default search action
Thomas Neubauer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Georg Goldenits, Kevin Mallinger, Sebastian Raubitzek, Thomas Neubauer:
Current applications and potential future directions of reinforcement learning-based Digital Twins in agriculture. CoRR abs/2406.08854 (2024) - 2023
- [j25]Stefan Fenz, Thomas Neubauer, Jürgen Kurt Friedel, Marie-Luise Wohlmuth:
AI- and data-driven crop rotation planning. Comput. Electron. Agric. 212: 108160 (2023) - [j24]Kevin Mallinger, Luiza Corpaci, Thomas Neubauer, Ildikó E. Tikász, Thomas M. Banhazi:
Unsupervised and supervised machine learning approach to assess user readiness levels for precision livestock farming technology adoption in the pig and poultry industries. Comput. Electron. Agric. 213: 108239 (2023) - [j23]Sebastian Raubitzek, Kevin Mallinger, Thomas Neubauer:
Combining Fractional Derivatives and Machine Learning: A Review. Entropy 25(1): 35 (2023) - [c41]Samira Homayouni, Taulant Berisha, Mario Paier, Sebastian Woblistin, Johannes Rehak, Thomas Neubauer:
Verification of Standardized Rel-15 Requirements for Drone's Command-and-Control Link Reliability. VTC2023-Spring 2023: 1-5 - 2022
- [j22]Sebastian Raubitzek, Thomas Neubauer:
An Exploratory Study on the Complexity and Machine Learning Predictability of Stock Market Data. Entropy 24(3): 332 (2022) - [j21]Sebastian Raubitzek, Thomas Neubauer, Jan Friedrich, Andreas Rauber:
Interpolating Strange Attractors via Fractional Brownian Bridges. Entropy 24(5): 718 (2022) - 2021
- [j20]Sebastian Raubitzek, Thomas Neubauer:
Taming the Chaos in Neural Network Time Series Predictions. Entropy 23(11): 1424 (2021) - [j19]Sebastian Raubitzek, Thomas Neubauer:
Combining Measures of Signal Complexity and Machine Learning for Time Series Analyis: A Review. Entropy 23(12): 1672 (2021) - [j18]Sebastian Raubitzek, Thomas Neubauer:
A fractal interpolation approach to improve neural network predictions for difficult time series data. Expert Syst. Appl. 169: 114474 (2021) - 2020
- [i1]Sebastian Raubitzek, Thomas Neubauer:
Machine Learning and Chaos Theory in Agriculture. ERCIM News 2020(122) (2020)
2010 – 2019
- 2018
- [j17]Stefan Fenz, Thomas Neubauer:
Ontology-based information security compliance determination and control selection on the example of ISO 27002. Inf. Comput. Secur. 26(5): 551-567 (2018) - 2016
- [j16]Stefan Fenz, Johannes Heurix, Thomas Neubauer, A Min Tjoa, Neda Ghiassi, Ulrich Pont, Ardeshir Mahdavi:
SEMERGY.net: automatically identifying and optimizing energy-efficient building designs. Comput. Sci. Res. Dev. 31(3): 135-140 (2016) - [j15]Johannes Heurix, Stefan Fenz, Antonio Rella, Thomas Neubauer:
Recognition and pseudonymisation of medical records for secondary use. Medical Biol. Eng. Comput. 54(2-3): 371-383 (2016) - 2015
- [j14]Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. Comput. Secur. 53: 1-17 (2015) - [j13]Michael Koenigsmayr, Thomas Neubauer:
The Role of ICT in a Low Carbon Society. IEEE Technol. Soc. Mag. 34(1): 39-44 (2015) - [c40]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management. ECIS 2015 - 2014
- [j12]Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein:
Current challenges in information security risk management. Inf. Manag. Comput. Secur. 22(5): 410-430 (2014) - 2013
- [c39]Stefan Fenz, Thomas Neubauer, Rafael Accorsi, Thomas G. Koslowski:
FORISK: Formalizing information security risk and compliance management. DSN Workshops 2013: 1-4 - 2012
- [c38]Johannes Heurix, Antonio Rella, Stefan Fenz, Thomas Neubauer:
Automated Transformation of Semi-Structured Text Elements. AMCIS 2012 - [c37]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. BIS 2012: 153-164 - [c36]Johannes Heurix, Michael Karlinger, Thomas Neubauer:
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents. HICSS 2012: 3011-3020 - 2011
- [j11]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Commun. Assoc. Inf. Syst. 28: 22 (2011) - [j10]Thomas Neubauer, Johannes Heurix:
A methodology for the pseudonymization of medical data. Int. J. Medical Informatics 80(3): 190-204 (2011) - [c35]Daniel Abouakil, Johannes Heurix, Thomas Neubauer:
Data Models for the Pseudonymization of DICOM Data. HICSS 2011: 1-11 - [c34]Kresimir Kasal, Johannes Heurix, Thomas Neubauer:
Model-Driven Development Meets Security: An Evaluation of Current Approaches. HICSS 2011: 1-9 - [c33]Johannes Heurix, Thomas Neubauer:
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption. TrustBus 2011: 186-197 - 2010
- [j9]Thomas Neubauer, Johannes Heurix, A Min Tjoa, Edgar R. Weippl:
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotech. Informationstechnik 127(5): 135-142 (2010) - [j8]Thomas Neubauer, Christian Stummer:
Interactive selection of Web services under multiple objectives. Inf. Technol. Manag. 11(1): 25-41 (2010) - [c32]Johannes Heurix, Thomas Neubauer:
