Startseite UR

Bibliographie der Universität Regensburg

Exportieren als
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppieren nach: Datum | Autoren | Dokumentenart | Keine Gruppierung
Gehe zu: A | B | D | F | L | M | P | R | S | V | W | Y
Anzahl der Einträge in dieser Kategorie: 105.

A

Aziz, Haris, Rauchecker, Gerhard, Schryen, Guido und Walsh, Toby (2017) Algorithms for Max-Min Share Fair Allocation of Indivisible Chores. In: Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), 4-9 February 2017, San Francisco.

B

Bodenstein, Christian, Schryen, Guido und Neumann, Dirk (2012) Energy-Aware Workload Management Models for Operating Cost Reduction in Data Centers. European Journal of Operational Research : EJOR 222 (1), S. 157-167. Zugang zum Volltext eingeschränkt.

Bodenstein, Christian, Schryen, Guido und Neumann, Dirk (2011) Reducing Datacenter Energy Usage through Efficient Job Allocation. In: Proceedings of the 19th European Conference on Information Systems (ECIS 2011), 9-11 June 2011, Helsinki, Finland.

Bodenstein, Christian, Schryen, Guido und Neumann, Dirk (2010) From "Take-it-or-leave-it" offers to "Take-it-or-be-left-out" Ultimatum - A trade mechanism for Online Services. In: 18th European Conference on Information Systems (ECIS 2010), 7-9 June 2010, Pretoria, South Africa. (Im Druck)

D

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Schryen, Guido, Vetter, Michael, Waas, Thomas und Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK-Praxis der Informationsverarbeitung und Kommunikation 36 (3), S. 153-159.

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Schryen, Guido, Vetter, Michael, Waas, Thomas und Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis der Informationsverarbeitung und Kommunikation 36 (3), S. 153-159.

F

Fischer, Andreas, Kittel, Thomas, Kolosnjaji, Bojan, Lengyel, Tamas, Mandarawi, Waseem, de Meer, Hermann, Müller, Tilo, Protsenko, Mykola, Reiser, Hans, Taubmann, Benjamin und Weishäupl, Eva (2015) CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. Lecture Notes in Computer Science 9415, S. 594-611.

Fink, Andreas, Kliewer, Natalia, Mattfeld, Dirk, Mönch, Lars, Rothlauf, Franz, Schryen, Guido, Suhl, Leena und Voß, Stefan (2014) Model-based Decision Support in Manufacturing and Service Networks. Business & Information Systems Engineering (BISE) 6 (1), S. 17-24. (Im Druck)

Fink, Andreas, Kliewer, Natalia, Mattfeld, Dirk, Mönch, Lars, Rothlauf, Franz, Schryen, Guido, Suhl, Lena und Voß, Stefan (2014) Modellbasierte Entscheidungsunterstützung in Produktions- und Service-Netzwerken. Wirtschaftsinformatik 56 (1), S. 21-29. (Im Druck) Volltext nicht vorhanden.

Finkbeiner, Josef, Bodenstein, Christian, Schryen, Guido und Neumann, Dirk (2010) Applying heuristic methods for job scheduling in storage markets. In: 18th European Conference on Information Systems (ECIS 2010), 7-9 June 2010, Pretoria, South Africa.

L

Lang, Fabian, Schryen, Guido und Fink, Andreas (2012) Elicitating, modeling, and processing uncertain human preferences for software agents in electronic negotiations: An empirical study. In: International Conference on Information Systems, December, 16-19, 2012 (conditionally accepted), Orlando, FL, USA.

Lang, Fabian, Schryen, Guido und Fink, Andreas (2011) Automated Negotiations Under Uncertain Preferences. In: Proceedings of the 2011 International Conference on Information Systems (ICIS 2011), 4-7 Dezember 2011, Shanghai, China.

M

Mandarawi, Waseem, Fischer, Andreas, de Meer, Hermann und Weishäupl, Eva (2015) QoS-Aware Secure Live Migration of Virtual Machines. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (Im Druck)

P

Püschel, Tim, Schryen, Guido, Hristova, Diana und Neumann, Dirk (2015) Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty. European Journal of Operational Research 244 (2), S. 637-647.

R

Rauchecker, Gerhard und Schryen, Guido (2019) An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response. European Journal of Operational Research.

Rauchecker, Gerhard und Schryen, Guido (2019) An exact branch-and-price algorithm for scheduling rescue units during disaster response. European Journal of Operational Research 272 (1), S. 352-363. Volltext nicht vorhanden.

