#Industrial Security

The connection to the Internet and the use of digital technologies make the industry, economy and infrastructure more vulnerable to new forms of sabotage. Industrial Security investigates the methods of the attackers and develops counter-strategies.


ABC - Austrian Blockchain Center

K1 competence center with the goal of the scientifically based further development of the blockchain technology and its application in various economic sectors. These range from Industry 4.0/Internet ...

Josef Ressel Center for Blockchain-Technologies & Security management

The Josef Ressel Center for Blockchain-Technologies & Security management is a research institution operated by the St. Pölten University of Applied Sciences. The research objective is making secur...

SensiTrack - Tracking vs Privacy in the Workplace 4.0

Developing measures to support employee privacy whwn using tracking systems in industry and comparing positive aspects of tracking technologies with regard to occupational safety


Industrial Security (IT/OT convergence) -Qualification network for promoting a common understanding of security among IT and OT experts

DuS - Digitization and Security

Qualification network for transferring IT security knowledge in context of the digital transformation of the economy


Jandl, C., Taurer, F., Hartner-Tiefenthaler, M., Wagner, M., Moser, T., & Schlund, S. (2021, July). Perceptions of Using Tracking and Tracing Systems in Work Environments. HCI INTERNATIONAL 2021 (23RD INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION).
Schacht, B., & Kieseberg, P. (2020). An Analysis of 5 Million OpenPGP Keys. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(3), 107–140. http://isyou.info/jowua/papers/jowua-v11n3-6.pdf
Nurgazina, J., Felberbauer, T., Moser, T., & Reiner, G. (2020). Distributed ledger technology applications for improved traceability of food supply chains. The EurOMA 2020 Conference Proceedings. 27th EurOMA Conference, Warwick, UK. https://euroma2020.exordo.com/files/papers/292/final_draft/EurOMA2020_DLT_applications_full_paper.pdf
Jandl, C., Nurgazina, J., Schöffer, L., Reichl, C., Wagner, M., & Moser, T. (2019, September 9). SensiTrack - A Privacy by Design Concept for industrial IoT Applications. International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragossa,Spain.
Eigner, O., Kreimel, P., & Tavolato, P. (2018). Attacks on Industrial Control Systems – Modeling and Anomaly Detection. International Workshop on FORmal Methods for Security Engineering - ForSE 2018. International Workshop on FORmal methods for Security Engineering - ForSE 2018.
Kreimel, P., Eigner, O., & Tavolato, P. (2017). Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. International Conference on Availability, Reliability and Security. https://doi.org/10/gh373x
Eigner, O., Kreimel, P., & Tavolato, P. (2016). Detection of Man-in-the-Middle Attacks on Industrial Control Networks. 2016 International Conference on Software Security and Assurance (ICSSA), St. Pölten, Austria. https://doi.org/10/gh373z
Brandstetter, T. (Ed.). (2016). 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016). British Computer Society. http://ewic.bcs.org/category/18898