Maria Leitner

Orcid: 0000-0003-1371-5446

Affiliations:
  • University of Vienna, Austria


According to our database1, Maria Leitner authored at least 34 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Machine Learning Based Prediction of Frequency Hopping Spread Spectrum Signals.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

BAnDIT: Business Process Anomaly Detection in Transactions.
Proceedings of the Cooperative Information Systems - 29th International Conference, 2023

2022
Collaborative Patterns for Workflows with Collaborative Robots.
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022

2021
Enabling exercises, education and research with a comprehensive cyber range.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

A Training Concept Based on a Digital Twin for a Wafer Transportation System.
Proceedings of the 23rd Conference on Business Informatics, 2021

Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Preparing for National Cyber Crises Using Non-linear Cyber Exercises.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments.
J. Netw. Comput. Appl., 2020

International Workshop on Cyber Range Technologies and Applications (CACOE 2020).
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
Privacy-aware Data Assessment of Online Social Network Registration Processes.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
CISA: Establishing National Cyber Situational Awareness to Counter New Threats.
ERCIM News, 2016

Evaluation Methods in Process-Aware Information Systems Research with a Perspective on Human Orientation.
Bus. Inf. Syst. Eng., 2016

An Experimental Approach to Reputation in E-Participation.
Proceedings of the International Conference on Software Security and Assurance, 2016

A Versatile, Secure and Privacy-Aware Tool for Online Participation.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A Cross-Layer Security Analysis for Process-Aware Information Systems.
CoRR, 2015

2014
A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions.
Inf. Softw. Technol., 2014

Anomaly detection and visualization in generative RBAC models.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
An Experimental Study on the Design and Modeling of Security Concepts in Business Processes.
Proceedings of the Practice of Enterprise Modeling, 2013

Delta Analysis of Role-Based Access Control Models.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Definition and Enactment of Instance-Spanning Process Constraints.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems.
Proceedings of the 13th ACM/IEEE International Conference on Grid Computing, 2012

A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models.
Proceedings of the Business Process Management Workshops, 2012

2011
SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Responsibility-driven Design and Development of Process-aware Security Policies.
Proceedings of the Sixth International Conference on Availability, 2011

AW-RBAC: Access Control in Adaptive Workflow Systems.
Proceedings of the Sixth International Conference on Availability, 2011

Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges.
Proceedings of the Sixth International Conference on Availability, 2011

2010
On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010


  Loading...