Rauchecker, Gerhard und Schryen, Guido (2019) Using high performance computing for unrelated parallel machine scheduling with sequence-dependent setup times: Development and computational evaluation of a parallel branch-and-price algorithm. Computers & Operations Research 104, S. 338-357. Volltext nicht vorhanden.

Rauchecker, Gerhard und Schryen, Guido (2018) Decision Support for the Optimal Coordination of Spontaneous Volunteers in Disaster Relief. In: 15th International Conference on Information Systems for Crisis Response and Management, 20.-23. Mai 2018, Rochester, NY, USA.

Rakotondravony, Noëlle, Taubmann, Benjamin, Mandarawi, Waseem, Weishäupl, Eva, Xu, Peng, Kolosnjaji, Bojan, Protsenko, Mykolai, de Meer, Hermann und Reiser, Hans (2017) Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing 6 (26).

Rauchecker, Gerhard und Schryen, Guido (2016) Projekt KUBAS: Koordination ungebundener Vor-Ort-Helfer. Im Einsatz 23, S. 44-46.

Reinfelder, Lena und Weishäupl, Eva (2016) A Literature Review on Smartphone Security in Organizations using a new theoretical Model - The Dynamic Security Success Model. In: PACIS - Pacific Asia Conference on Information Systems, June 27 - July 1, 2016, Chiayi, Taiwan.

Rauchecker, Gerhard und Schryen, Guido (2015) High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic. In: Australasian Conference on Information Systems, 30 Nov - 04 Dec 2015, Melbourne, Australia. (Im Druck)

Rauchecker, Gerhard, Yasasin, Emrah und Schryen, Guido (2014) A Decision Support System for IT Security Incident Management. In: 11th International Conference on Trust, Privacy, and Security in Digital Business (TRUSTBUS), 1.-5. Sep. 2014, Munich. (Im Druck) Volltext nicht vorhanden.

S

Szubartowicz, Eva (2018) Planning and Evaluation of Information Security Investments. Dissertation, Universität Regensburg.

Szubartowicz, Eva und Schryen, Guido (2018) Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements. Working Paper. (Eingereicht)

Schryen, Guido und Hristova, Diana (2017) High-Performance Business Computing – Effizienzsteigerung durch Parallelisierung. Smart Data Radar (Deutsche Bank). (Im Druck) Volltext nicht vorhanden.

Scholz, Michael, Dorner, Verena, Schryen, Guido und Benlian, Alexander (2017) A configuration-based recommender system for supporting e-commerce decisions. European Journal of Operational Research. (Im Druck)

Scholz, Michael , Dorner, Verena, Schryen, Guido und Benlian, Alexander (2017) A configuration-based recommender system for supporting e-commerce decisions. European Journal of Operational Research 259 (1), S. 205-215. Volltext nicht vorhanden.

Schryen, Guido , Benlian, Alexander , Rowe, Frantz, Shirley, Gregor , Larsen, Kai , Petter, Stacie, Paré, Guy , Wagner, Gerit , Haag, Steffi und Yasasin, Emrah (2017) Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields? Communications of the AIS. (Im Druck) Volltext nicht vorhanden.

Schryen, Guido , Wagner, Gerit und Schlegel, Alexander (2016) Development of two novel face-recognition CAPTCHAs: A security and usability study. Computers & Security 60, S. 95-116. Volltext nicht vorhanden.

Schryen, Guido , Wagner, Gerit und Schlegel, Alexander (2016) Development of two novel face-recognition CAPTCHAs: a security and usability study. Computers & Security 60 (July), S. 95-116.

Schryen, Guido, Wagner, Gerit und Benlian, Alexander (2015) Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In: International Conference on Information Systems (ICIS), December 13-16, 2015, Fort Worth, Texas, USA. (Im Druck)

Schryen, Guido und Weishäupl, Eva (2015) IT-Sicherheit: Ökonomisch Planen und Bewerten. Managementkompass (2), S. 17-18.

Schryen, Guido, Rauchecker, Gerhard und Comes, Martina (2015) Resource Planning in Disaster Response - Decision Support Models and Methodologies. Business & Information Systems Engineering (BISE) 57 (4), S. 243-259. (Im Druck)

Schryen, Guido (2015) Writing qualitative IS literature reviews – Guidelines for synthesis, interpretation and guidance of research. Communications of the AIS 37 (Art 12), S. 286-325.

Schryen, Guido (2014) The Epistemological Impact of Literature Reviews in Information Systems Research. Volltext nicht vorhanden.

Schryen, Guido (2014) Writing qualitative IS literature reviews – Guidelines for synthesis, interpretation and guidance of research. Volltext nicht vorhanden.

