Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Istvan Madari
Hao Mao
Peter Malec
Silvia Santoro
Bartlomiej Twardowski
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
SIMON TJOA
Author Info
Open Visualization
Name
Affiliation
Papers
SIMON TJOA
Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria
30
Collaborators
Citations
PageRank
38
180
20.01
Referers
Referees
References
401
664
406
Search Limit
100
664
Publications (30 rows)
Collaborators (38 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
0
0.34
2020
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress)
0
0.34
2018
A Readiness Model for Measuring the Maturity of Cyber Security Incident Management.
0
0.34
2018
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security.
0
0.34
2018
IoE Security Threats and You
1
0.43
2017
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication
0
0.34
2016
Contrology - An Ontology-Based Cloud Assurance Approach
1
0.35
2015
An Open Source Code Analyzer and Reviewer (OSCAR) Framework
0
0.34
2015
Touch to Authenticate — Continuous Biometric Authentication on Mobile Devices
1
0.36
2015
Simulation-Based Cyber-Attack Assessment of Critical Infrastructures.
1
0.38
2014
Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities
5
0.54
2013
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures
2
0.39
2013
A Comprehensive Literature Review of File Carving.
6
0.60
2013
Taxonomy of Data Fragment Classification Techniques.
0
0.34
2013
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach
0
0.34
2013
Evidence and Cloud Computing: The Virtual Machine Introspection Approach.
12
0.72
2013
Discussion on the Challenges and Opportunities of Cloud Forensics.
2
0.42
2012
A Generic Approach to Critical Infrastructure Modeling and Simulation
0
0.34
2012
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art
18
1.13
2011
Advanced File Carving Approaches for Multimedia Files.
16
0.83
2011
Roadmap to Approaches for Carving of Fragmented Multimedia Files
6
0.50
2011
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning
5
0.44
2010
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management
6
0.57
2009
Towards Automating Social Engineering Using Social Networking Sites
34
1.81
2009
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology
15
1.05
2008
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support
3
0.48
2008
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
20
1.97
2008
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation
13
0.95
2008
CASSIS - Computer-based Academy for Security and Safety in Information Systems
1
0.48
2007
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
12
2.56
2007
1