TU Wien Informatics

20 Years

Thomas Neubauer

Dipl.-Ing. Mag. Dr.techn.

Research Focus

Research Areas

  • Smart Farming, Explainable Artificial Intelligence, Decision support systems, Digital Agriculture , Computer Science

About

.

Role

2024S

 

2023

2022

  • PlusIQ-Agri Photovoltaics / Herbig, U., Berger, K., Damjanovic, D., Eizinger, J., Neubauer, T., Pont, U., Schauppenlehner, T., Shala-Mayrhofer, V., Tjoa, A. M., Wagner, D. A., Weih, P., & Zamini, S. (2022, November 10). PlusIQ-Agri Photovoltaics [Poster Presentation]. International Conference on Cultural Heritage and New Technologies (CHNT 27), Wien, Austria. http://hdl.handle.net/20.500.12708/175749
    Project: PlusIQ-AgrarPV (2022–2023)
  • PlusIQ-Agrarphotovoltaik: Integration als Weg zum Plus-Energie-Quartier / Herbig, U., Berger, K., Damjanovic, D., Eizinger, J., Neubauer, T., Pont, U., Schauppenlehner, T., Shala-Mayerhofer, V., Tjoa, A. M., Wagner, D. A., Weihs, P., & Zamini, S. (2022, October 6). PlusIQ-Agrarphotovoltaik: Integration als Weg zum Plus-Energie-Quartier [Poster Presentation]. Österreichische Fachtagung für Photovoltaik und Stromspeicherung, Wien, Austria. https://doi.org/10.34726/3548
    Download: ocr (2.08 MB)
    Project: PlusIQ-AgrarPV (2022–2023)
  • A Digital Twin for Grassland Management / Purcell, W., Klipic, A., & Neubauer, T. (2022). A Digital Twin for Grassland Management. In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET). 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Czechia. IEEE. https://doi.org/10.1109/icecet55527.2022.9873446
    Project: DiLaAg (2018–2022)
  • An Exploratory Study on the Complexity and Machine Learning Predictability of Stock Market Data / Raubitzek, S., & Neubauer, T. (2022). An Exploratory Study on the Complexity and Machine Learning Predictability of Stock Market Data. Entropy, 24(3), Article 332. https://doi.org/10.3390/e24030332
    Download: paper pdf (2.19 MB)
    Project: DiLaAg (2018–2022)
  • Systemic design requirements for sustainable Digital Twins in precision livestock farming / Mallinger, K., Purcell, W., & Neubauer, T. (2022). Systemic design requirements for sustainable Digital Twins in precision livestock farming. In D. Berckmans, M. Oczak, M. Iwersen, & K. Wagener (Eds.), Precision Livestock Farming ’22 (pp. 718–725). https://doi.org/10.34726/4644
    Download: PDF (1.94 MB)
    Project: DiLaAg (2018–2022)
  • The potential of Explainable Artificial Intelligence in Precision Livestock Farming / Hoxhallari, K., Purcell, W., & Neubauer, T. (2022). The potential of Explainable Artificial Intelligence in Precision Livestock Farming. In D. Berckmans, M. Oczak, M. Iwersen, & K. Wagener (Eds.), Precision Livestock Farming 2022 : papers presented at the 10th European Conference on Precision Livestock Farming (pp. 710–717). University of Veterinary Medicine Vienna. https://doi.org/10.34726/4701
    Download: Full text (169 KB)
    Project: DiLaAg (2018–2022)
  • Plus IQ-Agri Photovoltaics : Integration as a Path to the Plus-Energy-Quarters / Herbig, U., Berger, K., Damjanovic, D., Eitzinger, J., Neubauer, T., Pont, U., Schauppenlehner, T., Shala-Mayerhofer, V., Tjoa, A. M., Wagner, D. A., Weihs, P., & Zamini, S. (2022). Plus IQ-Agri Photovoltaics : Integration as a Path to the Plus-Energy-Quarters. AgroVoltaics 2022 - Conference and Exhibition, Piacenza, Italy. http://hdl.handle.net/20.500.12708/108497

2021

2020

2018

2016

2015

  • How to increase the inventory efficiency in information security risk and compliance management / Fenz, S., Heurix, J., & Neubauer, T. (2015). How to increase the inventory efficiency in information security risk and compliance management. In J. Becker, J. vom Brocke, & M. de Marco (Eds.), Proceedings of the European Conference on Information Systems (ECIS) 2015 (pp. 1–12). AIS. https://doi.org/10.18151/7217311
  • A taxonomy for privacy enhancing technologies / Heurix, J., Zimmermann, P., Neubauer, T., & Fenz, S. (2015). A taxonomy for privacy enhancing technologies. Computers and Security, 53, 1–17. https://doi.org/10.1016/j.cose.2015.05.002
  • Semergy - neue Ansätze in der Planung energieeffizienter Gebäude / Pont, U., Ghiassi, N., Shayeganfar, F., Fenz, S., Heurix, J., Anjomshoaa, A., Hammerberg, K., Neubauer, T., Taheri, M., Sustr, C., Tjoa, A. M., & Mahdavi, A. (2015). Semergy - neue Ansätze in der Planung energieeffizienter Gebäude. In ZIG - HS Luzern (Ed.), 11. ZIG-Planerseminar - Handouts (p. ’?). http://hdl.handle.net/20.500.12708/64374

2014

2013

  • FORISK: Formalizing information security risk and compliance management / Fenz, S., Neubauer, T., Accorsi, R., & Koslowski, T. (2013). FORISK: Formalizing information security risk and compliance management. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, EU. https://doi.org/10.1109/dsnw.2013.6615533
  • A Rule-Based Transformation System for Converting Semi-Structured Medical Documents / Heurix, J., Rella, A., Fenz, S., & Neubauer, T. (2013). A Rule-Based Transformation System for Converting Semi-Structured Medical Documents. Health and Technology, 3(1), 51–63. https://doi.org/10.1007/s12553-013-0040-0
  • An ontology-aided Optimization Approach to Eco-Efficient Building Design / Shayeganfar, F., Anjomshoaa, A., Heurix, J., Sustr, C., Ghiassi, N., Pont, U., Fenz, S., Neubauer, T., Tjoa, A. M., & Mahdavi, A. (2013). An ontology-aided Optimization Approach to Eco-Efficient Building Design. In IBPSA (Ed.), Building Simulation 2013 - 13th International Conference of the International Building Performance Simulation Association. (pp. 2193–2199). IBPSA. http://hdl.handle.net/20.500.12708/64187
  • Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit / Heurix, J., Fenz, S., Anjomshoaa, A., Neubauer, T., Tjoa, A. M., Taheri, M., Shayeganfar, F., Pont, U., Ghiassi, N., Sustr, C., & Mahdavi, A. (2013). Multi-objective optimization in the SEMERGY environment for sustainable building design and retrofit. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 27–34). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64162
  • Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment / Pont, U., Shayeganfar, F., Ghiassi, N., Taheri, M., Sustr, C., Mahdavi, A., Heurix, J., Fenz, S., Neubauer, T., Tjoa, A. M., & Anjomshoaa, A. (2013). Recent advances in SEMERGY: A semantically enriched optimization environment for performance-guided building design and refurbishment. In A. Mahdavi & B. Martens (Eds.), Proceedings of the 2nd Central European Symposium on Building Physics 9-11 September 2013, Vienna, Austria (pp. 19–26). ÖKK-Editions. http://hdl.handle.net/20.500.12708/64161

2012

2011

2010

  • Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten / Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik : e & i, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2
  • Workshop-based Security Safeguard Selection with AURUM / Neubauer, T., & Pehn, M. (2010). Workshop-based Security Safeguard Selection with AURUM. International Journal On Advances in Security, 3, 123–134. http://hdl.handle.net/20.500.12708/168178
  • On the Singularity of Valuating IT Security Investments / Neubauer, T., & Hartl, C. (2010). On the Singularity of Valuating IT Security Investments. In Proceedings of the 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (pp. 549–556). IEEE Computer Society Washington. http://hdl.handle.net/20.500.12708/53685
  • Workshop-Based Risk Assessment for the Definition of Secure Business Processes / Neubauer, T., & Pehn, M. (2010). Workshop-Based Risk Assessment for the Definition of Secure Business Processes. In 2010 Second International Conference on Information, Process, and Knowledge Management. Second International Conference on Information, Process, and Knowledge Management (eKNOW’10), St. Maarten, EU. IEEE Computer Society. https://doi.org/10.1109/eknow.2010.8
  • A Roadmap for Personal Identity Management / Neubauer, T., & Heurix, J. (2010). A Roadmap for Personal Identity Management. In 2010 Fifth International Conference on Systems. 2010 Fifth International Conference on Systems (ICONS), Menuires, Frankreich, EU. IEEE Computer Society. https://doi.org/10.1109/icons.2010.30
  • On the Security of Outsourced and Untrusted Databases / Heurix, J., & Neubauer, T. (2010). On the Security of Outsourced and Untrusted Databases. In 2010 IEEE/ACIS 9th International Conference on Computer and Information Science. 9th IEEE/ACIS International Conference on Computer and Information Science, Kaminoyama (Yamagata), Japan, Non-EU. IEEE Computer Society Washington. https://doi.org/10.1109/icis.2010.60
  • Secure Distributed Transparent File Storage (DTFS) / Neubauer, T. (2010). Secure Distributed Transparent File Storage (DTFS) (No. TR2010-03). http://hdl.handle.net/20.500.12708/36777

