The connection to the Internet and the use of digital technologies make the industry, economy and infrastructure more vulnerable to new forms of sabotage. Industrial Security investigates the methods of the attackers and develops counter-strategies.
The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...
Comprehensive service programme to increase the transformation capacity and transformation speed of SMEs in Eastern Austria with regard to digital innovations
Platform for digital makers, for interaction, efficient sharing of knowledge & experiences and nationwide coordination of activities
Creating resilient Home automation systems that successfully withstand attacks
Developing measures to support employee privacy whwn using tracking systems in industry and comparing positive aspects of tracking technologies with regard to occupational safety
Industrial Security (IT/OT convergence) -Qualification network for promoting a common understanding of security among IT and OT experts
Qualification network for transferring IT security knowledge in context of the digital transformation of the economy
Developing methods and techniques to detect cyber-attacks on digitized distribution networks of electrical power enhancing its reliability and resilience.
Extending SoniControl, the first ultrasonic firewall, that detects and blocks unwanted acoustic tracking on mobile devices.
Eigner, O., Kreimel, P., & Tavolato, P. (2018). Attacks on Industrial Control Systems – Modeling and Anomaly Detection. In International Workshop on FORmal methods for Security Engineering - ForSE 2018. SCITEPRESS.
Kreimel, P., Eigner, O., & Tavolato, P. (2017). Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. Presented at the International Conference on Availability, Reliability and Security, ACM. https://doi.org/https://doi.org/10.1145/3098954.3103155
Eigner, O., Kreimel, P., & Tavolato, P. (2016). Detection of Man-in-the-Middle Attacks on Industrial Control Networks. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), St. Pölten, Austria: IEEE.
Brandstetter, T. (Ed.). (2016). 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016). British Computer Society.