Schryen, Guido und Hristova, Diana (2014) Duality in fuzzy linear programming: A survey. OR -Spectrum 37 (1), S. 1-48.

Schryen, Guido und Wex, Felix (2014) Risk Reduction in Natural Disaster Management Through Information Systems: A Literature review and an IS design science research agenda. International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 6 (1). (Im Druck)

Schryen, Guido (2013) Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. European Journal of Information Systems (EJIS) 22 (2), S. 139-169. (Eingereicht)

Schryen, Guido (2012) Profis im Netz: Soziale Netzwerke könnten in Unternehmen viel mehr Nutzen stiften – woran hakt es?, in: Die Zeit (12.04.2012).

Schryen, Guido und Wex, Felix (2012) IS Design Thinking in Disaster Management Research. In: 45th Hawaii International Conference on System Sciences, 4.-7. Jan. 2012, Maui, Hawaii, USA.

Schryen, Guido (2012) Soziale Netzwerke in Unternehmenskontexten - Potentiale und Anforderungen, in: Information Management & Consulting, to appear. Information Multimedia Communication imc. (Im Druck)

Schryen, Guido (2011) Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM) Vol. 54 (No. 5), S. 130-139.

Schryen, Guido, Volkamer, Melanie und Ries, Sebastian (2011) A formal approach towards measuring trust in distributed systems. In: Proceedings of the 26th Annual ACM Symposium on Applied Computing, March 21 - 25, 2011, TaiChung, Taiwan. (Im Druck)

Schryen, Guido (2011) Seeking the VALUE in IS Business Value Research - An Agenda for investigating Synergies Between Socio-organizational Change, IS Capabilities Change, and IS Innovation. In: IS Capabilities Change, and IS Innovation, Proceedings of the 19th European Conference on Information Systems (ECIS 2011), Helsinki, 9-11 June 2011, Helsinki, Finland.

Schryen, Guido (2010) A Fuzzy Model for IT Security Investments. In: Proceedings of Sicherheit, Schutz und Zuverlässigkeit" (SICHERHEIT 2010), October 5-7, 2010, Berlin.

Schryen, Guido und Bodenstein, Christian (2010) A decision-theoretic foundation of IS business value research. In: Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 7-9 June 2010, Pretoria, South Africa.

Schryen, Guido (2010) An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness. In: Proceedings of the First Scandinavian Conference on Information Systems (SCIS), 20-22. August 2010, Rebild, North Jutland, Denmark.

Schryen, Guido und Eliot, Rich (2010) Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question. In: 43rd Annual Hawaii International Conference on System Sciences, 2010, Kauai.

Schryen, Guido (2010) Preserving knowledge on IS business value: what literature reviews have done. Business & Information Systems Engineering (BISE) 52 (4), S. 225-237. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2010) Ökonomischer Wert von Informationssystemen - Beitrag von Literatur-Reviews zum Wissenserhalt ( = Preserving Knowledge on IS Business Value. What Literature Reviews Have Done). Wirtschaftsinformatik 52 (4), S. 225-237.

Schryen, Guido (2009) A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In: 5th International Conference on IT Security Incident Management & IT Forensics, 15-17 September 2009, Stuttgart, Germany.

Schryen, Guido und Kadura, Rouven (2009) Open Source vs. Closed Source Software: Towards Measuring Security. In: 24th Annual ACM Symposium on Applied Computing, March 8 - 12, 2009, Hawaii.

Schryen, Guido und Rich, Eliot (2009) Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics & Security 4 (4 Part), S. 729-744.

Schryen, Guido (2009) Security of open source and closed source software: An empirical comparison of published vulnerabilities. In: 15th Americas Conference on Information Systems, August 6 - 9, 2009, San Francisco, California.

Schryen, Guido (2008) Effektivität und Effizienz von Anti-Spam-Maßnahmen. Linux New Media AG.

Schryen, Guido (2008) Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In: 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business), December 13, 2008, Paris.

Schryen, Guido (2007) A Scalable and Flexible Infrastructure Framework For Addressing Spam. In: Satesh, D. und Prabhakar, R., (eds.) Nicht ausgewählt ICFAI University Press, Hyderabad, India, S. 55-64. Volltext nicht vorhanden.

Schryen, Guido (2007) Anti-Spam Measures: Analysis and Design. Springer, Berlin, Heidelberg, New York. ISBN 9783642090875. Volltext nicht vorhanden.

Schryen, Guido (2007) Anti-spam legislation: An analysis of laws and their effectiveness. Information and Communications Technology Law 16 (1), S. 17-32. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2007) Approaches Addressing Spam. In: Satesh, D. und Prabhakar, R., (eds.) Spam: An Introduction. ICFAI University Press, Hyderabad, India, S. 41-57. Volltext nicht vorhanden.

