Name
Affiliation
Papers
SIMON TJOA
Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria
30
Collaborators
Citations 
PageRank 
38
180
20.01
Referers 
Referees 
References 
401
664
406
Search Limit
100664
Title
Citations
PageRank
Year
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education00.342020
An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress)00.342018
A Readiness Model for Measuring the Maturity of Cyber Security Incident Management.00.342018
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security.00.342018
IoE Security Threats and You10.432017
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication00.342016
Contrology - An Ontology-Based Cloud Assurance Approach10.352015
An Open Source Code Analyzer and Reviewer (OSCAR) Framework00.342015
Touch to Authenticate — Continuous Biometric Authentication on Mobile Devices10.362015
Simulation-Based Cyber-Attack Assessment of Critical Infrastructures.10.382014
Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities50.542013
Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures20.392013
A Comprehensive Literature Review of File Carving.60.602013
Taxonomy of Data Fragment Classification Techniques.00.342013
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach00.342013
Evidence and Cloud Computing: The Virtual Machine Introspection Approach.120.722013
Discussion on the Challenges and Opportunities of Cloud Forensics.20.422012
A Generic Approach to Critical Infrastructure Modeling and Simulation00.342012
Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art181.132011
Advanced File Carving Approaches for Multimedia Files.160.832011
Roadmap to Approaches for Carving of Fragmented Multimedia Files60.502011
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning50.442010
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management60.572009
Towards Automating Social Engineering Using Social Networking Sites341.812009
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology151.052008
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support30.482008
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management201.972008
Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation130.952008
CASSIS - Computer-based Academy for Security and Safety in Information Systems10.482007
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.122.562007