2009

  • A Process Model for RFID based Business Process Analysis / Neubauer, T., Goluch, G., Jakoubi, S., Tjoa, S., & Wisser, M. (2009). A Process Model for RFID based Business Process Analysis. In 2009 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009) (pp. 478–483). IEEE. http://hdl.handle.net/20.500.12708/53683
  • Ontologiebasiertes IT Risikomanagement / Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Ontologiebasiertes IT Risikomanagement. In D.A.CH Security 2009 (pp. 14–24). Heise Zeitschriften Verlag GmbH & Co. KG. http://hdl.handle.net/20.500.12708/53162
    Project: SecOnt (2008–2010)
  • Massenpseudonymisierung von persönlichen medizinischen Daten / Heurix, J., & Neubauer, T. (2009). Massenpseudonymisierung von persönlichen medizinischen Daten. In D.A.CH Security 2009 (p. 8). Heise Zeitschriften Verlag GmbH & Co. KG. http://hdl.handle.net/20.500.12708/53678
  • A Roadmap to Risk-Aware Business Process Management / Jakoubi, S., Neubauer, T., & Tjoa, S. (2009). A Roadmap to Risk-Aware Business Process Management. In 2009 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009) (pp. 23–27). IEEE. http://hdl.handle.net/20.500.12708/53680
  • Applying a Threshold Scheme to the Pseudonymization of Health Data / Riedl, B., Grascher, V., & Neubauer, T. (2009). Applying a Threshold Scheme to the Pseudonymization of Health Data. In Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’07) (pp. 397–400). http://hdl.handle.net/20.500.12708/53688
  • Zentralisierte Pseudonymisierung von medizinischen Patientendaten / Heurix, J., Mück, T., & Neubauer, T. (2009). Zentralisierte Pseudonymisierung von medizinischen Patientendaten. In Tagunsgsband eHealth2009 & eHealth Benchmarking 2009 (pp. 207–213). http://hdl.handle.net/20.500.12708/53679
  • An Evaluation of Technologies for the Pseudonymization of Medical Data / Neubauer, T., & Kolb, M. (2009). An Evaluation of Technologies for the Pseudonymization of Medical Data. Computer and Information Science 2009, 47–60. https://doi.org/10.1007/978-3-642-01209-9_5
  • Interactive selection of Web services under multiple objectives / Neubauer, T., & Stummer, C. (2009). Interactive selection of Web services under multiple objectives. Information Technology and Management, 11(1), 25–41. https://doi.org/10.1007/s10799-009-0058-1
  • A Comparison of Security Safeguard Selection Methods / Neubauer, T. (2009). A Comparison of Security Safeguard Selection Methods. In Proceedings of the 11th International Conference on Enterprise Information Systems, ICEIS 2009 (p. 4). Springer. http://hdl.handle.net/20.500.12708/53682
  • Technologies for the Pseudonymization of Medical Data: A Legal Evaluation / Neubauer, T., & Kolb, M. (2009). Technologies for the Pseudonymization of Medical Data: A Legal Evaluation. In 2009 Fourth International Conference on Systems. Second International Conference on Systems, Cancun, Mexiko, Non-EU. IEEE Computer Society. https://doi.org/10.1109/icons.2009.48
  • Business Process-Based Resource Importance Determination / Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Business Process-Based Resource Importance Determination. In Lecture Notes in Computer Science (pp. 113–127). Springer. https://doi.org/10.1007/978-3-642-03848-8_9
    Project: SecOnt (2008–2010)
  • How to determine threat probabilities using ontologies and Bayesian networks / Fenz, S., & Neubauer, T. (2009). How to determine threat probabilities using ontologies and Bayesian networks. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW ’09. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, Non-EU. ACM New York. https://doi.org/10.1145/1558607.1558686
    Project: SecOnt (2008–2010)
  • Automated Risk and Utility Management / Ekelhart, A., Fenz, S., & Neubauer, T. (2009). Automated Risk and Utility Management. In Proceedings of the Sixth International Conference on Information Technology: New Generations (pp. 393–398). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52658
    Project: SecOnt (2008–2010)
  • Ontology-based Decision Support for Information Security Risk Management / Fenz, S., Ekelhart, A., & Neubauer, T. (2009). Ontology-based Decision Support for Information Security Risk Management. In Proceedings of the 4th International Conference on Systems (pp. 80–85). http://hdl.handle.net/20.500.12708/52623
    Project: SecOnt (2008–2010)
  • An evaluation of technologies for the pseudonymization of medical data / Neubauer, T., Ekelhart, A., & Kolb, M. (2009). An evaluation of technologies for the pseudonymization of medical data. In Proceedings of the 2009 ACM symposium on Applied Computing - SAC ’09. 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, Non-EU. ACM. https://doi.org/10.1145/1529282.1529465
    Project: PIPE (2008–2012)
  • AURUM: A Framework for Information Security Risk Management / Neubauer, T., Ekelhart, A., & Fenz, S. (2009). AURUM: A Framework for Information Security Risk Management. In Proceedings of the 42th Hawaii International Conference on System Sciences (HICSS’09) (pp. 1–10). http://hdl.handle.net/20.500.12708/52370
    Project: SecOnt (2008–2010)