Schryen, Guido (2007) Armed for the spam battle - a technological and organizational infrastructure framework. In: 40th Annual Hawaii International Conference on System Sciences, 2007, Big Island.

Schryen, Guido (2007) Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2), S. 66-90. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2007) Location Based Services. In: Schulte, Heinz, (ed.) Vom LAN zum Kommunikationsnetz - Systeme und Applikationen. Interest-Verlag, Kissing. Volltext nicht vorhanden.

Schryen, Guido (2007) Spam-Emails. In: Schulte, Heinz, (ed.) Vom LAN zum Kommunikationsnetz - Systeme und Applikationen, Edition 02/2007. Interest-Verlag, Kissing. Volltext nicht vorhanden.

Schryen, Guido (2007) The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam – An Empirical Analysis. Computers & Security 2 (5), S. 361-372. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2006) A formal approach towards assessing the effectiveness of anti-spam procedures. In: 39th Annual Hawaii International Conference on System Sciences, 2006, Kauai.

Schryen, Guido (2005) A honeypot for the exploration of spammers' behaviour (ATAC IAnewsletter). United States Department of Defense.

Schryen, Guido (2005) An e-mail honeypot addressing spammers' behavior in collecting and applying addresses. In: 6th IEEE Information Assurance Workshop, 2005, Westpoint.

Schryen, Guido (2004) Effektivität von Lösungsansätzen zur Bekämpfung von Spam. Wirtschaftsinformatik 46 (4), S. 281-288. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2004) Fighting Spam: Motivating an Account-based Approach. In: Proceedings of the IADIS International Conference WWW/Internet 2004, 2004, Madrid.

Schryen, Guido (2004) How Security Problems Can Compromise Remote Internet Voting Systems. In: Workshop of the ESF TED Programme, 2004, Bregenz.

Schryen, Guido (2004) Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz? In: Gehrke, Gernot, (ed.) Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung. KOPAED-Verlag, München, S. 45-51. ISBN 3-935686-95-1. Volltext nicht vorhanden.

Schryen, Guido (2004) Security Aspects of Internet Voting. In: 37th Annual Hawaii International Conference on System Sciences, 2004, Big Island.

Schryen, Guido (2003) E-Democracy: Internet Voting. In: Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2. IADIS Press, Algarve, S. 1017-1021.

Schryen, Guido (2003) Internet-Wahlen. In: 6. Internationale Tagung Wirtschaftsinformatik, 2003, Heidelberg.

Schryen, Guido, Herstell, Jan und Schoenen, Markus (2003) Online Marktforschung im Mittelstand: Analyse von Konsumentenverhalten in 3D-Internet-Welten. Deutscher Universitäts-Verlag, Wiesbaden. Volltext nicht vorhanden.

Schryen, Guido und Herstell, Jan (2003) Online-Marktforschung – Analyse von Konsumentenverhalten in virtuellen Umgebungen, in: Information Management & Consulting, 18,2. Information Multimedia Communication (IMC).

Schryen, Guido und Schoenen, Markus (2002) Data Warehouse in der Marktforschung - Analyse von Benutzeraktivitäten in virtuellen Welten. In: Data Warehousing 2002, 2002, Friedrichshafen.

Schryen, Guido (2002) Elektronische Zeitung – das Erbe Gutenbergs? Oldenbourg; de Gruyter.

Schryen, Guido und Karla, Jürgen (2002) Elektronisches Papier - Display-Technologie mit weitem Anwendungsspektrum. Wirtschaftsinformatik 44 (6), S. 567-574. Zugang zum Volltext eingeschränkt.

Schryen, Guido (2001) Komponentenorientierte Softwareentwicklung in Softwareunternehmen: Konzeption eines Vorgehensmodells zur Einführung und Etablierung. Deutscher Universitäts-Verlag, Wiesbaden. Volltext nicht vorhanden.

V

Volkamer, Melanie und Schryen, Guido (2010) Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: Proceedings of the 23rd Bled eConference, June 20-23, 2010, Bled, Slovenia.

Volkamer, Melanie, Schryen, Guido, Langer, Lucie, Schmidt, Axel und Buchmann, Johannes (2009) Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: Workshop Elektronische Wahlen, elektronische Teilhabe, Societyware, 39th GI-Jahrestagung, 2009.

W

Weishäupl, Eva, Yasasin, Emrah und Schryen, Guido (2018) Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security. (Im Druck)

Weishäupl, Eva, Yasasin, Emrah und Schryen, Guido (2018) Information security investments: An exploratory multiple case study on decision-making, evaluation and learning. Computers & Security 77, S. 807-823. Volltext nicht vorhanden.

