Gerald Quirchmayr

Orcid: 0000-0003-2998-742X

Affiliations:
  • University of Vienna, Austria


According to our database1, Gerald Quirchmayr authored at least 128 papers between 1987 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories.
IEEE Access, 2024

Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review.
IEEE Access, 2024

Learning to Rank Privacy Design Patterns: A Semantic Approach to Meeting Privacy Requirements.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2024

2023
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis.
Mach. Learn. Knowl. Extr., 2022

KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data.
Comput. Secur., 2022

From User Stories to Data Flow Diagrams for Privacy Awareness: A Research Preview.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2022

PrivacyStory: Tool Support for Extracting Privacy Requirements from User Stories.
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022

Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

A Tailored Model for Cyber Security Education Utilizing a Cyber Range.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Cyber Exercises in Computer Science Education.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
A Named Entity Recognition Based Approach for Privacy Requirements Engineering.
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

Assuring long-term operational resilience in a pandemic: Lessons learned from COVID-19.
Proceedings of the IAIT 2021: The 12th International Conference on Advances in Information Technology, Bangkok, Thailand, 29 June 2021, 2021

Security, Trust and Privacy: Challenges for Community-Oriented ICT Support.
Proceedings of the Innovations for Community Services - 21st International Conference, 2021

An Approach to Supporting Militia Collaboration in Disaster Relief Through a Digital Environment.
Proceedings of the Innovations for Community Services - 21st International Conference, 2021

Poster: The Need for a Collaborative Approach to Cyber Security Education.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Virtual Knowledge Graphs for Federated Log Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
An Automated Ontology-Based Security Requirements Identification for the Vehicular Domain.
J. Data Intell., 2020

Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS Approach.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

2019
An Improved Quick Artificial Bee Colony Algorithm for Portfolio Selection.
Int. J. Comput. Intell. Appl., 2019

SemIDEA: Towards a Semantic IoT Data Analytic Framework for Facilitating Environmental Protection.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019

Ontology-Based Model for Automotive Security Verification and Validation.
Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019

Toward the Ontology-Based Security Verification and Validation Model for the Vehicular Domain.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Challenges of GDPR and the NIS Directive.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Towards Data Anonymization in Data Mining via Meta-heuristic Approaches.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Enhancing credibility of digital evidence through provenance-based incident response handling.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
CloudWoT - A Reference Model for Knowledge-based IoT Solutions.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018

A Machine Learning Approach for Privacy-preservation in E-business Applications.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Security-Driven Information Flow Modelling for Component Integration in Complex Environments.
Proceedings of the 10th International Conference on Advances in Information Technology, 2018

A GDPR compliance module for supporting the exchange of information between CERTs.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Towards a security and privacy protection model for semantic query engines.
Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, 2017

A comparative study on innovative approaches for privacy-preservation in knowledge discovery.
Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09, 2017

2016
Wissensaustausch und Vertrauen unter Computer Emergency Response Teams - eine europäische Herausforderung.
Datenschutz und Datensicherheit, 2016

Towards a generic data-model for cross-media communication during disasters & crises: Proposed framework for classification of platforms and technologies.
Proceedings of the 3rd International Conference on Information and Communication Technologies for Disaster Management, 2016

Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Major Challenges in Structuring and Institutionalizing CERT-Communication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Cross-Media Linking in Times of Disaster.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal Rules.
Proceedings of the 38th Australasian Computer Science Conference, 2015

Towards a CERT-Communication Model as Basis to Software Assurance.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study.
Proceedings of the Information and Communication Technology, 2014

A Pilot Study on the Effects of Personality Traits on the Usage of Mobile Applications: A Case Study on Office Workers and Tertiary Students in the Bangkok Area.
Proceedings of the Recent Advances in Information and Communication Technology, 2014

An evaluation model for analysing persuasive systems in mobile healthcare.
Proceedings of the International Conference on Computer, 2014

2013
A Knowledge Transfer Framework for Supporting the Transition to Agile Development of Web Application in the Thai Telecommunications Industry.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Cross-Media Analysis for Communication during Natural Disasters.
Proceedings of the Advances in Information Technology - 6th International Conference, 2013

Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Open Source Intelligence in Disaster Management.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Conducting a Privacy Impact Analysis for the Analysis of Communication Records.
Proceedings of the Perspectives in Business Informatics Research, 2012

A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation.
IEEE Trans. Serv. Comput., 2011

Towards an intelligent integrated language learning environment.
Int. J. Pervasive Comput. Commun., 2011

Challenges in Implementing Information Security Policies.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Veränderter Website-Traffic bei Einführung von barrierefreiem Web - eine Fallstudie.
HMD Prax. Wirtsch., 2010

Trust and privacy in location-based services.
Elektrotech. Informationstechnik, 2010

Natural language processing technologies for developing a language learning environment.
Proceedings of the iiWAS'2010, 2010

A Prototype for the Support of Integrated Software Process Development and Improvement.
Proceedings of the Advances in Information Technology - 4th International Conference, 2010

Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results.
Proceedings of the ARES 2010, 2010

2009
Towards Requirements for a Case Preparation Support System Based on Digital Evidence.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Requirements for a Knowledge Transfer Framework in the Field of Software Development Process Management for Executive Information Systems in the Telecommunications Industry.
Proceedings of the Advances in Information Technology - Third International Conference, 2009

A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management.
Proceedings of the Database and Expert Systems Applications, 2009

Einige aktuelle Gründe für eine integrierte Betrachtung von Rechtsinformatik und Informationsrecht.
Proceedings of the Informatik in Recht und Verwaltung: Gestern - Heute, 2009

2008
A Privacy-Enhancing Architecture for Databases.
J. Res. Pract. Inf. Technol., 2008

A middleware for location-based mobile applications with privacy protection.
Proceedings of the iiWAS'2008, 2008

Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
Proceedings of the 16th European Conference on Information Systems, 2008

A platform for the development of location-based mobile applications with privacy protection.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Cross Domain Privacy Protection for Location-Based Services.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
Proceedings of the The Third International Conference on Availability, 2008

2007
Transaction pseudonyms in mobile environments.
J. Comput. Virol., 2007

Information preloading strategies for e-government sites based on user's stated preference.
J. Enterp. Inf. Manag., 2007

Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies.
Proceedings of the Trust, 2007

Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

The motivation and proposition of a privacy-enhancing architecture for operational databases.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

Blended Learning Technology in Information Security Management Courses.
Proceedings of the The Second International Conference on Availability, 2007

A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications.
Proceedings of the The Second International Conference on Availability, 2007

2006
A framework for outsourcing IS/IT security services.
Inf. Manag. Comput. Secur., 2006

Mining MOUCLAS Patterns and Jumping MOUCLAS Patterns to Construct Classifiers.
Proceedings of the Data Mining - Theory, Methodology, Techniques, and Applications, 2006

2004
Intelligent Technology for Well Logging Analysis.
Proceedings of the Intelligent Information Processing II, 2004

Data Mining by MOUCLAS Algorithm for Petroleum Reservoir Characterization from Well Logging Data.
Proceedings of the Artificial Intelligence Applications and Innovations, 2004

An International Security Perspective.
Proceedings of the Information Security Management, Education and Privacy, 2004

Supporting Collaborative Communication in a Multi-layer Meta-process Model for Evolutionary Shared Workflows.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Supporting Web-Based Collaboration between Virtual Enterprise Partners.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

A Formal Model for the Relationship between Culture and Trust within is Security Management.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

Survivability and Business Continuity Management.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003

Through-Walls Communication for Medical Emergency Services.
Int. J. Hum. Comput. Interact., 2003

A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

Enterprise Application Integration - Future Revisited?
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Supporting Knowledge Management in Context-Aware and Pervasive Environments Using Event-Based Co-ordination.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing..
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
The Role Of Culture In the Development of Global E-Commerce Systems.
Proceedings of the Information Systems: The e-Business Challenge, 2002

Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002

Coordination of Inter-organisational Healthcare Processes via Specialisation of Internet-Based Object Life Cycles.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Some Thoughts on Research Perspectives in E-business.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Establishment of Virtual Enterprise Contracts.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

2001
Adaptive Context Aware Legal Work Environments - Basis for Developing Legal Live Spaces on the Web.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001

Analyzing Workflow Audit Trails in Web-Based Environments with Fuzzy Logic.
Proceedings of the Electronic Commerce and Web Technologies, 2001

Identifying Emerging Web-Communication Patterns Between Government and Citizens.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

Design of an Open and Distance Learning Framework Focused on Knowledge Management.
Proceedings of the 14th Bled eConference: e-Everything: e-Commerce, 2001

2000
Assignment of tasks to competing nodes when task duration times are fuzzy.
J. Intell. Fuzzy Syst., 2000

Assigning Tasks to Resource Pools: A Fuzzy Set Approach.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1998
A Prototype Model for Data Warehouse Security Based on Metadata.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

The Dissemination of United Nations Crime and Justice Information: Future Developments of UNCJIN.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Rule Extraction Using Rough Sets When Membership Values Are Intervals.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998

1997
Evaluating Workflow Management Systems.
Proceedings of the Eighth International Workshop on Database and Expert Systems Applications, 1997

A Meta Message Approach for Electronic Data Interchange (EDI).
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997

1996
Process Model Reuse to Promote Organizational Learning in Software Development.
Proceedings of the COMPSAC '96, 1996

1995
Comparison and Analysis of Selected CIM-Laboratory Concepts and their Importance for the Improvement of Staff Training.
Proceedings of the Information Management in Computer Integrated Manufacturing: A Comprehensive Guide to State-of-the-Art CIM Solutions, 1995

A Fuzzy Model of Managerial Decision Making Incorporating Risk and Ambiguity Aversion
Proceedings of the Database and Expert Systems Applications, 1995

1994
Tis/mm.
Proceedings of the International Conference on Information and Communications Technologies in Tourism, 1994

Identifying Precedents under Uncertainty.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

Managing Structured Documents in Distributed Publishing Environments.
Proceedings of the Database and Expert Systems Applications, 5th International Conference, 1994

Organizing MLS databases from a data modelling point of view.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Open Texture and Knowledge Representation.
Proceedings of the Terminology and Knowledge Engineering, 1993

The Application of Kripke-Type Structures to Regional Development Programs.
Proceedings of the Database and Expert Systems Applications, 4th International Conference, 1993

1991
A Formal Model for the Support of Analogical Reasoning in Legal Expert Systems.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

Making C++ Object Persistent by Using a Standard Relational Database System.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

1989
Die Unterstützung der inkrementellen juristischen Fallösung durch wissensbasierte Systeme.
PhD thesis, 1989

Der Einsatz von Expertensystemtechniken zur Unterstützung der Arbeit mit Rechtsinformationssystemen.
Proceedings of the GI, 1989

1987
Konzeptionelle Vorschläge für eine umfassende IT-Unterstützung von Richtern und Staatsanwälten sowie Ansätze zu ihrer Realisierung auf der Grundlage vernetzbarer PCs des Industriestandards.
Proceedings of the GI, 1987

Der Einsatz der Modellierungssprache OBLOG zum Entwurf von Juristischen Expertensystemen im Wege des Prototyping am Beispiel eines Modells des Verfahrens der Eidesstattlichen Versicherung.
Proceedings of the Informationsbedarfsermittlung und -analyse für den Entwurf von Informationssystemen, 1987


  Loading...