Wolfgang Boehmer

According to our database1, Wolfgang Boehmer authored at least 13 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Bestimmung des technical-Value at Risk mittels der bedingten Wahrscheinlichkeit, Angriffsbäumen und einer Risikofunktion.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Toward a target and coupling function of three different Information Security Management Systems.
Concurr. Comput. Pract. Exp., 2012

2011
Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risks with Game Theory.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Über die Anwendung von Sicherheitsmanagement Systemen, Policies und Spieltheorie zur Unternehmensabsicherung.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

2010
Analysis of Strongly and Weakly Coupled Management Systems in Information Security.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Toward a Target Function of an Information Security Management System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Survivability and Business Continuity Management System According to BS 25999.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Diskussionsvorschlag einer Lösungsskizze zur Behandlung von operationellen IT-Sicherheitsrisken nach Basel II auf der Grundlage von Anforderungen der Credit Suisse.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2008


  Loading...