2008

  • Improving Patients Privacy with Pseudonymization / Neubauer, T., & Riedl, B. (2008). Improving Patients Privacy with Pseudonymization. In Proceedings of the International Congress of the European Federation for Medical Informatics. Proceedings of the XXIst International Congress of the European Federation for Medical Informatics (MIE 2008), Göteborg, Schweden, EU. IOS Press. http://hdl.handle.net/20.500.12708/52376
  • Pseudonymization for improving the Privacy in E-Health Applications / Neubauer, T., Riedl, B., Fenz, S., & Grascher, V. (2008). Pseudonymization for improving the Privacy in E-Health Applications. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). 41th Hawaii International Conference on System Sciences (HICSS’08), Hawaii, Non-EU. IEEE Computer Society. https://doi.org/10.1109/hicss.2008.366
  • Economic and Security Aspects of Applying a Threshold Scheme in e-Health / Neubauer, T., Riedl, B., Grascher, V., & Kolb, M. (2008). Economic and Security Aspects of Applying a Threshold Scheme in e-Health. In 2008 Third International Conference on Availability, Reliability and Security. Third International Conference on Availability, Reliability and Security ARES, Barcelona, EU. IEEE Computer Society. https://doi.org/10.1109/ares.2008.175
  • Interaktive Portfolioauswahl im IT-Servicemanagement / Neubauer, T., & Stummer, C. (2008). Interaktive Portfolioauswahl im IT-Servicemanagement. HMD Praxis Der Wirtschaftsinformatik, 264. http://hdl.handle.net/20.500.12708/170692
  • Multiobjective Decision Support for defining Secure Business Processes: A Case Study / Neubauer, T., & Heurix, J. (2008). Multiobjective Decision Support for defining Secure Business Processes: A Case Study. International Journal of Business Intelligence and Data Mining, 3(2), 177. https://doi.org/10.1504/ijbidm.2008.020518
  • A Case Study on the Multicriteria Selection of Software Components / Neubauer, T., & Stummer, C. (2008). A Case Study on the Multicriteria Selection of Software Components. In 2008 IEEE Asia-Pacific Services Computing Conference. 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), Yilan, Taiwan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/apscc.2008.138
  • PIPE: Ein System zur Pseudonymisierung von Gesundheitsdaten / Neubauer, T., & Mück, T. (2008). PIPE: Ein System zur Pseudonymisierung von Gesundheitsdaten. In Proceedings of e-Health 2008. eHealth 2008 conference, Portoroz, Slovenia, EU. http://hdl.handle.net/20.500.12708/52374
  • Objective Types for the Valuation of Secure Business Processes / Neubauer, T., & Heurix, J. (2008). Objective Types for the Valuation of Secure Business Processes. In Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science (pp. 231–236). http://hdl.handle.net/20.500.12708/52373
  • Defining Secure Business Processes with Respect to Multiple Objectives / Neubauer, T., & Heurix, J. (2008). Defining Secure Business Processes with Respect to Multiple Objectives. In 2008 Third International Conference on Availability, Reliability and Security. Third International Conference on Availability, Reliability and Security ARES, Barcelona, EU. https://doi.org/10.1109/ares.2008.174
  • Interactive Selection of ISO 27001 Controls under Multiple Objectives / Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive Selection of ISO 27001 Controls under Multiple Objectives. In Proceedings of The Ifip Tc 11 23rd International Information Security Conference (pp. 477–492). Springer-Verlag GmbH. https://doi.org/10.1007/978-0-387-09699-5_31
    Project: SecOnt (2008–2010)

2007

2006

  • Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF / Neubauer, T., Weippl, E., & Biffl, S. (2006). Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 723–731). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51391
  • Secure Business Process Management: A Roadmap / Neubauer, T., Klemen, M., & Biffl, S. (2006). Secure Business Process Management: A Roadmap. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 457–464). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51390
  • Workshop-based multiobjective security safeguard selection / Neubauer, T., Stummer, C., & Weippl, E. (2006). Workshop-based multiobjective security safeguard selection. In First International Conference on Availability, Reliability and Security (ARES’06). First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria. IEEE Computer Society. https://doi.org/10.1109/ares.2006.144
  • Workshop-based Multiobjective Security Safeguard Selection / Neubauer, T., & Weippl, E. (2006). Workshop-based Multiobjective Security Safeguard Selection. In Proceedings of ARES 2006. IEEE Computer Society, Vienna, Austria. http://hdl.handle.net/20.500.12708/51424

2005