A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions M Leitner, S Rinderle-Ma Information and Software Technology 56 (3), 273-293, 2014 | 95 | 2014 |
Design considerations for cyber security testbeds: A case study on a cyber security testbed for education M Frank, M Leitner, T Pahi 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 43 | 2017 |
An empirical survey of functions and configurations of open-source capture the flag (ctf) environments S Kucek, M Leitner Journal of Network and Computer Applications 151, 102470, 2020 | 34 | 2020 |
An analysis and evaluation of security aspects in the business process model and notation M Leitner, M Miller, S Rinderle-Ma 2013 international conference on availability, reliability and security, 262-267, 2013 | 33 | 2013 |
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. T Pahi, M Leitner, F Skopik ICISSP, 334-345, 2017 | 30 | 2017 |
AIT cyber range: flexible cyber security environment for exercises, training and research M Leitner, M Frank, W Hotwagner, G Langner, O Maurhart, T Pahi, ... Proceedings of the European Interdisciplinary Cybersecurity Conference, 1-6, 2020 | 28 | 2020 |
Definition and enactment of instance-spanning process constraints M Leitner, J Mangler, S Rinderle-Ma Web Information Systems Engineering-WISE 2012: 13th International Conference …, 2012 | 27 | 2012 |
AW-RBAC: access control in adaptive workflow systems M Leitner, S Rinderle-Ma, J Mangler 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 24 | 2011 |
Digitale Bürgerbeteiligung: Forschung und Praxis–Chancen und Herausforderungen der elektronischen Partizipation M Leitner Springer-Verlag, 2018 | 16 | 2018 |
Evaluation methods in process-aware information systems research with a perspective on human orientation S Kriglstein, M Leitner, S Kabicher-Fuchs, S Rinderle-Ma Business & Information Systems Engineering 58, 397-414, 2016 | 16 | 2016 |
An adaptive heuristic approach to service selection problems in dynamic distributed systems PP Beran, E Vinek, E Schikuta, M Leitner 2012 ACM/IEEE 13th International Conference on Grid Computing, 66-75, 2012 | 14 | 2012 |
An experimental study on the design and modeling of security concepts in business processes M Leitner, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck The Practice of Enterprise Modeling: 6th IFIP WG 8.1 Working Conference …, 2013 | 13 | 2013 |
SPRINT-Responsibilities: design and development of security policies in process-aware information systems M Leitner, J Mangler, S Rinderle-Ma Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011 | 12 | 2011 |
An experimental approach to reputation in e-participation I Serov, M Leitner 2016 International Conference on Software Security and Assurance (ICSSA), 37-42, 2016 | 11 | 2016 |
A case study on the suitability of process mining to produce current-state RBAC models M Leitner, A Baumgrass, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck Business Process Management Workshops: BPM 2012 International Workshops …, 2013 | 11 | 2013 |
Training the human-in-the-loop in industrial cyber ranges S Kucek, M Leitner Digital Transformation in Semiconductor Manufacturing: Proceedings of the …, 2020 | 9 | 2020 |
Digitale bürgerbeteiligung M Leitner, M Sachs Springer Fachmedien Wiesbaden, 2018 | 8 | 2018 |
Effectively enforcing authorization constraints for emerging space-sensitive technologies CE Rubio-Medrano, S Jogani, M Leitner, Z Zhao, GJ Ahn Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 7 | 2019 |
Cyber Situational Awareness in Public-Private-Partnerships F Skopik, T Páhi, M Leitner Springer Berlin Heidelberg, 2018 | 7 | 2018 |
Situational Awareness for Strategic Decision Making on a National Level M eitner, T Pahi, F Skopik Collaborative Cyber Threat Intelligence, 225-276, 2017 | 7 | 2017 |