Heidelinde Hobel

Affiliations:
  • SBA Research, Vienna, Austria


According to our database1, Heidelinde Hobel authored at least 15 papers between 2013 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Qualitative Spatial Configuration Search.
Spatial Cogn. Comput., 2016

Mapping information security standard ISO 27002 to an ontological structure.
Inf. Comput. Secur., 2016

On the Quality of Annotations with Controlled Vocabularies.
Proceedings of the Collective Online Platforms for Financial and Environmental Awareness, 2016

Deriving the Geographic Footprint of Cognitive Regions.
Proceedings of the Geospatial Data in a Changing World, 2016

2015
Advanced social engineering attacks.
J. Inf. Secur. Appl., 2015

A Semantic Region Growing Algorithm: Extraction of Urban Settings.
Proceedings of the AGILE 2015, 2015

2014
Protecting Anonymity in Data-Driven Biomedical Science.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

IPv6 Security: Attacks and Countermeasures in a Nutshell.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Analysing supplier locations using social and semantic data: a case study based on indonesian factories.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

Exploiting Linked Spatial Data and Granularity Transformations.
Proceedings of the Workshop on Geographic Information Observatories 2014 co-located with the 8th International Conference on Geographic Information Science (GIScience 2014), 2014

Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels.
Proceedings of the Joint Proceedings of the 1th Workshop on Semantic Sentiment Analysis (SSA2014), 2014

Towards a Hardware Trojan Detection Cycle.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Hardware Malware
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02338-5, 2013

Social engineering attacks on the knowledge worker.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013


  Loading...