Wagner, Gerit, Prester, Julian und Schryen, Guido (2017) Exploring the Scientific Impact of Information Systems Design Science Research: A Scientometric Study. In: 38th International Conference on Information Systems, December 10-13, 2017, Seoul, South Korea. (Im Druck)

Weishäupl, Eva (2017) Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making. In: SHCIS’17, June 21-22, 2017, Neuchâtel, Switzerland.

Wagner, Gerit , Prester, Julian , Roche, Maria, Benlian, Alexander und Schryen, Guido (2016) Factors Affecting the Scientific Impact of Literature Reviews: A Scientometric Study. In: International Conference on Information Systems, 11.-14. Dez. 2016, Dublin.

Weishäupl, Eva, Yasasin, Emrah und Schryen, Guido (2015) A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In: International Conference on Information Systems, December 13-16, 2015, Fort Worth, Texas, USA. (Im Druck)

Weishäupl, Eva, Kunz, Michael, Yasasin, Emrah, Wagner, Gerit, Prester, Julian, Schryen, Guido und Pernul, Günther (2015) Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (Im Druck)

Weishäupl, Eva, Yasasin, Emrah und Schryen, Guido (2015) IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In: 23rd European Conference on Information Systems (ECIS 2015), May 26-29, Münster. (Im Druck)

Wex, Felix, Schryen, Guido, Feuerriegel, Stefan und Neumann, Dirk (2014) Emergency Response in Natural Disaster Management: Allocation and Scheduling of Rescue Units. European Journal of Operational Research. (Im Druck)

Wex, Felix, Schryen, Guido und Neumann, Dirk (2013) Assignments of Collaborative Rescue Units during Emergency Response. International Journal of Information Systems for Crisis Response and Management 5 (4), S. 63-80. (Im Druck)

Wex, Felix, Schryen, Guido und Neumann, Dirk (2013) Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In: Proceedings of the 46th Hawaii International Conference on System Science, 7-10 January 2013, Maui, Hawaii, USA.

Wex, Felix, Schryen, Guido und Neumann, Dirk (2012) A Fuzzy Decision Support Model for Natural Disaster Response under Informational Uncertainty. International Journal of Information Systems for Crisis Response and Management 4 (3), S. 23-41. Zugang zum Volltext eingeschränkt.

Wex, Felix, Schryen, Guido und Neumann, Dirk (2012) Operational Emergency Response under Informational Uncertainty: A Fuzzy Optimization Model for Scheduling and Allocating Rescue Units. In: International Conference on Information Systems for Crisis Response and Management (ISCRAM) 2012, 22. - 25. April 2012, Vancouver. (Im Druck)

Wex, Felix, Schryen, Guido und Neumann, Dirk (2011) Intelligent Decision Support for Centralized Coordination during Emergency Response. In: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), May 8 - 11, 2011, Lisbon, Portugal.

Y

Yasasin, Emrah, Prester, Julian , Wagner, Gerit und Schryen, Guido (2020) Forecasting IT security vulnerabilities – An empirical analysis. Computers & Security 88, S. 101610. Volltext nicht vorhanden.

Yasasin, Emrah, Prester, Julian, Wagner, Gerit und Schryen, Guido (2019) Forecasting IT Security Vulnerabilities - An Empirical Analysis. Computers & Security. (Im Druck)

Yasasin, Emrah (2018) Decision Problems in Information Security: Methodologies and Quantitative Models. Dissertation, Universität Regensburg.

Yasasin, Emrah, Prester, Julian, Wagner, Gerit und Schryen, Guido (2018) Forecasting IT Security Vulnerabilities - An Empirical Analysis. Working Paper. (Eingereicht)

Yasasin, Emrah und Schryen, Guido (2015) Requirements for IT Security Metrics – An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015), May 26-29, Münster. (Im Druck)

Yasasin, Emrah, Rauchecker, Gerhard, Prester, Julian und Schryen, Guido (2014) A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems. In: 1st Workshop on Security in highly connected IT systems (SHCIS’14), 1.-5. Sep. 2014, Munich. (Im Druck) Volltext nicht vorhanden.

Diese Liste wurde erzeugt am Mon Nov 18 23:37:04 2024 CET.
  1. Universität

Universitätsbibliothek

Publikationsserver

Kontakt:

Publizieren: oa@ur.de
0941 943 -4239 oder -69394

Dissertationen: dissertationen@ur.de
0941 943 -3904

Forschungsdaten: datahub@ur.de
0941 943 -5707

Ansprechpartner