default search action
Maria Leitner
Person information
- affiliation: University of Regensburg, Germany
- affiliation (former): University of Vienna, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Maria Leitner, Florian Skopik, Timea Pahi:
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries. Inf. Secur. J. A Glob. Perspect. 33(5): 486-507 (2024) - [c28]Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner:
Towards Customized Cyber Exercises using a Process-based Lifecycle Model. EICC 2024: 37-45 - 2023
- [c27]Nico Rudolf, Kristof Böhmer, Maria Leitner:
BAnDIT: Business Process Anomaly Detection in Transactions. CoopIS 2023: 405-415 - [c26]Maria Leitner:
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned. ICISSP 2023: 634-642 - [c25]Pascal Thiele, Laura Bernadó, David Löschenbrand, Benjamin Rainer, Christoph Sulzbachner, Maria Leitner, Thomas Zemen:
Machine Learning Based Prediction of Frequency Hopping Spread Spectrum Signals. PIMRC 2023: 1-6 - 2022
- [c24]Stefan Samhaber, Maria Leitner:
Collaborative Patterns for Workflows with Collaborative Robots. CoopIS 2022: 131-148 - 2021
- [j5]Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, Manuel Warum:
Enabling exercises, education and research with a comprehensive cyber range. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 37-61 (2021) - [c23]Florian Skopik, Maria Leitner:
Preparing for National Cyber Crises Using Non-linear Cyber Exercises. PST 2021: 1-5 - [c22]Lenhard Reuter, Maria Leitner, Paul Smith, Manuel Koschuch:
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems. SKM 2021: 151-170 - [c21]Germar Schneider, Moritz Wendl, Stela Kucek, Maria Leitner:
A Training Concept Based on a Digital Twin for a Wafer Transportation System. CBI (2) 2021: 20-28 - 2020
- [j4]Stela Kucek, Maria Leitner:
An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments. J. Netw. Comput. Appl. 151 (2020) - [c20]Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, Oliver Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith, Manuel Warum:
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. EICC 2020: 2:1-2:6 - [c19]Maria Leitner, Teodor Sommestad:
International Workshop on Cyber Range Technologies and Applications (CACOE 2020). EuroS&P Workshops 2020: 1
2010 – 2019
- 2019
- [c18]Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - 2018
- [c17]Christine Schuppler, Maria Leitner, Stefanie Rinderle-Ma:
Privacy-aware Data Assessment of Online Social Network Registration Processes. CODASPY 2018: 167-169 - 2017
- [c16]Maximilian Frank, Maria Leitner, Timea Pahi:
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. DASC/PiCom/DataCom/CyberSciTech 2017: 38-46 - [c15]Timea Pahi, Maria Leitner, Florian Skopik:
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. ICISSP 2017: 334-345 - 2016
- [j3]Simone Kriglstein, Maria Leitner, Sonja Kabicher-Fuchs, Stefanie Rinderle-Ma:
Evaluation Methods in Process-Aware Information Systems Research with a Perspective on Human Orientation. Bus. Inf. Syst. Eng. 58(6): 397-414 (2016) - [c14]Maria Leitner, Arndt Bonitz:
Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations. ARES 2016: 480-485 - [c13]Maria Leitner, Arndt Bonitz, Bernd Herzog, Walter Hötzendorfer, Christian Kenngott, Thomas Kuhta, Oliver Terbu, Stefan Vogl, Sebastian Zehetbauer:
A Versatile, Secure and Privacy-Aware Tool for Online Participation. EDOC Workshops 2016: 1-4 - [c12]Igor Serov, Maria Leitner:
An Experimental Approach to Reputation in E-Participation. ICSSA 2016: 37-42 - [i2]Florian Skopik, Maria Leitner, Timea Pahi:
CISA: Establishing National Cyber Situational Awareness to Counter New Threats. ERCIM News 2016(106) (2016) - 2015
- [i1]Maria Leitner, Zhendong Ma, Stefanie Rinderle-Ma:
A Cross-Layer Security Analysis for Process-Aware Information Systems. CoRR abs/1507.03415 (2015) - 2014
- [j2]Maria Leitner, Stefanie Rinderle-Ma:
A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions. Inf. Softw. Technol. 56(3): 273-293 (2014) - [c11]Maria Leitner, Stefanie Rinderle-Ma:
Anomaly detection and visualization in generative RBAC models. SACMAT 2014: 41-52 - 2013
- [c10]Maria Leitner, Michelle Miller, Stefanie Rinderle-Ma:
An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation. ARES 2013: 262-267 - [c9]Maria Leitner:
Delta Analysis of Role-Based Access Control Models. EUROCAST (1) 2013: 507-514 - [c8]Maria Leitner, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck:
An Experimental Study on the Design and Modeling of Security Concepts in Business Processes. PoEM 2013: 236-250 - 2012
- [c7]Maria Leitner, Anne Baumgrass, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck:
A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models. Business Process Management Workshops 2012: 719-724 - [c6]Peter Paul Beran, Elisabeth Vinek, Erich Schikuta, Maria Leitner:
An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems. GRID 2012: 66-75 - [c5]Maria Leitner, Juergen Mangler, Stefanie Rinderle-Ma:
Definition and Enactment of Instance-Spanning Process Constraints. WISE 2012: 652-658 - 2011
- [j1]Maria Leitner, Juergen Mangler, Stefanie Rinderle-Ma:
SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 4-26 (2011) - [c4]Maria Leitner, Stefanie Rinderle-Ma, Jürgen Mangler:
AW-RBAC: Access Control in Adaptive Workflow Systems. ARES 2011: 27-34 - [c3]Maria Leitner, Stefanie Rinderle-Ma, Juergen Mangler:
Responsibility-driven Design and Development of Process-aware Security Policies. ARES 2011: 334-341 - [c2]Maria Leitner:
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges. ARES 2011: 686-691 - 2010
- [c1]Stefanie Rinderle-Ma, Maria Leitner:
On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations. CEC 2010: 128-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint