-485-1.ch024
Project: SecOnt (2008–2010) - A Community Knowledge Base for IT Security / Fenz, S., Parkin, S., & Moorsel, A. van. (2011). A Community Knowledge Base for IT Security. IT Professional, 13(3), 24–30. https://doi.org/10.1109/mitp.2011.35
- Information Security Risk Management: In which security solutions is it worth investing? / Fenz, S., Ekelhart, A., & Neubauer, T. (2011). Information Security Risk Management: In which security solutions is it worth investing? Communications of the Association for Information Systems, 28(1), 329–356. http://hdl.handle.net/20.500.12708/161667
- Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models / Settas, D., Cerone, A., & Fenz, S. (2011). Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models. In 2011 Ninth International Conference on Software Engineering Research, Management and Applications. 9th International Conference on Software Engineering Research, Management and Applications (SERA 2011), Baltimore, Maryland USA, Non-EU. https://doi.org/10.1109/sera.2011.15
- Information Security Automation: How Far Can We Go? / Montesino, R., & Fenz, S. (2011). Information Security Automation: How Far Can We Go? In 2011 Sixth International Conference on Availability, Reliability and Security. Sixth International Conference on Availability, Reliability, and Security (ARES 2011), Vienna, Austria. IEEE. https://doi.org/10.1109/ares.2011.48
- Automation Possibilities in Information Security Management / Montesino, R., & Fenz, S. (2011). Automation Possibilities in Information Security Management. In 2011 European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. https://doi.org/10.1109/eisic.2011.39
-
An ontology- and Bayesian-based approach for determining threat probabilities
/
Fenz, S. (2011). An ontology- and Bayesian-based approach for determining threat probabilities. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’11. ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2011), Hongkong, Non-EU. ACM. https://doi.org/10.1145/1966913.1966958
Project: SecOnt (2008–2010)
2010
-
From the Resource to the Business Process Risk Level
/
Fenz, S. (2010). From the Resource to the Business Process Risk Level. In Proceedings of the South African Information Security Multi-Conference (SAISMC’2010) (pp. 100–109). http://hdl.handle.net/20.500.12708/53131
Project: SecOnt (2008–2010) -
Ontology-based generation of IT-security metrics
/
Fenz, S. (2010). Ontology-based generation of IT-security metrics. In Proceedings of the 2010 ACM Symposium on Applied Computing - SAC ’10. 25th ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, Non-EU. ACM. https://doi.org/10.1145/1774088.1774478
Project: SecOnt (2008–2010)
2009
-
Business Process-Based Resource Importance Determination
/
Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Business Process-Based Resource Importance Determination. In Business Process Management (pp. 113–127). Springer. https://doi.org/10.1007/978-3-642-03848-8_9
Project: SecOnt (2008–2010) -
Ontologiebasiertes IT Risikomanagement
/
Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Ontologiebasiertes IT Risikomanagement. In D.A.CH Security 2009 (pp. 14–24). Heise Zeitschriften Verlag GmbH & Co. KG. http://hdl.handle.net/20.500.12708/53162
Project: SecOnt (2008–2010) -
Ontology-based generation of Bayesian networks
/
Fenz, S., Tjoa, A. M., & Hudec, M. (2009). Ontology-based generation of Bayesian networks. In Proceedings of the Third International Conference on Complex, Intelligent and Software Intensive Systems - International Workshop on Ontology Alignment and Visualization - OnAV’09 (pp. 712–717). http://hdl.handle.net/20.500.12708/52599
Project: SecOnt (2008–2010) -
How to determine threat probabilities using ontologies and Bayesian networks
/
Fenz, S., & Neubauer, T. (2009). How to determine threat probabilities using ontologies and Bayesian networks. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW ’09. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, Non-EU. ACM New York. https://doi.org/10.1145/1558607.1558686
Project: SecOnt (2008–2010) -
Ontological Mapping of Information Security Best-Practice Guidelines
/
Fenz, S., Pruckner, T., & Manutscheri, A. (2009). Ontological Mapping of Information Security Best-Practice Guidelines. In Proceedings of the 12th International Conference on Business Information Systems (pp. 49–60). http://hdl.handle.net/20.500.12708/52659
Project: SecOnt (2008–2010) -
Automated Risk and Utility Management
/
Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Automated Risk and Utility Management. In Proceedings of the Sixth International Conference on Information Technology: New Generations (pp. 393–398). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52658
Project: SecOnt (2008–2010) -
Ontology-based Decision Support for Information Security Risk Management
/
Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Ontology-based Decision Support for Information Security Risk Management. In Proceedings of the 4th International Conference on Systems (pp. 80–85). http://hdl.handle.net/20.500.12708/52623
Project: SecOnt (2008–2010) -
Formalizing information security knowledge
/
Fenz, S., & Ekelhart, A. (2009). Formalizing information security knowledge. In Proceedings of the 2009 ACM symposium on Information, computer and communications security (pp. 183–194). http://hdl.handle.net/20.500.12708/52594
Project: SecOnt (2008–2010) -
AURUM: A Framework for Information Security Risk Management
/
Neubauer, T., Ekelhart, A., & Fenz, S. (2009). AURUM: A Framework for Information Security Risk Management. In Proceedings of the 42th Hawaii International Conference on System Sciences (HICSS’09) (pp. 1–10). http://hdl.handle.net/20.500.12708/52370
Project: SecOnt (2008–2010)
2008
-
XML Security - A Comparative Literature Review
/
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763
Project: SecOnt (2008–2010) -
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
/
Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., & Mück, T. (2008). Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.211
Project: SecOnt (2008–2010) - Pseudonymization for improving the Privacy in E-Health Applications / Neubauer, T., Riedl, B., Fenz, S., & Grascher, V. (2008). Pseudonymization for improving the Privacy in E-Health Applications. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.366
- Ontology- and Bayesian-based information security risk management / Fenz, S. (2008). Ontology- and Bayesian-based information security risk management [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/179784
-
Ontology- and Bayesian-based Threat Probability Determination
/
Fenz, S., & Tjoa, A. M. (2008). Ontology- and Bayesian-based Threat Probability Determination. In Proceedings of the Junior Scientist Conference 2008 (pp. 69–70). http://hdl.handle.net/20.500.12708/52597
Project: SecOnt (2008–2010) -
Fortification of IT Security by Automatic Security Advisory Processing
/
Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69
Project: SecOnt (2008–2010) -
Interactive Selection of ISO 27001 Controls under Multiple Objectives
/
Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive Selection of ISO 27001 Controls under Multiple Objectives. In Proceedings of The Ifip Tc 11 23rd International Information Security Conference (pp. 477–492). Springer-Verlag GmbH. https://doi.org/10.1007/978-0-387-09699-5_31
Project: SecOnt (2008–2010) -
Semantic Potential of existing Security Advisory Standards
/
Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160
Project: SecOnt (2008–2010)
2007
- Ontological Mapping of Common Criteria's Security Assurance Requirements / Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164
- Architectural approach for handling semi-structured data in an user-centered working environment / Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637
-
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
/
Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29
Project: SecOnt (2008–2010) - CASSIS - Computer-based Academy for Security and Safety in Information Systems / Goluch, G., Ekelhart, A., Fenz, S., Jakoubi, S., Riedl, B., & Tjoa, S. (2007). CASSIS - Computer-based Academy for Security and Safety in Information Systems. In Proceedings of the 2nd Conference on Availability, Reliability and Security, ARES2007 (pp. 730–740). http://hdl.handle.net/20.500.12708/53163
-
Security Ontologies: Improving Quantitative Risk Analysis
/
Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565
Project: SecOnt (2008–2010) - Formal Threat Descriptions for Enhancing Governmental Risk Assessment / Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161
-
Security Issues for the Use of Semantic Web in E-Commerce
/
Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1
Project: SecOnt (2008–2010) -
Security Ontologies: How to Improve Understanding of Complex Relationships
/
Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804
Project: SecOnt (2008–2010) -
Security Aspects In Semantic Web Services Filtering
/
Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916
Project: SecOnt (2008–2010)
2006
- Security ontologies : improving quantitative risk analysis / Fenz, S. (2006). Security ontologies : improving quantitative risk analysis [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/184418
-
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets
/
Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626
Project: SecOnt (2008–2010) -
Security Ontology: Simulating Threats to Corporate Assets
/
Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423
Project: SecOnt (2008–2010) -
Ontology-based IT-Security planning
/
Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421
Project: SecOnt (2008–2010)
2005
- The Blackman Project : gathering and storing semi-structured data for the "Semantik Desktop" / Fenz, S. (2005). The Blackman Project : gathering and storing semi-structured data for the “Semantik Desktop” [Master Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/182917
Supervisions
-
Crop rotation optimization for organic farming systems by combining model-based reinforcement learning methods with symbolic planning
/
Wagner, M. (2024). Crop rotation optimization for organic farming systems by combining model-based reinforcement learning methods with symbolic planning [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2024.114726
Download: PDF (2.43 MB) - Multi-objective optimization of energy networks / Deutsch, D. (2016). Multi-objective optimization of energy networks [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/79703
-
IKT-Sicherheitsrisiken an Schulen : Analyse und Darstellung möglicher Handlungsempfehlungen für ein Schul-CERT
/
Mischitz, T. (2014). IKT-Sicherheitsrisiken an Schulen : Analyse und Darstellung möglicher Handlungsempfehlungen für ein Schul-CERT [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://doi.org/10.34726/hss.2014.22113
Download: PDF (1.11 MB) - Guidelines for using and implementing cloud computing services in small and medium-sized enterprises / Trajanovski, R. (2014). Guidelines for using and implementing cloud computing services in small and medium-sized enterprises [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159149
-
Challenges of Web-based information security knowledge sharing
/
Feledi, D. (2012). Challenges of Web-based information security knowledge sharing [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-46490
Download: PDF (1.21 MB) -
Mapping security frameworks into SecOnt
/
Manutscheri, A. (2008). Mapping security frameworks into SecOnt [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-24144
Download: PDF (1.31 MB)