The connection to the Internet and the use of digital technologies make the industry, economy and infrastructure more vulnerable to new forms of sabotage. Industrial Security investigates the methods of the attackers and develops counter-strategies.
K1 competence center with the goal of the scientifically based further development of the blockchain technology and its application in various economic sectors. These range from Industry 4.0/Internet ...
The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...
Creating resilient Home automation systems that successfully withstand attacks
Platform for digital makers, for interaction, efficient sharing of knowledge & experiences and nationwide coordination of activities
Comprehensive service programme to increase the transformation capacity and transformation speed of SMEs in Eastern Austria with regard to digital innovations
Developing measures to support employee privacy whwn using tracking systems in industry and comparing positive aspects of tracking technologies with regard to occupational safety
Industrial Security (IT/OT convergence) -Qualification network for promoting a common understanding of security among IT and OT experts
Horak, T., Aigner, W., Brehmer, M., Joshi, A., & Tominski, C. (2022). Responsive Visualization Design for Mobile Devices. In B. Lee, E. K. Choe, P. Isenberg, & R. Dachselt (Eds.), Mobile Data Visualization. CRC Press; 10.1201/9781003090823-2. https://www.routledge.com/Mobile-Data-Visualization/Lee-Dachselt-Isenberg-Choe/p/book/9780367534714
Besancon, L., Aigner, W., Boucher, M., Dwyer, T., & Isenberg, T. (2022). 3D Mobile Data Visualization. In B. Lee, E. K. Choe, P. Isenberg, & R. Dachselt (Eds.), Mobile Data Visualization. CRC Press. https://www.routledge.com/Mobile-Data-Visualization/Lee-Dachselt-Isenberg-Choe/p/book/9780367534714
Aigner, W. (2021, July 10). Wie können Daten visualisiert werden? [Invited Talk]. Forum Digitalisierung, St. Pölten, Austria.
Jandl, C., Taurer, F., Hartner-Tiefenthaler, M., Wagner, M., Moser, T., & Schlund, S. (2021, July). Perceptions of Using Tracking and Tracing Systems in Work Environments. HCI INTERNATIONAL 2021 (23RD INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION).
Aigner, W. (2021, March 23). Datascope - Making Sensor Data Visible. Online Opening Conference, Online.
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Nurgazina, J., Felberbauer, T., Moser, T., & Reiner, G. (2020). Distributed ledger technology applications for improved traceability of food supply chains. The EurOMA 2020 Conference Proceedings. 27th EurOMA Conference, Warwick, UK.
Jandl, C., Nurgazina, J., Schöffer, L., Reichl, C., Wagner, M., & Moser, T. (2019, September 9). SensiTrack - A Privacy by Design Concept for industrial IoT Applications. International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragossa,Spain.
Eigner, O., Kreimel, P., & Tavolato, P. (2018). Attacks on Industrial Control Systems – Modeling and Anomaly Detection. International Workshop on FORmal Methods for Security Engineering - ForSE 2018. International Workshop on FORmal methods for Security Engineering - ForSE 2018. https://doi.org/10/gnt2t3
Kreimel, P., Eigner, O., & Tavolato, P. (2017). Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. International Conference on Availability, Reliability and Security. https://doi.org/10/gh373x