TU Wien Informatics

20 Years

About

The “Internet of Things” (IoT) is commonly anticipated with numerous applications including but not limited to manufacturing, power grids, buildings, rescue and relief operations, environmental monitoring, and traffic management.

Yet, complex applications in the IoT realm are inconceivable without increased mutual penetration of IT systems and automation technology. The integrated automation equipment is responsible for measuring, open and closed loop control, monitoring, supervision, diagnosis, and optimization. Following the divide and conquer paradigm, the push for distribution of processing functions is unbowed, while the heterogeneity of technologies used in automation remains a major obstacle.

On the other side, demands are made on the field of informatics to design, implement and validate (secure and safe) system architectures that allow for a seamless integration and combination of those different systems.For this reason, our research focus is put on the general theme of distributed automation and “automation systems integration”, moving away from manual integration to machine-aided solutions.

This includes the analysis and enhancement of industrial communication technologies (wired and wireless), guaranteeing specific quality of services for dependable distributed systems with safety and security in mind. Also, the integration of automation systems exploiting information modeling and knowledge representation is addressed, e.g. based on the vision and technologies of the Semantic Web.

Another aspect is the incorporation of research on safe programming languages, which by construction lead to increased safety and reliability of the created artifacts for safety-critical applications. To ensure extensibility and interoperability, additional effort is put in standardization and thus in the research of and collaboration on existing and emerging standards. Results of these research directions aim to enable not only human-to-machine but in particular genuine machine-to-machine communications, with consideration of extensibility, reliability and safety. Incarnations of the research results will thus add to applications of the “Industrial Internet of Things” (IIoT) including but not limited to the domains of cyber-physical production systems (Industry 4.0), smart grids, and intelligent buildings.

The research Unit Automation Systems is part of the Institute of Computer Engineering.

Johann Blieberger
Johann Blieberger J. Blieberger

Head of Research Unit
Ao.Univ.Prof. DI Dr.

Wolfgang Kastner
Wolfgang Kastner W. Kastner

Full Professor / On Leave
Univ.Prof. DI Dr.

Amirali Amiri
Amirali Amiri A. Amiri

PostDoc Researcher
Dr. / MSc

Markus Bader
Markus Bader M. Bader

PostDoc Researcher
DI Dr.

Mohammad Bilal
Mohammad Bilal M. Bilal

PreDoc Researcher
MSc

Monika di Angelo
Monika di Angelo M. di Angelo

PostDoc Researcher
Ass.Prof. DI Mag. Dr.

Leonhard Esterbauer
Leonhard Esterbauer L. Esterbauer

PreDoc Researcher
DI / BSc

Thomas Frühwirth
Thomas Frühwirth T. Frühwirth

PostDoc Researcher / On Leave
DI Dr. / BSc

Valentin Philipp Just
Valentin Philipp Just V. Just

PreDoc Researcher
MSc

Martin Kjäer
Martin Kjäer M. Kjäer

PreDoc Researcher
DI / BSc

Felix Knorr
Felix Knorr F. Knorr

PreDoc Researcher
DI / BSc

Martin Kronegger
Martin Kronegger M. Kronegger

Senior Lecturer
DI Dr.

Jürgen Pannosch
Jürgen Pannosch J. Pannosch

PreDoc Researcher
DI / BSc

Thomas Preindl
Thomas Preindl T. Preindl

PreDoc Researcher
DI / BSc

Tobias Schwarzinger
Tobias Schwarzinger T. Schwarzinger

PreDoc Researcher
DI / BSc

Gernot Steindl
Gernot Steindl G. Steindl

PostDoc Researcher
DDI Dr. / BSc

Max Albin Thoma
Max Albin Thoma M. Thoma

Project Services
BSc

Ulrike Weisz
Ulrike Weisz U. Weisz

Office Services
Mag. Dr.

Nora Hartner
Nora Hartner N. Hartner

Student Staff
BSc

2024

2023

2022

2021

  • Safety und Security – ein Spannungsfeld in der industriellen Praxis / Hollerer, S., Kastner, W., & Sauter, T. (2021). Safety und Security – ein Spannungsfeld in der industriellen Praxis. Elektrotechnik und Informationstechnik : e & i, 138(7), 449–453. https://doi.org/10.1007/s00502-021-00930-0
    Download: PDF (714 KB)
  • Safety und Security / Kastner, W., & Sauter, T. (2021). Safety und Security. Elektrotechnik und Informationstechnik : e & i, 138(7), 447–448. https://doi.org/10.1007/s00502-021-00944-8
  • Identification of token contracts on Ethereum: standard compliance and beyond / di Angelo, M., & Salzer, G. (2021). Identification of token contracts on Ethereum: standard compliance and beyond. International Journal of Data Science and Analytics. https://doi.org/10.1007/s41060-021-00281-1
    Download: PDF (915 KB)
  • RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness / Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., & Weippl, E. (2021). RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In Proceedings 2021 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium (NDSS) Symposium 2021, Unknown. Internet Society. https://doi.org/10.14722/ndss.2021.24116
  • Building Blocks for Flexible Functional Safety in Discrete Manufacturing and Process Industries / Klose, A., Pelzer, F., Etz, D., Strutzenberger, D., Frühwirth, T., Kastner, W., & Urbas, L. (2021). Building Blocks for Flexible Functional Safety in Discrete Manufacturing and Process Industries. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Västerås, Sweden, Sweden. https://doi.org/10.1109/etfa45728.2021.9613608
  • Experiences from Adjusting Industrial Software for Worst-Case Execution Time Analysis / Denzler, P., Frühwirth, T., Kirchberger, A., Schoeberl, M., & Kastner, W. (2021). Experiences from Adjusting Industrial Software for Worst-Case Execution Time Analysis. In 2021 IEEE 24th International Symposium on Real-Time Distributed Computing (ISORC). 2021 IEEE 24th International Symposium on Real-Time Distributed Computing (ISORC), Daegu, Korea (the Republic of). IEEE. https://doi.org/10.1109/isorc52013.2021.00019
    Project: FORA (2017–2021)
  • Towards the Identification of Security Tokens on Ethereum / Di Angelo, M., & Salzer, G. (2021). Towards the Identification of Security Tokens on Ethereum. In 3rd International Workshop on Blockchains and Smart Contracts (BSC 2020-2021) (p. 5). https://doi.org/10.1109/NTMS49979.2021.9432663
  • Empirical Evaluation of MakerDAO's Resilience / Kjäer, M., Di Angelo, M., & Salzer, G. (2021). Empirical Evaluation of MakerDAO’s Resilience. In Proc. Conference on Blockchain Research & Applications for Innovative Networks and Services (p. 8). https://doi.org/10.1109/BRAINS52497.2021.9569811
  • Detection of Misconfigurations in Power Distribution Grids using Deep Learning / Fellner, D., Strasser, T. I., & Kastner, W. (2021). Detection of Misconfigurations in Power Distribution Grids using Deep Learning. In 2021 International Conference on Smart Energy Systems and Technologies (SEST). 2021 International Conference on Smart Energy Systems and Technologies (SEST), Vaasa, Finland. IEEE. https://doi.org/10.1109/sest50973.2021.9543350
  • Cobot attack: a security assessment exemplified by a specific collaborative robot / Hollerer, S., Fischer, C., Brenner, B., Papa, M., & Schlund, S. (2021). Cobot attack: a security assessment exemplified by a specific collaborative robot. In Procedia Manufacturing (pp. 191–196). https://doi.org/10.1016/j.promfg.2021.07.029
  • AdaMM: A Precompiler for Memory Model Aware Programming on Higher Language Level / Blieberger, J. (2021). AdaMM: A Precompiler for Memory Model Aware Programming on Higher Language Level. Ada-Europe International Conference on Reliable Software Technologies 2021, Unknown. http://hdl.handle.net/20.500.12708/87197
  • Tunnelling and Mirroring Operational Technology Data with IP-based Middlewares / Denzler, P., Ramsauer, D., & Kastner, W. (2021). Tunnelling and Mirroring Operational Technology Data with IP-based Middlewares. In 2021 22nd IEEE International Conference on Industrial Technology (ICIT). 2021 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain. IEEE. https://doi.org/10.1109/icit46573.2021.9453658
    Project: FORA (2017–2021)
  • Static Timing Analysis of OPC UA PubSub / Denzler, P., Frühwirth, T., Kirchberger, A., Schoeberl, M., & Kastner, W. (2021). Static Timing Analysis of OPC UA PubSub. In 2021 17th IEEE International Conference on Factory Communication Systems (WFCS). 2021 17th IEEE International Conference on Factory Communication Systems (WFCS), Linz, Austria, Austria. https://doi.org/10.1109/wfcs46889.2021.9483614
    Project: FORA (2017–2021)
  • Deadlock and WCET Analysis of Barrier-Synchronized Concurrent Programs / Mittermayr, R., & Blieberger, J. (2021). Deadlock and WCET Analysis of Barrier-Synchronized Concurrent Programs. Computing, 103(5), 749–770. https://doi.org/10.1007/s00607-017-0555-8
  • Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed / Landauer, M., Skopik, F., Wurzenberger, M., Hotwagner, W., & Rauber, A. (2021). Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed. IEEE Transactions on Reliability, 70(1), 402–415. https://doi.org/10.1109/tr.2020.3031317
  • A Centralised or Distributed Risk Assessment using Asset Administration Shell / Bhosale, P., Kastner, W., & Sauter, T. (2021). A Centralised or Distributed Risk Assessment using Asset Administration Shell. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vasteras, Sweden. https://doi.org/10.1109/etfa45728.2021.9613152
  • Node-level indicators of soft faults in wireless sensor networks / Widhalm, D., Goeschka, K. M., & Kastner, W. (2021). Node-level indicators of soft faults in wireless sensor networks. In 2021 40th International Symposium on Reliable Distributed Systems (SRDS). 40st International Symposium on Reliable Distributed Systems, SRDS 2021, Chicago, USA, United States of America (the). https://doi.org/10.1109/srds53918.2021.00011
  • Is Arduino a suitable platform for sensor nodes? / Widhalm, D., Goeschka, K. M., & Kastner, W. (2021). Is Arduino a suitable platform for sensor nodes? In IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society. 47th Annual Conference of the IEEE Industrial Electronics Society (IECON 2021), Toronto, ON, Canada, Canada. https://doi.org/10.1109/iecon48115.2021.9589479
  • An Open-Source Wireless Sensor Node Platform with Active Node-Level Reliability for Monitoring Applications / Widhalm, D., Goeschka, K. M., & Kastner, W. (2021). An Open-Source Wireless Sensor Node Platform with Active Node-Level Reliability for Monitoring Applications. Sensors, 21(22), 7613. https://doi.org/10.3390/s21227613
  • Analysis of design phase processes with BIM for blockchain implementation / Srećković, M., Šibenik, G., Breitfuß, D., Preindl, T., & Kastner, W. (2021). Analysis of design phase processes with BIM for blockchain implementation. In ECPPM 2021 – eWork and eBusiness in Architecture, Engineering and Construction (pp. 125–131). CRC Press; Taylor and Francis Group, London. https://doi.org/10.1201/9781003191476-17
  • A Computational Model for 6LoWPAN Multicast Routing / Raich, P., & Kastner, W. (2021). A Computational Model for 6LoWPAN Multicast Routing. In 2021 17th IEEE International Conference on Factory Communication Systems (WFCS). 2021 17th IEEE International Conference on Factory Communication Systems (WFCS), Linz, Austria, Austria. https://doi.org/10.1109/wfcs46889.2021.9483604
  • Identification of security threats, safety hazards, and interdependencies in industrial edge computing / Denzler, P., Hollerer, S., Frühwirth, T., & Kastner, W. (2021). Identification of security threats, safety hazards, and interdependencies in industrial edge computing. In The Sixth ACM/IEEE Symposium on Edge Computing (SEC ´21) (p. 6). http://hdl.handle.net/20.500.12708/58647
    Projects: FORA (2017–2021) / TÜV AUSTRIA Security in Industry Research Lab P1 (2020–2024)
  • Transforming OPC UA Information Models into Domain-Specific Ontologies / Steindl, G., & Kastner, W. (2021). Transforming OPC UA Information Models into Domain-Specific Ontologies. In 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Victoria, BC, Canada, Canada. IEEE. https://doi.org/10.1109/icps49255.2021.9468254
  • Modelling protocol gateways for cyber-physical systems using Architecture Analysis & Design Language / Denzler, P., Scheuchenstuhl, D., Ramsauer, D., & Kastner, W. (2021). Modelling protocol gateways for cyber-physical systems using Architecture Analysis & Design Language. In Procedia CIRP (pp. 1339–1344). https://doi.org/10.1016/j.procir.2021.11.225
    Project: FORA (2017–2021)
  • Communication and container reconfiguration for cyber-physical production systems / Denzler, P., Ramsauer, D., Preindl, T., & Kastner, W. (2021). Communication and container reconfiguration for cyber-physical production systems. In 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Västerås, Sweden, Sweden. https://doi.org/10.1109/etfa45728.2021.9613675
    Project: FORA (2017–2021)
  • Towards Adding Safety and Security Properties to the Industry 4.0 Asset Administration Shell / Hosseini, A. M., Sauter, T., & Kastner, W. (2021). Towards Adding Safety and Security Properties to the Industry 4.0 Asset Administration Shell. In 17th IEEE International Workshop on Factory Communication Systems 2021 WFCS 2021 (pp. 1–4). http://hdl.handle.net/20.500.12708/55650
  • Model-driven Engineering of Gateways for Industrial Automation / Denzler, P., Ramsauer, D., & Kastner, W. (2021). Model-driven Engineering of Gateways for Industrial Automation. In Automation, Robotics & Communications for Industry 4.0 (pp. 47–50). International Frequency Sensor Association (IFSA) Publishing, S. L. http://hdl.handle.net/20.500.12708/55618
    Project: FORA (2017–2021)
  • Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments / Hollerer, S., Kastner, W., & Sauter, T. (2021). Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments. In 2021 17th IEEE International Conference on Factory Communication Systems (WFCS). 2021 17th IEEE International Conference on Factory Communication Systems (WFCS), Linz, Austria. IEEE. https://doi.org/10.1109/wfcs46889.2021.9483591
  • AVA: A Component-oriented Abstraction Layer for Virtual Plug&produce Automation Systems Engineering / Musić, G., Heinzl, B., & Kastner, W. (2021). AVA: A Component-oriented Abstraction Layer for Virtual Plug&produce Automation Systems Engineering. JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 26(100251), 100251. https://doi.org/10.1016/j.jii.2021.100251
  • IoTCrawler: Challenges and Solutions for Searching the Internet of Things / Iggena, T., Ilyas, E. B., Fischer, M., Tönjes, R., Elsaleh, T., Rezvani, R., Pourshahrokhi, N., Bischof, S., Fernbach, A., Parreira, J., Schneider, P., Smirnov, P., Strohbach, M., Truong, H., García-González, A., Skarmeta, A. F., Singh, P., Beliatis, M. J., Presser, M., & Martinez, J. A. (2021). IoTCrawler: Challenges and Solutions for Searching the Internet of Things. Sensors, 21(5), 1559. https://doi.org/10.3390/s21051559
  • Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone / Quarta, D., Ianni, M., Machiry, A., Fratantonio, Y., Gustafson, E., Balzarotti, D., Lindorfer, M., Vigna, G., & Kruegel, C. (2021). Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone. In Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks. ACM, Austria. ACM. https://doi.org/10.1145/3465413.3488571
    Project: IoTIO (2020–2025)
  • Safety und Security - ein Spannungsfeld in der industriellen Praxis / Hollerer, S., Kastner, W., & Sauter, T. (2021). Safety und Security - ein Spannungsfeld in der industriellen Praxis. Elektrotechnik Und Informationstechnik, 138(7), 449–453. https://doi.org/10.1007/s00502-021-00930-0
    Project: TÜV AUSTRIA Security in Industry Research Lab P1 (2020–2024)
  • Decentralized Management Framework for heterogeneous Devices in FM / Preindl, T., Pannosch, J., Kastner, W., Redlein, A., & Baretschneider, C. (2021). Decentralized Management Framework for heterogeneous Devices in FM. Journal Für Facility Management, WIEN(21), 26–38. http://hdl.handle.net/20.500.12708/138387
  • Semantic Microservice Framework for Digital Twins / Steindl, G., & Kastner, W. (2021). Semantic Microservice Framework for Digital Twins. Applied Sciences, 11(12), 5633. https://doi.org/10.3390/app11125633
  • Energy Community between Residential and Industrial Sites powered by Gaia-X / Wallner, B. J., Trautner, T., Knorr, F., Frühwirth, T., & Schwaiger, C. (2021). Energy Community between Residential and Industrial Sites powered by Gaia-X (No. 1). http://hdl.handle.net/20.500.12708/40417

