The connection to the Internet and the use of digital technologies make the industry, economy and infrastructure more vulnerable to new forms of sabotage. Industrial Security investigates the methods of the attackers and develops counter-strategies.
K1 competence center with the goal of the scientifically based further development of the blockchain technology and its application in various economic sectors. These range from Industry 4.0/Internet ...
The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...
Creating resilient Home automation systems that successfully withstand attacks
Platform for digital makers, for interaction, efficient sharing of knowledge & experiences and nationwide coordination of activities
Comprehensive service programme to increase the transformation capacity and transformation speed of SMEs in Eastern Austria with regard to digital innovations
Developing measures to support employee privacy whwn using tracking systems in industry and comparing positive aspects of tracking technologies with regard to occupational safety
Industrial Security (IT/OT convergence) -Qualification network for promoting a common understanding of security among IT and OT experts
Jandl, C., Taurer, F., Hartner-Tiefenthaler, M., Wagner, M., Moser, T., & Schlund, S. (2021, July). Perceptions of Using Tracking and Tracing Systems in Work Environments. HCI INTERNATIONAL 2021 (23RD INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION).
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Nurgazina, J., Felberbauer, T., Moser, T., & Reiner, G. (2020). Distributed ledger technology applications for improved traceability of food supply chains. The EurOMA 2020 Conference Proceedings. 27th EurOMA Conference, Warwick, UK. https://euroma2020.exordo.com/files/papers/292/final_draft/EurOMA2020_DLT_applications_full_paper.pdf
Jandl, C., Nurgazina, J., Schöffer, L., Reichl, C., Wagner, M., & Moser, T. (2019, September 9). SensiTrack - A Privacy by Design Concept for industrial IoT Applications. International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragossa,Spain.
Eigner, O., Kreimel, P., & Tavolato, P. (2018). Attacks on Industrial Control Systems – Modeling and Anomaly Detection. International Workshop on FORmal Methods for Security Engineering - ForSE 2018. International Workshop on FORmal methods for Security Engineering - ForSE 2018.
Kreimel, P., Eigner, O., & Tavolato, P. (2017). Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. International Conference on Availability, Reliability and Security. https://doi.org/10/gh373x
Brandstetter, T. (Ed.). (2016). 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016). British Computer Society. http://ewic.bcs.org/category/18898
Eigner, O., Kreimel, P., & Tavolato, P. (2016). Detection of Man-in-the-Middle Attacks on Industrial Control Networks. 2016 International Conference on Software Security and Assurance (ICSSA), St. Pölten, Austria. https://doi.org/10/gh373z