Andreas Ekelhart

Orcid: 0000-0003-3682-1364

According to our database1, Andreas Ekelhart authored at least 75 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Distance-based linkage of personal microbiome records for identification and its privacy implications.
Comput. Secur., January, 2024

Semantic-enabled architecture for auditable privacy-preserving data analysis.
Semantic Web, 2024

Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024


2023
QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems.
IEEE Trans. Ind. Informatics, April, 2023

Semantic Web Machine Learning Systems: An Analysis of System Patterns.
Proceedings of the Compendium of Neurosymbolic Artificial Intelligence, 2023

Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

Combining Machine Learning and Semantic Web: A Systematic Mapping Study.
ACM Comput. Surv., 2023

Describing and Organizing Semantic Web and Machine Learning Systems in the SWeMLS-KG.
Proceedings of the Semantic Web - 20th International Conference, 2023

2022
Automated Security Risk Identification Using AutomationML-Based Engineering Data.
IEEE Trans. Dependable Secur. Comput., 2022

VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis.
Mach. Learn. Knowl. Extr., 2022

Graph-based managing and mining of processes and data in the domain of intellectual property.
Inf. Syst., 2022

KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data.
Comput. Secur., 2022

Reconciliation of Mental Concepts with Graph Neural Networks.
Proceedings of the Database and Expert Systems Applications, 2022

Anonymisation of Heterogeneous Graphs with Multiple Edge Types.
Proceedings of the Database and Expert Systems Applications, 2022

Utility and Privacy Assessment of Synthetic Microbiome Data.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Macro-level Inference in Collaborative Learning.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

An Efficient Approach for Anonymising the Structure of Heterogeneous Graphs.
Proceedings of the IEEE International Conference on Big Data, 2022

Efficient Bayesian Network Construction for Increased Privacy on Synthetic Data.
Proceedings of the IEEE International Conference on Big Data, 2022

Distance-based Techniques for Personal Microbiome Identification✱.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Privacy Risks and Anonymization of Microbiome Data.
ERCIM News, 2021

Digital Twins for Cyber-Physical Threat Detection and Response.
ERCIM News, 2021

An ATT&CK-KG for Linking Cybersecurity Attacks to Adversary Tactics and Techniques.
Proceedings of the ISWC 2021 Posters, 2021

The SLOGERT Framework for Automated Log Knowledge Graph Construction.
Proceedings of the Semantic Web - 18th International Conference, 2021

Virtual Knowledge Graphs for Federated Log Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Evaluation of Synthetic Data for Privacy-Preserving Machine Learning.
ERCIM News, 2020

Automated Knowledge Graph Construction From Raw Log Data.
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020

Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Privacy-Preserving Anomaly Detection Using Synthetic Data.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

A Baseline for Attribute Disclosure Risk in Synthetic Data.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.
J. Internet Serv. Inf. Secur., 2019

Securing the testing process for industrial automation software.
Comput. Secur., 2019

The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity.
Proceedings of the Semantic Web - ISWC 2019, 2019

A Versatile Security Layer for AutomationML.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Security Development Lifecycle for Cyber-Physical Production Systems.
Proceedings of the IECON 2019, 2019

Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process.
Proceedings of the IECON 2019, 2019

Semantic Integration and Monitoring of File System Activity.
Proceedings of the Posters and Demo Track of the 15th International Conference on Semantic Systems co-located with 15th International Conference on Semantic Systems (SEMANTiCS 2019), Karlsruhe, Germany, September 9th - to, 2019

Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Backdoor Attacks in Neural Networks - A Systematic Evaluation on Multiple Traffic Sign Datasets.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies.
Proceedings of the Information Systems Engineering in Responsible Information Systems, 2019

Utility and Privacy Assessments of Synthetic Data for Regression Tasks.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook.
Proceedings of the Security and Quality in Cyber-Physical Systems Engineering, 2019

2018
Securing Cyber-Physical Systems through Digital Twins.
ERCIM News, 2018

Taming the logs - Vocabularies for semantic security analysis.
Proceedings of the 14th International Conference on Semantic Systems, 2018

A Specification-based State Replication Approach for Digital Twins.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

Towards Security-Aware Virtual Environments for Digital Twins.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2015
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.
Inf. Technol. Manag., 2015

2014
Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Evolving Secure Information Systems through Attack Simulation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Simulation-based optimization of information security controls: An adversary-centric approach.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

2011
Verification, Validation, and Evaluation in Information Security Risk Management.
IEEE Secur. Priv., 2011

Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
Commun. Assoc. Inf. Syst., 2011

2009
An evaluation of technologies for the pseudonymization of medical data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Automated Risk and Utility Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Ontology-Based Decision Support for Information Security Risk Management.
Proceedings of the Fourth International Conference on Systems, 2009

AURUM: A Framework for Information Security Risk Management.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Formalizing information security knowledge.
Proceedings of the 2009 ACM Symposium on Information, 2009

Business Process-Based Resource Importance Determination.
Proceedings of the Business Process Management, 7th International Conference, 2009

2008
XML security - A comparative literature review.
J. Syst. Softw., 2008

Interactive Selection of ISO 27001 Controls under Multiple Objectives.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Fortification of IT Security by Automatic Security Advisory Processing.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Architectural approach for handling semi-structured data in a user-centred working environment.
Int. J. Web Inf. Syst., 2007

Ontological Mapping of Common Criteria's Security Assurance Requirements.
Proceedings of the New Approaches for Security, 2007

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Security aspects in Semantic Web Services Filtering.
Proceedings of the iiWAS'2007, 2007

Formal threat descriptions for enhancing governmental risk assessment.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Security Ontologies: Improving Quantitative Risk Analysis.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Security Issues for the Use of Semantic Web in E-Commerce.
Proceedings of the Business Information Systems, 10th International Conference, 2007

CASSIS - Computer-based Academy for Security and Safety in Information Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets.
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006

The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
Proceedings of the Ontologies-Based Databases and Information Systems, 2006

Security Ontology: Simulating Threats to Corporate Assets.
Proceedings of the Information Systems Security, Second International Conference, 2006


  Loading...