2020

  • HydRand: Efficient Continuous Distributed Randomness / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, United States of America (the). https://doi.org/10.1109/sp40000.2020.00003
  • Creating Character-based Templates for Log Data to Enable Security Event Classification / Wurzenberger, M., Höld, G., Landauer, M., Skopic, F., & Kastner, W. (2020). Creating Character-based Templates for Log Data to Enable Security Event Classification. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. 15th ACM ASIA Conference on Computer and Communications Security, Taipei, Taiwan (Province of China). https://doi.org/10.1145/3320269.3384722
  • Generic Digital Twin Architecture for Industrial Energy Systems / Steindl, G., Stagl, M., Kasper, L., Kastner, W., & Hofmann, R. (2020). Generic Digital Twin Architecture for Industrial Energy Systems. Applied Sciences, 10(24), 8903. https://doi.org/10.3390/app10248903
  • Semantics for Cyber-Physical Systems: A Cross-Domain Perspective / Sabou, M., Biffl, S., Einfalt, A., Krammer, L., Kastner, W., & Ekaputra, F. J. (2020). Semantics for Cyber-Physical Systems: A Cross-Domain Perspective. Semantic Web, 11(1), 115–124. https://doi.org/10.3233/sw-190381
  • Behavioral modeling of manufacturing skills in OPC UA for automated execution by an independent cell controller / Trautner, T., Ayatollahi, I., Strutzenberger, D., Frühwirth, T., Pauker, F., & Kittl, B. (2020). Behavioral modeling of manufacturing skills in OPC UA for automated execution by an independent cell controller. In Procedia CIRP (pp. 633–638). https://doi.org/10.1016/j.procir.2021.03.085
  • Assessing the Similarity of Smart Contracts by Clustering their Interfaces / di Angelo, M., & Salzer, G. (2020). Assessing the Similarity of Smart Contracts by Clustering their Interfaces. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China. IEEE. https://doi.org/10.1109/trustcom50675.2020.00261
  • Wallet Contracts on Ethereum / Di Angelo, M., & Salzer, G. (2020). Wallet Contracts on Ethereum. In International Conference on Blockchain and Cryptocurrency (pp. 1–2). IEEE. http://hdl.handle.net/20.500.12708/58164
  • Characterizing Types of Smart Contracts in the Ethereum Landscape / di Angelo, M., & Salzer, G. (2020). Characterizing Types of Smart Contracts in the Ethereum Landscape. In Financial Cryptography and Data Security (pp. 389–404). Springer. https://doi.org/10.1007/978-3-030-54455-3_28
  • Tokens, Types, and Standards: Identification and Utilization in Ethereum / di Angelo, M., & Salzer, G. (2020). Tokens, Types, and Standards: Identification and Utilization in Ethereum. In 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS 2020), Oxford, United Kingdom of Great Britain and Northern Ireland (the). IEEE. https://doi.org/10.1109/dapps49028.2020.00001
  • SoK / Widhalm, D., Goeschka, K. M., & Kastner, W. (2020). SoK. In Proceedings of the 15th International Conference on Availability, Reliability and Security. ARES’20: 15th International Conference on Availability, Reliability and Security, Dublin, Ireland. https://doi.org/10.1145/3407023.3407027
  • Towards Data-Driven Malfunctioning Detection in Public and Industrial Power Grids / Fellner, D., Brunner, H., Strasser, T. I., & Kastner, W. (2020). Towards Data-Driven Malfunctioning Detection in Public and Industrial Power Grids. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Wien, Austria. IEEE. https://doi.org/10.1109/etfa46521.2020.9212178
  • Ontology-Based Model Identification of Industrial Energy Systems / Steindl, G., & Kastner, W. (2020). Ontology-Based Model Identification of Industrial Energy Systems. In 2020 IEEE 29th International Symposium on Industrial Electronics (ISIE). 2020 IEEE 29th International Symposium on Industrial Electronics (ISIE), Delft, Netherlands (the). https://doi.org/10.1109/isie45063.2020.9152386
  • A general variable neighborhood search for simulation-based energy-aware flow shop scheduling / Heinzl, B., & Kastner, W. (2020). A general variable neighborhood search for simulation-based energy-aware flow shop scheduling. In Proceedings of the 2020 Summer Simulation Conference (pp. 1–12). http://hdl.handle.net/20.500.12708/58265
    Project: ASPeCT (2017–2020)
  • Data Driven Detection of Malfunctions in Power Systems / Fellner, D. (2020). Data Driven Detection of Malfunctions in Power Systems. In Proceedings 9th DACH+ Conference on Energy Informatics (pp. 1–4). http://hdl.handle.net/20.500.12708/58188
  • Functional Differences of Neo and Ethereum as Smart Contract Platforms / Bareis, M., di Angelo, M., & Salzer, G. (2020). Functional Differences of Neo and Ethereum as Smart Contract Platforms. In J. Prieto (Ed.), Advances in Intelligent Systems and Computing (pp. 13–23). Springer. https://doi.org/10.1007/978-3-030-52535-4_2
  • Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection / Landauer, M., Skopik, F., Wurzenberger, M., Hotwagner, W., & Rauber, A. (2020). Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. International Conference on Information Systems Security and Privacy, Valletta, Malta. SciTePress. https://doi.org/10.5220/0008918703490360
  • SoK: Development of Secure Smart Contracts – Lessons from a Graduate Course / di Angelo, M., Sack, C., & Salzer, G. (2020). SoK: Development of Secure Smart Contracts – Lessons from a Graduate Course. In Financial Cryptography and Data Security (pp. 91–105). Springer. https://doi.org/10.1007/978-3-030-43725-1_8
  • Digitalization in Industry - An Austrian Perspective, Whitepaper / Hofmann, R., Halmschlager, V., Knöttner, S., Leitner, B., Pernsteiner, D., Prendl, L., Sejkora, C., Steindl, G., & Traupmann, A. (2020). Digitalization in Industry - An Austrian Perspective, Whitepaper. http://hdl.handle.net/20.500.12708/40039
  • System Log Clustering Approaches for Cyber Security Applications: A Survey / Landauer, M., Skopik, F., Wurzenberger, M., & Rauber, A. (2020). System Log Clustering Approaches for Cyber Security Applications: A Survey. Computers and Security, 92(101739), 101739. https://doi.org/10.1016/j.cose.2020.101739
  • Zukünftige Anforderungen an Niederspannungsnetze und deren Lösungsansätze am Beispiel des Projekts PoSyCo / Herbst, D., Lagler, M., Schürhuber, R., Schmautzer, E., Fickert, L., Einfalt, A., Brunner, H., Schultis, D.-L., Frühwirth, T., & Prüggler, W. (2020). Zukünftige Anforderungen an Niederspannungsnetze und deren Lösungsansätze am Beispiel des Projekts PoSyCo. In 16. Symposium Energieinnovation (p. 11). http://hdl.handle.net/20.500.12708/76395
    Project: PoSyCo (2019–2022)
  • synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems / Skopik, F., Landauer, M., Wurzenberger, M., Vormayr, G., Milosevic, J., Fabini, J., Prüggler, W., Kruschitz, O., Widmann, B., Truckenthanner, K., Rass, S., Simmer, M., & Zauner, C. (2020). synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. Journal of Information Security and Applications, 54(102544), 102544. https://doi.org/10.1016/j.jisa.2020.102544
  • Analysis of Design Phase Processes with BIM for Blockchain Implementation / Sreckovic, M., Sibenik, G., Preindl, T., Kastner, W., & Breitfuss, D. (2020). Analysis of Design Phase Processes with BIM for Blockchain Implementation. Social Science Research Network (SSRN). https://doi.org/10.2139/ssrn.3577529
  • Open Monitoring Platform for Mobile Broadband / Hofer, W., Svoboda, P., Kastner, W., Raida, V., & Rupp, M. (2020). Open Monitoring Platform for Mobile Broadband. In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring). Online Conference 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Netherlands (the). IEEE. https://doi.org/10.1109/vtc2020-spring48590.2020.9128798
  • When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features / Aghakhani, H., Gritti, F., Mecca, F., Lindorfer, M., Ortolani, S., Balzarotti, D., Vigna, G., & Krügel, C. (2020). When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed System Security Symposium (NDSS). Internet Society. http://hdl.handle.net/20.500.12708/58307
  • FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic / van Ede, T., Bortolameotti, R., Continella, A., Ren, J., Dubois, D., Lindorfer, M., Choffnes, D., van Steen, M., & Peter, A. (2020). FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium (NDSS). Internet Society. http://hdl.handle.net/20.500.12708/58308
  • Model-Based Virtual Components in Event-Based Controls: Linking the FMI and IEC 61499 / Spiegel, M. H., Widl, E., Heinzl, B., Kastner, W., & Akroud, N. (2020). Model-Based Virtual Components in Event-Based Controls: Linking the FMI and IEC 61499. Applied Sciences, 10(5), 1611. https://doi.org/10.3390/app10051611
  • Simulation-Based Multi-Criteria Optimization of Parallel Heat Treatment Furnaces at a Casting Manufacturer / Sobottka, T., Kamhuber, F., & Heinzl, B. (2020). Simulation-Based Multi-Criteria Optimization of Parallel Heat Treatment Furnaces at a Casting Manufacturer. Journal of Manufacturing and Materials Processing, 4(3), 94. https://doi.org/10.3390/jmmp4030094
    Project: ASPeCT (2017–2020)
  • Flexible Safety Systems for Smart Manufacturing / Etz, D., Frühwirth, T., & Kastner, W. (2020). Flexible Safety Systems for Smart Manufacturing. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria. https://doi.org/10.1109/etfa46521.2020.9211905
  • Characteristics of Wallet Contracts on Ethereum / di Angelo, M., & Salzer, G. (2020). Characteristics of Wallet Contracts on Ethereum. In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS). 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, Paris, France. IEEE. https://doi.org/10.1109/brains49436.2020.9223287
  • Towards Consolidating Industrial Use Cases on a Common Fog Computing Platform / Denzler, P., Ruh, J., Kadar, M., Avasalcai, C., & Kastner, W. (2020). Towards Consolidating Industrial Use Cases on a Common Fog Computing Platform. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2020) - Hybrid Conference, Vienna, Austria, Austria. IEEE. https://doi.org/10.1109/etfa46521.2020.9211885
    Project: FORA (2017–2021)
  • Design-space evaluation for non-blocking synchronization in Ada: lock elision of protected objects, concurrent objects, and low-level atomics / Yang, S., Jeong, S., Min, B., Kim, Y., Burgstaller, B., & Blieberger, J. (2020). Design-space evaluation for non-blocking synchronization in Ada: lock elision of protected objects, concurrent objects, and low-level atomics. The Journal of Systems Architecture: Embedded Software Design, 110(101764), 101764. https://doi.org/10.1016/j.sysarc.2020.101764
    Project: SAJiTcore++ (2013–2016)
  • Metaheuristic Simulation-based Production Planning for Energy Efficiency: A Case Study / Heinzl, B., & Kastner, W. (2020). Metaheuristic Simulation-based Production Planning for Energy Efficiency: A Case Study. SNE Simulation Notes Europe, 30(3), 105–116. https://doi.org/10.11128/sne.30.tn.10523
    Project: ASPeCT (2017–2020)
  • An efficient hybrid multi-criteria optimization approach for rolling production smoothing of a European food manufacturer / Kamhuber, F., Sobottka, T., Heinzl, B., Henjes, J., & Sihn, W. (2020). An efficient hybrid multi-criteria optimization approach for rolling production smoothing of a European food manufacturer. Computers and Industrial Engineering, 147(106620), 106620. https://doi.org/10.1016/j.cie.2020.106620
    Project: ASPeCT (2017–2020)
  • Self-Configuring Safety Networks / Etz, D., Frühwirth, T., & Kastner, W. (2020). Self-Configuring Safety Networks. In J. Jasperneite & V. Lohweg (Eds.), Kommunikation und Bildverarbeitung in der Automation (pp. 232–245). Springer. https://doi.org/10.1007/978-3-662-59895-5_17
  • Hosting functional safety applications in factory networks through Time-Sensitive Networking / Gent, S., Gutierrez Peon, P., Frühwirth, T., & Etz, D. (2020). Hosting functional safety applications in factory networks through Time-Sensitive Networking. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria, Austria. https://doi.org/10.1109/etfa46521.2020.9212024
  • TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records / der Toorn, O. van, van Rijswijk-Deij, R., Fiebig, T., Lindorfer, M., & Sperotto, A. (2020). TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. https://doi.org/10.1109/eurospw51379.2020.00080
  • Methods for Hybrid Modeling and Simulation-Based Optimization in Energy-Aware Production Planning / Heinzl, B., & Heinzl, B. (2020). Methods for Hybrid Modeling and Simulation-Based Optimization in Energy-Aware Production Planning. TU Verlag, Vienna. http://hdl.handle.net/20.500.12708/24770

2019

  • Manufacturing process data analysis pipelines: a requirements analysis and survey / Ismail, A., Truong, H.-L., & Kastner, W. (2019). Manufacturing process data analysis pipelines: a requirements analysis and survey. Journal Of Big Data, 6, 1–26. https://doi.org/10.1186/s40537-018-0162-3
    Download: PDF (2.55 MB)
  • Distributed Key Generation with Ethereum Smart Contracts / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherlands (the). Springer. http://hdl.handle.net/20.500.12708/58084
  • Echoes of the Past: Recovering Blockchain Metrics from Merged mining / Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, United States of America (the). Springer. http://hdl.handle.net/20.500.12708/58072
  • Benchmark of delays simulated by OpenTrack and calculated by Kronecker Algebra / Schöbel, A., Schöbel, C., Blieberger, J., & Stefan, M. (2019). Benchmark of delays simulated by OpenTrack and calculated by Kronecker Algebra. In Proceedings of the International Scientific Conference “The Science and Development of Transport” (pp. 371–375). Faculty of Transport and Traffic SciencesUniversity of Zagreb. http://hdl.handle.net/20.500.12708/58003
  • Smart contracts in view of the civil code / di Angelo, M., Soare, A., & Salzer, G. (2019). Smart contracts in view of the civil code. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. SAC ’19: The 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus. ACM. https://doi.org/10.1145/3297280.3297321
  • Communication interface specification in OPC UA / Strutzenberger, D., Frühwirth, T., Trautner, T., Hinterbichler, R., & Pauker, F. (2019). Communication interface specification in OPC UA. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. https://doi.org/10.1109/etfa.2019.8869383
  • Parallel Construction of Simultaneous Deterministic Finite Automata on Shared-memory Multicores / Jung, M., Park, J., Blieberger, J., & Burgstaller, B. (2019). Parallel Construction of Simultaneous Deterministic Finite Automata on Shared-memory Multicores. The 12th Annual Meeting of the Asian Association for Algorithms and Computation, Seoul, Korea (the Republic of). http://hdl.handle.net/20.500.12708/86867
    Project: SAJiTcore++ (2013–2016)
  • Multi Robot Route Planning (MRRP): Extended Spatial-Temporal Prioritized Planning / Binder, B., Beck, F., König, F., & Bader, M. (2019). Multi Robot Route Planning (MRRP): Extended Spatial-Temporal Prioritized Planning. In Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 4133–4139). http://hdl.handle.net/20.500.12708/76955
  • Map Based Human Motion Prediction for People Tracking / Beck, F., & Bader, M. (2019). Map Based Human Motion Prediction for People Tracking. In Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 7842–7848). http://hdl.handle.net/20.500.12708/76954
  • A Framework for Cyber Threat Intelligence Extraction from Raw Log Data / Landauer, M., Skopik, F., Wurzenberger, M., Hotwagner, W., & Rauber, A. (2019). A Framework for Cyber Threat Intelligence Extraction from Raw Log Data. In 2019 IEEE International Conference on Big Data (Big Data). 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, United States of America (the). https://doi.org/10.1109/bigdata47090.2019.9006328
  • Measuring Cookies and Web Privacy in a Post-GDPR World / Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117
  • AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis / Wurzenberger, M., Landauer, M., Skopik, F., & Kastner, W. (2019). AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis. In IFIP/IEEE International Symposium on Integrated Network Management (pp. 7–12). http://hdl.handle.net/20.500.12708/58031
  • An Efficient Multi-Objective Hybrid Simheuristic Approach for Advanced Rolling Horizon Production Planning / Kamhuber, F., Sobottka, T., Heinzl, B., & Sihn, W. (2019). An Efficient Multi-Objective Hybrid Simheuristic Approach for Advanced Rolling Horizon Production Planning. In Proceedings of the 2019 Winter Simulation Conference. Winter Simulation Conference 2019 (WSC2019), Maryland, United States of America (the). http://hdl.handle.net/20.500.12708/58007
  • Mayflies, Breeders, and Busy Bees in Ethereum / di Angelo, M., & Salzer, G. (2019). Mayflies, Breeders, and Busy Bees in Ethereum. In Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts  - BCC ’19. BCC 2019 : The Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts, Auckland, New Zealand. ACM. https://doi.org/10.1145/3327959.3329537
  • A Survey of Tools for Analyzing Ethereum Smart Contracts / di Angelo, M., & Salzer, G. (2019). A Survey of Tools for Analyzing Ethereum Smart Contracts. In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). IEEE International Conference on Decentralized Applications and Infrastructures, San Francisco, United States of America (the). IEEE. https://doi.org/10.1109/dappcon.2019.00018
  • A Model-Driven and Ontology-based Engineering Approach for Smart Grid Automation Applications / Zanabria, C., Andren, F. P., Strasser, T. I., & Kastner, W. (2019). A Model-Driven and Ontology-based Engineering Approach for Smart Grid Automation Applications. In IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society. IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal. IEEE. https://doi.org/10.1109/iecon.2019.8927139
  • Smart Manufacturing Retrofit for Brownfield Systems / Etz, D., Brantner, H., & Kastner, W. (2019). Smart Manufacturing Retrofit for Brownfield Systems. In Procedia Manufacturing (pp. 327–332). https://doi.org/10.1016/j.promfg.2020.02.085
  • Closed Loop Cycle Time Feedback to Optimize High-Mix / Low-Volume Production Planning / Messner, M., Mauthner, G., Pauker, F., Frühwirth, T., & Mangler, J. (2019). Closed Loop Cycle Time Feedback to Optimize High-Mix / Low-Volume Production Planning. In Procedia CIRP (pp. 689–694). https://doi.org/10.1016/j.procir.2019.03.177
  • Ontology-Based OPC UA Data Access via Custom Property Functions / Steindl, G., Frühwirth, T., & Kastner, W. (2019). Ontology-Based OPC UA Data Access via Custom Property Functions. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. https://doi.org/10.1109/etfa.2019.8869436
  • Query Performance Evaluation of Sensor Data Integration Methods for Knowledge Graphs / Steindl, G., & Kastner, W. (2019). Query Performance Evaluation of Sensor Data Integration Methods for Knowledge Graphs. In Proceedings of the 6th IEEE International Conference on Big Data, Knowledge and Control Systems Engineering. 6th IEEE International Conference on Big Data, Knowledge and Control Systems Engineering, Sofia, Bulgaria. http://hdl.handle.net/20.500.12708/58032
    Project: BIM4BEMS (2017–2019)
  • Simulation of RPDEVS Models of Logic Gates / Fiedler, C., Preyser, F. J., & Kastner, W. (2019). Simulation of RPDEVS Models of Logic Gates. In U. Durak, C. Deatcu, & J. Hettwer (Eds.), ASIM Workshop 2019 Simulation Technischer System Grundlagen und Methoden in Modellbildung und Simulation (pp. 129–134). Arbeitsgemeinschaft Simulation ASIM in der Gesellschaft für Informatik GI. http://hdl.handle.net/20.500.12708/58017
  • A Novel Ontology-Based Smart Service Architecture for Data-Driven Model Development / Steindl, G., Heinzl, B., & Kastner, W. (2019). A Novel Ontology-Based Smart Service Architecture for Data-Driven Model Development. In Proceedings of the Eleventh International Conference on Information, Process, and Knowledge Management (eKNOW 2019). Eleventh International Conference on Information, Process, and Knowledge Management (eKNOW 2019), Athens, Greece. http://hdl.handle.net/20.500.12708/58005
  • Knowledge-based building management combining human perception and building automation systems / Kastner, W., Gaida, S., & Tellioglu, H. (2019). Knowledge-based building management combining human perception and building automation systems. In Proceedings of the First International Conference on Societal Automation (SA 2019). First International Conference on Societal Automation (SA 2019), Krakow, Poland. http://hdl.handle.net/20.500.12708/57823
  • Collateral Use of Deployment Code for Smart Contracts in Ethereum / di Angelo, M., & Salzer, G. (2019). Collateral Use of Deployment Code for Smart Contracts in Ethereum. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Gran Canaria, Spain. IEEE. https://doi.org/10.1109/ntms.2019.8763828
  • RPDEVS Abstract Simulator / Preyser, F. J., Heinzl, B., & Kastner, W. (2019). RPDEVS Abstract Simulator. In Tagungsband 2019 Workshop der ASIM-Fachgruppen STS und GMMS. 2019 Workshop der ASIM-Fachgruppen STS und GMMS, Braunschweig, Germany. ARGESIM Verlag Wien. https://doi.org/10.11128/arep.57
    Project: ASPeCT (2017–2020)
  • Platform-independent Modeling for Simulation-based Energy Optimization in Industrial Production / Heinzl, B., & Kastner, W. (2019). Platform-independent Modeling for Simulation-based Energy Optimization in Industrial Production. International Journal of Simulation. Systems, Science and Technology, 20. https://doi.org/10.5013/ijssst.a.20.06.10
  • Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies / Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189
  • Backdoors to planning / Kronegger, M., Ordyniak, S., & Pfandler, A. (2019). Backdoors to planning. Artificial Intelligence, 269, 49–75. https://doi.org/10.1016/j.artint.2018.10.002
    Projects: FAIR (2013–2018) / START (2014–2022)
  • A Multiparametric View on Answer Set Programming / Fichte, J. K., Kronegger, M., & Woltran, S. (2019). A Multiparametric View on Answer Set Programming. Annals of Mathematics and Artificial Intelligence, 86(1–3), 121–147. https://doi.org/10.1007/s10472-019-09633-x
  • Comparison of Data-Driven Thermal Building Models for Model Predictive Control / Steindl, G., Kastner, W., & Stangl, V. (2019). Comparison of Data-Driven Thermal Building Models for Model Predictive Control. Journal of Sustainable Development of Energy, Water and Environment Systems, 7(4), 730–742. https://doi.org/10.13044/j.sdewes.d7.0286
  • Simulation of RPDEVS Models of Logic Gates / Fiedler, C., Preyser, F. J., & Kastner, W. (2019). Simulation of RPDEVS Models of Logic Gates. SNE Simulation Notes Europe, 29(2), 85–91. https://doi.org/10.11128/sne.29.tn.10474
  • Parameterized Complexity of Asynchronous Border Minimization / Ganian, R., Kronegger, M., Pfandler, A., & Popa, A. (2019). Parameterized Complexity of Asynchronous Border Minimization. Algorithmica, 81(1), 201–223. https://doi.org/10.1007/s00453-018-0442-5
    Projects: FAIR (2013–2018) / START (2014–2022) / X-TRACT (2014–2018)
  • RPDEVS Abstract Simulator / Preyser, F. J., Heinzl, B., & Kastner, W. (2019). RPDEVS Abstract Simulator. SNE Simulation Notes Europe, 29(2), 79–84. https://doi.org/10.11128/sne.29.tn.10473
  • Blocking versus Non-Blocking Shared-Memory Multicore Synchronization: Programmability, Scalability and Performance / Yang, S., Jeong, S., Min, B., Kim, Y., Burgstaller, B., & Blieberger, J. (2019). Blocking versus Non-Blocking Shared-Memory Multicore Synchronization: Programmability, Scalability and Performance. Reliable Software Technologies - Ada-Europe, Montreux, Switzerland, Austria. http://hdl.handle.net/20.500.12708/86876
  • Digital Transformation Manager (DTM) Course II Modul 7: Industrie 4.0 / IoT / Kittl, B., Trautner, T., Kastner, W., & Frühwirth, T. (2019). Digital Transformation Manager (DTM) Course II Modul 7: Industrie 4.0 / IoT. Digital Transformation Manager (DTM) Course, Pilotfabrik Seestadt Aspern, Austria. http://hdl.handle.net/20.500.12708/87210
  • Digital Transformation Manager (DTM) Course Modul 7: Industrie 4.0 / IoT / Kittl, B., Trautner, T., Kastner, W., & Frühwirth, T. (2019). Digital Transformation Manager (DTM) Course Modul 7: Industrie 4.0 / IoT. Digital Transformation Manager (DTM) Course, Pilotfabrik Seestadt Aspern, Austria. http://hdl.handle.net/20.500.12708/87209
  • Assuring compliance with protection profiles with ThreatGet / El Sadany, M., Schmittner, C., & Kastner, W. (2019). Assuring compliance with protection profiles with ThreatGet. In Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems (pp. 1–12). http://hdl.handle.net/20.500.12708/58030
  • Performance and Scalability of Private Ethereum Blockchains / Schäffer, M., di Angelo, M., & Salzer, G. (2019). Performance and Scalability of Private Ethereum Blockchains. In Business Process Management: Blockchain and Central and Eastern Europe Forum (pp. 103–118). Springer. https://doi.org/10.1007/978-3-030-30429-4_8

2018

  • Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection / Landauer, M., Wurzenberger, M., Skopik, F., Settanni, G., & Filzmoser, P. (2018). Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection. Computers and Security, 79, 94–116. https://doi.org/10.1016/j.cose.2018.08.009
  • Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3
  • Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491
  • A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678
  • Kronecker Algebra for Optimization of Rail Traffic Flow on Zagreb--Rijeka Line / Schöbel, A., Schöbel, C., Stefan, M., & Blieberger, J. (2018). Kronecker Algebra for Optimization of Rail Traffic Flow on Zagreb--Rijeka Line. In Proceedings Railcon 2018 (pp. 41–44). http://hdl.handle.net/20.500.12708/57457
  • Enhancing Performance in Railway Operation by Application of Kronecker Algebra / Schöbel, A., Schöbel, C., Stefan, M., & Blieberger, J. (2018). Enhancing Performance in Railway Operation by Application of Kronecker Algebra. In Proceedings ICTTE 2018 (pp. 113–117). ? http://hdl.handle.net/20.500.12708/57435
  • Application of Kronecker Algebra for Railway Line Zagreb-Rijeka / Schöbel, A., Blieberger, J., & Schöbel, C. (2018). Application of Kronecker Algebra for Railway Line Zagreb-Rijeka. In Road and Rail Infrastructure V (pp. 1261–1264). Department of Transportation, Faculty of Ciivil Engineering, University of Zagreb. https://doi.org/10.5592/co/cetra.2018.698
  • Kronecker Algebra for Managing Rail Capacity / Schöbel, A., Schöbel, C., & Blieberger, J. (2018). Kronecker Algebra for Managing Rail Capacity. In ISEP2018 -- 26th International Symposium on Electronics in Transport. ISEP2018. http://hdl.handle.net/20.500.12708/57324
  • Ontology-based Optimization of Building Automation Systems / Gaida, S., Kastner, W., Petrushevski, F., & Sipetic, M. (2018). Ontology-based Optimization of Building Automation Systems. In Proceedings of the 44th Annual Conference of the IEEE Industrial Electronics Society (pp. 819–825). IEEE. http://hdl.handle.net/20.500.12708/57609
    Project: ADA-EE (2015–2018)
  • A Cognitive System Architecture for Building Energy Management / Zucker, G., Sporr, A., Kollmann, S., Wendt, A., Siafara Chaido, L., & Fernbach, A. (2018). A Cognitive System Architecture for Building Energy Management. IEEE Transactions on Industrial Informatics, 14(6), 2521–2529. https://doi.org/10.1109/tii.2018.2815739
  • Time series analysis: Unsupervised anomaly detection beyond outlier detection / Landauer, M., Wurzenberger, M., Skopik, F., Settanni, G., & Filzmoser, P. (2018). Time series analysis: Unsupervised anomaly detection beyond outlier detection. In C. Su & H. Kikuch (Eds.), Information Security Practice and Experience (pp. 16–36). Springer. http://hdl.handle.net/20.500.12708/29783
  • Enabling flexible real-time factory networks by combining OPC UA and TSN / Frühwirth, T., Gutierrez-Peon, P., Etz, D., & Gent, S. (2018). Enabling flexible real-time factory networks by combining OPC UA and TSN. 4. Wiener Produktionstechnik Kongress - WPK 2018, Wien, Austria. http://hdl.handle.net/20.500.12708/86797
  • Use Cases for Improved Analysis of Energy and Comfort Related Parameters Based on BIM and BEMS Data / Petrushevski, F., Montazer, M., Seifried, S., Schiefer, C., Zucker, G., Preindl, T., Suter, G., & Kastner, W. (2018). Use Cases for Improved Analysis of Energy and Comfort Related Parameters Based on BIM and BEMS Data. In Advanced Computing Strategies for Engineering (pp. 391–413). https://doi.org/10.1007/978-3-319-91638-5_22
  • More Deterministic Product Ramp-up in Cloud Manufacturing Scenarios / Willmann, R., & Kastner, W. (2018). More Deterministic Product Ramp-up in Cloud Manufacturing Scenarios. In P. Granig, E. Hartlieb, & B. Heiden (Eds.), Mit Innovationsmanagement zu Industrie 4.0: Grundlagen, Strategien, Erfolgsfaktoren und Praxisbeispiele (pp. 125–137). Springer-Verlag. https://doi.org/10.1007/978-3-658-11667-5_10
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447
  • A methodology for creating reusable ontologies / Frühwirth, T., Krammer, L., & Kastner, W. (2018). A methodology for creating reusable ontologies. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018), St. Petersburg, Non-EU. IEEE. https://doi.org/10.1109/icphys.2018.8387639
  • MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / Konoth, R. K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., & Vigna, G. (2018). MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/3243734.3243858
  • GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM / van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H., & Razavi, K. (2018). GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 92–113). Springer. https://doi.org/10.1007/978-3-319-93411-2_5
  • Self-healing by property-guided structural adaptation / Ratasich, D., Preindl, T., Selyunin, K., & Grosu, R. (2018). Self-healing by property-guided structural adaptation. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018), St. Petersburg, Non-EU. IEEE. https://doi.org/10.1109/icphys.2018.8387659
  • TransportBuddy: Navigation in Human Accessible Spaces / Bader, M., Todoran, G., Beck, F., Binder, B., & Buchegger, K. (2018). TransportBuddy: Navigation in Human Accessible Spaces. In C. Landschützer, M. Fritz, & A. Wolfschluckner (Eds.), Proceedings of 7th Transport Research Arena TRA 2018 (p. 10). Zenodo. https://doi.org/10.5281/zenodo.1486646
  • Interdisciplinary multi-criteria optimization using hybrid simulation to pursue energy efficiency through production planning / Sihn, W., Sobottka, T., Heinzl, B., & Kamhuber, F. (2018). Interdisciplinary multi-criteria optimization using hybrid simulation to pursue energy efficiency through production planning. CIRP Annals - Manufacturing Technology, 67(1), 447–450. https://doi.org/10.1016/j.cirp.2018.04.059
  • Semantic Evolution in Building Automation Systems Integration / Kastner, W., & Fernbach, A. (2018). Semantic Evolution in Building Automation Systems Integration. KNX Scientific Conference, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/86852
  • Building Automation in the Realm of the IoT / Kastner, W. (2018). Building Automation in the Realm of the IoT. 2018 IEEE International Conference on Future IoT Technologies (Future IoT 2018), Eger, Hungary, EU. http://hdl.handle.net/20.500.12708/86814
  • Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions / Ren, J., Lindorfer, M., Dubois, D. J., Rao, A., Choffnes, D., & Vallina-Rodriguez, N. (2018). Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. In Proceedings 2018 Network and Distributed System Security Symposium. Internet Society. https://doi.org/10.14722/ndss.2018.23143
  • Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications / Pan, E., Ren, J., Lindorfer, M., Wilson, C., & Choffnes, D. (2018). Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. In Proceedings on Privacy Enhancing Technologies (pp. 33–50). DeGruyter. https://doi.org/10.1515/popets-2018-0030
  • Throttled service calls in OPC UA / Ismail, A., & Kastner, W. (2018). Throttled service calls in OPC UA. In 2018 IEEE International Conference on Industrial Technology (ICIT). IEEE International Conference on Industrial Technology, Lyon, France, EU. https://doi.org/10.1109/icit.2018.8352430
  • Towards Model-Driven Development of Hybrid Simulation Models in Industrial Engineering / Heinzl, B., & Kastner, W. (2018). Towards Model-Driven Development of Hybrid Simulation Models in Industrial Engineering. In IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON2018), Washington D.C., USA, Non-EU. IEEE. https://doi.org/10.1109/iecon.2018.8592811
    Project: ASPeCT (2017–2020)
  • RPDEVS: Revising the Parallel Discrete Event System Specification / Preyser, F., Heinzl, B., & Kastner, W. (2018). RPDEVS: Revising the Parallel Discrete Event System Specification. In IFAC-PapersOnLine (pp. 242–247). IFAC-PapersOnLine. https://doi.org/10.1016/j.ifacol.2018.03.042
    Project: ASPeCT (2017–2020)
  • The need for efficient multicast routing in low-power IPv6 mesh networks / Raich, P., & Kastner, W. (2018). The need for efficient multicast routing in low-power IPv6 mesh networks. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). 14th IEEE International Workshop on Factory Communication Systems, Imperia, Italy, EU. https://doi.org/10.1109/wfcs.2018.8402381
  • Digitalization & Facility Management: Energy Flexibility of Existing Buildings / Metzger, A. S., Jradi, M., Grønborg Junker, R., Kastner, W., Reynders, G., Weiss, T., Knotzer, A., & Østergaard Jensen, S. (2018). Digitalization & Facility Management: Energy Flexibility of Existing Buildings. In Proceedings 11th Facility Management Congress (pp. 1–25). http://hdl.handle.net/20.500.12708/57640
  • Design and Implementation of a Negative Voltage Fault Injection Attack Prototype / Kudera, C., Müllner, M., Kammerstetter, M., & Kastner, W. (2018). Design and Implementation of a Negative Voltage Fault Injection Attack Prototype. In Proceedings IEEE International Workshop on Physical Attacks and Inspection on Electronics (PAINE) (pp. 1–6). http://hdl.handle.net/20.500.12708/57623
  • Autonomous Navigation using Just-in-Time Emergency Trajectories / Todoran, G., & Bader, M. (2018). Autonomous Navigation using Just-in-Time Emergency Trajectories. In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 3422–3429). IEEE Xplore Digital Library. http://hdl.handle.net/20.500.12708/57577
  • Self-Configuring Safety Networks / Etz, D., Frühwirth, T., & Kastner, W. (2018). Self-Configuring Safety Networks. In Proceedings of the 9. Jahreskolloquium Kommunikation in der Automation (pp. 1–9). http://hdl.handle.net/20.500.12708/57524
  • Simplifying functional safety communication in modular, heterogeneous production lines / Etz, D., Frühwirth, T., Ismail, A., & Kastner, W. (2018). Simplifying functional safety communication in modular, heterogeneous production lines. In Proceedings 14th IEEE International Workshop on Factory Communication Systems (pp. 1–4). http://hdl.handle.net/20.500.12708/57523
  • Simulation-based Assessment of Energy Efficiency in Industry: Comparison of Hybrid Simulation Approaches / Heinzl, B., Raich, P., Preyser, F., & Kastner, W. (2018). Simulation-based Assessment of Energy Efficiency in Industry: Comparison of Hybrid Simulation Approaches. In IFAC-PapersOnLine (pp. 689–694). IFAC-PapersOnLine. https://doi.org/10.1016/j.ifacol.2018.03.117
    Project: ASPeCT (2017–2020)
  • Security and Privacy Implementations within the AnyPLACE Energy Management Solution / Kudera, C., Ullmann, V., Kammerstetter, M., & Kastner, W. (2018). Security and Privacy Implementations within the AnyPLACE Energy Management Solution. In 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Praha, Czech Republic, EU. https://doi.org/10.1109/etfa.2018.8502507
  • Context-aware optimization strategies for universal application in smart building energy management / Schachinger, D., & Kastner, W. (2018). Context-aware optimization strategies for universal application in smart building energy management. In 2018 IEEE 16th International Conference on Industrial Informatics (INDIN). IEEE 16th International Conference on Industrial Informatics (INDIN 2018), Porto, Portugal, EU. IEEE. https://doi.org/10.1109/indin.2018.8472000
  • Adaptive learning-based time series prediction framework for building energy management / Schachinger, D., Pannosch, J., & Kastner, W. (2018). Adaptive learning-based time series prediction framework for building energy management. In 2018 IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES). IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES 2018), Hamilton, New Zealand, Non-EU. IEEE. https://doi.org/10.1109/ieses.2018.8349919
  • Safe Non-blocking Synchronization in Ada2x / Blieberger, J., & Burgstaller, B. (2018). Safe Non-blocking Synchronization in Ada2x. In A. Casimiro & P. M. Ferreira (Eds.), Reliable Software Technologies – Ada-Europe 2018 (pp. 53–69). Springer-Verlag. https://doi.org/10.1007/978-3-319-92432-8_4

2017

2016

  • An advanced data analytics framework for energy efficiency in buildings / Schachinger, D., Gaida, S., Kastner, W., Petrushevski, F., Reinthaler, C., Sipetic, M., & Zucker, G. (2016). An advanced data analytics framework for energy efficiency in buildings. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany, EU. IEEE. https://doi.org/10.1109/etfa.2016.7733630
    Project: ADA-EE (2015–2018)
  • Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools / Wurzenberger, M., Skopic, F., Fiedler, R., & Kastner, W. (2016). Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. https://doi.org/10.1145/2995959.2995973
  • Applying the SGAM methodology for rapid prototyping of smart Grid applications / Andren, F. P., Strasser, T., & Kastner, W. (2016). Applying the SGAM methodology for rapid prototyping of smart Grid applications. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7794057
  • Exploring Network Formation of Tough and Biocompatible Thiol-​yne Based Photopolymers / Oesterreicher, A., Gorsche, C., Ayalur-Karunakaran, S., Moser, A., Edler, M., Pinter, G., Schlögl, S., Liska, R., & Griesser, T. (2016). Exploring Network Formation of Tough and Biocompatible Thiol-​yne Based Photopolymers. Macromolecular Rapid Communications, 37(20), 1701–1706. http://hdl.handle.net/20.500.12708/148980
  • Optimization of Energy Efficiency in Buildings with Cognitive Knowledge-Based Control / Wendt, A., Zucker, G., Siafara, L., Hausberger, P., Schaat, S., Lindmeier, I., & Kastner, W. (2016). Optimization of Energy Efficiency in Buildings with Cognitive Knowledge-Based Control. Smart Grids Week 2016, Linz, Austria. http://hdl.handle.net/20.500.12708/90746
  • Product Ramp-up for Semiconductor Manufacturing Automated Recommendation of Control System Setup / Willmann, R., & Kastner, W. (2016). Product Ramp-up for Semiconductor Manufacturing Automated Recommendation of Control System Setup. In Semantic Web Technologies for Intelligent Engineering Applications (pp. 219–255). Springer International Publishing Switzerland. http://hdl.handle.net/20.500.12708/29241
  • Rahmenwerk zur modellbasierten horizontalen und vertikalen Integration von Standards für Industrie 4.0 / Mazak, A., Wimmer, M., Huemer, C., Kappel, G., & Kastner, W. (2016). Rahmenwerk zur modellbasierten horizontalen und vertikalen Integration von Standards für Industrie 4.0. In B. Vogel-Heuser (Ed.), Handbuch Industrie 4.0 (pp. 1–22). Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-662-45537-1_94-1
    Project: InteGra 4.0 (2015–2016)
  • Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation / Kammerstetter, M., Burian, D., & Kastner, W. (2016). Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation. In Tenth International Conference on Emerging Security Information, Systems and Technologies (pp. 21–26). http://hdl.handle.net/20.500.12708/56726
    Project: AnyPLACE (2015–2018)
  • Semantics for smart control of building automation / Schachinger, D., & Kastner, W. (2016). Semantics for smart control of building automation. In 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE). 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), Santa Clara, CA, USA, Non-EU. IEEE. https://doi.org/10.1109/isie.2016.7745041
  • Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering / Kammerstetter, M., Müllner, M., Kudera, C., Burian, D., & Kastner, W. (2016). Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering. In Conference on Cryptographic Hardware and Embedded Systems 2016 (pp. 559–577). http://hdl.handle.net/20.500.12708/56727
    Project: AnyPLACE (2015–2018)
  • Reliable IP based communication for fire alarm systems / Kasberger, J., Krammer, L., & Kastner, W. (2016). Reliable IP based communication for fire alarm systems. In 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE). 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), Santa Clara, CA, USA, Non-EU. https://doi.org/10.1109/isie.2016.7744866
    Project: BMS 2016 (2015–2017)
  • Modeling techniques for integrated simulation of industrial systems based on hybrid PDEVS / Raich, P., Heinzl, B., Preyser, F., & Kastner, W. (2016). Modeling techniques for integrated simulation of industrial systems based on hybrid PDEVS. In 2016 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). 2016 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Wien, Austria. https://doi.org/10.1109/mscpes.2016.7480221
    Project: 13054 BAMA (2014–2017)
  • Expressive Navigation and Local Path-Planning of Independent Steering Autonomous Systems / Todoran, G., & Bader, M. (2016). Expressive Navigation and Local Path-Planning of Independent Steering Autonomous Systems. In 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 4742–4749). IEEE Xplore Digital Library,. http://hdl.handle.net/20.500.12708/56623
    Project: MPCv1 (2015–2017)
  • Communications for AnyPLACE: A Smart Metering Platform with Management and Control Functionalities / Henneke, D., Freudenmann, C., Kammerstetter, M., Rua, D., Wisniewski, L., & Jasperneite, J. (2016). Communications for AnyPLACE: A Smart Metering Platform with Management and Control Functionalities. In 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016). IEEE. http://hdl.handle.net/20.500.12708/56733
  • Teil V: Maßnahmenkatalog und Tool-Implementierung / de Bruyn, K., Freingruber, R., Göllner, J., Gottwald, R., Haberler, B., Hecht, T., Kammerstetter, M., Kienesberger, G., Kudera, C., Kupzog, F., Langer, L., Mattern, A., Meisel, M., Meurers, C., Milojkovic, S., Montagna, R., Peer, A., Reichl, J., Sadofsky, A., … Tischlinger, M. (2016). Teil V: Maßnahmenkatalog und Tool-Implementierung. In Smart Grid Security Guidance - (SG)2: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich (pp. 1–253). Schriftenreihe der Landesverteidigungsakademie. http://hdl.handle.net/20.500.12708/29689
  • From old to new: Assessing cybersecurity risks for an evolving smart grid / Langer, L., Skopik, F., Smith, P., & Kammerstetter, M. (2016). From old to new: Assessing cybersecurity risks for an evolving smart grid. In Elsevier Journal on Computers & Security (pp. 165–176). Elsevier. http://hdl.handle.net/20.500.12708/56732
  • CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes / Carter, P., Mulliner, C., Lindorfer, M., Robertson, W., & Kirda, E. (2016). CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In Financial Cryptography and Data Security (pp. 231–249). Springer. https://doi.org/10.1007/978-3-662-54970-4_13
  • Building Profiling for Energy Management / Schachinger, D., & Krammer, L. (2016). Building Profiling for Energy Management. Blickpunkt Forschung: Smart Communities + Technologies @ TU Wien, Wien, Austria. http://hdl.handle.net/20.500.12708/86387
  • Semantic integration in Building Automation - A case study for KNX oBIX and Semantic Web applications / Fernbach, A., Pelesic, I., Kastner, W., & Granzer, W. (2016). Semantic integration in Building Automation - A case study for KNX oBIX and Semantic Web applications. In Proceedings of the KNX Scientific Conference (p. 12). http://hdl.handle.net/20.500.12708/56729
  • Increasing security and availability in KNX networks / Glanzer, H., Krammer, L., & Kastner, W. (2016). Increasing security and availability in KNX networks. In Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI) (pp. 241–252). http://hdl.handle.net/20.500.12708/56725
  • Methodical Reference Architecture Development Progress / Meisel, M., Wilker, S., Fabini, J., Annessi, R., Zseby, T., Müllner, M., Kastner, W., Litzlbauer, M., Gawlik, W., & Neureiter, C. (2016). Methodical Reference Architecture Development Progress. In F. Kupzog (Ed.), energieinformatik 2016 (pp. 40–43). Österreichischer Verband für Elektrotechnik. http://hdl.handle.net/20.500.12708/75506
  • Intelligent control of streetlights based on sensor fusion / Raich, P., Novak, T., Pollhammer, K., Treytl, A., & Kastner, W. (2016). Intelligent control of streetlights based on sensor fusion. In Proceedings of the 11th European ITS Congress. 11th European ITS Congress, Glasgow, EU. http://hdl.handle.net/20.500.12708/56652
    Project: CANOPUS (2015–2017)
  • Open traffic data platform for scenario-based control / Pollhammer, K., Novak, T., Raich, P., Kastner, W., Treytl, A., & Kovacs, G. (2016). Open traffic data platform for scenario-based control. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793132
    Project: CANOPUS (2015–2017)
  • Secure Control Applications in Smart Homes and Buildings / Praus, F., Kastner, W., & Palensky, P. (2016). Secure Control Applications in Smart Homes and Buildings. Journal of Universal Computer Science, 22(9), 1249–1273. http://hdl.handle.net/20.500.12708/149561
  • A Comprehensive Dependability Approach for Building Automation Networks / Krammer, L., Kastner, W., & Sauter, T. (2016). A Comprehensive Dependability Approach for Building Automation Networks. Journal of Universal Computer Science, 22(9), 1225–1248. http://hdl.handle.net/20.500.12708/149560
  • A Method for Real-Time Aggregation of a Product Footprint during Manufacturing / Smolek, P., Leobner, I., Heinzl, B., Gourlis, G., & Ponweiser, K. (2016). A Method for Real-Time Aggregation of a Product Footprint during Manufacturing. Journal of Sustainable Development of Energy, Water and Environment Systems, 4(4), 360–378. https://doi.org/10.13044/j.sdewes.2016.04.0028
    Project: 13054 BAMA (2014–2017)
  • Building automation systems: Concepts and technology review / Domingues, P., Carreira, P., Vieira, R., & Kastner, W. (2016). Building automation systems: Concepts and technology review. Computer Standards & Interfaces, 45, 1–12. https://doi.org/10.1016/j.csi.2015.11.005
    Project: IEA EBC Annex 67 (2015–2019)
  • Software security requirements in building automation / Praus, F., Kastner, W., & Palensky, P. (2016). Software security requirements in building automation. In Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI) : 5. - 7. April 2016 in Bonn (pp. 217–228). http://hdl.handle.net/20.500.12708/56724
  • Vertical integration in industrial enterprises and distributed middleware / Ismail, A., & Kastner, W. (2016). Vertical integration in industrial enterprises and distributed middleware. International Journal of Internet Protocol Technology, 9(2/3), 79. https://doi.org/10.1504/ijipt.2016.079547
  • A Generic Graph Model for WCET Analysis of Multi-core Concurrent Applications / Mittermayr, R., & Blieberger, J. (2016). A Generic Graph Model for WCET Analysis of Multi-core Concurrent Applications. Journal of Software Engineering and Applications, 09(05), 182–198. https://doi.org/10.4236/jsea.2016.95015
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms / van der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K., & Giuffrida, C. (2016). Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/2976749.2978406
  • ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic / Ren, J., Rao, A., Lindorfer, M., Legout, A., & Choffnes, D. (2016). ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM. https://doi.org/10.1145/2906388.2906392
  • Methodical Reference Architecture Development Progress / Meisel, M., Wilker, S., Fabini, J., Annessi, R., Zseby, T., Müllner, M., Kastner, W., Litzlbauer, M., Gawlik, W., & Neureiter, C. (2016). Methodical Reference Architecture Development Progress. D-A-CH Energieinformatik Konferenz, Wien, Austria. http://hdl.handle.net/20.500.12708/90885
    Project: RASSA-Architektur (2015–2017)
  • DigiTrans Modul3 - Praxistag 2: Automatisierungstechnik und automatisierte Fertigungssysteme / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 2: Automatisierungstechnik und automatisierte Fertigungssysteme. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86591
  • DigiTrans Modul3 - Praxistag 3: OPC Unified Architecture / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 3: OPC Unified Architecture. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86590
  • DigiTrans Modul3 - Praxistag 1: Integration / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 1: Integration. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86589
    Project: DigiTrans 4.0 (2016–2018)
  • KNX goes IoT - Aufbruch ins IoT mittels KNX - Webservices / Kastner, W. (2016). KNX goes IoT - Aufbruch ins IoT mittels KNX - Webservices. 7. ZVEI Kolloquium Gebäudeautomation Fachverband Elektroinstallationssysteme, Frankfurt, EU. http://hdl.handle.net/20.500.12708/86388
  • DigiTrans Modul3 - Praxistag 4: Security / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., Gridling, G., Kudera, C., & Kammerstetter, M. (2016). DigiTrans Modul3 - Praxistag 4: Security. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86592
  • Kronecker Algebra Based Analysis of Concurrent Computer Programs / Blieberger, J. (2016). Kronecker Algebra Based Analysis of Concurrent Computer Programs. Festkolloquium aus Anlass des 60. Geburtstages von o.Univ.Prof.Dr. Peter Kirschenhofer, Leoben, Austria. http://hdl.handle.net/20.500.12708/86321
  • Reference Architecture as Foundation for Risk and Threat Analysis / Meisel, M., Wilker, S., Kammerstetter, M., Müllner, M., Fasthuber, D., Kastner, W., & Gawlik, W. (2016). Reference Architecture as Foundation for Risk and Threat Analysis. In Symposium on Innovative Smart Grid Cybersecurtity Solutions - Research-driven solutions for the critical cybersecurity challenges facing the future smart grid (pp. 98–103). Facultas Universitätsverlag. http://hdl.handle.net/20.500.12708/75616
    Project: RASSA-Architektur (2015–2017)
  • A systematic approach to OPC UA information model design / Pauker, F., Frühwirth, T., Kittl, B., & Kastner, W. (2016). A systematic approach to OPC UA information model design. In Procedia CIRP. 49th CIRP Conference on Manufacturing Systems, Stuttgart, EU. ELSEVIER. http://hdl.handle.net/20.500.12708/67460
  • Data-Based Modelling, Simulation And Optimization Of The Operation Of Production Plants / Mörzinger, B., Obermair, M., Leobner, I., Smolek, P., Heinzl, B., Wittmann, A., & Bleicher, F. (2016). Data-Based Modelling, Simulation And Optimization Of The Operation Of Production Plants. In H. Krebs (Ed.), VSS (pp. 86–87). http://hdl.handle.net/20.500.12708/67453
    Project: 13054 BAMA (2014–2017)
  • Hybrid Building Performance Simulation Models for Industrial Energy Efficiency Applications / Smolek, P., Leobner, I., Gourlis, G., Mörzinger, B., Heinzl, B., & Ponweiser, K. (2016). Hybrid Building Performance Simulation Models for Industrial Energy Efficiency Applications. In Proceedings of the 11th Conference on Sustainable Development of Energy, Water and Environment Systems (p. 12). Faculty of Mechanical Engineering and Naval Architecture, Zagreb. http://hdl.handle.net/20.500.12708/61989
    Project: 13054 BAMA (2014–2017)
  • Reliable control network gateways for building automation networks / Seifried, S., & Kastner, W. (2016). Reliable control network gateways for building automation networks. In 2016 Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP). Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP), Krakau, Polen, EU. https://doi.org/10.1109/ebccsp.2016.7605254
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection / Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202
  • Eine Architektur für sichere Smart Grids in Österreich / Jung, O., Fenz, S., Kammerstetter, M., & Hudic, A. (2016). Eine Architektur für sichere Smart Grids in Österreich. In D-A-CH Security 2016 (pp. 1–9). Forschungsgruppe Systemsicherheit. http://hdl.handle.net/20.500.12708/56735
  • Gebäudemanagement durch Wissensbasierte Systeme / Fernbach, A., & Kastner, W. (2016). Gebäudemanagement durch Wissensbasierte Systeme. In Proceedings of the 7. Jahreskolloquium Kommunikation in der Automation (p. 8). http://hdl.handle.net/20.500.12708/56728
  • A generic dependability layer for building automation networks / Krammer, L., Kastner, W., & Sauter, T. (2016). A generic dependability layer for building automation networks. In 2016 IEEE World Conference on Factory Communication Systems (WFCS). IEEE International Workshop on Factory Communication Systems, Porto, Portugal, Austria. https://doi.org/10.1109/wfcs.2016.7496536
  • Linked data for building management / Fernbach, A., Pelesic, I., & Kastner, W. (2016). Linked data for building management. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793781
  • IMU-based smart fitness devices for weight training / Hausberger, P., Fernbach, A., & Kastner, W. (2016). IMU-based smart fitness devices for weight training. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793510
  • Integration von KNX Netzwerken in das Internet der Dinge: Die KNX Web Services Spezifikation / Schachinger, D., & Kastner, W. (2016). Integration von KNX Netzwerken in das Internet der Dinge: Die KNX Web Services Spezifikation. In Proceedings of the 7. Jahreskolloquium Kommunikation in der Automation (p. 8). http://hdl.handle.net/20.500.12708/56700
  • IoT integration based on the KNX Web services specification / Schachinger, D., & Kastner, W. (2016). IoT integration based on the KNX Web services specification. In Proceedings of the KNX Scientific Conference (p. 12). http://hdl.handle.net/20.500.12708/56697
  • Ontology-based abstraction layer for smart grid interaction in building energy management systems / Schachinger, D., Kastner, W., & Gaida, S. (2016). Ontology-based abstraction layer for smart grid interaction in building energy management systems. In 2016 IEEE International Energy Conference (ENERGYCON). IEEE International Energy Conference (ENERGYCON 2016), Leuven, Belgium, EU. IEEE. https://doi.org/10.1109/energycon.2016.7513991
  • Simulation-based Strategies for Smart Demand Response / Leobner, I., Smolek, P., Heinzl, B., Raich, P., Schirrer, A., & Kozek, M. (2016). Simulation-based Strategies for Smart Demand Response. In Proceedings of the 2nd South East European Conference on Sustainable Development of Energy, Water and Environment Systems (SEE SDEWES 2016). 2nd South East European Conference on Sustainable Development of Energy, Water and Environment Systems (SEE SDEWES 2016), Piran, Slovenia, EU. http://hdl.handle.net/20.500.12708/56657
    Project: 13054 BAMA (2014–2017)
  • Towards Extending the Parallel-DEVS Formalism to Improve Component Modularity / Preyser, F. J., Heinzl, B., Raich, P., & Kastner, W. (2016). Towards Extending the Parallel-DEVS Formalism to Improve Component Modularity. In Tagungsband zum Workshop der ASIM/GI-Fachgruppen STS und GMMS. 2016 Workshop der ASIM/GI-Fachgruppen STS und GMMS, Lippstadt, Germany, EU. ARGESIM Verlag Wien. http://hdl.handle.net/20.500.12708/56655
    Project: 13054 BAMA (2014–2017)
  • KNX IPv6 / Seifried, S., Gridling, G., & Kastner, W. (2016). KNX IPv6. In Proceedings in KNX Scientific Conference 2016 (p. 12). http://hdl.handle.net/20.500.12708/56642
  • A middleware architecture for vertical integration / Ismail, A., & Kastner, W. (2016). A middleware architecture for vertical integration. In 2016 1st International Workshop on Cyber-Physical Production Systems (CPPS). 1st International Workshop on Cyber-Physical Production Systems (CPPS), Vienna, Austria. https://doi.org/10.1109/cpps.2016.7483915
  • Position tracking of a model race car with Inertial Measurement Unit, laser mouse sensor and Extended Kalman Filter / Naydenov, D., & Bader, M. (2016). Position tracking of a model race car with Inertial Measurement Unit, laser mouse sensor and Extended Kalman Filter. In Proceedings of the 25th International Conference on Robotics in Alpe-Adria-Danube Region (RAAD) (p. 8). Springer. http://hdl.handle.net/20.500.12708/56626
  • Controlling and Tracking a Unmanned Ground Vehicle with Ackermanndrive / Kaltenegger, E., Binder, B., & Bader, M. (2016). Controlling and Tracking a Unmanned Ground Vehicle with Ackermanndrive. In Vision Meets Robotics, Proceedings of the ÖAGM Workshop 2016 (p. 7). http://hdl.handle.net/20.500.12708/56624
  • Discovery in SOA-governed industrial middleware with mDNS and DNS-SD / Ismail, A., & Kastner, W. (2016). Discovery in SOA-governed industrial middleware with mDNS and DNS-SD. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany, EU. IEEE. https://doi.org/10.1109/etfa.2016.7733529
  • Co-operative peer-to-peer systems for industrial middleware / Ismail, A., & Kastner, W. (2016). Co-operative peer-to-peer systems for industrial middleware. In 2016 IEEE World Conference on Factory Communication Systems (WFCS). WFCS, Torino, Italy, EU. https://doi.org/10.1109/wfcs.2016.7496497
  • Visualisation and Simulation of Pedestrians at Train Stations / Jaros, M., Ferschin, P., & Di Angelo, M. (2016). Visualisation and Simulation of Pedestrians at Train Stations. In W. Song, J. Ma, & L. Fu (Eds.), Proceedings of Pedestrian and Evacuation Dynamics 2016 (pp. 453–458). University of Science and Technology of China Press. http://hdl.handle.net/20.500.12708/56520
    Project: DIVS (2010–2020)
  • Modeling and Simulation of Pedestrian Behaviour / Jaros, M., Di Angelo, M., & Ferschin, P. (2016). Modeling and Simulation of Pedestrian Behaviour. In Y. Merkuryev (Ed.), Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (pp. 149–156). SciTePress. http://hdl.handle.net/20.500.12708/56519
    Project: DIVS (2010–2020)
  • Kronecker Algebra for Static Analysis of Barriers in Ada / Mittermayr, R., & Blieberger, J. (2016). Kronecker Algebra for Static Analysis of Barriers in Ada. In Ada-Europe’2016 International Conference on Reliable Software Technologies (pp. 145–159). Springer-Verlag. http://hdl.handle.net/20.500.12708/56463
  • Smart Grid Security Guidance - (SG)²: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich / Langer, L., Göllner, J., Tischlinger, M., & Kammerstetter, M. (Eds.). (2016). Smart Grid Security Guidance - (SG)2: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich. Schriftenreihe der Landesverteidigungsakademie. http://hdl.handle.net/20.500.12708/24235

2015

  • Kronecker Algebra zur Optimierung des Eisenbahnbetriebes / Stefan, M., Blieberger, J., & Schöbel, A. (2015, September). Kronecker Algebra zur Optimierung des Eisenbahnbetriebes. Eisenbahntechnische Rundschau (ETR), 9, 78–84. http://hdl.handle.net/20.500.12708/151053
  • Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach / Giang, N. K., Im, J., Kim, D., Jung, M., & Kastner, W. (2015). Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6(1), 56. http://hdl.handle.net/20.500.12708/151685
  • Interoperable integration of building automation systems using RESTful BACnet Web services / Schachinger, D., Stampfel, C., & Kastner, W. (2015). Interoperable integration of building automation systems using RESTful BACnet Web services. In Proceedings of the Conference of the IEEE Industrial Electronics Society (p. 6). http://hdl.handle.net/20.500.12708/56166
  • From textual programming to IEC 61499 artifacts: Towards a model-driven engineering approach for smart grid applications / Andren, F., Strasser, T., & Kastner, W. (2015). From textual programming to IEC 61499 artifacts: Towards a model-driven engineering approach for smart grid applications. In INDIN (pp. 1524–1530). IEEE. http://hdl.handle.net/20.500.12708/56316
  • Woody / Spiesberger, P., Jungwirth, F., Wöss, C., Bachl, S., Harms, J., & Grechenig, T. (2015). Woody. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia. 14th International Conference on Mobile and Ubiquitous Multimedia (MUM 2015), Linz, Austria. ACM, New York, NY, USA. https://doi.org/10.1145/2836041.2841210
  • Balanced Manufacturing - a Methodology for Energy Efficient Production Plant operation / Leobner, I., Smolek, P., Heinzl, B., Kovacic, I., Dür, F., Ponweiser, K., & Kastner, W. (2015). Balanced Manufacturing - a Methodology for Energy Efficient Production Plant operation. In Proceedings of the 10th Conference on Sustainable Development of Energy, Water and Environment Systems (p. 10). http://hdl.handle.net/20.500.12708/67368
    Project: 13054 BAMA (2014–2017)
  • SmartCityGrid: CoOpt Koordinierte Optimierung von erneuerbarer Energie in Netz und Gebäude bei Planung und Betrieb / Ferhatbegovic, T., Gawlik, W., Haas, R., Hartl, M., Hauer, S., Heimberger, M., Henein, S., Hiesl, A., Jasek, P., Klug, R., Kodre, B., Kozek, M., Kupzog, F., Leitner, M., Leobner, I., Ponweiser, K., Schidler, S., Schirrer, A., Stockinger, J., … Zucker, G. (2015). SmartCityGrid: CoOpt Koordinierte Optimierung von erneuerbarer Energie in Netz und Gebäude bei Planung und Betrieb. http://hdl.handle.net/20.500.12708/38544
  • Rapid Prototyping for Kinetic Architecture / Ferschin, P., Di Angelo, M., & Brunner, G. (2015). Rapid Prototyping for Kinetic Architecture. In 7th International Conference on Robotics, Automation and Mechatronics (RAM) (pp. 118–123). IEEE Computer Society. http://hdl.handle.net/20.500.12708/56133
    Project: DIVS (2010–2020)
  • Semantic Web and its contribution to Industrie 4.0 / Willmann, R., Kastner, W., & Biffl, S. (2015). Semantic Web and its contribution to Industrie 4.0. 15th European Advanced Process Control and Manufacturing Conference, Freising, Germany, EU. http://hdl.handle.net/20.500.12708/86200
  • Towards a Common Description of Interdisciplinary Aspects Relevant for Holistic Energy Analysis of Production Facilities / Heinzl, B., Hafner, I., Smolek, P., Leobner, I., Gourlis, G., Obermair, M., Popper, N., & Kastner, W. (2015). Towards a Common Description of Interdisciplinary Aspects Relevant for Holistic Energy Analysis of Production Facilities. In Workshop der ASIM/GI-Fachgruppen STS/GMMS (p. 2). http://hdl.handle.net/20.500.12708/56400
    Project: 13054 BAMA (2014–2017)
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210
  • On using FMI-based models in IEC 61499 control applications / Spiegel, M. H., Leimgruber, F., Widl, E., & Gridling, G. (2015). On using FMI-based models in IEC 61499 control applications. In 2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Berlin, Germany, EU. https://doi.org/10.1109/mscpes.2015.7115407
  • Dependability Demands and State of the Art in the Internet of Things / Frühwirth, T., Krammer, L., & Kastner, W. (2015). Dependability Demands and State of the Art in the Internet of Things. In Proceedings of the 20th IEEE Conference on Emerging Technologies and Factory Automation (ETFA) (p. 4). http://hdl.handle.net/20.500.12708/56190
  • Knowledge Based Building and Energy Management / Fernbach, A., Granzer, W., & Kastner, W. (2015). Knowledge Based Building and Energy Management. In Nachhaltige Gebäude (pp. 123–130). Leykam. http://hdl.handle.net/20.500.12708/56329
  • Efficient Construction of Simultaneous Deterministic Finite Automata on Multicores Using Rabin Fingerprints / Jung, M., Burgstaller, B., & Blieberger, J. (2015). Efficient Construction of Simultaneous Deterministic Finite Automata on Multicores Using Rabin Fingerprints. arXiv. https://doi.org/10.48550/arXiv.1512.09228
    Project: SAJiTcore++ (2013–2016)
  • OPC4Factory - Flexibel automatisierte Fertigungszellen / Pauker, F., Frühwirth, T., Hinterbichler, R., & Bachmayr, T. (2015). OPC4Factory - Flexibel automatisierte Fertigungszellen. Blickpunkt Forschung: Energie@TU Wien, Wien, Austria. http://hdl.handle.net/20.500.12708/94447
  • Was verlangt die Gebäudesicherheit der Zukunft?" / Kastner, W. (2015). Was verlangt die Gebäudesicherheit der Zukunft?". Bosch Sicherheitsforum 2015, Wien, Austria. http://hdl.handle.net/20.500.12708/86179
  • Interdisziplinäre Forschung zur Energieoptimierung in Fertigungsbetrieben / Heinzl, B. (2015). Interdisziplinäre Forschung zur Energieoptimierung in Fertigungsbetrieben. Blickpunkt Forschung: Energie @ TU Wien, Technische Universität Wien, Austria. http://hdl.handle.net/20.500.12708/86241
    Projects: 13054 BAMA (2014–2017) / INFO (2010–2013)
  • Secure and Semantic Web of Automation / Fernbach, A. (2015). Secure and Semantic Web of Automation. 8. Internationaler Facility Management Kongress, Wien, Austria. http://hdl.handle.net/20.500.12708/86207
  • Secure and Semantic Web of Automation / Kastner, W., & Fernbach, A. (2015). Secure and Semantic Web of Automation. Blickpunkt Forschung: Energie @ TU Wien, Technische Universität Wien, Austria. http://hdl.handle.net/20.500.12708/86181
  • Industrial Internet for the Internet of Things / Ismail, A., & Kastner, W. (2015). Industrial Internet for the Internet of Things. OCG Jahrestagung 2015, Wien, Austria. http://hdl.handle.net/20.500.12708/86180
  • Future Energy - Diskussion & Zukunftsbild / Schachinger, D., & Kastner, W. (2015). Future Energy - Diskussion & Zukunftsbild. IMAGINE15, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/86125
  • Coordination of an Autonomous Fleet / Bader, M., Richtsfeld, A., Suchi, M., Todoran, G., Kastner, W., & Vincze, M. (2015). Coordination of an Autonomous Fleet. In Proceedings of the Austrian Robotics Workshop 2015 (p. 2). http://hdl.handle.net/20.500.12708/74587
  • A Method for Real-Time Aggregation of a Product Footprint during Manufacturing / Smolek, P., Leobner, I., Heinzl, B., Gourlis, G., & Ponweiser, K. (2015). A Method for Real-Time Aggregation of a Product Footprint during Manufacturing. In 10th Conference on Sustainable Development of Energy, Water and Environment Systems. 10th Conference on Sustainable Development of Energy, Water and Environment Systems (SDEWES 2015), Dubrovnik, Kroatien, EU. http://hdl.handle.net/20.500.12708/61829
    Project: 13054 BAMA (2014–2017)
  • MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis / Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis. In 2015 IEEE 39th Annual Computer Software and Applications Conference. IEEE. https://doi.org/10.1109/compsac.2015.103
    Project: SysSec (2010–2014)
  • Balancing Centralized Control with Vehicle Autonomy in AGV Systems / Bader, M., Richtsfeld, A., Suchi, M., Todoran, G., Holl, W., Kastner, W., & Vincze, M. (2015). Balancing Centralized Control with Vehicle Autonomy in AGV Systems. In Conference on Autonomic and Autonomous Systems (ICAS) (pp. 37–43). http://hdl.handle.net/20.500.12708/57036
  • Integration von Gebäudeautomationssystemen in das Internet der Dinge / Kastner, W. (2015). Integration von Gebäudeautomationssystemen in das Internet der Dinge. In Integrale Planung (pp. 294–301). http://hdl.handle.net/20.500.12708/56268
  • Error-Correcting Codes as Source for Decoding Ambiguity / Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209
  • Smart Privacy Visor: Bridging the Privacy Gap / Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198
  • Guarded state machines in OPC UA / Frühwirth, T., Pauker, F., Fernbach, A., Ayatollahi, I., Kastner, W., & Kittl, B. (2015). Guarded state machines in OPC UA. In Proceedings of the 41st Annual Conference of the IEEE Industrial Electronics Society (IECON) (p. 6). http://hdl.handle.net/20.500.12708/56193
  • TTEthernet SW-based End System for AUTOSAR / Frühwirth, T., Steiner, W., & Stangl, B. (2015). TTEthernet SW-based End System for AUTOSAR. In Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES) (p. 8). http://hdl.handle.net/20.500.12708/56189
  • Model-driven integration of building automation systems into Web service gateways / Schachinger, D., & Kastner, W. (2015). Model-driven integration of building automation systems into Web service gateways. In 2015 IEEE World Conference on Factory Communication Systems (WFCS). 11th IEEE World Conference on Factory Communication Systems (WFCS 2015), Palma de Mallorca, EU. https://doi.org/10.1109/wfcs.2015.7160561
  • Smart grid communication at the interface of customer buildings with focus on demand response / Schachinger, D., Gaida, S., & Kastner, W. (2015). Smart grid communication at the interface of customer buildings with focus on demand response. In 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST). International Symposium on Smart Electric Distribution Systems and Technologies (EDST 2015), Vienna, Austria, Austria. https://doi.org/10.1109/sedst.2015.7315236
  • Medieval Craftsmen at Castle Waldenfels / Giang, H. N. K., Ferschin, P., & Di Angelo, M. (2015). Medieval Craftsmen at Castle Waldenfels. In 2nd International Congress on Digital Heritage. Digital Heritage 2015, Granada, Spain, EU. IEEE Computer Society. http://hdl.handle.net/20.500.12708/56135
    Project: DIVS (2010–2020)

2014

  • Parametric Balinese rumah: Procedural modeling of traditional Balinese architecture / Ferschin, P., Di Angelo, M., & Paskaleva, G. (2014). Parametric Balinese rumah: Procedural modeling of traditional Balinese architecture. In 2013 Digital Heritage International Congress (DigitalHeritage) (pp. 199–206). Royal Society of Chemistry (RSC). https://doi.org/10.1109/digitalheritage.2013.6744755
  • A General Concept for Description of Production Plants / Popper, N., Hafner, I., Rössler, M., Preyser, F. J., Heinzl, B., Smolek, P., & Leobner, I. (2014). A General Concept for Description of Production Plants. Simulation Notes Europe, 24(2), 105–114. http://hdl.handle.net/20.500.12708/158043
    Project: 13054 BAMA (2014–2017)
  • Optimisation of Railway Operation by Application of Kronecker Algebra / Volcic, M., Blieberger, J., & Schöbel, A. (2014). Optimisation of Railway Operation by Application of Kronecker Algebra. In Proceedings CETRA 2014 (pp. 37–42). http://hdl.handle.net/20.500.12708/55113
  • Analysis and optimisation of railway systems / Schöbel, A., Volcic, M., & Blieberger, J. (2014). Analysis and optimisation of railway systems. In EURO_ZEL 2014, 22nd International Symposium (p. 6). University of Zilina. http://hdl.handle.net/20.500.12708/55121
  • Kronecker-Algebra und ihre breit gefächerten Anwendungen im Eisenbahnbereich / Blieberger, J., Schöbel, A., & Volcic, M. (2014). Kronecker-Algebra und ihre breit gefächerten Anwendungen im Eisenbahnbereich. Signal + Draht, 106(7+8), 15–18. http://hdl.handle.net/20.500.12708/156397
  • Računalno modeliranje i simulacija zeljezničkog prometa na relaciji Savski Marof - Dugo Selo primjenom programskog alata OpenTrack / Haramina, H., Schöbel, A., & Bojić, M. (2014). Računalno modeliranje i simulacija zeljezničkog prometa na relaciji Savski Marof - Dugo Selo primjenom programskog alata OpenTrack. Zeljeznice 21, 13(2), 17–20. http://hdl.handle.net/20.500.12708/156857
  • Model-Driven Engineering applied to Smart Grid Automation using IEC 61850 and IEC 61499 / Andren, F., Strasser, T., & Kastner, W. (2014). Model-Driven Engineering applied to Smart Grid Automation using IEC 61850 and IEC 61499. In Proceedings 18th Power Systems Computation Conference (pp. 1–7). http://hdl.handle.net/20.500.12708/55985
  • Semantic Web of Things: an analysis of the application semantics for the IoT moving towards the IoT convergence / Jara, A. J., Olivieri, A. C., Bocchi, Y., Jung, M., Kastner, W., & Skarmeta, A. F. (2014). Semantic Web of Things: an analysis of the application semantics for the IoT moving towards the IoT convergence. International Journal of Web and Grid Services, 10(2/3), 244. https://doi.org/10.1504/ijwgs.2014.060260
    Project: IoT6 (2011–2014)
  • Deriving guidelines for cross-vendor reuse of IEC 61131-3 modules based on Normalized Systems theorems / van der Linden, D., De Bruyn, P., Kastner, W., & Mannaert, H. (2014). Deriving guidelines for cross-vendor reuse of IEC 61131-3 modules based on Normalized Systems theorems. Computer Standards & Interfaces, 36(3), 598–603. https://doi.org/10.1016/j.csi.2013.10.001
    Project: WebCom (2010–2012)
  • Co-simulation environment for optimizing energy efficiency in production systems / Bleicher, F., Duer, F., Leobner, I., Kovacic, I., Heinzl, B., & Kastner, W. (2014). Co-simulation environment for optimizing energy efficiency in production systems. CIRP Annals - Manufacturing Technology, 63(1), 441–444. https://doi.org/10.1016/j.cirp.2014.03.122
  • SGMS - Smart Web Grid - Konzeption eines Informationsmodells für webbasierten Zugriff auf Smart Grids Daten / Meisel, M., Berger, M., Hofer, T., Judex, F., Jung, M., Kienesberger, G., Pichler, M., Prost, S., Prüggler, W., & Röderer, K. (2014). SGMS - Smart Web Grid - Konzeption eines Informationsmodells für webbasierten Zugriff auf Smart Grids Daten. http://hdl.handle.net/20.500.12708/38124
  • Soundia A Learning Application For Musical Correlations According To "The Musical Space" / Ehrentraud, F., & Di Angelo, M. (2014). Soundia A Learning Application For Musical Correlations According To “The Musical Space.” In A. çakir İlhan (Ed.), ITEC 2014 (p. 11). University of Ankara. http://hdl.handle.net/20.500.12708/55087
  • Hardware Trojans - Detect and React? / Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009
  • Towards a Hardware Trojan Detection Cycle / Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977
  • Determining Qualified Production Processes for New Product Ramp-up using Semantic Web Technologies / Willmann, R., Biffl, S., & Serral Asensio, E. (2014). Determining Qualified Production Processes for New Product Ramp-up using Semantic Web Technologies. In Proceedings of the 14th International Conference on Knowledge Technologies and Data-Driven Business (I-KNOW). 14th International Conference on Knowledge Technologies and Data-Driven Business (I-KNOW), Graz, Austria. ACM. http://hdl.handle.net/20.500.12708/55849
  • Future Trends in Smart Homes and Buildings / Kastner, W., Jung, M., & Krammer, L. (2014). Future Trends in Smart Homes and Buildings. In Industrial Communication Technology Handbook, Second Edition (pp. 59-1-59–20). CRC Press. http://hdl.handle.net/20.500.12708/28520
  • State of the Art in Smart Homes and Buildings / Kastner, W., Krammer, L., & Fernbach, A. (2014). State of the Art in Smart Homes and Buildings. In Industrial Communication Technology Handbook, Second Edition (pp. 55-1-55–20). CRC Press. http://hdl.handle.net/20.500.12708/28516
  • Application and benefits of IPv6 for SMEs / Kastner, W., Jung, M., & Kofler, M. (2014). Application and benefits of IPv6 for SMEs. In M. R. Palattella, L. Latif, S. Ziegler, & W. Kastner (Eds.), IoT - IPv6 integration handbook for SMEs (pp. 25–33). open source. http://hdl.handle.net/20.500.12708/28524
    Project: IoT6 (2011–2014)
  • Practical Risk Assessment Using a Cumulative Smart Grid Model / Kammerstetter, M., Langer, L., Skopik, F., Kupzog, F., & Kastner, W. (2014). Practical Risk Assessment Using a Cumulative Smart Grid Model. In 3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS) (p. 12). http://hdl.handle.net/20.500.12708/55875
    Project: (SG)² (2012–2015)
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers / Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950
  • Interdisziplinäre Optimierung der Energieeffizienz in Fertigungsbetrieben mittels Co-Simulation / Heinzl, B., Kastner, W., Rößler, M., Bleicher, F., Dür, F., Kovacic, I., Leobner, I., & Popper, N. (2014). Interdisziplinäre Optimierung der Energieeffizienz in Fertigungsbetrieben mittels Co-Simulation. In J. Scheible, I. Bausch-Gall, & C. Deatcu (Eds.), ASIM-Workshop der STS/GMMS 2014 (p. 4). ARGESIM Verlag Wien. http://hdl.handle.net/20.500.12708/55864
    Project: INFO (2010–2013)
  • Bedeutung des Risikomanagements für die Sicherheit von Smart Grids / Göllner, J., Meurers, C., Peer, A., Langer, L., & Kammerstetter, M. (2014). Bedeutung des Risikomanagements für die Sicherheit von Smart Grids. In 13th SYMPOSIUM ENERGY INNOVATION (EnInnov2014) (p. 10). http://hdl.handle.net/20.500.12708/55874
  • Importance of Risk Management for the Security of Smart Grids / Langer, L., Göllner, J., Meurers, C., Peer, A., & Kammerstetter, M. (2014). Importance of Risk Management for the Security of Smart Grids. In European Meetings on Cybernetics and Systems Research EMCSR 2014 (pp. 1–5). http://hdl.handle.net/20.500.12708/55876
  • Smart Grid Security Analysis: The (SG)² Approach / Langer, L., Kammerstetter, M., & Skopik, F. (2014). Smart Grid Security Analysis: The (SG)2 Approach. Smart Grids Week 2014, Graz, Austria. http://hdl.handle.net/20.500.12708/85972
  • Architecture-driven smart grid security management / Kammerstetter, M., Langer, L., Skopik, F., & Kastner, W. (2014). Architecture-driven smart grid security management. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security - IH&MMSec ’14. 2nd ACM workshop on Information hiding and multimedia security, Salzburg, Austria. https://doi.org/10.1145/2600918.2600937
    Project: (SG)² (2012–2015)
  • Generalized Catalan Sequences Originating from the Analysis of Special Data Structures / Blieberger, J., & Kirschenhofer, P. (2014). Generalized Catalan Sequences Originating from the Analysis of Special Data Structures. Bulletin of the Institute of Combinatorics and Its Applications, 71, 103–116. http://hdl.handle.net/20.500.12708/156592
  • QR - Inception: Barcode in Barcode Attacks / Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952
  • IPv6 Security: Attacks and Countermeasures in a Nutshell / Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399
  • ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors / Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Veen, V. van der, & Platzer, C. (2014). ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). IEEE. https://doi.org/10.1109/badgers.2014.7
    Project: SysSec (2010–2014)
  • KNX and the Semantic Web of Automation / Kastner, W., Fernbach, A., Granzer, W., & Jung, M. (2014). KNX and the Semantic Web of Automation. In Proceedings of the KNX Scientific Conference (p. 18). http://hdl.handle.net/20.500.12708/55843
    Project: iModelA (2012–2014)
  • Enter Sandbox: Android Sandbox Comparison / Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124
  • Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images / Platzer, C., Stuetz, M., & Lindorfer, M. (2014). Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images. In Proceedings of the 2nd international workshop on Security and forensics in communication systems - SFCS ’14. IEEE. https://doi.org/10.1145/2598918.2598920
    Project: SysSec (2010–2014)
  • Co-simulation environment for optimizing energy efficiency in production systems / Bleicher, F., Dür, F., Leobner, I., Kovacic, I., Heinzl, B., & Kastner, W. (2014). Co-simulation environment for optimizing energy efficiency in production systems. 64th CIRP General Asembly, Nantes, EU. http://hdl.handle.net/20.500.12708/93926
    Projects: 13054 BAMA (2014–2017) / INFO (2010–2013)
  • IoTSyS - Control Logic Editor / Jung, M., & Weidinger, J. (2014). IoTSyS - Control Logic Editor. IPSO Challenge 2014, Chicago, USA, Non-EU. http://hdl.handle.net/20.500.12708/86016
    Project: IoT6 (2011–2014)
  • Intelligenz in den eigenen vier Wänden / Kastner, W. (2014). Intelligenz in den eigenen vier Wänden. Zukunft Wohnen - intelligent und lebenswert, Linz, Austria. http://hdl.handle.net/20.500.12708/85810
    Project: ThinkHome (2009–2012)
  • Semantic Web of Automation / Kastner, W., & Jung, M. (2014). Semantic Web of Automation. IMAGINE, Wien, Austria. http://hdl.handle.net/20.500.12708/85809
  • Smart Web Grid - An Austrian research project on interoperable data exchange within smart grids / Jung, M. (2014). Smart Web Grid - An Austrian research project on interoperable data exchange within smart grids. 2nd EU- Jordan Networking in Renewable Energy, Wien, Austria. http://hdl.handle.net/20.500.12708/85772
  • Das Internet der Dinge in der Automation / Kastner, W. (2014). Das Internet der Dinge in der Automation. Österreichischer Automatisierungstag, Wien, Austria. http://hdl.handle.net/20.500.12708/85982
    Project: IoT6 (2011–2014)
  • Security und Gebäudeautomatisierung / Kastner, W. (2014). Security und Gebäudeautomatisierung. Informationstag “IT-Sicherheit im Smart Home und in der Gebäudeautomation,” Berlin, EU. http://hdl.handle.net/20.500.12708/85981
    Project: seBAS (2007–2011)
  • A fault-tolerant Backbone for IEEE 802.15.4 based Networks / Krammer, L., Seifried, S., & Kastner, W. (2014). A fault-tolerant Backbone for IEEE 802.15.4 based Networks. In IEEE Proceedings of the 15th International Conference on Industrial Technology (ICIT 2014) (pp. 736–742). IEEE. http://hdl.handle.net/20.500.12708/55151
    Projects: Feldbus/Fire-IP (2014–2016) / Fire-IP (2012–2015)
  • Hierarchical concept for IP-based resilient communication in building automation / Krammer, L., Bunyai, D., & Kastner, W. (2014). Hierarchical concept for IP-based resilient communication in building automation. In Proceedings - ISIE2013 - 23rd IEEE International Symposium on Industrial Electronics (pp. 2654–2659). IEEE. http://hdl.handle.net/20.500.12708/55150
    Projects: Feldbus/Fire-IP (2014–2016) / Fire-IP (2012–2015)
  • KNX and Model-Driven Engineering / Schachinger, D., Jung, M., & Kastner, W. (2014). KNX and Model-Driven Engineering. In Proceedings of the KNX Scientific Conference (p. 12). http://hdl.handle.net/20.500.12708/55755
  • AndRadar: Fast Discovery of Android Applications in Alternative Markets / Lindorfer, M., Volanis, S., Sisto, A., Neugschwandtner, M., Athanasopoulos, E., Maggi, F., Platzer, C., Zanero, S., & Ioannidis, S. (2014). AndRadar: Fast Discovery of Android Applications in Alternative Markets. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 51–71). Springer. https://doi.org/10.1007/978-3-319-08509-8_4
    Project: SysSec (2010–2014)
  • Competence Orientation in Vocational Schools - the Case of Industrial Information Technology in Austria / Brunner, M., & Di Angelo, M. (2014). Competence Orientation in Vocational Schools - the Case of Industrial Information Technology in Austria. In Y. Gülbahar & E. Karatas (Eds.), ISSEP 2014 (pp. 88–99). Springer-Verlag Berlin Heidelberg. http://hdl.handle.net/20.500.12708/55926
  • The relevance and impact of IPv6 multicasting for Wireless Sensor and Actuator Networks based on 6LoWPAN and Constrained RESTful Environments / Jung, M., Raich, P., & Kastner, W. (2014). The relevance and impact of IPv6 multicasting for Wireless Sensor and Actuator Networks based on 6LoWPAN and Constrained RESTful Environments. In Proceedings International Conference on the Internet of Things (pp. 1–6). http://hdl.handle.net/20.500.12708/55905
    Project: IoT6 (2011–2014)
  • Extending the EPCIS with Building Automation Systems: a New Information System for the Internet of Things / Giang, N. K., Kim, S., Kim, D., Jung, M., & Kastner, W. (2014). Extending the EPCIS with Building Automation Systems: a New Information System for the Internet of Things. In Proceedings Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 364–369). http://hdl.handle.net/20.500.12708/55904
    Project: IoT6 (2011–2014)
  • A reliable and flexible KNX Gateway / Seifried, S., Krammer, L., & Kastner, W. (2014). A reliable and flexible KNX Gateway. In Proceedings KNX Scientific Conference 2014 (p. 10). http://hdl.handle.net/20.500.12708/55899
  • Spotting unsecured KNX installations / Praus, F., & Kastner, W. (2014). Spotting unsecured KNX installations. In Proceedings KNX Scientific Conference (p. 11). http://hdl.handle.net/20.500.12708/55898
    Project: seBAS (2007–2011)
  • An OPC UA Information Model for Cross-Domain Vertical Integration in Automation Systems / Fernbach, A., Kastner, W., Mätzler, S., & Wollschlaeger, M. (2014). An OPC UA Information Model for Cross-Domain Vertical Integration in Automation Systems. In Proceedings of the 19th IEEE Conference on Emerging Technologies and Factory Automation (ETFA’14) (p. 8). IEEE. http://hdl.handle.net/20.500.12708/55892
    Project: iModelA (2012–2014)
  • Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering / Kammerstetter, M., Muellner, M., Burian, D., Platzer, C., & Kastner, W. (2014). Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 21st ACM Conference on Computer and Communications Security (ACM CCS), Scottsdale, Arizona, USA, Non-EU. https://doi.org/10.1145/2660267.2660301
    Project: (SG)² (2012–2015)
  • Identifying unsecured building automation installations / Praus, F., & Kastner, W. (2014). Identifying unsecured building automation installations. In Proceedings of the 19th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (pp. 1–4). IEEE. http://hdl.handle.net/20.500.12708/55853
    Project: seBAS (2007–2011)
  • Building automation systems integration into the Internet of Things the IoT6 approach, its realization and validation / Kastner, W., Kofler, M., Jung, M., Gridling, G., & Weidinger, J. (2014). Building automation systems integration into the Internet of Things the IoT6 approach, its realization and validation. In Proceedings 19th IEEE International Conference on Emerging Technologies and Factory Automation (pp. 1–9). IEEE. http://hdl.handle.net/20.500.12708/55852
    Project: IoT6 (2011–2014)
  • Domänenübergreifende vertikale Integration mit OPC UA / Mätzler, S., Wollschlaeger, M., Fernbach, A., & Kastner, W. (2014). Domänenübergreifende vertikale Integration mit OPC UA. In 5. Jahreskolloquium “Kommunikation in der Automation” ( KommA 2014). Hochschule Ostwestfalen-Lippe, Institut für industrielle Informationstechnik (inIT). http://hdl.handle.net/20.500.12708/55824
    Project: iModelA (2012–2014)
  • Short paper: A scripting-free control logic editor for the Internet of Things / Jung, M., Hajdarevic, E., Kastner, W., & Jara, A. (2014). Short paper: A scripting-free control logic editor for the Internet of Things. In 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, Non-EU. https://doi.org/10.1109/wf-iot.2014.6803155
    Project: IoT6 (2011–2014)
  • Using coupled simulation for planning of energy efficient production facilities / Heinzl, B., Kastner, W., Leobner, I., Dür, F., Bleicher, F., & Kovacic, I. (2014). Using coupled simulation for planning of energy efficient production facilities. In 2014 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Berlin, Germany, EU. https://doi.org/10.1109/mscpes.2014.6842397
    Project: 13054 BAMA (2014–2017)
  • On the security of security extensions for IP-based KNX networks / Judmayer, A., Krammer, L., & Kastner, W. (2014). On the security of security extensions for IP-based KNX networks. In 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014). 10th IEEE Workshop on Factory Communication Systems (WFCS), Toulouse, France, EU. https://doi.org/10.1109/wfcs.2014.6837593
  • Integration of smart meters into management systems in automation / Fernbach, A., & Kastner, W. (2014). Integration of smart meters into management systems in automation. In 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014). 10th IEEE Workshop on Factory Communication Systems (WFCS), Toulouse, France, EU. https://doi.org/10.1109/wfcs.2014.6837586
    Project: iModelA (2012–2014)
  • Prospect / Kammerstetter, M., Platzer, C., & Kastner, W. (2014). Prospect. In Proceedings of the 9th ACM symposium on Information, computer and communications security. 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, Non-EU. https://doi.org/10.1145/2590296.2590301
    Project: (SG)² (2012–2015)
  • Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects / Blieberger, J., & Burgstaller, B. (2014). Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects. In Proceedings of Ada-Europe 2014 (pp. 27–42). http://hdl.handle.net/20.500.12708/55086
    Project: SAJiTcore++ (2013–2016)

2013

2012

2011

  • Informatics Classes in Austria's Lower Secondary Schools - a Survey / Smejkal, P., & Di Angelo, M. (2011). Informatics Classes in Austria’s Lower Secondary Schools - a Survey. In D. Bezakova & I. Kalas (Eds.), Informatics in Schools: Situation, Evolution and Perspectives (p. 37). http://hdl.handle.net/20.500.12708/53767
  • Building and Home Automation / Kastner, W., Soucek, S., Reinisch, C., & Klapproth, A. (2011). Building and Home Automation. In Industrial Electronics Handbook, volume 2: Industrial Communication Systems. CRC Press. http://hdl.handle.net/20.500.12708/27437
  • The Evolution of Factory and Building Automation / Sauter, T., Soucek, S., Kastner, W., & Dietrich, D. (2011). The Evolution of Factory and Building Automation. IEEE Transactions on Industrial Electronics, 5(3), 35–48. https://doi.org/10.1109/mie.2011.942175
  • Procedure-based availability SLAs for Traffic Management Systems / Stögerer, C., Novak, T., Kastner, W., & Krammer, L. (2011). Procedure-based availability SLAs for Traffic Management Systems. In IEEE International Conference on Emerging Technologies (p. 8). http://hdl.handle.net/20.500.12708/53992
    Project: wiTAV (2010–2013)
  • Applying availability SLAs to traffic management systems / Stögerer, C., Brandic, I., Emeakaroha, V. C., Kastner, W., & Novak, T. (2011). Applying availability SLAs to traffic management systems. In 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC). Intelligent Transportation Systems (ITSC), 2011 14th International IEEE Conference, Washington, DC, USA, Non-EU. IEEE Computer Society. https://doi.org/10.1109/itsc.2011.6082941
    Project: FoSII (2009–2012)
  • Smart Web Grid: Eine integrierte Informationsdrehscheibe für Smart Grids / Kienesberger, G., Jung, M., Kupzog, F., & Kastner, W. (2011). Smart Web Grid: Eine integrierte Informationsdrehscheibe für Smart Grids. In Tagungsband Smart Grids Week Linz 2011 (p. 166). http://hdl.handle.net/20.500.12708/72630
    Project: SmartWebGrid (2011–2013)
  • Integration Aspects of Wireless Industrial Automation / Nagy, A., Ring, F., Loschmidt, P., Mahmood, A., Gaderer, G., & Kastner, W. (2011). Integration Aspects of Wireless Industrial Automation. In 37th Annual Conference on IEEE Industrial Electronics Society (pp. 2998–3003). http://hdl.handle.net/20.500.12708/53988
  • Information Technology Education Add-on: "Improving Media Literacy" / Planinc, R., Wetzinger, E., & Di Angelo, M. (2011). Information Technology Education Add-on: “Improving Media Literacy.” In D. Bezakova & I. Kalas (Eds.), Informatics in Schools: Situation, Evolution and Perspectives (p. 32). http://hdl.handle.net/20.500.12708/54089
  • KNX / Kastner, W., Praus, F., Neugschwandtner, G., & Granzer, W. (2011). KNX. In Industrial Electronics Handbook, volume 2: Industrial Communication Systems. CRC Press. http://hdl.handle.net/20.500.12708/27438
  • A Knowledge Representation for Energy Parameters in Sustainable Smart Homes / Kofler, M. J., Reinisch, C., & Kastner, W. (2011). A Knowledge Representation for Energy Parameters in Sustainable Smart Homes. In Third International Conference on Applied Energy (ICAE ’11) (pp. 1065–1078). http://hdl.handle.net/20.500.12708/54049
    Project: ThinkHome (2009–2012)
  • Energy Efficient Production - A Holistic Modeling Approach / Leobner, I., Ponweiser, K., Neugschwandtner, G., & Kastner, W. (2011). Energy Efficient Production - A Holistic Modeling Approach. In World Congress on Sustainable Technologies (WCST-2011) (pp. 62–67). http://hdl.handle.net/20.500.12708/53999
  • An OPC UA interface for an evolvable ISA88 control module / Van Der Linden, D., Mannaert, H., Kastner, W., Vanderputten, V., Peremans, H., & Verelst, J. (2011). An OPC UA interface for an evolvable ISA88 control module. In IEEE International Conference on Emerging Technologies and Factory Automation (p. 9). http://hdl.handle.net/20.500.12708/53993
  • ThinkHome: Gesteigerte Energieeffizienz durch den Einsatz von künstlicher Intelligenz im Haus der Zukunft / Kastner, W. (2011). ThinkHome: Gesteigerte Energieeffizienz durch den Einsatz von künstlicher Intelligenz im Haus der Zukunft. In Science Brunch. Science Brunch, TechGate Vienna, Austria. http://hdl.handle.net/20.500.12708/53989
    Project: ThinkHome (2009–2012)
  • BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients / Szydlowski, M., Zhao, B. Y., Kirda, E., & Krügel, C. (2011). BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. In Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011) (p. 6). IEEE. http://hdl.handle.net/20.500.12708/53715
  • The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code / Kolbitsch, C., Kirda, E., & Krügel, C. (2011). The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS). ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. ACM. http://hdl.handle.net/20.500.12708/54011
    Projects: SysSec (2010–2014) / TRUDIE (2009–2012)
  • Current equalization of serially connected battery cells for a possible second life application / Einhorn, M., Permann, R., Kral, C., Conte, F. V., Guertlschmid, W., Blochberger, T., Kumpusch, R., & Fleig, J. (2011). Current equalization of serially connected battery cells for a possible second life application. In 2011 IEEE Vehicle Power and Propulsion Conference. Vehicle Power and Propulsion Conference (VPPC), Chicago, Non-EU. https://doi.org/10.1109/vppc.2011.6043059
  • Comparison of electrical battery models using a numerically optimized parameterization method / Einhorn, M., Conte, V., Kral, C., & Fleig, J. (2011). Comparison of electrical battery models using a numerically optimized parameterization method. In 2011 IEEE Vehicle Power and Propulsion Conference. Vehicle Power and Propulsion Conference (VPPC), Chicago, Non-EU. https://doi.org/10.1109/vppc.2011.6043060
  • Vermittlung von Java im Anfängerunterricht / Löwenstein, B., & Di Angelo, M. (2011). Vermittlung von Java im Anfängerunterricht. Javamagazin, 12(3), 20–24. http://hdl.handle.net/20.500.12708/162062
  • IDEs für die Schulbank / Löwenstein, B., & Di Angelo, M. (2011). IDEs für die Schulbank. Javamagazin, 12(4), 31–34. http://hdl.handle.net/20.500.12708/162063
  • Mikrowelten / Löwenstein, B., & Di Angelo, M. (2011). Mikrowelten. Javamagazin, 12(5), 30–33. http://hdl.handle.net/20.500.12708/162064
  • Lego Mindstorms / Löwenstein, B., & Di Angelo, M. (2011). Lego Mindstorms. Javamagazin, 12(6), 23–26. http://hdl.handle.net/20.500.12708/162065
  • ThinkHome / Kastner, W., Reinisch, C., & Kofler, M. J. (2011). ThinkHome. In e-nova: Nachhaltige Gebäude - Innovative Technologien & Konzepte für Gebäude der Zukunft (pp. 101–110). http://hdl.handle.net/20.500.12708/54043
    Project: ThinkHome (2009–2012)
  • An Intelligent Knowledge Representation of Smart Home Energy Parameters / Kofler, M. J., Reinisch, C., & Kastner, W. (2011). An Intelligent Knowledge Representation of Smart Home Energy Parameters. In World Renewable Energy Congress (pp. 921–928). http://hdl.handle.net/20.500.12708/53994
    Project: ThinkHome (2009–2012)
  • ThinkHome Energy Efficiency in Future Smart Homes / Reinisch, C., Kofler, M., Iglesias, F., & Kastner, W. (2011). ThinkHome Energy Efficiency in Future Smart Homes. EURASIP Journal on Embedded Systems, 2011(1), 104617. https://doi.org/10.1155/2011/104617
    Project: ThinkHome (2009–2012)
  • FORECAST / Neugschwandtner, M., Comparetti, P. M., Jacob, G., & Kruegel, C. (2011). FORECAST. In Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC ’11. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. ACM. https://doi.org/10.1145/2076732.2076735
  • Towards normalized connection elements in industrial automation / Van Der Linden, D., Mannaert, H., Kastner, W., & Peremans, H. (2011). Towards normalized connection elements in industrial automation. Advances in Internet Technology, 4(3 & amp;4), 133–146. http://hdl.handle.net/20.500.12708/163464
  • ITIL als Methode gegen Social Engineering Attacken / Ehringfeld, A. (2011). ITIL als Methode gegen Social Engineering Attacken. Hakin9, 10, 28–34. http://hdl.handle.net/20.500.12708/163202
  • Datenkommunikation in der verteilten Gebäudeautomation: Stand der Technik und zukünftige Herausforderungen / Kastner, W. (2011). Datenkommunikation in der verteilten Gebäudeautomation: Stand der Technik und zukünftige Herausforderungen. Wohnen mit K(n)öpfchen Zukunftstrend Smart Living, Innsbruck, Austria. http://hdl.handle.net/20.500.12708/85237
    Projects: Networked miniSPOT (2010–2012) / SmartWebGrid (2011–2013) / ThinkHome (2009–2012)
  • Smart Integration / Kastner, W. (2011). Smart Integration. Mercur’11, Wien, Austria. http://hdl.handle.net/20.500.12708/85236
    Project: ThinkHome (2009–2012)
  • OPC Unified Architecture (OPC UA): New Opportunities of System Integration and Information Modeling in Automation Systems / Van Der Linden, D., Granzer, W., & Kastner, W. (2011). OPC Unified Architecture (OPC UA): New Opportunities of System Integration and Information Modeling in Automation Systems. IEEE 9th International Conference on. Industrial Informatics (INDIN’2011), Caparica, Lisbon, Portugal, EU. http://hdl.handle.net/20.500.12708/85221
    Project: WebCom (2010–2012)
  • Building Automation / Kastner, W. (2011). Building Automation. Vienna Green Summer Academy, Wien, Austria. http://hdl.handle.net/20.500.12708/85264
    Projects: Networked miniSPOT (2010–2012) / SmartWebGrid (2011–2013) / ThinkHome (2009–2012)
  • Procedural Modelling of Traditional Balinese Settlements / Ferschin, P., & Di Angelo, M. (2011). Procedural Modelling of Traditional Balinese Settlements. In W. Börner (Ed.), Proc. 16th International Conference on Cultural Heritage and New Technologies (pp. 304–313). http://hdl.handle.net/20.500.12708/54129
  • Unterrichtsveränderungen in Notebook-Klassen / Kurz, G., & Di Angelo, M. (2011). Unterrichtsveränderungen in Notebook-Klassen. In M. Weigend, F. Otte, & M. Thomas (Eds.), Informatik mit Kopf, Herz und Hand - Praxisbeiträge zur INFOS 2011 (pp. 111–120). ZfL-Verlag Münster. http://hdl.handle.net/20.500.12708/54088
  • Detecting malware's failover C&C strategies with squeeze / Neugschwandtner, M., Comparetti, P. M., & Platzer, C. (2011). Detecting malware’s failover C&C strategies with squeeze. In Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC ’11. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. ACM. https://doi.org/10.1145/2076732.2076736
  • Toward a Management Catalog of Security Measures against Social Engineering Attacks / Ehringfeld, A., Naber, L., Kappel, K., Fischer, G., & Grechenig, T. (2011). Toward a Management Catalog of Security Measures against Social Engineering Attacks. In Proceedings of the International Conference on Engineering and Information Management (pp. 1–5). http://hdl.handle.net/20.500.12708/54073
  • Learning from a Distributed Denial of Service Attack against a Legally Binding Electronic Election: Scenario, Operational Experience, Legal Consequences / Ehringfeld, A., Naber, L., Kappel, K., Fischer, G., Pichl, E., & Grechenig, T. (2011). Learning from a Distributed Denial of Service Attack against a Legally Binding Electronic Election: Scenario, Operational Experience, Legal Consequences. In K. N. Andersen, E. Francesconi, Å. Grönlund, & T. M. van Engers (Eds.), Proceedings of the Second international conference on Electronic government and the information systems perspective (EGOVIS’11) (pp. 56–67). Springer-Verlag. http://hdl.handle.net/20.500.12708/54072
  • The Effects of Personal Displays and Transfer Techniques on Collaboration Strategies in Multi-touch Based Multi-display Environments / Bachl, S., Tomitsch, M., Kappel, K., & Grechenig, T. (2011). The Effects of Personal Displays and Transfer Techniques on Collaboration Strategies in Multi-touch Based Multi-display Environments. In P. Campos (Ed.), Proceedings of 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT ´11) (pp. 373–390). Springer Berlin / Heidelberg. http://hdl.handle.net/20.500.12708/54064
  • Electricity Load Management in Smart Home Control / Iglesias Vazquez, F., Kastner, W., Gaceo, S. C., & Reinisch, C. (2011). Electricity Load Management in Smart Home Control. In 12th Conference of 12th Conference of International Building Performance Simulation Association (pp. 957–964). http://hdl.handle.net/20.500.12708/54042
    Project: ThinkHome (2009–2012)
  • Sequence-Based Bot Detection in Massive Multiplayer Online Games / Platzer, C. (2011). Sequence-Based Bot Detection in Massive Multiplayer Online Games. In Proceedings of the 8th International Conference on Information, Communications and Signal Processing (p. 5). IEEE. http://hdl.handle.net/20.500.12708/54022
    Project: SysSec (2010–2014)
  • Detecting Environment-Sensitive Malware / Lindorfer, M., Kolbitsch, C., & Milani Comparetti, P. (2011). Detecting Environment-Sensitive Malware. In Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011). Springer. http://hdl.handle.net/20.500.12708/54010
    Projects: icode (2010–2012) / SysSec (2010–2014) / TRUDIE (2009–2012)
  • Agent based control in the Smart Home / Reinisch, C., & Kastner, W. (2011). Agent based control in the Smart Home. In 37th Annual Conference of the IEEE Industrial Electronics Society (pp. 334–339). http://hdl.handle.net/20.500.12708/53986
    Project: ThinkHome (2009–2012)
  • Impact of user habits in smart home control / Iglesias Vazquez, F., Kastner, W., & Reinisch, C. (2011). Impact of user habits in smart home control. In 16th IEEE International Conference on Emerging Technologies and Factory Automation (p. 8). http://hdl.handle.net/20.500.12708/53985
    Project: INFO (2010–2013)
  • Behavioral Profiles for Building Energy Performance Using eXclusive SOM / Iglesias Vazquez, F., Gaceo, S. C., Kastner, W., & Morales, J. A. M. (2011). Behavioral Profiles for Building Energy Performance Using eXclusive SOM. In IFIP Advances in Information and Communication Technology (pp. 31–40). http://hdl.handle.net/20.500.12708/53984
    Project: ThinkHome (2009–2012)
  • Accessing KNX networks via BACnet/WS / Kastner, W., & Szucsich, S. (2011). Accessing KNX networks via BACnet/WS. In Proceedings ISIE 2011 (pp. 1315–1320). IEEE. http://hdl.handle.net/20.500.12708/53983
    Project: seBAS (2007–2011)
  • Multi-Stakeholder-Datenaustausch in zukünftigen Smart Grids: Smart Web Grid / Jung, M. (2011). Multi-Stakeholder-Datenaustausch in zukünftigen Smart Grids: Smart Web Grid. In Tagungsband ComForEn 2011 (pp. 73–75). http://hdl.handle.net/20.500.12708/53976
  • Privacy enabled Web service access control using SAML and XACML for home automation gateways / Jung, M., Kienesberger, G., Granzer, W., Unger, M., & Kastner, W. (2011). Privacy enabled Web service access control using SAML and XACML for home automation gateways. In Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (pp. 584–591). IEEE. http://hdl.handle.net/20.500.12708/53975
    Project: SmartWebGrid (2011–2013)
  • Clustering methods for occupancy prediction in smart home control / Iglesias Vazquez, F., & Kastner, W. (2011). Clustering methods for occupancy prediction in smart home control. In Proceedings ISIE 2011 (pp. 1321–1328). IEEE. http://hdl.handle.net/20.500.12708/53973
    Project: ThinkHome (2009–2012)
  • A new Approach for Robot Motion Planning using Rapidly-exploring Randomized Trees / Krammer, L., Granzer, W., & Kastner, W. (2011). A new Approach for Robot Motion Planning using Rapidly-exploring Randomized Trees. In Proceedings IEEE Conference on Industrial Informatics (INDIN ’11) (pp. 263–268). http://hdl.handle.net/20.500.12708/53937
  • Integrating CCTV Systems into BACnet / Mauser, C., Granzer, W., & Kastner, W. (2011). Integrating CCTV Systems into BACnet. In Proceedings IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’11) (pp. 1–4). http://hdl.handle.net/20.500.12708/53936
    Project: Networked miniSPOT (2010–2012)
  • Interoperability at the Management Level of Building Automation Systems: A Case Study for BACnet and OPC UA / Fernbach, A., Granzer, W., & Kastner, W. (2011). Interoperability at the Management Level of Building Automation Systems: A Case Study for BACnet and OPC UA. In Proceedings IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’11) (pp. 1–8). http://hdl.handle.net/20.500.12708/53935
    Project: WebCom (2010–2012)
  • Social Snapshots: Digital Forensics for Online Social Networks / Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929
  • An Approach to Formalize Traditional Balinese Architecture with Design Grammars / Ferschin, P., & Di Angelo, M. (2011). An Approach to Formalize Traditional Balinese Architecture with Design Grammars. In E. Lehner, I. Doubrawa, & A. Ikaputra (Eds.), Proc. International Symposium Insular Diversity: Architecture, Culture, and Identity in Indonesia (pp. 151–158). IVA-ICRA. http://hdl.handle.net/20.500.12708/53655
    Project: DIVS (2010–2020)

2010

  • Informatikunterricht in der Wiener AHS-Unterstufe / Smejkal, P., & Di Angelo, M. (2010). Informatikunterricht in der Wiener AHS-Unterstufe. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 326–331). OCG. http://hdl.handle.net/20.500.12708/53247
  • Distributed monitoring for component-based traffic management systems gement software / Stögerer, C., & Kastner, W. (2010). Distributed monitoring for component-based traffic management systems gement software. In 15th IEEE Conference on Emerging Techonologies and Factory Automation (pp. 1–4). http://hdl.handle.net/20.500.12708/53373
  • Approaches for increasing availability of component-based traffic management software / Stögerer, C., & Kastner, W. (2010). Approaches for increasing availability of component-based traffic management software. In 13th IEEE Conference on Intelligent Transportation Systems (pp. 1608–1613). http://hdl.handle.net/20.500.12708/53376
  • Towards the life-cycle of VMS configurations / Stögerer, C., Novak, T., & Kastner, W. (2010). Towards the life-cycle of VMS configurations. In 13th IEEE Conference on Intelligent Transportation Systems (pp. 783–788). http://hdl.handle.net/20.500.12708/53375
  • Security in building automation systems / Granzer, W., Praus, F., & Kastner, W. (2010). Security in building automation systems. IEEE Transactions on Industrial Electronics, 57(11), 3622–3630. http://hdl.handle.net/20.500.12708/167556
    Project: seBAS (2007–2011)
  • Facebook im Unterricht / Planinc, R., & Di Angelo, M. (2010). Facebook im Unterricht. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 296–304). OCG. http://hdl.handle.net/20.500.12708/53246
  • Von der Kamera ins Web / Planinc, R., Wetzinger, E., & Di Angelo, M. (2010). Von der Kamera ins Web. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 285–290). OCG. http://hdl.handle.net/20.500.12708/53244
  • Experimentieren mit digitalem Ton / Eisenbarth, M., & Di Angelo, M. (2010). Experimentieren mit digitalem Ton. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 291–295). OCG. http://hdl.handle.net/20.500.12708/53245
  • Begabtenförderung mit LEGO Mindstorms / Di Angelo, M., Berger, K., & Schönbauer, A. (2010). Begabtenförderung mit LEGO Mindstorms. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 275–279). OCG. http://hdl.handle.net/20.500.12708/53243
  • ThinkHome: A Smart Home as Digital Ecosystem / Reinisch, C., Kofler, M. J., & Kastner, W. (2010). ThinkHome: A Smart Home as Digital Ecosystem. In 4th IEEE International Conference on Digital Ecosystems and Technologies (pp. 256–261). http://hdl.handle.net/20.500.12708/53372
    Project: ThinkHome (2009–2012)
  • Using AI to Realize Energy Efficient Yet Comfortable Smart Homes / Kastner, W., Kofler, M. J., & Reinisch, C. (2010). Using AI to Realize Energy Efficient Yet Comfortable Smart Homes. In 8th IEEE International Workshop on Factory Communication Systems (pp. 169–172). http://hdl.handle.net/20.500.12708/53371
    Project: ThinkHome (2009–2012)
  • No-new-wires technologies for control / Kastner, W. (2010). No-new-wires technologies for control. In Broadband Home today and tomorrow: technical challenges and developments. Broadband Home today and tomorrow: technical challenges and developments, Delft, Netherlands, EU. http://hdl.handle.net/20.500.12708/53513
  • Integrating process communication in building information models with IFC and LON / Malinowsky, B., & Kastner, W. (2010). Integrating process communication in building information models with IFC and LON. In 8th IEEE International Workshop on Factory Communication Systems (pp. 221–230). http://hdl.handle.net/20.500.12708/53370
  • Exploring the potential of game engines for real-time light simulation / Ferschin, P., Di Angelo, M., & Suter, G. (2010). Exploring the potential of game engines for real-time light simulation. In A. Mahdavi & B. Martens (Eds.), BAUSIM 2010 (pp. 499–504). http://hdl.handle.net/20.500.12708/53248
  • Exploiting diverse observation perspectives to get insights on the malware landscape / Leita, C., Bayer, U., & Kirda, E. (2010). Exploiting diverse observation perspectives to get insights on the malware landscape. In Proceedings of the 40th Dependable Systems & Networks Conference (DSN) (pp. 393–402). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53347
  • Extending Mondrian Memory Protection / Kolbitsch, C., Krügel, C., & Kirda, E. (2010). Extending Mondrian Memory Protection. In IST-091 Information Assurance and Cyber Defence (p. 18). NATO Research and Technology Organization (NATO RTO). http://hdl.handle.net/20.500.12708/53348
    Projects: SECoverer (2008–2011) / WOMBAT (2008–2011)
  • Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries / Kolbitsch, C., Holz, T., Krügel, C., & Kirda, E. (2010). Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In 2010 IEEE Symposium on Security and Privacy (pp. 29–44). IEEE Computer Society. https://doi.org/10.1109/SP.2010.10
    Project: WOMBAT (2008–2011)
  • Is the Internet for Porn? An Insight Into the Online Adult Industry / Wondracek, G., Holz, T., Platzer, C., Kirda, E., & Krügel, C. (2010). Is the Internet for Porn? An Insight Into the Online Adult Industry. In The Ninth Workshop on the Economics of Information Security (WEIS 2010) (p. 14). ACM Press. http://hdl.handle.net/20.500.12708/53357
    Project: WOMBAT (2008–2011)
  • A Practical Attack to De-anonymize Social Network Users / Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A Practical Attack to De-anonymize Social Network Users. In 2010 IEEE Symposium on Security and Privacy. IEEE, Austria. IEEE Computer Society. https://doi.org/10.1109/sp.2010.21
    Project: WOMBAT (2008–2011)
  • Identifying Dormant Functionality in Malware Programs / Milani Comparetti, P., Salvaneschi, G., Kirda, E., Kolbitsch, C., Krügel, C., & Zanero, S. (2010). Identifying Dormant Functionality in Malware Programs. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 61–76). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53340
    Project: WOMBAT (2008–2011)
  • A solution for the automated detection of clickjacking attacks / Balduzzi, M., Egele, M., Balzarotti, D., Kirda, E., & Krügel, C. (2010). A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10. ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China, Non-EU. ACM. https://doi.org/10.1145/1755688.1755706
    Projects: SECoverer (2008–2011) / WOMBAT (2008–2011)
  • Abusing Social Networks for Automated User Profiling / Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Krügel, C. (2010). Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection (RAID 2010) (p. 20). Springer. http://hdl.handle.net/20.500.12708/53362
    Project: WOMBAT (2008–2011)
  • A Knowledge Base for Energy-Efficient Smart Homes / Kofler, M. J., & Kastner, W. (2010). A Knowledge Base for Energy-Efficient Smart Homes. In Proceedings IEEE International Energy Conference & Exhibition. IEEE International Energy Conference & Exhibition, Manama, Bahrain, Non-EU. http://hdl.handle.net/20.500.12708/53517
    Project: ThinkHome (2009–2012)
  • Auf dem Weg zu prädiktiven Regelungen im Zweckbau und Heimbereich / Kastner, W., Kofler, M. J., & Reinisch, C. (2010). Auf dem Weg zu prädiktiven Regelungen im Zweckbau und Heimbereich. Technologieworkshop, Wien, Austria. http://hdl.handle.net/20.500.12708/85052
    Project: ThinkHome (2009–2012)
  • Integrating surveillance systems into KNX / Schuster, F., Krammer, L., Granzer, W., & Kastner, W. (2010). Integrating surveillance systems into KNX. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53368
    Project: Networked miniSPOT (2010–2012)
  • Building Automation / Kastner, W. (2010). Building Automation. Smart Buildings - Planning for the Future, Wien, Austria. http://hdl.handle.net/20.500.12708/85051
  • Intelligente Gebäudeautomation / Kastner, W. (2010). Intelligente Gebäudeautomation. Plusenergiehäuser der Zukunft, Wien, Austria. http://hdl.handle.net/20.500.12708/85050
  • Future Challenges for Building Automation: Wireless and Security / Kastner, W., Granzer, W., & Reinisch, C. (2010). Future Challenges for Building Automation: Wireless and Security. IEEE International Symposium on Industrial Electronics (ISIE ’10), Bari, Italy, EU. http://hdl.handle.net/20.500.12708/85022
    Projects: seBAS (2007–2011) / ThinkHome (2009–2012)
  • ThinkHome - die nächste Generation des energieeffizienten Eigenheims? / Reinisch, C. (2010). ThinkHome - die nächste Generation des energieeffizienten Eigenheims? Technologieworkshop I “Sustainable Construction,” Wien, Austria. http://hdl.handle.net/20.500.12708/85485
  • First legally binding Election in Austria - the Student Union Election / Ehringfeld, A. (2010). First legally binding Election in Austria - the Student Union Election. 4th International Conference on eDemocracy (EDEM 2010), Krems, Austria. http://hdl.handle.net/20.500.12708/85083
  • Availability Analysis for Railway Infrastructure based on Graph Theory / Schöbel, A., & Blieberger, J. (2010). Availability Analysis for Railway Infrastructure based on Graph Theory. In Revitalisation of Economy - New Challenge for European Railways (pp. 141–148). EDIS Zilina. http://hdl.handle.net/20.500.12708/60186
  • AdaStreams: A Type-based Programming Extension for Stream-Parallelism with Ada 2005 / Hong, J., Hong, K., Burgstaller, B., & Blieberger, J. (2010). AdaStreams: A Type-based Programming Extension for Stream-Parallelism with Ada 2005. In Reliable Software Technologies - Ada Europe 2010 (pp. 208–221). Springer-Verlag. http://hdl.handle.net/20.500.12708/53659
  • The Use of E-Voting in the Austrian Federation of Students Elections 2009 / Krimmer, R., Ehringfeld, A., & Traxl, M. (2010). The Use of E-Voting in the Austrian Federation of Students Elections 2009. In R. Krimmer & R. Grimm (Eds.), Electronic Voting (pp. 33–44). Gi, Lni. http://hdl.handle.net/20.500.12708/53572
  • Challenges for Designing the User Experience of Multi-touch Interfaces / Bachl, S., Tomitsch, M., Wimmer, C., & Grechenig, T. (2010). Challenges for Designing the User Experience of Multi-touch Interfaces. In Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems. Engineering Patterns for Multi-Touch Interfaces 2010, Berlin, EU. ACM. http://hdl.handle.net/20.500.12708/53538
  • Analysis of Recommendation Rec(2004)11 Based on the Experiences of Specific Attacks Against the First Legally Binding Implementation of E-Voting in Austria / Ehringfeld, A., Naber, L., Grechenig, T., Krimmer, R., Traxl, M., & Fischer, G. (2010). Analysis of Recommendation Rec(2004)11 Based on the Experiences of Specific Attacks Against the First Legally Binding Implementation of E-Voting in Austria. In R. Krimmer & R. Grimm (Eds.), Electronic Voting (pp. 225–237). Gi, Lni. http://hdl.handle.net/20.500.12708/53529
  • Open Source Approaches to Integrate KNX into Media Centers / Praus, F., Reinisch, C., Leitner, P., & Kastner, W. (2010). Open Source Approaches to Integrate KNX into Media Centers. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53515
  • Mapping KNX to BACnet/Web Services / Szucsich, S., & Kastner, W. (2010). Mapping KNX to BACnet/Web Services. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53378
    Project: WebCom (2010–2012)
  • Usage Profiles for Sustainable Buildings / Iglesias Vazquez, F., & Kastner, W. (2010). Usage Profiles for Sustainable Buildings. In 15th IEEE Conference on Emerging Techonologies and Factory Automation (pp. 1–8). http://hdl.handle.net/20.500.12708/53374
    Project: ThinkHome (2009–2012)
  • Secure Control Applications in Building Automation using Domain Knowledge / Praus, F., & Kastner, W. (2010). Secure Control Applications in Building Automation using Domain Knowledge. In Proceedings 8th IEEE International Conference on Industrial Informatics (INDIN 2010) (pp. 52–57). http://hdl.handle.net/20.500.12708/53367
    Project: seBAS (2007–2011)
  • Security Analysis of Open Building Automation Systems / Granzer, W., & Kastner, W. (2010). Security Analysis of Open Building Automation Systems. In Proceedings 29th International Conference on Computer Safety, Reliability and Security (SAFECOMP ’10) (pp. 303–316). Springer. http://hdl.handle.net/20.500.12708/53366
    Project: seBAS (2007–2011)
  • Communication Services for Secure Building Automation Networks / Granzer, W., & Kastner, W. (2010). Communication Services for Secure Building Automation Networks. In Proceedings IEEE International Symposium on Industrial Electronics (ISIE ’10) (pp. 3380–3385). http://hdl.handle.net/20.500.12708/53365
    Project: seBAS (2007–2011)
  • KNX and OPC UA / Granzer, W., Kastner, W., & Furtak, P. (2010). KNX and OPC UA. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53361
    Project: WebCom (2010–2012)
  • dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection / Neugschwandtner, M., Platzer, C., Milani Comparetti, P., & Bayer, U. (2010). dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection. In Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (p. 20). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53360
    Project: WOMBAT (2008–2011)
  • Covertly Probing Underground Economy Marketplaces / Fallmann, H., Wondracek, G., & Platzer, C. (2010). Covertly Probing Underground Economy Marketplaces. In Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010) (p. 10). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53359
    Project: TRUDIE (2009–2012)

2009

  • System Management Standards for Traffic Management Systems / Stögerer, C., & Kastner, W. (2009). System Management Standards for Traffic Management Systems. In Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation. 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain, EU. http://hdl.handle.net/20.500.12708/52894
  • Server-Side Bot Detection in Massively Multiplayer Online Games / Mitterhofer, S. K., Krügel, C., Kirda, E., & Platzer, C. (2009). Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy, 7(3), 29–36. https://doi.org/10.1109/msp.2009.78
  • Securing IP Backbones in Building Automation Networks / Granzer, W., Lechner, D., Praus, F., & Kastner, W. (2009). Securing IP Backbones in Building Automation Networks. In Proceedings 7th IEEE International Concerence on Industrial Informatics (pp. 410–415). Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN ’09),. http://hdl.handle.net/20.500.12708/52665
    Project: seBAS (2007–2011)
  • SWAP: Mitigating XSS Attacks using a Reverse Proxy / Krügel, C., Platzer, C., Kirda, E., Ludl, C., & Wurzinger, P. (2009). SWAP: Mitigating XSS Attacks using a Reverse Proxy. In SESS proceedings. International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA, Non-EU. http://hdl.handle.net/20.500.12708/52880
    Project: WOMBAT (2008–2011)
  • Mitigating Drive-by Download Attacks: Challenges and Open Problems / Egele, M., Kirda, E., & Krügel, C. (2009). Mitigating Drive-by Download Attacks: Challenges and Open Problems. In Open Research Problems in Network Security Workshop. Open Research Problems in Network Security Workshop, Zurich, EU. http://hdl.handle.net/20.500.12708/52883
  • Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks / Wurzinger, P., Egele, M., Kirda, E., & Krügel, C. (2009). Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks. In Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. http://hdl.handle.net/20.500.12708/52884
    Projects: SECoverer (2008–2011) / WOMBAT (2008–2011)
  • Removing web spam links from search engine results / Kolbitsch, C., Egele, M., & Platzer, C. (2009). Removing web spam links from search engine results. Journal in Computer Virology, 7(1), 51–62. https://doi.org/10.1007/s11416-009-0132-6
    Projects: SECoverer (2008–2011) / WOMBAT (2008–2011)
  • Removing Web Spam Links from Search Engine Results / Kirda, E., Egele, M., & Krügel, C. (2009). Removing Web Spam Links from Search Engine Results. In EICAR proceedings. Conference of the European Institute for Computer Antivirus Research (EICAR), Germany, EU. http://hdl.handle.net/20.500.12708/52881
    Projects: SECoverer (2008–2011) / WOMBAT (2008–2011)
  • Data communications for distributed building automation / Kastner, W., & Neugschwandtner, G. (2009). Data communications for distributed building automation. In Embedded Systems Handbook, Second Edition, Volume 2: Networked Embedded Systems (pp. 29-1-29–34). CRC Press. http://hdl.handle.net/20.500.12708/26573
  • Scalable, Behavior-Based Malware Clustering / Bayer, U., Kirda, E., Krügel, C., Milani Comparetti, P., & Hlauschek, C. (2009). Scalable, Behavior-Based Malware Clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009). Network and Distributed System Security Symposium (NDSS), USA, Non-EU. NDSS Proceedings. http://hdl.handle.net/20.500.12708/52860
    Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011)
  • Effective and Efficient Malware Detection at the End Host / Milani Comparetti, P., Kolbitsch, C., Kirda, E., Krügel, C., Xiaoyong, Z., & Xiaofeng, W. (2009). Effective and Efficient Malware Detection at the End Host. In usenix 2009. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/52887
    Project: WOMBAT (2008–2011)
  • FIRE: FInding Rogue nEtworks / Stone-Gross, B., Moser, A., Krügel, C., Kirda, E., & Almaroth, K. (2009). FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/52891
    Project: WOMBAT (2008–2011)
  • Automatically Generating Models for Botnet Detection / Wurzinger, P., Bilge, L., Kirda, E., Krügel, C., Holz, T., & Göbel, J. (2009). Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS 2009). European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France, EU. http://hdl.handle.net/20.500.12708/52890
    Projects: Pathfinder (2007–2009) / WOMBAT (2008–2011)
  • Prospex: Protocol Specification Extraction / Milani Comparetti, P., Wondracek, G., Krügel, C., & Kirda, E. (2009). Prospex: Protocol Specification Extraction. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 110–125). IEEE. http://hdl.handle.net/20.500.12708/52878
    Project: WOMBAT (2008–2011)
  • Graphentheoretische Verfügbarkeitsanalyse für die Eisenbahninfrastruktur / Blieberger, J., Ostermann, N., & Schöbel, A. (2009). Graphentheoretische Verfügbarkeitsanalyse für die Eisenbahninfrastruktur. Signal&Draht, 101(9), 33–36. http://hdl.handle.net/20.500.12708/165268
  • Functional Safety in Building Automation / Kastner, W., & Novak, T. (2009). Functional Safety in Building Automation. In Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation. 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain, EU. http://hdl.handle.net/20.500.12708/52893
    Project: KNXSafety (2008–2009)
  • Enhanced Control Application Development in Building Automation / Praus, F., Granzer, W., & Kastner, W. (2009). Enhanced Control Application Development in Building Automation. In 7th IEEE International Conference on Industrial Informatics (INDIN ’09) (pp. 390–395). Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN ’09). http://hdl.handle.net/20.500.12708/52892
    Project: seBAS (2007–2011)
  • Congestion control in building automation networks: Considerations for KNX / Neugschwandtner, G., & Kastner, W. (2009). Congestion control in building automation networks: Considerations for KNX. In Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009) (p. 6). http://hdl.handle.net/20.500.12708/52889
    Project: KNXIPSim (2008–2010)

2008

2007

  • A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees / Scholz, B., & Blieberger, J. (2007). A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees. In Compiler Construction (pp. 202–217). LNCS, Springer-Verlag. https://doi.org/10.1007/978-3-540-71229-9_14
  • Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2007). Extending .NET Security to Unmanaged Code. International Journal of Information Security, 6(6), 417–428. http://hdl.handle.net/20.500.12708/169715
  • Limits of Static Analysis for Malware Detection / Moser, A., Krügel, C., & Kirda, E. (2007). Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 12–21). http://hdl.handle.net/20.500.12708/52153
  • Exploring Multiple Execution Paths for Malware Analysis / Moser, A., Krügel, C., & Kirda, E. (2007). Exploring Multiple Execution Paths for Malware Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 1–15). http://hdl.handle.net/20.500.12708/52143
  • On the Effectiveness of Techniques to Detect Phishing Sites / Ludl, C., McAllister, S., Kirda, E., & Krügel, C. (2007). On the Effectiveness of Techniques to Detect Phishing Sites. In Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA) (pp. 1–20). http://hdl.handle.net/20.500.12708/52145
  • Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / Yin, H., Song, D., Egele, M., Krügel, C., & Kirda, E. (2007). Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52151
  • Dynamic Spyware Analysis / Egele, M., Krügel, C., Kirda, E., Yin, H., & Song, D. (2007). Dynamic Spyware Analysis. In Proceedings of the Usenix Annual Technical Conference (pp. 1–14). http://hdl.handle.net/20.500.12708/52146
  • Considering a technical realization of a neuro-psychoanalytical model of the mind / Dietrich, D., Fodor, G., Kastner, W., & Ulieru, M. (2007). Considering a technical realization of a neuro-psychoanalytical model of the mind. In Proceedings of ENF 2007 - 1st International Engineering & Neuro-Psychoanalysis Forum (pp. 13–20). http://hdl.handle.net/20.500.12708/69775
  • Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / Karlberger, C., Bayler, G., Krügel, C., & Kirda, E. (2007). Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In Usenix Workshop on Offensive Technologies (WOOT) (pp. 1–7). http://hdl.handle.net/20.500.12708/52150
  • Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards / Költringer, T., Ngo Van, M., & Grechenig, T. (2007). Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards. In Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (pp. 2513–2518). ACM Press. http://hdl.handle.net/20.500.12708/52082
  • A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks / Praus, F., Granzer, W., Georg, G., & Sauter, T. (2007). A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks. In Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’07) (pp. 1465–1472). http://hdl.handle.net/20.500.12708/52051
  • Trends in der Gebäudeautomation: Wireless Automation Networks / Kastner, W. (2007). Trends in der Gebäudeautomation: Wireless Automation Networks. MegaTECH, 1/2(2007), 46. http://hdl.handle.net/20.500.12708/169697
  • Static Detection of Livelocks in Ada Multitasking Programs / Blieberger, J., Burgstaller, B., & Mittermayr, R. (2007). Static Detection of Livelocks in Ada Multitasking Programs. In N. Abdennadher & F. Kordon (Eds.), Reliable Software Technologies - Ada-Europe 2007: 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007, Proceedings (pp. 69–83). Springer-Verlag. https://doi.org/10.1007/978-3-540-73230-3_6
  • Improving Signature Testing Through Dynamic Data Flow Analysis / Balzarotti, D., Robertson, W., Krügel, C., & Vigna, G. (2007). Improving Signature Testing Through Dynamic Data Flow Analysis. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 22–32). http://hdl.handle.net/20.500.12708/52154
  • Secure Input for Web Applications / Szydlowski, M., Krügel, C., & Kirda, E. (2007). Secure Input for Web Applications. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 1–11). http://hdl.handle.net/20.500.12708/52152
  • Detecting System Emulators / Raffetseder, T., Krügel, C., & Kirda, E. (2007). Detecting System Emulators. In Proceedings of the Information Security Conference (ISC ) (pp. 1–18). http://hdl.handle.net/20.500.12708/52149
  • Mining Specifications of Malicious Behavior / Christodorescu, M., Jha, S., & Krügel, C. (2007). Mining Specifications of Malicious Behavior. In Proceedings of the European Software Engineering Conference (ESEC) (pp. 1–10). http://hdl.handle.net/20.500.12708/52148
  • A Layout-Similarity-Based Approach for Detecting Phishing Pages / Rosiello, A., Krügel, C., Kirda, E., & Ferrandi, F. (2007). A Layout-Similarity-Based Approach for Detecting Phishing Pages. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) (pp. 1–10). http://hdl.handle.net/20.500.12708/52147
  • Building Anti-Phishing Browser Plug-Ins: An Experience Report / Raffetseder, T., Kirda, E., & Krügel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. In 3rd International Workshop on Software Engineering for Secure Systems (SESS) (pp. 1–7). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52144
  • Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Vogt, P., Nentwich, F., Jovanovic, N., Krügel, C., Kirda, E., & Vigna, G. (2007). Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52142
  • Understanding Spatial Mobile Service Discovery using Pointing and Touching. / Költringer, T., Tomitsch, M., Kappel, K., Zrno, M., & Grechenig, T. (2007). Understanding Spatial Mobile Service Discovery using Pointing and Touching. In ACM CHI 2007 Workshop on Mobile Spatial Interaction (p. 4). http://hdl.handle.net/20.500.12708/52085
  • Designing Tangible Tabletop Interfaces for Patients in Rehabilitation / Leitner, M., Tomitsch, M., Költringer, T., Kappel, K., & Grechenig, T. (2007). Designing Tangible Tabletop Interfaces for Patients in Rehabilitation. In M. Hersh (Ed.), Proceedings of the Conference and Workshop on Assistive Technology for People with Vision and Hearing Impairments (p. 7). http://hdl.handle.net/20.500.12708/52080
  • Plug and Play in Distributed Home and in Building Automation Systems: An Introduction / Neugschwandtner, G. (2007). Plug and Play in Distributed Home and in Building Automation Systems: An Introduction. In Proceedings Konnex Scientific Conference (p. 10). http://hdl.handle.net/20.500.12708/52052
  • Automatisch sicher / Kastner, W. (2007). Automatisch sicher. In Der Mensch im Zentrum der intelligenten Gebäudeautomation (pp. 85–97). http://hdl.handle.net/20.500.12708/52050
  • Calimero: Next Generation / Malinowsky, B., Neugschwandtner, G., & Kastner, W. (2007). Calimero: Next Generation. In Proceedings Konnex Scientific Conference (p. 10). http://hdl.handle.net/20.500.12708/52049
    Project: seBAS (2007–2011)
  • BACnet over KNX / Granzer, W., & Kastner, W. (2007). BACnet over KNX. In Proceedings Konnex Scientific Conference (p. 19). http://hdl.handle.net/20.500.12708/52048
    Project: seBAS (2007–2011)
  • Wireless Technologies in Home and Building Automation / Reinisch, C., Kastner, W., Neugschwandtner, G., & Granzer, W. (2007). Wireless Technologies in Home and Building Automation. In Proceedings 5th IEEE International Conference on Industrial Informatics (pp. 93–98). http://hdl.handle.net/20.500.12708/52047
    Project: seBAS (2007–2011)
  • Web Services in Building Automation: Mapping KNX to oBIX / Neugschwandtner, M., Neugschwandtner, G., & Kastner, W. (2007). Web Services in Building Automation: Mapping KNX to oBIX. In Proceedings 5th IEEE International Conference on Industrial Informatics (pp. 87–92). http://hdl.handle.net/20.500.12708/52044
  • Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP / Reinisch, C., Kastner, W., & Neugschwandtner, G. (2007). Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP. In Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’07) (pp. 1380–1383). http://hdl.handle.net/20.500.12708/52015
    Project: seBAS (2007–2011)
  • Synchronous Consensus with Mortal Byzantines / Widder, J., Gridling, G., Weiss, B., & Blanquart, J.-P. (2007). Synchronous Consensus with Mortal Byzantines. In Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE Conference on Dependable Systems and Networks (DSN), Philadelphia, PA, USA, Non-EU. http://hdl.handle.net/20.500.12708/52033

2006

  • Towards Plug and Play in Home and Building Automation Networks / Neugschwandtner, G. (2006). Towards Plug and Play in Home and Building Automation Networks. In 11th IEEE International Conference on Emerging Technologies and Factory Automation (pp. 461–464). IEEE. https://doi.org/10.1109/ETFA.2006.355254
  • Symbolic Analysis of Imperative Programming Languages / Burgstaller, B., Scholz, B., & Blieberger, J. (2006). Symbolic Analysis of Imperative Programming Languages. In Modular Programming Languages (pp. 172–194). Springer-Verlag. https://doi.org/10.1007/11860990_12
  • Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2006). Protecting Users Against Phishing Attacks with AntiPhish. The Computer Journal, 49(5). http://hdl.handle.net/20.500.12708/173448
  • Dynamic Analysis of Malicious Code / Bayer, U., Moser, A., Krügel, C., & Kirda, E. (2006). Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1). http://hdl.handle.net/20.500.12708/173446
  • Static Detection of Access Anomalies in Ada95 / Burgstaller, B., Blieberger, J., & Mittermayr, R. (2006). Static Detection of Access Anomalies in Ada95. In Reliable Software Technologies – Ada-Europe 2006 (pp. 40–55). Springer-Verlag. https://doi.org/10.1007/11767077_4
  • Using Static Program Analysis to Aid Intrusion Detection / Egele, M., Szydlowski, M., Kirda, E., & Krügel, C. (2006). Using Static Program Analysis to Aid Intrusion Detection. In Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science (pp. 17–37). Springer-Verlag. http://hdl.handle.net/20.500.12708/51697
  • ConceptWorld: Uncovering the Pragmatic Depth of Semantic Concepts Using the WWW / Dittenbach, M., Berger, H., Merkl, D., & Eckkrammer, F. (2006). ConceptWorld: Uncovering the Pragmatic Depth of Semantic Concepts Using the WWW. In Proc. Asian Semantic Web Conf. 2006 (pp. 301–312). Jilin University Press. http://hdl.handle.net/20.500.12708/51747
  • An Embedded Systems Programming Environment for C / Burgstaller, B., Scholz, B., & Ertl, M. A. (2006). An Embedded Systems Programming Environment for C. In Euro-Par 2006 Parallel Processing (pp. 1204–1216). Lecture Notes in Computer Science, Springer Verlag. http://hdl.handle.net/20.500.12708/51629
  • Fire Safety Alarm Transmission in Networked Building Automation Systems / Neugschwandtner, G., Kastner, W., & Erb, B. (2006). Fire Safety Alarm Transmission in Networked Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 79–82). http://hdl.handle.net/20.500.12708/51680
  • Towards a Community-Driven 3D e-Tourism Environment / Berger, H., Dittenbach, M., & Merkl, D. (2006). Towards a Community-Driven 3D e-Tourism Environment. In P. Isaias, M. McPherson, & F. Bannister (Eds.), e-Society 2006 Proceedings. Proceedings of the IADIS International Conference on e-Society (pp. 168–172). http://hdl.handle.net/20.500.12708/51745
  • Experiments in Multi-Class e-Mail Categorization / Berger, H., Merkl, D., & Dittenbach, M. (2006). Experiments in Multi-Class e-Mail Categorization. In Proc. Seventh Intern. Baltic Conf. on Databases and Information Systems 2006 (pp. 79–90). http://hdl.handle.net/20.500.12708/51746
  • Exploiting Partial Decision Trees for Feature Subset Selection in e-Mail Categorization / Berger, H., Merkl, D., & Dittenbach, M. (2006). Exploiting Partial Decision Trees for Feature Subset Selection in e-Mail Categorization. In Proc. Applied Computing 2006 (pp. 1105–1109). ACM Press. http://hdl.handle.net/20.500.12708/51741
  • "Wissen schaft": Gebäudeautomation - Security in KNX/EIB / Kastner, W. (2006). “Wissen schaft”: Gebäudeautomation - Security in KNX/EIB. MegaTECH, 12, 16. http://hdl.handle.net/20.500.12708/173443
  • Anomalous System Call Detection / Mutz, D., Valeur, F., Krügel, C., & Vigna, G. (2006). Anomalous System Call Detection. ACM Transactions on Information and System Security, 9(1). http://hdl.handle.net/20.500.12708/173447
  • "Wissen schaft": Trends in der Gebäudeautomation / Kastner, W. (2006). “Wissen schaft”: Trends in der Gebäudeautomation. MegaTECH, 11, 44. http://hdl.handle.net/20.500.12708/173442
  • Datenkommunikation in der verteilten Gebäudeautomation / Kastner, W., & Neugschwandtner, G. (2006). Datenkommunikation in der verteilten Gebäudeautomation. Bulletin SEV/VSE, 17, 9–14. http://hdl.handle.net/20.500.12708/173441
  • Average Case Analysis of DJ Graphs / Blieberger, J. (2006). Average Case Analysis of DJ Graphs. Journal of Discrete Algorithms, 4(4), 649–675. https://doi.org/10.1016/j.jda.2005.07.002
  • Synchronous Consensus with Mortal Byzantines / Widder, J., Gridling, G., Weiss, B., & Blanquart, J.-P. (2006). Synchronous Consensus with Mortal Byzantines. Dagstuhl Seminar 06371. From Security to Dependability, Dagstuhl, EU. http://hdl.handle.net/20.500.12708/84588
  • Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Habilitationskolloquium, Wien, Austria. http://hdl.handle.net/20.500.12708/84565
  • Vulnerabilities in Web Applications / Krügel, C. (2006). Vulnerabilities in Web Applications. TERENA Networking Conference, Italy, EU. http://hdl.handle.net/20.500.12708/84564
  • Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada, Non-EU. http://hdl.handle.net/20.500.12708/84563
  • Dimensionen der Integration / Neugschwandtner, G. (2006). Dimensionen der Integration. Technologieberatung “Intelligente Gebäude- und Haustechnik”, TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84562
  • State of the Art und Offene Standards / Kastner, W. (2006). State of the Art und Offene Standards. Technologieberatung “Intelligente Gebäude- und Haustechnik”, TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84561
  • Offene Kommunikation in der Gebäudeautomation - State of the Art and Future Trends / Kastner, W. (2006). Offene Kommunikation in der Gebäudeautomation - State of the Art and Future Trends. Automation 2006 Jahreskongress, Congress Center Messezentrum WienNeu, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84560
  • Plug and Play in der Automatisierungstechnik / Kastner, W. (2006). Plug and Play in der Automatisierungstechnik. Veranstaltung Automatisierung in der Produktion - zukunftsweisendes Know-How an der TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84559
  • Bahavior-based Spyware Detection / Kirda, E., Krügel, C., Banks, G., Vigna, G., & Kemmerer, R. (2006). Bahavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium (pp. 273–288). http://hdl.handle.net/20.500.12708/51798
  • Wireless Communication in KNX/EIB / Reinisch, C., Granzer, W., Neugschwandtner, G., Praus, F., & Kastner, W. (2006). Wireless Communication in KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 15). http://hdl.handle.net/20.500.12708/51782
  • EIBsec: A Security Extension to KNX/EIB / Granzer, W., Kastner, W., & Neugschwandtner, G. (2006). EIBsec: A Security Extension to KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 13). http://hdl.handle.net/20.500.12708/51685
  • Interoperable Web Services for Building Automation: Integrating KNX / Neugschwandtner, M., Neugschwandtner, G., & Kastner, W. (2006). Interoperable Web Services for Building Automation: Integrating KNX. In Proceedings KNX Scientific Conference 2006 (p. 14). http://hdl.handle.net/20.500.12708/51684
  • A versatile networked embedded platform for KNX/EIB / Praus, F., Neugschwandtner, G., & Kastner, W. (2006). A versatile networked embedded platform for KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 18). http://hdl.handle.net/20.500.12708/51683
  • Developing User Interface Guidelines for DVD Menus / Kappel, K., Tomitsch, M., Költringer, T., & Grechenig, T. (2006). Developing User Interface Guidelines for DVD Menus. In Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2006 (pp. 177–182). ACM Press. http://hdl.handle.net/20.500.12708/51707
  • Experiences from Designing a Tangible Musical Toy / Tomitsch, M., Grechenig, T., Kappel, K., & Költringer, T. (2006). Experiences from Designing a Tangible Musical Toy. In Proceedings of the 5th International Conference for Interaction Design and Children - IDC 2006 (pp. 169–170). ACM Press. http://hdl.handle.net/20.500.12708/51706
  • Guidelines for Designing Usable DVD Menus / Költringer, T., Tomitsch, M., Kappel, K., & Grechenig, T. (2006). Guidelines for Designing Usable DVD Menus. In Proceedings of the 20th British HCI conference - HCI 2006, Vol. 2 (pp. 74–78). ACM Press. http://hdl.handle.net/20.500.12708/51705
  • Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks / Robertson, W., Vigna, G., Krügel, C., & Kemmerer, R. (2006). Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In Proc. Network and Distributed System Security Symposium (NDSS) (pp. 31–46). Internet Society. http://hdl.handle.net/20.500.12708/51702
  • An Anomaly-driven Reverse Proxy for Web Applications / Valeur, F., Vigna, G., Krügel, C., & Kirda, E. (2006). An Anomaly-driven Reverse Proxy for Web Applications. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 361–369). ACM Press. http://hdl.handle.net/20.500.12708/51701
  • Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / Kirda, E., Krügel, C., Vigna, G., & Jovanovic, N. (2006). Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 330–338). ACM Press. http://hdl.handle.net/20.500.12708/51700
  • TTAnalyze: A Tool for Analyzing Malware / Bayer, U., Krügel, C., & Kirda, E. (2006). TTAnalyze: A Tool for Analyzing Malware. In Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR) (pp. 180–192). http://hdl.handle.net/20.500.12708/51699
  • SecuBat: A Web Vulnerability Scanner / Kals, S., Kirda, E., Krügel, C., & Jovanovic, N. (2006). SecuBat: A Web Vulnerability Scanner. In Proc. 15th International World Wide Web Conference (WWW) (pp. 247–257). http://hdl.handle.net/20.500.12708/51698
  • Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2006). Extending .NET Security to Unmanaged Code. In Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science (pp. 1–16). Springer-Verlag. http://hdl.handle.net/20.500.12708/51696
  • Security in Networked Building Automation Systems / Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). Security in Networked Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 283–292). http://hdl.handle.net/20.500.12708/51682
  • A Modular Architecture for Building Automation Systems / Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). A Modular Architecture for Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 99–102). http://hdl.handle.net/20.500.12708/51681
  • Embedded Real-Time Ball Detection Unit for the YABIRO Biped Robot / Bader, M., Alberto, M., Sablatnig, R., Simo, J., Benet, G., Novak, G., & Blanes, F. (2006). Embedded Real-Time Ball Detection Unit for the YABIRO Biped Robot. In Proc. of 4th Workshop on Intelligent Solutions in Embedded Systems (pp. 3–12). http://hdl.handle.net/20.500.12708/51574
  • A µController Lab for Distance Learning / Gridling, G., & Weiss, B. (2006). A µController Lab for Distance Learning. In EWME 2006 - Proceedings (pp. 129–132). http://hdl.handle.net/20.500.12708/51522
  • Embedded Systems Exams With True/False Questions: A Case Study / Gridling, G., Weiss, B., Elmenreich, W., & Trödhandl, C. (2006). Embedded Systems Exams With True/False Questions: A Case Study. In Proceedings of the Second International Conference on Education and Technology (pp. 168–172). http://hdl.handle.net/20.500.12708/51519
  • Preventing Cross Site Request Forgery Attacks / Jovanovic, N., Kirda, E., & Krügel, C. (2006). Preventing Cross Site Request Forgery Attacks. In 2nd International Conference on Security and Privacy in Communication Networks & the Workshops. SecureComm 2006, Baltimore, MD, USA, Non-EU. IEEE. http://hdl.handle.net/20.500.12708/51397
  • Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (pp. 258–263). IEEE Inc. http://hdl.handle.net/20.500.12708/51372
  • Precise Alias Analysis for Static Detection of Web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Precise Alias Analysis for Static Detection of Web Application Vulnerabilities. In Proceedings of the 2006 Programming Languages and Analysis for Security Workshop (pp. 27–36). ACM Inc. http://hdl.handle.net/20.500.12708/51371
  • Impulstechnik / Schildt, G.-H. (2006). Impulstechnik. LyK Informationstechnik. http://hdl.handle.net/20.500.12708/22338

2005

  • Communication Systems for Building Automation and Control / Kastner, W., Neugschwandtner, G., Soucek, S., & Newman, H. M. (2005). Communication Systems for Building Automation and Control. Proceedings of the IEEE, 93(6), 1178–1203. http://hdl.handle.net/20.500.12708/173354
  • System Architecture for Variable Message Signs / Kulovits, H., Stögerer, C., & Kastner, W. (2005). System Architecture for Variable Message Signs. In Proc. 10th IEEE Intl. Conference on Emerging Technologies and Factory Automation (ETFA’05) (pp. 903–910). http://hdl.handle.net/20.500.12708/51195
  • A multi-model approach to the detection of web-based attacks / Krügel, C., Vigna, G., & Robertson, W. (2005). A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5), 717–738. http://hdl.handle.net/20.500.12708/173353
  • Internet Security / Krügel, C. (2005). Internet Security. In The Industrial Communication Technology Handbook (pp. 1–14). CRC Press. http://hdl.handle.net/20.500.12708/25364
  • EIB: European Installation Bus / Kastner, W., & Neugschwandtner, G. (2005). EIB: European Installation Bus. In The Industrial Communication Technology Handbook (pp. 1–18). CRC Press. http://hdl.handle.net/20.500.12708/25365
  • Host-Based Intrusion Detection / Vigna, G., & Krügel, C. (2005). Host-Based Intrusion Detection. In Handbook of Information Security (pp. 1–12). John Wiley and Sons. http://hdl.handle.net/20.500.12708/25363
  • Open-source foundations for PC based KNX/EIB access and management / Erb, B., Neugschwandtner, G., Kastner, W., & Kögler, M. (2005). Open-source foundations for PC based KNX/EIB access and management. In Proccedings of Konnex Scientific Conference 2005 (p. 12). http://hdl.handle.net/20.500.12708/51185
  • Mnemonic SOMs: Recognizable Shapes for Self-Organizing Maps / Mayer, R., Merkl, D., & Rauber, A. (2005). Mnemonic SOMs: Recognizable Shapes for Self-Organizing Maps. In Proceedings of the 5th Workshop On Self-Organizing Maps Paris (WSOM 2005) (pp. 131–138). WSOM. http://hdl.handle.net/20.500.12708/51085
  • Analysing and Detecting Malicious Code / Krügel, C. (2005). Analysing and Detecting Malicious Code. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84467
  • Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84466
  • Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Technische Universität Berlin, Austria. http://hdl.handle.net/20.500.12708/84465
  • Advanced Techniques for Malicious Code Detection / Krügel, C. (2005). Advanced Techniques for Malicious Code Detection. NATO ASI Workshop, Yerevan, Armenien, Non-EU. http://hdl.handle.net/20.500.12708/84464
  • Identification of Anomalous System Calls for Intrusion Detection / Krügel, C. (2005). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84463
  • Intrusion Detection und Korrelation / Krügel, C. (2005). Intrusion Detection und Korrelation. FH Hagenberg, Hagenberg, Austria. http://hdl.handle.net/20.500.12708/84462
  • Dekomposition und Enumeration von Flussgraphen / Blieberger, J. (2005). Dekomposition und Enumeration von Flussgraphen. Department Mathematik und Informationstechnologie, Lehrstuhl für Mathematik & Statistik, Leoben, Austria, Austria. http://hdl.handle.net/20.500.12708/84436
  • GlueBar: A Solution Pattern for Integrating Interfaces into Self-Contained Applications / Költringer, T., Kappel, K., & Grechenig, T. (2005). GlueBar: A Solution Pattern for Integrating Interfaces into Self-Contained Applications. In roceedings of the 2005 Conference On Human Factors In Computing Systems (p. 8). Mira Digital Publishing. http://hdl.handle.net/20.500.12708/51197
  • An open approach to EIB/KNX software development / Kastner, W., Neugschwandtner, G., & Kögler, M. (2005). An open approach to EIB/KNX software development. In Proc. 6th IFAC International Conference on Fieldbus Systems and their Applications (FET’05) (pp. 255–262). http://hdl.handle.net/20.500.12708/51196
  • Programming fieldbus nodes: A RAD approach to customizable applications / Neugschwandtner, G., Kastner, W., & Kögler, M. (2005). Programming fieldbus nodes: A RAD approach to customizable applications. In Proc. 10th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (pp. 1061–1064). http://hdl.handle.net/20.500.12708/51187
  • Rapid Application Development for KNX/EIB BCUs / Kögler, M., Kastner, W., & Neugschwandtner, G. (2005). Rapid Application Development for KNX/EIB BCUs. In Proccedings of Konnex Scientific Conference 2005 (p. 14). http://hdl.handle.net/20.500.12708/51186
  • Reverse Engineering of Network Signatures / Mutz, D., Krügel, C., Robertson, W., Vigna, G., & Kemmerer, R. (2005). Reverse Engineering of Network Signatures. In Proceedings of the Information Technology Security Conference. AusCERT, Gold Coast, Australia, Non-EU. http://hdl.handle.net/20.500.12708/51184
  • Polymorphic Worm Detection Using Structural Information of Executables / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID). RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA, Non-EU. Springer-Verlag. http://hdl.handle.net/20.500.12708/51179
  • A Case Study in Efficient Microcontroller Education / Weiss, B., Gridling, G., & Proske, M. (2005). A Case Study in Efficient Microcontroller Education. In Proceedings Workshop on Embedded Systems Education WESE 2005 (pp. 36–43). http://hdl.handle.net/20.500.12708/51127
  • Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2005). Protecting Users Against Phishing Attacks with AntiPhish. In Proceedings of the 29th Anual International Computer Software and Applications Conference (pp. 517–524). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51050
  • Automating Mimicry Attacks Using Static Binary Analysis / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the 14th USENIX Security Symposium (pp. 161–176). USENIX Assoication. http://hdl.handle.net/20.500.12708/51049
  • Bedarfserhebung Pflicht- und Wahllehrveranstaltung Automation Systems Group / Kastner, W. (2005). Bedarfserhebung Pflicht- und Wahllehrveranstaltung Automation Systems Group. http://hdl.handle.net/20.500.12708/33036
  • Antrag UNI-Infrastruktur III, Embedded Systems Research Cluster / Schmid, U., Kopetz, H., Puschner, P., Mayerhofer, L., Steininger, A., Grünbacher, H., Kastner, W., & Krall, A. (2005). Antrag UNI-Infrastruktur III, Embedded Systems Research Cluster. http://hdl.handle.net/20.500.12708/33035
  • Informatik: Aufgaben und Lösungen / Kastner, W., & Schildt, G.-H. (2005). Informatik: Aufgaben und Lösungen. Springer-Verlag. http://hdl.handle.net/20.500.12708/22291
  • Einführung in die Technische Informatik / Schildt, G.-H., Kahn, D., Krügel, C., & Mörz, C. (2005). Einführung in die Technische Informatik. Springer-Verlag. http://hdl.handle.net/20.500.12708/22288
  • Informatik-Grundlagen / Blieberger, J., Burgstaller, B., & Schildt, G.-H. (2005). Informatik-Grundlagen. Springer-Verlag. http://hdl.handle.net/20.500.12708/22282

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1989

1987

  • Monotonically Labelled Motzkin Trees / Blieberger, J. (1987). Monotonically Labelled Motzkin Trees. Discrete Applied Mathematics, 18, 9–24. http://hdl.handle.net/20.500.12708/174810

 

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

 

  • Christopher Krügel: Wirtschaftskammerpreis
    2005 / Wirtschaftskammern / Austria
  • Christopher Krügel: EIB Scientific Award for Excellent Diploma Thesis
    2000 / Germany
  • Monika di Angelo: Mobilitätsstipendium der TU Wien für hervorragende Dissertation
    1989 / Lions-Förderpreis

Soon, this page will include additional information such as reference projects, conferences, events, and other research activities.

Until then, please visit Automation Systems’ research profile in TISS .