Simon Tjoa

Orcid: 0000-0003-2280-9604

According to our database1, Simon Tjoa authored at least 58 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Controllable Artificial Intelligence.
ERCIM News, 2024

Cyber Resilience Fundamentals
520, Springer, ISBN: 978-3-031-52063-1, 2024

2023
Procurement of Secure AI - A Practical Guide.
ERCIM News, 2023

DISA - A Blockchain-Based Distributed Information Security Audit.
Proceedings of the Information Integration and Web Intelligence, 2023

2022
Guest Editorial: Special Issue on the ARES-Workshops 2021.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Fighting Cybercrime through Education: Integration of an Educational Cyber Defence Centre into Cyber Security Curricula.
ERCIM News, 2022

Cyber Exercises in Computer Science Education.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Security considerations for the procurement and acquisition of Artificial Intelligence (AI) systems.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

Business Continuity & Disaster Recovery A simulation game for holistic cyber security education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

A Design Thinking Approach on Information Security.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Guest Editorial: Special Issue on the ARES-Workshops 2020.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Security Management and the Slow Adoption of Blockchains.
ERCIM News, 2021

Towards Resilient Artificial Intelligence: Survey and Research Issues.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020

The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks.
J. Internet Serv. Inf. Secur., 2020

Comparing Blockchain Standards and Recommendations.
Future Internet, 2020

Penetration Testing Artificial Intelligence.
ERCIM News, 2020

Medical Blockchains and Privacy in Austria - Technical and Legal Aspects.
Proceedings of the International Conference on Software Security and Assurance, 2020

2018
A Readiness Model for Measuring the Maturity of Cyber Security Incident Management.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

APT RPG: Design of a Gamified Attacker/Defender Meta Model.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
High-Level Self-Sustaining Information Security Management Framework.
Balt. J. Mod. Comput., 2017

IoE Security Threats and You.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
The Role of ICT to Achieve the UN Sustainable Development Goals (SDG).
Proceedings of the ICT for Promoting Human Development and Protecting the Environment, 2016

Defeating the Database Adversary Using Deception - A MySQL Database Honeypot.
Proceedings of the International Conference on Software Security and Assurance, 2016

The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication.
Proceedings of the International Conference on Software Security and Assurance, 2016

2015
Contrology - An Ontology-Based Cloud Assurance Approach.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

An Open Source Code Analyzer and Reviewer (OSCAR) Framework.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Keeping an Eye on Your Security Through Assurance Indicators.
Proceedings of the SECRYPT 2014, 2014

Simulation-Based Cyber-Attack Assessment of Critical Infrastructures.
Proceedings of the Enterprise and Organizational Modeling and Simulation, 2014

2013
Frontiers in Security and Dependability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Evidence and Cloud Computing: The Virtual Machine Introspection Approach.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach.
Int. J. Mob. Comput. Multim. Commun., 2013

Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities.
Proceedings of the IEEE International Conference on Systems, 2013

Taxonomy of Data Fragment Classification Techniques.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

A Comprehensive Literature Review of File Carving.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Generic Approach to Critical Infrastructure Modeling and Simulation.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Discussion on the Challenges and Opportunities of Cloud Forensics.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation.
IEEE Trans. Serv. Comput., 2011

Advanced File Carving Approaches for Multimedia Files.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Roadmap to Approaches for Carving of Fragmented Multimedia Files.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach.
Proceedings of the ARES 2010, 2010

A Formal Approach Towards Risk-Aware Service Level Analysis and Planning.
Proceedings of the ARES 2010, 2010

2009
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management.
Proceedings of the Database and Expert Systems Applications, 2009

Towards Automating Social Engineering Using Social Networking Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A reference model for risk-aware business process management.
Proceedings of the CRiSIS 2009, 2009

A process model for RFID based Business Process Analysis.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

A roadmap to risk-aware business process management.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
Proceedings of the 16th European Conference on Information Systems, 2008

Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology.
Proceedings of the The Third International Conference on Availability, 2008

2007
Rope: A Methodology for Enabling the Risk-Aware Modelling and Simulation of Business Processes.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

CASSIS - Computer-based Academy for Security and Safety in Information Systems.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...