On the Security of Outsourced and Untrusted Databases. ACIS-ICIS 2010: 125-132 - [c31]Thomas Neubauer, Markus Pehn:
Workshop-Based Risk Assessment for the Definition of Secure Business Processes. eKNOW 2010: 74-79
2000 – 2009
- 2009
- [j7]Thomas Neubauer:
An empirical study about the status of business process management. Bus. Process. Manag. J. 15(2): 166-183 (2009) - [c30]Thomas Neubauer, Christian Hartl:
On the Singularity of Valuating IT Security Investments. ACIS-ICIS 2009: 549-556 - [c29]Stefan Jakoubi, Thomas Neubauer, Simon Tjoa:
A roadmap to risk-aware business process management. APSCC 2009: 23-27 - [c28]Thomas Neubauer, Gernot Goluch, Stefan Jakoubi, Simon Tjoa, Martin Wisser:
A process model for RFID based Business Process Analysis. APSCC 2009: 478-483 - [c27]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Business Process-Based Resource Importance Determination. BPM 2009: 113-127 - [c26]Stefan Fenz, Thomas Neubauer:
How to determine threat probabilities using ontologies and Bayesian networks. CSIIRW 2009: 69 - [c25]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10 - [c24]Thomas Neubauer:
A Comparison of Security Safeguard Selection Methods. ICEIS (3) 2009: 320-323 - [c23]Thomas Neubauer, Mathias Kolb:
Technologies for the Pseudonymization of Medical Data: A Legal Evaluation. ICONS 2009: 7-12 - [c22]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
Ontology-Based Decision Support for Information Security Risk Management. ICONS 2009: 80-85 - [c21]Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. ITNG 2009: 393-398 - [c20]Thomas Neubauer, Andreas Ekelhart:
An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858 - [p1]Thomas Neubauer, Mathias Kolb:
An Evaluation of Technologies for the Pseudonymization of Medical Data. Computer and Information Science 2009: 47-60 - 2008
- [j6]Christian Stummer, Thomas Neubauer:
Interaktive Portfolioauswahl im IT-Servicemanagement. HMD Prax. Wirtsch. 264: 48-55 (2008) - [j5]Thomas Neubauer, Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study. Int. J. Bus. Intell. Data Min. 3(2): 177-195 (2008) - [j4]Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization. J. Softw. 3(2): 23-32 (2008) - [c19]Thomas Neubauer, Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes. ACIS-ICIS 2008: 231-236 - [c18]Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health. ARES 2008: 39-46 - [c17]Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives. ARES 2008: 187-194 - [c16]Thomas Neubauer, Jan Pichler, Christian Stummer:
A Case Study on the Multicriteria Selection of Software Components. APSCC 2008: 1005-1012 - [c15]Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications. HICSS 2008: 255 - [c14]Thomas Neubauer, Bernhard Riedl:
Improving Patients Privacy with Pseudonymization. MIE 2008: 691-696 - [c13]Thomas Neubauer, Andreas Ekelhart, Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492 - 2007
- [c12]Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data. ARES 2007: 318-324 - [c11]Thomas Neubauer, Gernot Goluch, Bernhard Riedl:
A research agenda for Autonomous Business Process Management. ARES 2007: 670-680 - [c10]Thomas Neubauer, Christian Stummer:
Interactive Decision Support for Multiobjective COTS Selection. HICSS 2007: 283 - [c9]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c8]Thomas Neubauer, Johannes Heurix:
Multiobjective Decision Support for defining Secure Business Processes. iiWAS 2007: 477-482 - [c7]Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data. PRDC 2007: 397-400 - [c6]Thomas Neubauer, Christian Stummer:
Extending business process management to determine efficient IT investments. SAC 2007: 1250-1256 - [c5]Thomas Neubauer, Christian Stummer:
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen. Wirtschaftsinformatik (2) 2007: 255-270 - 2006
- [c4]Thomas Neubauer, Christian Stummer, Edgar R. Weippl:
Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373 - [c3]Thomas Neubauer, Markus D. Klemen, Stefan Biffl:
Secure Business Process Management: A Roadmap. ARES 2006: 457-464 - [c2]Thomas Neubauer, Edgar R. Weippl, Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731 - 2005
- [j3]Thomas Neubauer, Markus D. Klemen, Stefan Biffl:
Business process-based valuation of IT-security. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - 2002
- [c1]Thomas Baumgartner, Thomas Neubauer, Ernst Bonek:
Performance of downlink beam switching for UMTS FDD in the presence of angular spread. ICC 2002: 851-855 - 2001
- [j2]Thomas Neubauer, Ernst Bonek:
Smart-antenna space-time UMTS uplink processing for system capacity enhancement. Ann. des Télécommunications 56(5-6): 306-316 (2001) - 2000
- [j1]Thomas Neubauer, Ernst Bonek:
Increasing mixed service uplink capacity of UMTS by smart antennas. J. Commun. Networks 2(4): 331-336 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint