TU Wien Informatics

About

The “Internet of Things” (IoT) is commonly anticipated with numerous applications including but not limited to manufacturing, power grids, buildings, rescue and relief operations, environmental monitoring, and traffic management.

Yet, complex applications in the IoT realm are inconceivable without increased mutual penetration of IT systems and automation technology. The integrated automation equipment is responsible for measuring, open and closed loop control, monitoring, supervision, diagnosis, and optimization. Following the divide and conquer paradigm, the push for distribution of processing functions is unbowed, while the heterogeneity of technologies used in automation remains a major obstacle.

On the other side, demands are made on the field of informatics to design, implement and validate (secure and safe) system architectures that allow for a seamless integration and combination of those different systems.For this reason, our research focus is put on the general theme of distributed automation and “automation systems integration”, moving away from manual integration to machine-aided solutions.

This includes the analysis and enhancement of industrial communication technologies (wired and wireless), guaranteeing specific quality of services for dependable distributed systems with safety and security in mind. Also, the integration of automation systems exploiting information modeling and knowledge representation is addressed, e.g. based on the vision and technologies of the Semantic Web.

Another aspect is the incorporation of research on safe programming languages, which by construction lead to increased safety and reliability of the created artifacts for safety-critical applications. To ensure extensibility and interoperability, additional effort is put in standardization and thus in the research of and collaboration on existing and emerging standards. Results of these research directions aim to enable not only human-to-machine but in particular genuine machine-to-machine communications, with consideration of extensibility, reliability and safety. Incarnations of the research results will thus add to applications of the “Industrial Internet of Things” (IIoT) including but not limited to the domains of cyber-physical production systems (Industry 4.0), smart grids, and intelligent buildings.

The research Unit Automation Systems is part of the Institute of Computer Engineering.

Johann Blieberger
Johann Blieberger J. Blieberger

Associate Professor
Ao.Univ.Prof. DI Dr.

Wolfgang Kastner
Wolfgang Kastner W. Kastner

Head of Research Unit
Univ.Prof. DI Dr.

Markus Bader
Markus Bader M. Bader

PostDoc Researcher
DI Dr.

Patrick Heinrich Denzler
Patrick Heinrich Denzler P. Denzler

PreDoc Researcher
DI(FH) / MSc MBA

Monika di Angelo
Monika di Angelo M. di Angelo

PostDoc Researcher
Ass.Prof. DI Mag. Dr.

Leonhard Esterbauer
Leonhard Esterbauer L. Esterbauer

PreDoc Researcher
DI / BSc

Dieter Etz
Dieter Etz D. Etz

PreDoc Researcher
DI(FH) / MBA

Thomas Frühwirth
Thomas Frühwirth T. Frühwirth

PostDoc Researcher
DI Dr. / BSc

Valentin Philipp Just
Valentin Philipp Just V. Just

PreDoc Researcher
MSc

Martin Kjäer
Martin Kjäer M. Kjäer

PreDoc Researcher
DI / BSc

Felix Knorr
Felix Knorr F. Knorr

PreDoc Researcher
DI / BSc

Martin Kronegger
Martin Kronegger M. Kronegger

Senior Lecturer
DI Dr.

Jürgen Pannosch
Jürgen Pannosch J. Pannosch

PreDoc Researcher
DI / BSc

Thomas Preindl
Thomas Preindl T. Preindl

PreDoc Researcher
DI / BSc

Mahyar Shariat
Mahyar Shariat M. Shariat

PreDoc Researcher

Gernot Steindl
Gernot Steindl G. Steindl

PostDoc Researcher
DDI Dr. / BSc

2022W

2023S

 

Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.

2023

2022

2021

2020

2019

  • Manufacturing process data analysis pipelines: a requirements analysis and survey / Ismail, A., Truong, H.-L., & Kastner, W. (2019). Manufacturing process data analysis pipelines: a requirements analysis and survey. Journal Of Big Data, 6, 1–26. https://doi.org/10.1186/s40537-018-0162-3
  • Comparison of Data-Driven Thermal Building Models for Model Predictive Control / Steindl, G., Kastner, W., & Stangl, V. (2019). Comparison of Data-Driven Thermal Building Models for Model Predictive Control. Journal of Sustainable Development of Energy, Water and Environment Systems, 7(4), 730–742. https://doi.org/10.13044/j.sdewes.d7.0286
  • Simulation of RPDEVS Models of Logic Gates / Fiedler, C., Preyser, F. J., & Kastner, W. (2019). Simulation of RPDEVS Models of Logic Gates. SNE Simulation Notes Europe, 29(2), 85–91. https://doi.org/10.11128/sne.29.tn.10474
  • Parameterized Complexity of Asynchronous Border Minimization / Ganian, R., Kronegger, M., Pfandler, A., & Popa, A. (2019). Parameterized Complexity of Asynchronous Border Minimization. Algorithmica, 81(1), 201–223. https://doi.org/10.1007/s00453-018-0442-5 / Projects: FAIR, START, X-TRACT
  • RPDEVS Abstract Simulator / Preyser, F. J., Heinzl, B., & Kastner, W. (2019). RPDEVS Abstract Simulator. SNE Simulation Notes Europe, 29(2), 79–84. https://doi.org/10.11128/sne.29.tn.10473
  • Backdoors to planning / Kronegger, M., Ordyniak, S., & Pfandler, A. (2019). Backdoors to planning. Artificial Intelligence, 269, 49–75. https://doi.org/10.1016/j.artint.2018.10.002 / Projects: FAIR, START
  • A Multiparametric View on Answer Set Programming / Fichte, J. K., Kronegger, M., & Woltran, S. (2019). A Multiparametric View on Answer Set Programming. Annals of Mathematics and Artificial Intelligence, 86(1–3), 121–147. https://doi.org/10.1007/s10472-019-09633-x
  • Platform-independent Modeling for Simulation-based Energy Optimization in Industrial Production / Heinzl, B., & Kastner, W. (2019). Platform-independent Modeling for Simulation-based Energy Optimization in Industrial Production. International Journal of Simulation: Systems, Science & Technology. https://doi.org/10.5013/ijssst.a.20.06.10
  • Simulation of RPDEVS Models of Logic Gates / Fiedler, C., Preyser, F. J., & Kastner, W. (2019). Simulation of RPDEVS Models of Logic Gates. In U. Durak, C. Deatcu, & J. Hettwer (Eds.), ASIM Workshop 2019 Simulation Technischer System Grundlagen und Methoden in Modellbildung und Simulation (pp. 129–134). Arbeitsgemeinschaft Simulation ASIM in der Gesellschaft für Informatik GI. http://hdl.handle.net/20.500.12708/58017
  • Blocking versus Non-Blocking Shared-Memory Multicore Synchronization: Programmability, Scalability and Performance / Yang, S., Jeong, S., Min, B., Kim, Y., Burgstaller, B., & Blieberger, J. (2019). Blocking versus Non-Blocking Shared-Memory Multicore Synchronization: Programmability, Scalability and Performance. Reliable Software Technologies - Ada-Europe, Montreux, Switzerland, Austria. http://hdl.handle.net/20.500.12708/86876
  • Digital Transformation Manager (DTM) Course II Modul 7: Industrie 4.0 / IoT / Kittl, B., Trautner, T., Kastner, W., & Frühwirth, T. (2019). Digital Transformation Manager (DTM) Course II Modul 7: Industrie 4.0 / IoT. Digital Transformation Manager (DTM) Course, Pilotfabrik Seestadt Aspern, Austria. http://hdl.handle.net/20.500.12708/87210
  • Digital Transformation Manager (DTM) Course Modul 7: Industrie 4.0 / IoT / Kittl, B., Trautner, T., Kastner, W., & Frühwirth, T. (2019). Digital Transformation Manager (DTM) Course Modul 7: Industrie 4.0 / IoT. Digital Transformation Manager (DTM) Course, Pilotfabrik Seestadt Aspern, Austria. http://hdl.handle.net/20.500.12708/87209
  • Parallel Construction of Simultaneous Deterministic Finite Automata on Shared-memory Multicores / Jung, M., Park, J., Blieberger, J., & Burgstaller, B. (2019). Parallel Construction of Simultaneous Deterministic Finite Automata on Shared-memory Multicores. The 12th Annual Meeting of the Asian Association for Algorithms and Computation, Seoul, South Korea, Non-EU. http://hdl.handle.net/20.500.12708/86867 / Project: SAJiTcore++
  • Multi Robot Route Planning (MRRP): Extended Spatial-Temporal Prioritized Planning / Binder, B., Beck, F., König, F., & Bader, M. (2019). Multi Robot Route Planning (MRRP): Extended Spatial-Temporal Prioritized Planning. In Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 4133–4139). http://hdl.handle.net/20.500.12708/76955
  • Map Based Human Motion Prediction for People Tracking / Beck, F., & Bader, M. (2019). Map Based Human Motion Prediction for People Tracking. In Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 7842–7848). http://hdl.handle.net/20.500.12708/76954
  • A Model-Driven and Ontology-based Engineering Approach for Smart Grid Automation Applications / Zanabria, C., Andren, F. P., Strasser, T. I., & Kastner, W. (2019). A Model-Driven and Ontology-based Engineering Approach for Smart Grid Automation Applications. In IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society. IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, EU. IEEE. https://doi.org/10.1109/iecon.2019.8927139
  • Smart Manufacturing Retrofit for Brownfield Systems / Etz, D., Brantner, H., & Kastner, W. (2019). Smart Manufacturing Retrofit for Brownfield Systems. In Procedia Manufacturing (pp. 327–332). https://doi.org/10.1016/j.promfg.2020.02.085
  • Measuring Cookies and Web Privacy in a Post-GDPR World / Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117
  • Distributed Key Generation with Ethereum Smart Contracts / Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherland, EU. Springer. http://hdl.handle.net/20.500.12708/58084
  • Echoes of the Past: Recovering Blockchain Metrics from Merged mining / Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, Non-EU. Springer. http://hdl.handle.net/20.500.12708/58072
  • Closed Loop Cycle Time Feedback to Optimize High-Mix / Low-Volume Production Planning / Messner, M., Mauthner, G., Pauker, F., Frühwirth, T., & Mangler, J. (2019). Closed Loop Cycle Time Feedback to Optimize High-Mix / Low-Volume Production Planning. In Procedia CIRP (pp. 689–694). https://doi.org/10.1016/j.procir.2019.03.177
  • Ontology-Based OPC UA Data Access via Custom Property Functions / Steindl, G., Frühwirth, T., & Kastner, W. (2019). Ontology-Based OPC UA Data Access via Custom Property Functions. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. https://doi.org/10.1109/etfa.2019.8869436
  • Query Performance Evaluation of Sensor Data Integration Methods for Knowledge Graphs / Steindl, G., & Kastner, W. (2019). Query Performance Evaluation of Sensor Data Integration Methods for Knowledge Graphs. In Proceedings of the 6th IEEE International Conference on Big Data, Knowledge and Control Systems Engineering. 6th IEEE International Conference on Big Data, Knowledge and Control Systems Engineering, Sofia, Bulgarien, EU. http://hdl.handle.net/20.500.12708/58032 / Project: BIM4BEMS
  • AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis / Wurzenberger, M., Landauer, M., Skopik, F., & Kastner, W. (2019). AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis. In IFIP/IEEE International Symposium on Integrated Network Management (pp. 7–12). http://hdl.handle.net/20.500.12708/58031
  • Assuring compliance with protection profiles with ThreatGet / El Sadany, M., Schmittner, C., & Kastner, W. (2019). Assuring compliance with protection profiles with ThreatGet. In Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems (pp. 1–12). http://hdl.handle.net/20.500.12708/58030
  • An Efficient Multi-Objective Hybrid Simheuristic Approach for Advanced Rolling Horizon Production Planning / Kamhuber, F., Sobottka, T., Heinzl, B., & Sihn, W. (2019). An Efficient Multi-Objective Hybrid Simheuristic Approach for Advanced Rolling Horizon Production Planning. In Proceedings of the 2019 Winter Simulation Conference. Winter Simulation Conference 2019 (WSC2019), Maryland, USA, Non-EU. http://hdl.handle.net/20.500.12708/58007
  • A Novel Ontology-Based Smart Service Architecture for Data-Driven Model Development / Steindl, G., Heinzl, B., & Kastner, W. (2019). A Novel Ontology-Based Smart Service Architecture for Data-Driven Model Development. In Proceedings of the Eleventh International Conference on Information, Process, and Knowledge Management (eKNOW 2019). Eleventh International Conference on Information, Process, and Knowledge Management (eKNOW 2019), Athens, Greece, EU. http://hdl.handle.net/20.500.12708/58005
  • Benchmark of delays simulated by OpenTrack and calculated by Kronecker Algebra / Schöbel, A., Schöbel, C., Blieberger, J., & Stefan, M. (2019). Benchmark of delays simulated by OpenTrack and calculated by Kronecker Algebra. In Proceedings of the International Scientific Conference “The Science and Development of Transport” (pp. 371–375). Faculty of Transport and Traffic SciencesUniversity of Zagreb. http://hdl.handle.net/20.500.12708/58003
  • Knowledge-based building management combining human perception and building automation systems / Kastner, W., Gaida, S., & Tellioglu, H. (2019). Knowledge-based building management combining human perception and building automation systems. In Proceedings of the First International Conference on Societal Automation (SA 2019). First International Conference on Societal Automation (SA 2019), Krakow, Poland, EU. http://hdl.handle.net/20.500.12708/57823
  • Performance and Scalability of Private Ethereum Blockchains / Schäffer, M., di Angelo, M., & Salzer, G. (2019). Performance and Scalability of Private Ethereum Blockchains. In Business Process Management: Blockchain and Central and Eastern Europe Forum (pp. 103–118). Springer. https://doi.org/10.1007/978-3-030-30429-4_8
  • Mayflies, Breeders, and Busy Bees in Ethereum / di Angelo, M., & Salzer, G. (2019). Mayflies, Breeders, and Busy Bees in Ethereum. In Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts  - BCC ’19. BCC 2019 : The Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts, Auckland, New Zealand, Non-EU. ACM. https://doi.org/10.1145/3327959.3329537
  • Collateral Use of Deployment Code for Smart Contracts in Ethereum / di Angelo, M., & Salzer, G. (2019). Collateral Use of Deployment Code for Smart Contracts in Ethereum. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Gran Canaria, EU. IEEE. https://doi.org/10.1109/ntms.2019.8763828
  • Smart contracts in view of the civil code / di Angelo, M., Soare, A., & Salzer, G. (2019). Smart contracts in view of the civil code. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. SAC ’19: The 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Zypern, EU. ACM. https://doi.org/10.1145/3297280.3297321
  • A Survey of Tools for Analyzing Ethereum Smart Contracts / di Angelo, M., & Salzer, G. (2019). A Survey of Tools for Analyzing Ethereum Smart Contracts. In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). IEEE International Conference on Decentralized Applications and Infrastructures, San Francisco, Non-EU. IEEE. https://doi.org/10.1109/dappcon.2019.00018
  • Communication interface specification in OPC UA / Strutzenberger, D., Frühwirth, T., Trautner, T., Hinterbichler, R., & Pauker, F. (2019). Communication interface specification in OPC UA. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain, EU. IEEE. https://doi.org/10.1109/etfa.2019.8869383
  • RPDEVS Abstract Simulator / Preyser, F. J., Heinzl, B., & Kastner, W. (2019). RPDEVS Abstract Simulator. In Tagungsband 2019 Workshop der ASIM-Fachgruppen STS und GMMS. 2019 Workshop der ASIM-Fachgruppen STS und GMMS, Braunschweig, EU. ARGESIM Verlag Wien. https://doi.org/10.11128/arep.57 / Project: ASPeCT
  • A Framework for Cyber Threat Intelligence Extraction from Raw Log Data / Landauer, M., Skopik, F., Wurzenberger, M., Hotwagner, W., & Rauber, A. (2019). A Framework for Cyber Threat Intelligence Extraction from Raw Log Data. In 2019 IEEE International Conference on Big Data (Big Data). 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, Non-EU. https://doi.org/10.1109/bigdata47090.2019.9006328
  • Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies / Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189

2018

  • Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid / Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3
  • On Security Research towards Future Mobile Network Generations / Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728
  • Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection / Landauer, M., Wurzenberger, M., Skopik, F., Settanni, G., & Filzmoser, P. (2018). Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection. Computers and Security, 79, 94–116. https://doi.org/10.1016/j.cose.2018.08.009
  • A Cognitive System Architecture for Building Energy Management / Zucker, G., Sporr, A., Kollmann, S., Wendt, A., Siafara Chaido, L., & Fernbach, A. (2018). A Cognitive System Architecture for Building Energy Management. IEEE Transactions on Industrial Informatics, 14(6), 2521–2529. https://doi.org/10.1109/tii.2018.2815739
  • Interdisciplinary multi-criteria optimization using hybrid simulation to pursue energy efficiency through production planning / Sihn, W., Sobottka, T., Heinzl, B., & Kamhuber, F. (2018). Interdisciplinary multi-criteria optimization using hybrid simulation to pursue energy efficiency through production planning. CIRP Annals - Manufacturing Technology, 67(1), 447–450. https://doi.org/10.1016/j.cirp.2018.04.059
  • GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM / van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H., & Razavi, K. (2018). GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 92–113). Springer. https://doi.org/10.1007/978-3-319-93411-2_5
  • MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / Konoth, R. K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., & Vigna, G. (2018). MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/3243734.3243858
  • Application of Kronecker Algebra for Railway Line Zagreb-Rijeka / Schöbel, A., Blieberger, J., & Schöbel, C. (2018). Application of Kronecker Algebra for Railway Line Zagreb-Rijeka. In Road and Rail Infrastructure V (pp. 1261–1264). Department of Transportation, Faculty of Ciivil Engineering, University of Zagreb. https://doi.org/10.5592/co/cetra.2018.698
  • More Deterministic Product Ramp-up in Cloud Manufacturing Scenarios / Willmann, R., & Kastner, W. (2018). More Deterministic Product Ramp-up in Cloud Manufacturing Scenarios. In P. Granig, E. Hartlieb, & B. Heiden (Eds.), Mit Innovationsmanagement zu Industrie 4.0: Grundlagen, Strategien, Erfolgsfaktoren und Praxisbeispiele (pp. 125–137). Springer-Verlag. https://doi.org/10.1007/978-3-658-11667-5_10
  • Semantic Evolution in Building Automation Systems Integration / Kastner, W., & Fernbach, A. (2018). Semantic Evolution in Building Automation Systems Integration. KNX Scientific Conference, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/86852
  • Enabling flexible real-time factory networks by combining OPC UA and TSN / Frühwirth, T., Gutierrez-Peon, P., Etz, D., & Gent, S. (2018). Enabling flexible real-time factory networks by combining OPC UA and TSN. 4. Wiener Produktionstechnik Kongress - WPK 2018, Wien, Austria. http://hdl.handle.net/20.500.12708/86797
  • Building Automation in the Realm of the IoT / Kastner, W. (2018). Building Automation in the Realm of the IoT. 2018 IEEE International Conference on Future IoT Technologies (Future IoT 2018), Eger, Hungary, EU. http://hdl.handle.net/20.500.12708/86814
  • Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions / Ren, J., Lindorfer, M., Dubois, D. J., Rao, A., Choffnes, D., & Vallina-Rodriguez, N. (2018). Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. In Proceedings 2018 Network and Distributed System Security Symposium. Internet Society. https://doi.org/10.14722/ndss.2018.23143
  • Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications / Pan, E., Ren, J., Lindorfer, M., Wilson, C., & Choffnes, D. (2018). Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. In Proceedings on Privacy Enhancing Technologies (pp. 33–50). DeGruyter. https://doi.org/10.1515/popets-2018-0030
  • Throttled service calls in OPC UA / Ismail, A., & Kastner, W. (2018). Throttled service calls in OPC UA. In 2018 IEEE International Conference on Industrial Technology (ICIT). IEEE International Conference on Industrial Technology, Lyon, France, EU. https://doi.org/10.1109/icit.2018.8352430
  • Towards Model-Driven Development of Hybrid Simulation Models in Industrial Engineering / Heinzl, B., & Kastner, W. (2018). Towards Model-Driven Development of Hybrid Simulation Models in Industrial Engineering. In IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON2018), Washington D.C., USA, Non-EU. IEEE. https://doi.org/10.1109/iecon.2018.8592811 / Project: ASPeCT
  • A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice / Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curacao, Santa Barbara Beach Resort, Non-EU. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678
  • RPDEVS: Revising the Parallel Discrete Event System Specification / Preyser, F., Heinzl, B., & Kastner, W. (2018). RPDEVS: Revising the Parallel Discrete Event System Specification. In IFAC-PapersOnLine (pp. 242–247). IFAC-PapersOnLine. https://doi.org/10.1016/j.ifacol.2018.03.042 / Project: ASPeCT
  • The need for efficient multicast routing in low-power IPv6 mesh networks / Raich, P., & Kastner, W. (2018). The need for efficient multicast routing in low-power IPv6 mesh networks. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). 14th IEEE International Workshop on Factory Communication Systems, Imperia, Italy, EU. https://doi.org/10.1109/wfcs.2018.8402381
  • Digitalization & Facility Management: Energy Flexibility of Existing Buildings / Metzger, A. S., Jradi, M., Grønborg Junker, R., Kastner, W., Reynders, G., Weiss, T., Knotzer, A., & Østergaard Jensen, S. (2018). Digitalization & Facility Management: Energy Flexibility of Existing Buildings. In Proceedings 11th Facility Management Congress (pp. 1–25). http://hdl.handle.net/20.500.12708/57640
  • Use Cases for Improved Analysis of Energy and Comfort Related Parameters Based on BIM and BEMS Data / Petrushevski, F., Montazer, M., Seifried, S., Schiefer, C., Zucker, G., Preindl, T., Suter, G., & Kastner, W. (2018). Use Cases for Improved Analysis of Energy and Comfort Related Parameters Based on BIM and BEMS Data. In Advanced Computing Strategies for Engineering (pp. 391–413). https://doi.org/10.1007/978-3-319-91638-5_22
  • Design and Implementation of a Negative Voltage Fault Injection Attack Prototype / Kudera, C., Müllner, M., Kammerstetter, M., & Kastner, W. (2018). Design and Implementation of a Negative Voltage Fault Injection Attack Prototype. In Proceedings IEEE International Workshop on Physical Attacks and Inspection on Electronics (PAINE) (pp. 1–6). http://hdl.handle.net/20.500.12708/57623
  • Ontology-based Optimization of Building Automation Systems / Gaida, S., Kastner, W., Petrushevski, F., & Sipetic, M. (2018). Ontology-based Optimization of Building Automation Systems. In Proceedings of the 44th Annual Conference of the IEEE Industrial Electronics Society (pp. 819–825). IEEE. http://hdl.handle.net/20.500.12708/57609 / Project: ADA-EE
  • A methodology for creating reusable ontologies / Frühwirth, T., Krammer, L., & Kastner, W. (2018). A methodology for creating reusable ontologies. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018), St. Petersburg, Non-EU. IEEE. https://doi.org/10.1109/icphys.2018.8387639
  • Autonomous Navigation using Just-in-Time Emergency Trajectories / Todoran, G., & Bader, M. (2018). Autonomous Navigation using Just-in-Time Emergency Trajectories. In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 3422–3429). IEEE Xplore Digital Library. http://hdl.handle.net/20.500.12708/57577
  • Self-Configuring Safety Networks / Etz, D., Frühwirth, T., & Kastner, W. (2018). Self-Configuring Safety Networks. In Proceedings of the 9. Jahreskolloquium Kommunikation in der Automation (pp. 1–9). http://hdl.handle.net/20.500.12708/57524
  • Simplifying functional safety communication in modular, heterogeneous production lines / Etz, D., Frühwirth, T., Ismail, A., & Kastner, W. (2018). Simplifying functional safety communication in modular, heterogeneous production lines. In Proceedings 14th IEEE International Workshop on Factory Communication Systems (pp. 1–4). http://hdl.handle.net/20.500.12708/57523
  • Simulation-based Assessment of Energy Efficiency in Industry: Comparison of Hybrid Simulation Approaches / Heinzl, B., Raich, P., Preyser, F., & Kastner, W. (2018). Simulation-based Assessment of Energy Efficiency in Industry: Comparison of Hybrid Simulation Approaches. In IFAC-PapersOnLine (pp. 689–694). IFAC-PapersOnLine. https://doi.org/10.1016/j.ifacol.2018.03.117 / Project: ASPeCT
  • Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques / Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491
  • Security and Privacy Implementations within the AnyPLACE Energy Management Solution / Kudera, C., Ullmann, V., Kammerstetter, M., & Kastner, W. (2018). Security and Privacy Implementations within the AnyPLACE Energy Management Solution. In 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Praha, Czech Republic, EU. https://doi.org/10.1109/etfa.2018.8502507
  • TransportBuddy: Navigation in Human Accessible Spaces / Bader, M., Todoran, G., Beck, F., Binder, B., & Buchegger, K. (2018). TransportBuddy: Navigation in Human Accessible Spaces. In Proceedings of 7th Transport Research Arena TRA 2018 (p. 10). Zenodo. https://doi.org/10.5281/zenodo.1486646
  • Kronecker Algebra for Optimization of Rail Traffic Flow on Zagreb--Rijeka Line / Schöbel, A., Schöbel, C., Stefan, M., & Blieberger, J. (2018). Kronecker Algebra for Optimization of Rail Traffic Flow on Zagreb--Rijeka Line. In Proceedings Railcon 2018 (pp. 41–44). http://hdl.handle.net/20.500.12708/57457
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids / Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447
  • Context-aware optimization strategies for universal application in smart building energy management / Schachinger, D., & Kastner, W. (2018). Context-aware optimization strategies for universal application in smart building energy management. In 2018 IEEE 16th International Conference on Industrial Informatics (INDIN). IEEE 16th International Conference on Industrial Informatics (INDIN 2018), Porto, Portugal, EU. IEEE. https://doi.org/10.1109/indin.2018.8472000
  • Adaptive learning-based time series prediction framework for building energy management / Schachinger, D., Pannosch, J., & Kastner, W. (2018). Adaptive learning-based time series prediction framework for building energy management. In 2018 IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES). IEEE International Conference on Industrial Electronics for Sustainable Energy Systems (IESES 2018), Hamilton, New Zealand, Non-EU. IEEE. https://doi.org/10.1109/ieses.2018.8349919
  • Enhancing Performance in Railway Operation by Application of Kronecker Algebra / Schöbel, A., Schöbel, C., Stefan, M., & Blieberger, J. (2018). Enhancing Performance in Railway Operation by Application of Kronecker Algebra. In Proceedings ICTTE 2018 (pp. 113–117). ? http://hdl.handle.net/20.500.12708/57435
  • Safe Non-blocking Synchronization in Ada2x / Blieberger, J., & Burgstaller, B. (2018). Safe Non-blocking Synchronization in Ada2x. In A. Casimiro & P. M. Ferreira (Eds.), Reliable Software Technologies – Ada-Europe 2018 (pp. 53–69). Springer-Verlag. https://doi.org/10.1007/978-3-319-92432-8_4
  • Self-healing by property-guided structural adaptation / Ratasich, D., Preindl, T., Selyunin, K., & Grosu, R. (2018). Self-healing by property-guided structural adaptation. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018), St. Petersburg, Non-EU. IEEE. https://doi.org/10.1109/icphys.2018.8387659
  • Kronecker Algebra for Managing Rail Capacity / Schöbel, A., Schöbel, C., & Blieberger, J. (2018). Kronecker Algebra for Managing Rail Capacity. In ISEP2018 -- 26th International Symposium on Electronics in Transport. ISEP2018. http://hdl.handle.net/20.500.12708/57324
  • Time series analysis: Unsupervised anomaly detection beyond outlier detection / Landauer, M., Wurzenberger, M., Skopik, F., Settanni, G., & Filzmoser, P. (2018). Time series analysis: Unsupervised anomaly detection beyond outlier detection. In C. Su & H. Kikuch (Eds.), Information Security Practice and Experience (pp. 16–36). Springer. http://hdl.handle.net/20.500.12708/29783

2017

2016

  • Secure Control Applications in Smart Homes and Buildings / Praus, F., Kastner, W., & Palensky, P. (2016). Secure Control Applications in Smart Homes and Buildings. Journal of Universal Computer Science, 22(9), 1249–1273. http://hdl.handle.net/20.500.12708/149561
  • A Comprehensive Dependability Approach for Building Automation Networks / Krammer, L., Kastner, W., & Sauter, T. (2016). A Comprehensive Dependability Approach for Building Automation Networks. Journal of Universal Computer Science, 22(9), 1225–1248. http://hdl.handle.net/20.500.12708/149560
  • A Method for Real-Time Aggregation of a Product Footprint during Manufacturing / Smolek, P., Leobner, I., Heinzl, B., Gourlis, G., & Ponweiser, K. (2016). A Method for Real-Time Aggregation of a Product Footprint during Manufacturing. Journal of Sustainable Development of Energy, Water and Environment Systems, 4(4), 360–378. https://doi.org/10.13044/j.sdewes.2016.04.0028 / Project: 13054 BAMA
  • Exploring Network Formation of Tough and Biocompatible Thiol-​yne Based Photopolymers / Oesterreicher, A., Gorsche, C., Ayalur-Karunakaran, S., Moser, A., Edler, M., Pinter, G., Schlögl, S., Liska, R., & Griesser, T. (2016). Exploring Network Formation of Tough and Biocompatible Thiol-​yne Based Photopolymers. Macromolecular Rapid Communications, 37(20), 1701–1706. http://hdl.handle.net/20.500.12708/148980
  • Building automation systems: Concepts and technology review / Domingues, P., Carreira, P., Vieira, R., & Kastner, W. (2016). Building automation systems: Concepts and technology review. Computer Standards & Interfaces, 45, 1–12. https://doi.org/10.1016/j.csi.2015.11.005 / Project: IEA EBC Annex 67
  • Software security requirements in building automation / Praus, F., Kastner, W., & Palensky, P. (2016). Software security requirements in building automation. In Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI) : 5. - 7. April 2016 in Bonn (pp. 217–228). http://hdl.handle.net/20.500.12708/56724
  • Vertical integration in industrial enterprises and distributed middleware / Ismail, A., & Kastner, W. (2016). Vertical integration in industrial enterprises and distributed middleware. International Journal of Internet Protocol Technology, 9(2/3), 79. https://doi.org/10.1504/ijipt.2016.079547
  • A Generic Graph Model for WCET Analysis of Multi-core Concurrent Applications / Mittermayr, R., & Blieberger, J. (2016). A Generic Graph Model for WCET Analysis of Multi-core Concurrent Applications. Journal of Software Engineering and Applications, 09(05), 182–198. https://doi.org/10.4236/jsea.2016.95015
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms / van der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K., & Giuffrida, C. (2016). Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM. https://doi.org/10.1145/2976749.2978406
  • ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic / Ren, J., Rao, A., Lindorfer, M., Legout, A., & Choffnes, D. (2016). ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM. https://doi.org/10.1145/2906388.2906392
  • Methodical Reference Architecture Development Progress / Meisel, M., Wilker, S., Fabini, J., Annessi, R., Zseby, T., Müllner, M., Kastner, W., Litzlbauer, M., Gawlik, W., & Neureiter, C. (2016). Methodical Reference Architecture Development Progress. D-A-CH Energieinformatik Konferenz, Wien, Austria. http://hdl.handle.net/20.500.12708/90885 / Project: RASSA-Architektur
  • Optimization of Energy Efficiency in Buildings with Cognitive Knowledge-Based Control / Wendt, A., Zucker, G., Siafara, L., Hausberger, P., Schaat, S., Lindmeier, I., & Kastner, W. (2016). Optimization of Energy Efficiency in Buildings with Cognitive Knowledge-Based Control. Smart Grids Week 2016, Linz, Austria. http://hdl.handle.net/20.500.12708/90746
  • DigiTrans Modul3 - Praxistag 2: Automatisierungstechnik und automatisierte Fertigungssysteme / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 2: Automatisierungstechnik und automatisierte Fertigungssysteme. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86591
  • DigiTrans Modul3 - Praxistag 3: OPC Unified Architecture / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 3: OPC Unified Architecture. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86590
  • DigiTrans Modul3 - Praxistag 1: Integration / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., & Gridling, G. (2016). DigiTrans Modul3 - Praxistag 1: Integration. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86589 / Project: DigiTrans 4.0
  • KNX goes IoT - Aufbruch ins IoT mittels KNX - Webservices / Kastner, W. (2016). KNX goes IoT - Aufbruch ins IoT mittels KNX - Webservices. 7. ZVEI Kolloquium Gebäudeautomation Fachverband Elektroinstallationssysteme, Frankfurt, EU. http://hdl.handle.net/20.500.12708/86388
  • Building Profiling for Energy Management / Schachinger, D., & Krammer, L. (2016). Building Profiling for Energy Management. Blickpunkt Forschung: Smart Communities + Technologies @ TU Wien, Wien, Austria. http://hdl.handle.net/20.500.12708/86387
  • DigiTrans Modul3 - Praxistag 4: Security / Frühwirth, T., Ayatollahi, I., Pauker, F., Kastner, W., Kittl, B., Trautner, T., Gridling, G., Kudera, C., & Kammerstetter, M. (2016). DigiTrans Modul3 - Praxistag 4: Security. DigiTrans 4.0 - Innovationslehrgang im Themenfeld Industrie 4.0, Wien, Austria. http://hdl.handle.net/20.500.12708/86592
  • Kronecker Algebra Based Analysis of Concurrent Computer Programs / Blieberger, J. (2016). Kronecker Algebra Based Analysis of Concurrent Computer Programs. Festkolloquium aus Anlass des 60. Geburtstages von o.Univ.Prof.Dr. Peter Kirschenhofer, Leoben, Austria. http://hdl.handle.net/20.500.12708/86321
  • Reference Architecture as Foundation for Risk and Threat Analysis / Meisel, M., Wilker, S., Kammerstetter, M., Müllner, M., Fasthuber, D., Kastner, W., & Gawlik, W. (2016). Reference Architecture as Foundation for Risk and Threat Analysis. In Symposium on Innovative Smart Grid Cybersecurtity Solutions - Research-driven solutions for the critical cybersecurity challenges facing the future smart grid (pp. 98–103). Facultas Universitätsverlag. http://hdl.handle.net/20.500.12708/75616 / Project: RASSA-Architektur
  • Methodical Reference Architecture Development Progress / Meisel, M., Wilker, S., Fabini, J., Annessi, R., Zseby, T., Müllner, M., Kastner, W., Litzlbauer, M., Gawlik, W., & Neureiter, C. (2016). Methodical Reference Architecture Development Progress. In F. Kupzog (Ed.), energieinformatik 2016 (pp. 40–43). Österreichischer Verband für Elektrotechnik. http://hdl.handle.net/20.500.12708/75506
  • A systematic approach to OPC UA information model design / Pauker, F., Frühwirth, T., Kittl, B., & Kastner, W. (2016). A systematic approach to OPC UA information model design. In Procedia CIRP. 49th CIRP Conference on Manufacturing Systems, Stuttgart, EU. ELSEVIER. http://hdl.handle.net/20.500.12708/67460
  • Data-Based Modelling, Simulation And Optimization Of The Operation Of Production Plants / Mörzinger, B., Obermair, M., Leobner, I., Smolek, P., Heinzl, B., Wittmann, A., & Bleicher, F. (2016). Data-Based Modelling, Simulation And Optimization Of The Operation Of Production Plants. In H. Krebs (Ed.), VSS (pp. 86–87). http://hdl.handle.net/20.500.12708/67453 / Project: 13054 BAMA
  • Hybrid Building Performance Simulation Models for Industrial Energy Efficiency Applications / Smolek, P., Leobner, I., Gourlis, G., Mörzinger, B., Heinzl, B., & Ponweiser, K. (2016). Hybrid Building Performance Simulation Models for Industrial Energy Efficiency Applications. In Proceedings of the 11th Conference on Sustainable Development of Energy, Water and Environment Systems (p. 12). Faculty of Mechanical Engineering and Naval Architecture, Zagreb. http://hdl.handle.net/20.500.12708/61989 / Project: 13054 BAMA
  • Reliable control network gateways for building automation networks / Seifried, S., & Kastner, W. (2016). Reliable control network gateways for building automation networks. In 2016 Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP). Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP), Krakau, Polen, EU. https://doi.org/10.1109/ebccsp.2016.7605254
  • CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes / Carter, P., Mulliner, C., Lindorfer, M., Robertson, W., & Kirda, E. (2016). CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In Financial Cryptography and Data Security (pp. 231–249). Springer. https://doi.org/10.1007/978-3-662-54970-4_13
  • Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools / Wurzenberger, M., Skopic, F., Fiedler, R., & Kastner, W. (2016). Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. ACM Conference on Computer and Communications Security (CCS), Washington, USA, Non-EU. https://doi.org/10.1145/2995959.2995973
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection / Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202
  • Eine Architektur für sichere Smart Grids in Österreich / Jung, O., Fenz, S., Kammerstetter, M., & Hudic, A. (2016). Eine Architektur für sichere Smart Grids in Österreich. In D-A-CH Security 2016 (pp. 1–9). Forschungsgruppe Systemsicherheit. http://hdl.handle.net/20.500.12708/56735
  • Communications for AnyPLACE: A Smart Metering Platform with Management and Control Functionalities / Henneke, D., Freudenmann, C., Kammerstetter, M., Rua, D., Wisniewski, L., & Jasperneite, J. (2016). Communications for AnyPLACE: A Smart Metering Platform with Management and Control Functionalities. In 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016). IEEE. http://hdl.handle.net/20.500.12708/56733
  • From old to new: Assessing cybersecurity risks for an evolving smart grid / Langer, L., Skopik, F., Smith, P., & Kammerstetter, M. (2016). From old to new: Assessing cybersecurity risks for an evolving smart grid. In Elsevier Journal on Computers & Security (pp. 165–176). Elsevier. http://hdl.handle.net/20.500.12708/56732
  • Semantic integration in Building Automation - A case study for KNX oBIX and Semantic Web applications / Fernbach, A., Pelesic, I., Kastner, W., & Granzer, W. (2016). Semantic integration in Building Automation - A case study for KNX oBIX and Semantic Web applications. In Proceedings of the KNX Scientific Conference (p. 12). http://hdl.handle.net/20.500.12708/56729
  • Gebäudemanagement durch Wissensbasierte Systeme / Fernbach, A., & Kastner, W. (2016). Gebäudemanagement durch Wissensbasierte Systeme. In Proceedings of the 7. Jahreskolloquium Kommunikation in der Automation (p. 8). http://hdl.handle.net/20.500.12708/56728
  • Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering / Kammerstetter, M., Müllner, M., Kudera, C., Burian, D., & Kastner, W. (2016). Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering. In Conference on Cryptographic Hardware and Embedded Systems 2016 (pp. 559–577). http://hdl.handle.net/20.500.12708/56727 / Project: AnyPLACE
  • Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation / Kammerstetter, M., Burian, D., & Kastner, W. (2016). Embedded Security Testing with Peripheral Device Caching and Runtime Program State Approximation. In Tenth International Conference on Emerging Security Information, Systems and Technologies (pp. 21–26). http://hdl.handle.net/20.500.12708/56726 / Project: AnyPLACE
  • Increasing security and availability in KNX networks / Glanzer, H., Krammer, L., & Kastner, W. (2016). Increasing security and availability in KNX networks. In Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI) (pp. 241–252). http://hdl.handle.net/20.500.12708/56725
  • A generic dependability layer for building automation networks / Krammer, L., Kastner, W., & Sauter, T. (2016). A generic dependability layer for building automation networks. In 2016 IEEE World Conference on Factory Communication Systems (WFCS). IEEE International Workshop on Factory Communication Systems, Porto, Portugal, Austria. https://doi.org/10.1109/wfcs.2016.7496536
  • Reliable IP based communication for fire alarm systems / Kasberger, J., Krammer, L., & Kastner, W. (2016). Reliable IP based communication for fire alarm systems. In 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE). 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), Santa Clara, CA, USA, Non-EU. https://doi.org/10.1109/isie.2016.7744866 / Project: BMS 2016
  • Linked data for building management / Fernbach, A., Pelesic, I., & Kastner, W. (2016). Linked data for building management. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793781
  • IMU-based smart fitness devices for weight training / Hausberger, P., Fernbach, A., & Kastner, W. (2016). IMU-based smart fitness devices for weight training. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793510
  • Applying the SGAM methodology for rapid prototyping of smart Grid applications / Andren, F. P., Strasser, T., & Kastner, W. (2016). Applying the SGAM methodology for rapid prototyping of smart Grid applications. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7794057
  • Integration von KNX Netzwerken in das Internet der Dinge: Die KNX Web Services Spezifikation / Schachinger, D., & Kastner, W. (2016). Integration von KNX Netzwerken in das Internet der Dinge: Die KNX Web Services Spezifikation. In Proceedings of the 7. Jahreskolloquium Kommunikation in der Automation (p. 8). http://hdl.handle.net/20.500.12708/56700
  • Semantics for smart control of building automation / Schachinger, D., & Kastner, W. (2016). Semantics for smart control of building automation. In 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE). 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), Santa Clara, CA, USA, Non-EU. IEEE. https://doi.org/10.1109/isie.2016.7745041
  • IoT integration based on the KNX Web services specification / Schachinger, D., & Kastner, W. (2016). IoT integration based on the KNX Web services specification. In Proceedings of the KNX Scientific Conference (p. 12). http://hdl.handle.net/20.500.12708/56697
  • An advanced data analytics framework for energy efficiency in buildings / Schachinger, D., Gaida, S., Kastner, W., Petrushevski, F., Reinthaler, C., Sipetic, M., & Zucker, G. (2016). An advanced data analytics framework for energy efficiency in buildings. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany, EU. IEEE. https://doi.org/10.1109/etfa.2016.7733630 / Project: ADA-EE
  • Ontology-based abstraction layer for smart grid interaction in building energy management systems / Schachinger, D., Kastner, W., & Gaida, S. (2016). Ontology-based abstraction layer for smart grid interaction in building energy management systems. In 2016 IEEE International Energy Conference (ENERGYCON). IEEE International Energy Conference (ENERGYCON 2016), Leuven, Belgium, EU. IEEE. https://doi.org/10.1109/energycon.2016.7513991
  • Simulation-based Strategies for Smart Demand Response / Leobner, I., Smolek, P., Heinzl, B., Raich, P., Schirrer, A., & Kozek, M. (2016). Simulation-based Strategies for Smart Demand Response. In Proceedings of the 2nd South East European Conference on Sustainable Development of Energy, Water and Environment Systems (SEE SDEWES 2016). 2nd South East European Conference on Sustainable Development of Energy, Water and Environment Systems (SEE SDEWES 2016), Piran, Slovenia, EU. http://hdl.handle.net/20.500.12708/56657 / Project: 13054 BAMA
  • Towards Extending the Parallel-DEVS Formalism to Improve Component Modularity / Preyser, F. J., Heinzl, B., Raich, P., & Kastner, W. (2016). Towards Extending the Parallel-DEVS Formalism to Improve Component Modularity. In Tagungsband zum Workshop der ASIM/GI-Fachgruppen STS und GMMS. 2016 Workshop der ASIM/GI-Fachgruppen STS und GMMS, Lippstadt, Germany, EU. ARGESIM Verlag Wien. http://hdl.handle.net/20.500.12708/56655 / Project: 13054 BAMA
  • Intelligent control of streetlights based on sensor fusion / Raich, P., Novak, T., Pollhammer, K., Treytl, A., & Kastner, W. (2016). Intelligent control of streetlights based on sensor fusion. In Proceedings of the 11th European ITS Congress. 11th European ITS Congress, Glasgow, EU. http://hdl.handle.net/20.500.12708/56652 / Project: CANOPUS
  • Modeling techniques for integrated simulation of industrial systems based on hybrid PDEVS / Raich, P., Heinzl, B., Preyser, F., & Kastner, W. (2016). Modeling techniques for integrated simulation of industrial systems based on hybrid PDEVS. In 2016 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). 2016 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Wien, Austria. https://doi.org/10.1109/mscpes.2016.7480221 / Project: 13054 BAMA
  • Open traffic data platform for scenario-based control / Pollhammer, K., Novak, T., Raich, P., Kastner, W., Treytl, A., & Kovacs, G. (2016). Open traffic data platform for scenario-based control. In IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society. 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON2016), Florenz, EU. https://doi.org/10.1109/iecon.2016.7793132 / Project: CANOPUS
  • KNX IPv6 / Seifried, S., Gridling, G., & Kastner, W. (2016). KNX IPv6. In Proceedings in KNX Scientific Conference 2016 (p. 12). http://hdl.handle.net/20.500.12708/56642
  • A middleware architecture for vertical integration / Ismail, A., & Kastner, W. (2016). A middleware architecture for vertical integration. In 2016 1st International Workshop on Cyber-Physical Production Systems (CPPS). 1st International Workshop on Cyber-Physical Production Systems (CPPS), Vienna, Austria. https://doi.org/10.1109/cpps.2016.7483915
  • Position tracking of a model race car with Inertial Measurement Unit, laser mouse sensor and Extended Kalman Filter / Naydenov, D., & Bader, M. (2016). Position tracking of a model race car with Inertial Measurement Unit, laser mouse sensor and Extended Kalman Filter. In Proceedings of the 25th International Conference on Robotics in Alpe-Adria-Danube Region (RAAD) (p. 8). Springer. http://hdl.handle.net/20.500.12708/56626
  • Controlling and Tracking a Unmanned Ground Vehicle with Ackermanndrive / Kaltenegger, E., Binder, B., & Bader, M. (2016). Controlling and Tracking a Unmanned Ground Vehicle with Ackermanndrive. In Vision Meets Robotics, Proceedings of the ÖAGM Workshop 2016 (p. 7). http://hdl.handle.net/20.500.12708/56624
  • Expressive Navigation and Local Path-Planning of Independent Steering Autonomous Systems / Todoran, G., & Bader, M. (2016). Expressive Navigation and Local Path-Planning of Independent Steering Autonomous Systems. In 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (pp. 4742–4749). IEEE Xplore Digital Library,. http://hdl.handle.net/20.500.12708/56623 / Project: MPCv1
  • Discovery in SOA-governed industrial middleware with mDNS and DNS-SD / Ismail, A., & Kastner, W. (2016). Discovery in SOA-governed industrial middleware with mDNS and DNS-SD. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany, EU. IEEE. https://doi.org/10.1109/etfa.2016.7733529
  • Co-operative peer-to-peer systems for industrial middleware / Ismail, A., & Kastner, W. (2016). Co-operative peer-to-peer systems for industrial middleware. In 2016 IEEE World Conference on Factory Communication Systems (WFCS). WFCS, Torino, Italy, EU. https://doi.org/10.1109/wfcs.2016.7496497
  • Visualisation and Simulation of Pedestrians at Train Stations / Jaros, M., Ferschin, P., & Di Angelo, M. (2016). Visualisation and Simulation of Pedestrians at Train Stations. In W. Song, J. Ma, & L. Fu (Eds.), Proceedings of Pedestrian and Evacuation Dynamics 2016 (pp. 453–458). University of Science and Technology of China Press. http://hdl.handle.net/20.500.12708/56520 / Project: DIVS
  • Modeling and Simulation of Pedestrian Behaviour / Jaros, M., Di Angelo, M., & Ferschin, P. (2016). Modeling and Simulation of Pedestrian Behaviour. In Y. Merkuryev (Ed.), Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (pp. 149–156). SciTePress. http://hdl.handle.net/20.500.12708/56519 / Project: DIVS
  • Kronecker Algebra for Static Analysis of Barriers in Ada / Mittermayr, R., & Blieberger, J. (2016). Kronecker Algebra for Static Analysis of Barriers in Ada. In Ada-Europe’2016 International Conference on Reliable Software Technologies (pp. 145–159). Springer-Verlag. http://hdl.handle.net/20.500.12708/56463
  • Teil V: Maßnahmenkatalog und Tool-Implementierung / de Bruyn, K., Freingruber, R., Göllner, J., Gottwald, R., Haberler, B., Hecht, T., Kammerstetter, M., Kienesberger, G., Kudera, C., Kupzog, F., Langer, L., Mattern, A., Meisel, M., Meurers, C., Milojkovic, S., Montagna, R., Peer, A., Reichl, J., Sadofsky, A., … Tischlinger, M. (2016). Teil V: Maßnahmenkatalog und Tool-Implementierung. In Smart Grid Security Guidance - (SG)2: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich (pp. 1–253). Schriftenreihe der Landesverteidigungsakademie. http://hdl.handle.net/20.500.12708/29689
  • Product Ramp-up for Semiconductor Manufacturing Automated Recommendation of Control System Setup / Willmann, R., & Kastner, W. (2016). Product Ramp-up for Semiconductor Manufacturing Automated Recommendation of Control System Setup. In Semantic Web Technologies for Intelligent Engineering Applications (pp. 219–255). Springer International Publishing Switzerland. http://hdl.handle.net/20.500.12708/29241
  • Smart Grid Security Guidance - (SG)²: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich / Langer, L., Göllner, J., Tischlinger, M., & Kammerstetter, M. (Eds.). (2016). Smart Grid Security Guidance - (SG)2: Sicherheitsmaßnahmen für Stromnetzbetreiber in Österreich. Schriftenreihe der Landesverteidigungsakademie. http://hdl.handle.net/20.500.12708/24235
  • Rahmenwerk zur modellbasierten horizontalen und vertikalen Integration von Standards für Industrie 4.0 / Mazak, A., Wimmer, M., Huemer, C., Kappel, G., & Kastner, W. (2016). Rahmenwerk zur modellbasierten horizontalen und vertikalen Integration von Standards für Industrie 4.0. In B. Vogel-Heuser (Ed.), Handbuch Industrie 4.0 (pp. 1–22). Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-662-45537-1_94-1 / Project: InteGra 4.0

2015

  • Kronecker Algebra zur Optimierung des Eisenbahnbetriebes / Stefan, M., Blieberger, J., & Schöbel, A. (2015, September). Kronecker Algebra zur Optimierung des Eisenbahnbetriebes. Eisenbahntechnische Rundschau (ETR), 9, 78–84. http://hdl.handle.net/20.500.12708/151053
  • Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach / Giang, N. K., Im, J., Kim, D., Jung, M., & Kastner, W. (2015). Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6(1), 56. http://hdl.handle.net/20.500.12708/151685
  • Efficient Construction of Simultaneous Deterministic Finite Automata on Multicores Using Rabin Fingerprints / Jung, M., Burgstaller, B., & Blieberger, J. (2015). Efficient Construction of Simultaneous Deterministic Finite Automata on Multicores Using Rabin Fingerprints. arXiv. https://doi.org/10.48550/arXiv.1512.09228 / Project: SAJiTcore++
  • OPC4Factory - Flexibel automatisierte Fertigungszellen / Pauker, F., Frühwirth, T., Hinterbichler, R., & Bachmayr, T. (2015). OPC4Factory - Flexibel automatisierte Fertigungszellen. Blickpunkt Forschung: Energie@TU Wien, Wien, Austria. http://hdl.handle.net/20.500.12708/94447
  • Semantic Web and its contribution to Industrie 4.0 / Willmann, R., Kastner, W., & Biffl, S. (2015). Semantic Web and its contribution to Industrie 4.0. 15th European Advanced Process Control and Manufacturing Conference, Freising, Germany, EU. http://hdl.handle.net/20.500.12708/86200
  • Was verlangt die Gebäudesicherheit der Zukunft?" / Kastner, W. (2015). Was verlangt die Gebäudesicherheit der Zukunft?". Bosch Sicherheitsforum 2015, Wien, Austria. http://hdl.handle.net/20.500.12708/86179
  • Interdisziplinäre Forschung zur Energieoptimierung in Fertigungsbetrieben / Heinzl, B. (2015). Interdisziplinäre Forschung zur Energieoptimierung in Fertigungsbetrieben. Blickpunkt Forschung: Energie @ TU Wien, Technische Universität Wien, Austria. http://hdl.handle.net/20.500.12708/86241 / Projects: 13054 BAMA, INFO
  • Secure and Semantic Web of Automation / Fernbach, A. (2015). Secure and Semantic Web of Automation. 8. Internationaler Facility Management Kongress, Wien, Austria. http://hdl.handle.net/20.500.12708/86207
  • Secure and Semantic Web of Automation / Kastner, W., & Fernbach, A. (2015). Secure and Semantic Web of Automation. Blickpunkt Forschung: Energie @ TU Wien, Technische Universität Wien, Austria. http://hdl.handle.net/20.500.12708/86181
  • Industrial Internet for the Internet of Things / Ismail, A., & Kastner, W. (2015). Industrial Internet for the Internet of Things. OCG Jahrestagung 2015, Wien, Austria. http://hdl.handle.net/20.500.12708/86180
  • Future Energy - Diskussion & Zukunftsbild / Schachinger, D., & Kastner, W. (2015). Future Energy - Diskussion & Zukunftsbild. IMAGINE15, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/86125
  • Coordination of an Autonomous Fleet / Bader, M., Richtsfeld, A., Suchi, M., Todoran, G., Kastner, W., & Vincze, M. (2015). Coordination of an Autonomous Fleet. In Proceedings of the Austrian Robotics Workshop 2015 (p. 2). http://hdl.handle.net/20.500.12708/74587
  • Balanced Manufacturing - a Methodology for Energy Efficient Production Plant operation / Leobner, I., Smolek, P., Heinzl, B., Kovacic, I., Dür, F., Ponweiser, K., & Kastner, W. (2015). Balanced Manufacturing - a Methodology for Energy Efficient Production Plant operation. In Proceedings of the 10th Conference on Sustainable Development of Energy, Water and Environment Systems (p. 10). http://hdl.handle.net/20.500.12708/67368 / Project: 13054 BAMA
  • A Method for Real-Time Aggregation of a Product Footprint during Manufacturing / Smolek, P., Leobner, I., Heinzl, B., Gourlis, G., & Ponweiser, K. (2015). A Method for Real-Time Aggregation of a Product Footprint during Manufacturing. In 10th Conference on Sustainable Development of Energy, Water and Environment Systems. 10th Conference on Sustainable Development of Energy, Water and Environment Systems (SDEWES 2015), Dubrovnik, Kroatien, EU. http://hdl.handle.net/20.500.12708/61829 / Project: 13054 BAMA
  • MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis / Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis. In 2015 IEEE 39th Annual Computer Software and Applications Conference. IEEE. https://doi.org/10.1109/compsac.2015.103 / Project: SysSec
  • Balancing Centralized Control with Vehicle Autonomy in AGV Systems / Bader, M., Richtsfeld, A., Suchi, M., Todoran, G., Holl, W., Kastner, W., & Vincze, M. (2015). Balancing Centralized Control with Vehicle Autonomy in AGV Systems. In Conference on Autonomic and Autonomous Systems (ICAS) (pp. 37–43). http://hdl.handle.net/20.500.12708/57036
  • On using FMI-based models in IEC 61499 control applications / Spiegel, M. H., Leimgruber, F., Widl, E., & Gridling, G. (2015). On using FMI-based models in IEC 61499 control applications. In 2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Berlin, Germany, EU. https://doi.org/10.1109/mscpes.2015.7115407
  • Towards a Common Description of Interdisciplinary Aspects Relevant for Holistic Energy Analysis of Production Facilities / Heinzl, B., Hafner, I., Smolek, P., Leobner, I., Gourlis, G., Obermair, M., Popper, N., & Kastner, W. (2015). Towards a Common Description of Interdisciplinary Aspects Relevant for Holistic Energy Analysis of Production Facilities. In Workshop der ASIM/GI-Fachgruppen STS/GMMS (p. 2). http://hdl.handle.net/20.500.12708/56400 / Project: 13054 BAMA
  • Knowledge Based Building and Energy Management / Fernbach, A., Granzer, W., & Kastner, W. (2015). Knowledge Based Building and Energy Management. In Nachhaltige Gebäude (pp. 123–130). Leykam. http://hdl.handle.net/20.500.12708/56329
  • From textual programming to IEC 61499 artifacts: Towards a model-driven engineering approach for smart grid applications / Andren, F., Strasser, T., & Kastner, W. (2015). From textual programming to IEC 61499 artifacts: Towards a model-driven engineering approach for smart grid applications. In INDIN (pp. 1524–1530). IEEE. http://hdl.handle.net/20.500.12708/56316
  • Integration von Gebäudeautomationssystemen in das Internet der Dinge / Kastner, W. (2015). Integration von Gebäudeautomationssystemen in das Internet der Dinge. In Integrale Planung (pp. 294–301). http://hdl.handle.net/20.500.12708/56268
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education / Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., Non-EU. USENIX. http://hdl.handle.net/20.500.12708/56210
  • Error-Correcting Codes as Source for Decoding Ambiguity / Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, California, Non-EU. http://hdl.handle.net/20.500.12708/56209
  • Smart Privacy Visor: Bridging the Privacy Gap / Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208
  • Woody / Spiesberger, P., Jungwirth, F., Wöss, C., Bachl, S., Harms, J., & Grechenig, T. (2015). Woody. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia. 14th International Conference on Mobile and Ubiquitous Multimedia (MUM 2015), Linz, Austria. ACM, New York, NY, USA. https://doi.org/10.1145/2836041.2841210
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing / Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, Non-EU. Springer. http://hdl.handle.net/20.500.12708/56198
  • Guarded state machines in OPC UA / Frühwirth, T., Pauker, F., Fernbach, A., Ayatollahi, I., Kastner, W., & Kittl, B. (2015). Guarded state machines in OPC UA. In Proceedings of the 41st Annual Conference of the IEEE Industrial Electronics Society (IECON) (p. 6). http://hdl.handle.net/20.500.12708/56193
  • Dependability Demands and State of the Art in the Internet of Things / Frühwirth, T., Krammer, L., & Kastner, W. (2015). Dependability Demands and State of the Art in the Internet of Things. In Proceedings of the 20th IEEE Conference on Emerging Technologies and Factory Automation (ETFA) (p. 4). http://hdl.handle.net/20.500.12708/56190
  • TTEthernet SW-based End System for AUTOSAR / Frühwirth, T., Steiner, W., & Stangl, B. (2015). TTEthernet SW-based End System for AUTOSAR. In Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES) (p. 8). http://hdl.handle.net/20.500.12708/56189
  • Interoperable integration of building automation systems using RESTful BACnet Web services / Schachinger, D., Stampfel, C., & Kastner, W. (2015). Interoperable integration of building automation systems using RESTful BACnet Web services. In Proceedings of the Conference of the IEEE Industrial Electronics Society (p. 6). http://hdl.handle.net/20.500.12708/56166
  • Model-driven integration of building automation systems into Web service gateways / Schachinger, D., & Kastner, W. (2015). Model-driven integration of building automation systems into Web service gateways. In 2015 IEEE World Conference on Factory Communication Systems (WFCS). 11th IEEE World Conference on Factory Communication Systems (WFCS 2015), Palma de Mallorca, EU. https://doi.org/10.1109/wfcs.2015.7160561
  • Smart grid communication at the interface of customer buildings with focus on demand response / Schachinger, D., Gaida, S., & Kastner, W. (2015). Smart grid communication at the interface of customer buildings with focus on demand response. In 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST). International Symposium on Smart Electric Distribution Systems and Technologies (EDST 2015), Vienna, Austria, Austria. https://doi.org/10.1109/sedst.2015.7315236
  • Medieval Craftsmen at Castle Waldenfels / Giang, H. N. K., Ferschin, P., & Di Angelo, M. (2015). Medieval Craftsmen at Castle Waldenfels. In 2nd International Congress on Digital Heritage. Digital Heritage 2015, Granada, Spain, EU. IEEE Computer Society. http://hdl.handle.net/20.500.12708/56135 / Project: DIVS
  • Rapid Prototyping for Kinetic Architecture / Ferschin, P., Di Angelo, M., & Brunner, G. (2015). Rapid Prototyping for Kinetic Architecture. In 7th International Conference on Robotics, Automation and Mechatronics (RAM) (pp. 118–123). IEEE Computer Society. http://hdl.handle.net/20.500.12708/56133 / Project: DIVS
  • SmartCityGrid: CoOpt Koordinierte Optimierung von erneuerbarer Energie in Netz und Gebäude bei Planung und Betrieb / Ferhatbegovic, T., Gawlik, W., Haas, R., Hartl, M., Hauer, S., Heimberger, M., Henein, S., Hiesl, A., Jasek, P., Klug, R., Kodre, B., Kozek, M., Kupzog, F., Leitner, M., Leobner, I., Ponweiser, K., Schidler, S., Schirrer, A., Stockinger, J., … Zucker, G. (2015). SmartCityGrid: CoOpt Koordinierte Optimierung von erneuerbarer Energie in Netz und Gebäude bei Planung und Betrieb. http://hdl.handle.net/20.500.12708/38544

2014

2013

2012

2011

2010

  • Security in building automation systems / Granzer, W., Praus, F., & Kastner, W. (2010). Security in building automation systems. IEEE Transactions on Industrial Electronics, 57(11), 3622–3630. http://hdl.handle.net/20.500.12708/167556 / Project: seBAS
  • Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries / Kolbitsch, C., Holz, T., Krügel, C., & Kirda, E. (2010). Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In 2010 IEEE Symposium on Security and Privacy (pp. 29–44). IEEE Computer Society. https://doi.org/10.1109/SP.2010.10 / Project: WOMBAT
  • Building Automation / Kastner, W. (2010). Building Automation. Smart Buildings - Planning for the Future, Wien, Austria. http://hdl.handle.net/20.500.12708/85051
  • Auf dem Weg zu prädiktiven Regelungen im Zweckbau und Heimbereich / Kastner, W., Kofler, M. J., & Reinisch, C. (2010). Auf dem Weg zu prädiktiven Regelungen im Zweckbau und Heimbereich. Technologieworkshop, Wien, Austria. http://hdl.handle.net/20.500.12708/85052 / Project: ThinkHome
  • Intelligente Gebäudeautomation / Kastner, W. (2010). Intelligente Gebäudeautomation. Plusenergiehäuser der Zukunft, Wien, Austria. http://hdl.handle.net/20.500.12708/85050
  • Future Challenges for Building Automation: Wireless and Security / Kastner, W., Granzer, W., & Reinisch, C. (2010). Future Challenges for Building Automation: Wireless and Security. IEEE International Symposium on Industrial Electronics (ISIE ’10), Bari, Italy, EU. http://hdl.handle.net/20.500.12708/85022 / Projects: seBAS, ThinkHome
  • ThinkHome - die nächste Generation des energieeffizienten Eigenheims? / Reinisch, C. (2010). ThinkHome - die nächste Generation des energieeffizienten Eigenheims? Technologieworkshop I “Sustainable Construction,” Wien, Austria. http://hdl.handle.net/20.500.12708/85485
  • First legally binding Election in Austria - the Student Union Election / Ehringfeld, A. (2010). First legally binding Election in Austria - the Student Union Election. 4th International Conference on eDemocracy (EDEM 2010), Krems, Austria. http://hdl.handle.net/20.500.12708/85083
  • Availability Analysis for Railway Infrastructure based on Graph Theory / Schöbel, A., & Blieberger, J. (2010). Availability Analysis for Railway Infrastructure based on Graph Theory. In Revitalisation of Economy - New Challenge for European Railways (pp. 141–148). EDIS Zilina. http://hdl.handle.net/20.500.12708/60186
  • AdaStreams: A Type-based Programming Extension for Stream-Parallelism with Ada 2005 / Hong, J., Hong, K., Burgstaller, B., & Blieberger, J. (2010). AdaStreams: A Type-based Programming Extension for Stream-Parallelism with Ada 2005. In Reliable Software Technologies - Ada Europe 2010 (pp. 208–221). Springer-Verlag. http://hdl.handle.net/20.500.12708/53659
  • The Use of E-Voting in the Austrian Federation of Students Elections 2009 / Krimmer, R., Ehringfeld, A., & Traxl, M. (2010). The Use of E-Voting in the Austrian Federation of Students Elections 2009. In R. Krimmer & R. Grimm (Eds.), Electronic Voting (pp. 33–44). Gi, Lni. http://hdl.handle.net/20.500.12708/53572
  • Challenges for Designing the User Experience of Multi-touch Interfaces / Bachl, S., Tomitsch, M., Wimmer, C., & Grechenig, T. (2010). Challenges for Designing the User Experience of Multi-touch Interfaces. In Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems. Engineering Patterns for Multi-Touch Interfaces 2010, Berlin, EU. ACM. http://hdl.handle.net/20.500.12708/53538
  • Analysis of Recommendation Rec(2004)11 Based on the Experiences of Specific Attacks Against the First Legally Binding Implementation of E-Voting in Austria / Ehringfeld, A., Naber, L., Grechenig, T., Krimmer, R., Traxl, M., & Fischer, G. (2010). Analysis of Recommendation Rec(2004)11 Based on the Experiences of Specific Attacks Against the First Legally Binding Implementation of E-Voting in Austria. In R. Krimmer & R. Grimm (Eds.), Electronic Voting (pp. 225–237). Gi, Lni. http://hdl.handle.net/20.500.12708/53529
  • A Knowledge Base for Energy-Efficient Smart Homes / Kofler, M. J., & Kastner, W. (2010). A Knowledge Base for Energy-Efficient Smart Homes. In Proceedings IEEE International Energy Conference & Exhibition. IEEE International Energy Conference & Exhibition, Manama, Bahrain, Non-EU. http://hdl.handle.net/20.500.12708/53517 / Project: ThinkHome
  • Open Source Approaches to Integrate KNX into Media Centers / Praus, F., Reinisch, C., Leitner, P., & Kastner, W. (2010). Open Source Approaches to Integrate KNX into Media Centers. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53515
  • Mapping KNX to BACnet/Web Services / Szucsich, S., & Kastner, W. (2010). Mapping KNX to BACnet/Web Services. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53378 / Project: WebCom
  • Approaches for increasing availability of component-based traffic management software / Stögerer, C., & Kastner, W. (2010). Approaches for increasing availability of component-based traffic management software. In 13th IEEE Conference on Intelligent Transportation Systems (pp. 1608–1613). http://hdl.handle.net/20.500.12708/53376
  • Towards the life-cycle of VMS configurations / Stögerer, C., Novak, T., & Kastner, W. (2010). Towards the life-cycle of VMS configurations. In 13th IEEE Conference on Intelligent Transportation Systems (pp. 783–788). http://hdl.handle.net/20.500.12708/53375
  • Usage Profiles for Sustainable Buildings / Iglesias Vazquez, F., & Kastner, W. (2010). Usage Profiles for Sustainable Buildings. In 15th IEEE Conference on Emerging Techonologies and Factory Automation (pp. 1–8). http://hdl.handle.net/20.500.12708/53374 / Project: ThinkHome
  • Distributed monitoring for component-based traffic management systems gement software / Stögerer, C., & Kastner, W. (2010). Distributed monitoring for component-based traffic management systems gement software. In 15th IEEE Conference on Emerging Techonologies and Factory Automation (pp. 1–4). http://hdl.handle.net/20.500.12708/53373
  • ThinkHome: A Smart Home as Digital Ecosystem / Reinisch, C., Kofler, M. J., & Kastner, W. (2010). ThinkHome: A Smart Home as Digital Ecosystem. In 4th IEEE International Conference on Digital Ecosystems and Technologies (pp. 256–261). http://hdl.handle.net/20.500.12708/53372 / Project: ThinkHome
  • Using AI to Realize Energy Efficient Yet Comfortable Smart Homes / Kastner, W., Kofler, M. J., & Reinisch, C. (2010). Using AI to Realize Energy Efficient Yet Comfortable Smart Homes. In 8th IEEE International Workshop on Factory Communication Systems (pp. 169–172). http://hdl.handle.net/20.500.12708/53371 / Project: ThinkHome
  • Integrating process communication in building information models with IFC and LON / Malinowsky, B., & Kastner, W. (2010). Integrating process communication in building information models with IFC and LON. In 8th IEEE International Workshop on Factory Communication Systems (pp. 221–230). http://hdl.handle.net/20.500.12708/53370
  • Integrating surveillance systems into KNX / Schuster, F., Krammer, L., Granzer, W., & Kastner, W. (2010). Integrating surveillance systems into KNX. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53368 / Project: Networked miniSPOT
  • Secure Control Applications in Building Automation using Domain Knowledge / Praus, F., & Kastner, W. (2010). Secure Control Applications in Building Automation using Domain Knowledge. In Proceedings 8th IEEE International Conference on Industrial Informatics (INDIN 2010) (pp. 52–57). http://hdl.handle.net/20.500.12708/53367 / Project: seBAS
  • Security Analysis of Open Building Automation Systems / Granzer, W., & Kastner, W. (2010). Security Analysis of Open Building Automation Systems. In Proceedings 29th International Conference on Computer Safety, Reliability and Security (SAFECOMP ’10) (pp. 303–316). Springer. http://hdl.handle.net/20.500.12708/53366 / Project: seBAS
  • Communication Services for Secure Building Automation Networks / Granzer, W., & Kastner, W. (2010). Communication Services for Secure Building Automation Networks. In Proceedings IEEE International Symposium on Industrial Electronics (ISIE ’10) (pp. 3380–3385). http://hdl.handle.net/20.500.12708/53365 / Project: seBAS
  • Abusing Social Networks for Automated User Profiling / Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Krügel, C. (2010). Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection (RAID 2010) (p. 20). Springer. http://hdl.handle.net/20.500.12708/53362 / Project: WOMBAT
  • KNX and OPC UA / Granzer, W., Kastner, W., & Furtak, P. (2010). KNX and OPC UA. In Proceedings KNX Scientific Conference 2010. KNX Scientific Conference 2010, Pamplona, Navarra, Spain, EU. http://hdl.handle.net/20.500.12708/53361 / Project: WebCom
  • dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection / Neugschwandtner, M., Platzer, C., Milani Comparetti, P., & Bayer, U. (2010). dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection. In Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (p. 20). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53360 / Project: WOMBAT
  • Covertly Probing Underground Economy Marketplaces / Fallmann, H., Wondracek, G., & Platzer, C. (2010). Covertly Probing Underground Economy Marketplaces. In Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010) (p. 10). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53359 / Project: TRUDIE
  • Is the Internet for Porn? An Insight Into the Online Adult Industry / Wondracek, G., Holz, T., Platzer, C., Kirda, E., & Krügel, C. (2010). Is the Internet for Porn? An Insight Into the Online Adult Industry. In The Ninth Workshop on the Economics of Information Security (WEIS 2010) (p. 14). ACM Press. http://hdl.handle.net/20.500.12708/53357 / Project: WOMBAT
  • Extending Mondrian Memory Protection / Kolbitsch, C., Krügel, C., & Kirda, E. (2010). Extending Mondrian Memory Protection. In IST-091 Information Assurance and Cyber Defence (p. 18). NATO Research and Technology Organization (NATO RTO). http://hdl.handle.net/20.500.12708/53348 / Projects: SECoverer, WOMBAT
  • Exploiting diverse observation perspectives to get insights on the malware landscape / Leita, C., Bayer, U., & Kirda, E. (2010). Exploiting diverse observation perspectives to get insights on the malware landscape. In Proceedings of the 40th Dependable Systems & Networks Conference (DSN) (pp. 393–402). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53347
  • A Practical Attack to De-anonymize Social Network Users / Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A Practical Attack to De-anonymize Social Network Users. In 2010 IEEE Symposium on Security and Privacy. IEEE, Austria. IEEE Computer Society. https://doi.org/10.1109/sp.2010.21 / Project: WOMBAT
  • Identifying Dormant Functionality in Malware Programs / Milani Comparetti, P., Salvaneschi, G., Kirda, E., Kolbitsch, C., Krügel, C., & Zanero, S. (2010). Identifying Dormant Functionality in Malware Programs. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (pp. 61–76). IEEE Computer Society. http://hdl.handle.net/20.500.12708/53340 / Project: WOMBAT
  • A solution for the automated detection of clickjacking attacks / Balduzzi, M., Egele, M., Balzarotti, D., Kirda, E., & Krügel, C. (2010). A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS ’10. ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China, Non-EU. ACM. https://doi.org/10.1145/1755688.1755706 / Projects: SECoverer, WOMBAT
  • Exploring the potential of game engines for real-time light simulation / Ferschin, P., Di Angelo, M., & Suter, G. (2010). Exploring the potential of game engines for real-time light simulation. In A. Mahdavi & B. Martens (Eds.), BAUSIM 2010 (pp. 499–504). http://hdl.handle.net/20.500.12708/53248
  • No-new-wires technologies for control / Kastner, W. (2010). No-new-wires technologies for control. In Broadband Home today and tomorrow: technical challenges and developments. Broadband Home today and tomorrow: technical challenges and developments, Delft, Netherlands, EU. http://hdl.handle.net/20.500.12708/53513
  • Informatikunterricht in der Wiener AHS-Unterstufe / Smejkal, P., & Di Angelo, M. (2010). Informatikunterricht in der Wiener AHS-Unterstufe. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 326–331). OCG. http://hdl.handle.net/20.500.12708/53247
  • Facebook im Unterricht / Planinc, R., & Di Angelo, M. (2010). Facebook im Unterricht. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 296–304). OCG. http://hdl.handle.net/20.500.12708/53246
  • Experimentieren mit digitalem Ton / Eisenbarth, M., & Di Angelo, M. (2010). Experimentieren mit digitalem Ton. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 291–295). OCG. http://hdl.handle.net/20.500.12708/53245
  • Von der Kamera ins Web / Planinc, R., Wetzinger, E., & Di Angelo, M. (2010). Von der Kamera ins Web. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 285–290). OCG. http://hdl.handle.net/20.500.12708/53244
  • Begabtenförderung mit LEGO Mindstorms / Di Angelo, M., Berger, K., & Schönbauer, A. (2010). Begabtenförderung mit LEGO Mindstorms. In G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, & K. Schoder (Eds.), 25 Jahre Schulinformatik (pp. 275–279). OCG. http://hdl.handle.net/20.500.12708/53243

2009

  • Removing web spam links from search engine results / Kolbitsch, C., Egele, M., & Platzer, C. (2009). Removing web spam links from search engine results. Journal in Computer Virology, 7(1), 51–62. https://doi.org/10.1007/s11416-009-0132-6 / Projects: SECoverer, WOMBAT
  • Graphentheoretische Verfügbarkeitsanalyse für die Eisenbahninfrastruktur / Blieberger, J., Ostermann, N., & Schöbel, A. (2009). Graphentheoretische Verfügbarkeitsanalyse für die Eisenbahninfrastruktur. Signal&Draht, 101(9), 33–36. http://hdl.handle.net/20.500.12708/165268
  • Server-Side Bot Detection in Massively Multiplayer Online Games / Mitterhofer, S. K., Platzer, C., Kirda, E., & Krügel, C. (2009). Server-Side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy, 7(3), 29–36. https://doi.org/10.1109/msp.2009.78
  • System Management Standards for Traffic Management Systems / Stögerer, C., & Kastner, W. (2009). System Management Standards for Traffic Management Systems. In Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation. 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain, EU. http://hdl.handle.net/20.500.12708/52894
  • Functional Safety in Building Automation / Kastner, W., & Novak, T. (2009). Functional Safety in Building Automation. In Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation. 14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain, EU. http://hdl.handle.net/20.500.12708/52893 / Project: KNXSafety
  • Enhanced Control Application Development in Building Automation / Praus, F., Granzer, W., & Kastner, W. (2009). Enhanced Control Application Development in Building Automation. In 7th IEEE International Conference on Industrial Informatics (INDIN ’09) (pp. 390–395). Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN ’09). http://hdl.handle.net/20.500.12708/52892 / Project: seBAS
  • FIRE: FInding Rogue nEtworks / Stone-Gross, B., Moser, A., Krügel, C., Kirda, E., & Almaroth, K. (2009). FIRE: FInding Rogue nEtworks. In 25th Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/52891 / Project: WOMBAT
  • Automatically Generating Models for Botnet Detection / Wurzinger, P., Bilge, L., Kirda, E., Krügel, C., Holz, T., & Göbel, J. (2009). Automatically Generating Models for Botnet Detection. In 14th European Symposium on Research in Computer Security (ESORICS 2009). European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France, EU. http://hdl.handle.net/20.500.12708/52890 / Projects: Pathfinder, WOMBAT
  • Congestion control in building automation networks: Considerations for KNX / Neugschwandtner, G., & Kastner, W. (2009). Congestion control in building automation networks: Considerations for KNX. In Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009) (p. 6). http://hdl.handle.net/20.500.12708/52889 / Project: KNXIPSim
  • Effective and Efficient Malware Detection at the End Host / Milani Comparetti, P., Kolbitsch, C., Kirda, E., Krügel, C., Xiaoyong, Z., & Xiaofeng, W. (2009). Effective and Efficient Malware Detection at the End Host. In usenix 2009. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/52887 / Project: WOMBAT
  • Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks / Wurzinger, P., Egele, M., Kirda, E., & Krügel, C. (2009). Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks. In Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany, EU. http://hdl.handle.net/20.500.12708/52884 / Projects: SECoverer, WOMBAT
  • Mitigating Drive-by Download Attacks: Challenges and Open Problems / Egele, M., Kirda, E., & Krügel, C. (2009). Mitigating Drive-by Download Attacks: Challenges and Open Problems. In Open Research Problems in Network Security Workshop. Open Research Problems in Network Security Workshop, Zurich, EU. http://hdl.handle.net/20.500.12708/52883
  • Removing Web Spam Links from Search Engine Results / Kirda, E., Egele, M., & Krügel, C. (2009). Removing Web Spam Links from Search Engine Results. In EICAR proceedings. Conference of the European Institute for Computer Antivirus Research (EICAR), Germany, EU. http://hdl.handle.net/20.500.12708/52881 / Projects: SECoverer, WOMBAT
  • SWAP: Mitigating XSS Attacks using a Reverse Proxy / Krügel, C., Platzer, C., Kirda, E., Ludl, C., & Wurzinger, P. (2009). SWAP: Mitigating XSS Attacks using a Reverse Proxy. In SESS proceedings. International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA, Non-EU. http://hdl.handle.net/20.500.12708/52880 / Project: WOMBAT
  • Prospex: Protocol Specification Extraction / Milani Comparetti, P., Wondracek, G., Krügel, C., & Kirda, E. (2009). Prospex: Protocol Specification Extraction. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 110–125). IEEE. http://hdl.handle.net/20.500.12708/52878 / Project: WOMBAT
  • Scalable, Behavior-Based Malware Clustering / Bayer, U., Kirda, E., Krügel, C., Milani Comparetti, P., & Hlauschek, C. (2009). Scalable, Behavior-Based Malware Clustering. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009). Network and Distributed System Security Symposium (NDSS), USA, Non-EU. NDSS Proceedings. http://hdl.handle.net/20.500.12708/52860 / Projects: Pathfinder, WOMBAT
  • Securing IP Backbones in Building Automation Networks / Granzer, W., Lechner, D., Praus, F., & Kastner, W. (2009). Securing IP Backbones in Building Automation Networks. In Proceedings 7th IEEE International Concerence on Industrial Informatics (pp. 410–415). Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN ’09),. http://hdl.handle.net/20.500.12708/52665 / Project: seBAS
  • Data communications for distributed building automation / Kastner, W., & Neugschwandtner, G. (2009). Data communications for distributed building automation. In Embedded Systems Handbook, Second Edition, Volume 2: Networked Embedded Systems (pp. 29-1-29–34). CRC Press. http://hdl.handle.net/20.500.12708/26573

2008

2007

  • Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2007). Extending .NET Security to Unmanaged Code. International Journal of Information Security, 6(6), 417–428. http://hdl.handle.net/20.500.12708/169715
  • Trends in der Gebäudeautomation: Wireless Automation Networks / Kastner, W. (2007). Trends in der Gebäudeautomation: Wireless Automation Networks. MegaTECH, 1/2(2007), 46. http://hdl.handle.net/20.500.12708/169697
  • Static Detection of Livelocks in Ada Multitasking Programs / Blieberger, J., Burgstaller, B., & Mittermayr, R. (2007). Static Detection of Livelocks in Ada Multitasking Programs. In N. Abdennadher & F. Kordon (Eds.), Reliable Software Technologies - Ada-Europe 2007: 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007, Proceedings (pp. 69–83). Springer-Verlag. https://doi.org/10.1007/978-3-540-73230-3_6
  • Considering a technical realization of a neuro-psychoanalytical model of the mind / Dietrich, D., Fodor, G., Kastner, W., & Ulieru, M. (2007). Considering a technical realization of a neuro-psychoanalytical model of the mind. In Proceedings of ENF 2007 - 1st International Engineering & Neuro-Psychoanalysis Forum (pp. 13–20). http://hdl.handle.net/20.500.12708/69775
  • Improving Signature Testing Through Dynamic Data Flow Analysis / Balzarotti, D., Robertson, W., Krügel, C., & Vigna, G. (2007). Improving Signature Testing Through Dynamic Data Flow Analysis. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 22–32). http://hdl.handle.net/20.500.12708/52154
  • Limits of Static Analysis for Malware Detection / Moser, A., Krügel, C., & Kirda, E. (2007). Limits of Static Analysis for Malware Detection. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 12–21). http://hdl.handle.net/20.500.12708/52153
  • Secure Input for Web Applications / Szydlowski, M., Krügel, C., & Kirda, E. (2007). Secure Input for Web Applications. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (pp. 1–11). http://hdl.handle.net/20.500.12708/52152
  • Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / Yin, H., Song, D., Egele, M., Krügel, C., & Kirda, E. (2007). Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52151
  • Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / Karlberger, C., Bayler, G., Krügel, C., & Kirda, E. (2007). Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In Usenix Workshop on Offensive Technologies (WOOT) (pp. 1–7). http://hdl.handle.net/20.500.12708/52150
  • Detecting System Emulators / Raffetseder, T., Krügel, C., & Kirda, E. (2007). Detecting System Emulators. In Proceedings of the Information Security Conference (ISC ) (pp. 1–18). http://hdl.handle.net/20.500.12708/52149
  • Mining Specifications of Malicious Behavior / Christodorescu, M., Jha, S., & Krügel, C. (2007). Mining Specifications of Malicious Behavior. In Proceedings of the European Software Engineering Conference (ESEC) (pp. 1–10). http://hdl.handle.net/20.500.12708/52148
  • A Layout-Similarity-Based Approach for Detecting Phishing Pages / Rosiello, A., Krügel, C., Kirda, E., & Ferrandi, F. (2007). A Layout-Similarity-Based Approach for Detecting Phishing Pages. In Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) (pp. 1–10). http://hdl.handle.net/20.500.12708/52147
  • Dynamic Spyware Analysis / Egele, M., Krügel, C., Kirda, E., Yin, H., & Song, D. (2007). Dynamic Spyware Analysis. In Proceedings of the Usenix Annual Technical Conference (pp. 1–14). http://hdl.handle.net/20.500.12708/52146
  • Building Anti-Phishing Browser Plug-Ins: An Experience Report / Raffetseder, T., Kirda, E., & Krügel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. In 3rd International Workshop on Software Engineering for Secure Systems (SESS) (pp. 1–7). IEEE Computer Society. http://hdl.handle.net/20.500.12708/52144
  • On the Effectiveness of Techniques to Detect Phishing Sites / Ludl, C., McAllister, S., Kirda, E., & Krügel, C. (2007). On the Effectiveness of Techniques to Detect Phishing Sites. In Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA) (pp. 1–20). http://hdl.handle.net/20.500.12708/52145
  • Exploring Multiple Execution Paths for Malware Analysis / Moser, A., Krügel, C., & Kirda, E. (2007). Exploring Multiple Execution Paths for Malware Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 1–15). http://hdl.handle.net/20.500.12708/52143
  • Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Vogt, P., Nentwich, F., Jovanovic, N., Krügel, C., Kirda, E., & Vigna, G. (2007). Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1–12). http://hdl.handle.net/20.500.12708/52142
  • Understanding Spatial Mobile Service Discovery using Pointing and Touching. / Költringer, T., Tomitsch, M., Kappel, K., Zrno, M., & Grechenig, T. (2007). Understanding Spatial Mobile Service Discovery using Pointing and Touching. In ACM CHI 2007 Workshop on Mobile Spatial Interaction (p. 4). http://hdl.handle.net/20.500.12708/52085
  • Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards / Költringer, T., Ngo Van, M., & Grechenig, T. (2007). Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards. In Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (pp. 2513–2518). ACM Press. http://hdl.handle.net/20.500.12708/52082
  • Designing Tangible Tabletop Interfaces for Patients in Rehabilitation / Leitner, M., Tomitsch, M., Költringer, T., Kappel, K., & Grechenig, T. (2007). Designing Tangible Tabletop Interfaces for Patients in Rehabilitation. In M. Hersh (Ed.), Proceedings of the Conference and Workshop on Assistive Technology for People with Vision and Hearing Impairments (p. 7). http://hdl.handle.net/20.500.12708/52080
  • Plug and Play in Distributed Home and in Building Automation Systems: An Introduction / Neugschwandtner, G. (2007). Plug and Play in Distributed Home and in Building Automation Systems: An Introduction. In Proceedings Konnex Scientific Conference (p. 10). http://hdl.handle.net/20.500.12708/52052
  • A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks / Praus, F., Granzer, W., Georg, G., & Sauter, T. (2007). A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks. In Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’07) (pp. 1465–1472). http://hdl.handle.net/20.500.12708/52051
  • Automatisch sicher / Kastner, W. (2007). Automatisch sicher. In Der Mensch im Zentrum der intelligenten Gebäudeautomation (pp. 85–97). http://hdl.handle.net/20.500.12708/52050
  • Calimero: Next Generation / Malinowsky, B., Neugschwandtner, G., & Kastner, W. (2007). Calimero: Next Generation. In Proceedings Konnex Scientific Conference (p. 10). http://hdl.handle.net/20.500.12708/52049 / Project: seBAS
  • BACnet over KNX / Granzer, W., & Kastner, W. (2007). BACnet over KNX. In Proceedings Konnex Scientific Conference (p. 19). http://hdl.handle.net/20.500.12708/52048 / Project: seBAS
  • Wireless Technologies in Home and Building Automation / Reinisch, C., Kastner, W., Neugschwandtner, G., & Granzer, W. (2007). Wireless Technologies in Home and Building Automation. In Proceedings 5th IEEE International Conference on Industrial Informatics (pp. 93–98). http://hdl.handle.net/20.500.12708/52047 / Project: seBAS
  • Web Services in Building Automation: Mapping KNX to oBIX / Neugschwandtner, M., Neugschwandtner, G., & Kastner, W. (2007). Web Services in Building Automation: Mapping KNX to oBIX. In Proceedings 5th IEEE International Conference on Industrial Informatics (pp. 87–92). http://hdl.handle.net/20.500.12708/52044
  • Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP / Reinisch, C., Kastner, W., & Neugschwandtner, G. (2007). Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP. In Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA ’07) (pp. 1380–1383). http://hdl.handle.net/20.500.12708/52015 / Project: seBAS
  • A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees / Scholz, B., & Blieberger, J. (2007). A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees. In Lecture Notes in Computer Science (pp. 202–217). LNCS, Springer-Verlag. https://doi.org/10.1007/978-3-540-71229-9_14
  • Synchronous Consensus with Mortal Byzantines / Widder, J., Gridling, G., Weiss, B., & Blanquart, J.-P. (2007). Synchronous Consensus with Mortal Byzantines. In Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE Conference on Dependable Systems and Networks (DSN), Philadelphia, PA, USA, Non-EU. http://hdl.handle.net/20.500.12708/52033

2006

  • "Wissen schaft": Gebäudeautomation - Security in KNX/EIB / Kastner, W. (2006). “Wissen schaft”: Gebäudeautomation - Security in KNX/EIB. MegaTECH, 12, 16. http://hdl.handle.net/20.500.12708/173443
  • Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2006). Protecting Users Against Phishing Attacks with AntiPhish. The Computer Journal, 49(5). http://hdl.handle.net/20.500.12708/173448
  • Anomalous System Call Detection / Mutz, D., Valeur, F., Krügel, C., & Vigna, G. (2006). Anomalous System Call Detection. ACM Transactions on Information and System Security, 9(1). http://hdl.handle.net/20.500.12708/173447
  • Dynamic Analysis of Malicious Code / Bayer, U., Moser, A., Krügel, C., & Kirda, E. (2006). Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1). http://hdl.handle.net/20.500.12708/173446
  • "Wissen schaft": Trends in der Gebäudeautomation / Kastner, W. (2006). “Wissen schaft”: Trends in der Gebäudeautomation. MegaTECH, 11, 44. http://hdl.handle.net/20.500.12708/173442
  • Datenkommunikation in der verteilten Gebäudeautomation / Kastner, W., & Neugschwandtner, G. (2006). Datenkommunikation in der verteilten Gebäudeautomation. Bulletin SEV/VSE, 17, 9–14. http://hdl.handle.net/20.500.12708/173441
  • Average Case Analysis of DJ Graphs / Blieberger, J. (2006). Average Case Analysis of DJ Graphs. Journal of Discrete Algorithms, 4(4), 649–675. https://doi.org/10.1016/j.jda.2005.07.002
  • Synchronous Consensus with Mortal Byzantines / Widder, J., Gridling, G., Weiss, B., & Blanquart, J.-P. (2006). Synchronous Consensus with Mortal Byzantines. Dagstuhl Seminar 06371. From Security to Dependability, Dagstuhl, EU. http://hdl.handle.net/20.500.12708/84588
  • Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Habilitationskolloquium, Wien, Austria. http://hdl.handle.net/20.500.12708/84565
  • Vulnerabilities in Web Applications / Krügel, C. (2006). Vulnerabilities in Web Applications. TERENA Networking Conference, Italy, EU. http://hdl.handle.net/20.500.12708/84564
  • Malicious Code Analysis / Krügel, C. (2006). Malicious Code Analysis. Talk at the Computer Science Colloquium, Carleton University, Ottawa, Canada, Non-EU. http://hdl.handle.net/20.500.12708/84563
  • Dimensionen der Integration / Neugschwandtner, G. (2006). Dimensionen der Integration. Technologieberatung “Intelligente Gebäude- und Haustechnik”, TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84562
  • State of the Art und Offene Standards / Kastner, W. (2006). State of the Art und Offene Standards. Technologieberatung “Intelligente Gebäude- und Haustechnik”, TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84561
  • Offene Kommunikation in der Gebäudeautomation - State of the Art and Future Trends / Kastner, W. (2006). Offene Kommunikation in der Gebäudeautomation - State of the Art and Future Trends. Automation 2006 Jahreskongress, Congress Center Messezentrum WienNeu, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84560
  • Plug and Play in der Automatisierungstechnik / Kastner, W. (2006). Plug and Play in der Automatisierungstechnik. Veranstaltung Automatisierung in der Produktion - zukunftsweisendes Know-How an der TU Wien, Vienna, Austria, Austria. http://hdl.handle.net/20.500.12708/84559
  • Symbolic Analysis of Imperative Programming Languages / Burgstaller, B., Scholz, B., & Blieberger, J. (2006). Symbolic Analysis of Imperative Programming Languages. In Lecture Notes in Computer Science (pp. 172–194). Springer-Verlag. https://doi.org/10.1007/11860990_12
  • Static Detection of Access Anomalies in Ada95 / Burgstaller, B., Blieberger, J., & Mittermayr, R. (2006). Static Detection of Access Anomalies in Ada95. In Reliable Software Technologies – Ada-Europe 2006 (pp. 40–55). Springer-Verlag. https://doi.org/10.1007/11767077_4
  • Bahavior-based Spyware Detection / Kirda, E., Krügel, C., Banks, G., Vigna, G., & Kemmerer, R. (2006). Bahavior-based Spyware Detection. In Proc. 15th USENIX Security Symposium (pp. 273–288). http://hdl.handle.net/20.500.12708/51798
  • Wireless Communication in KNX/EIB / Reinisch, C., Granzer, W., Neugschwandtner, G., Praus, F., & Kastner, W. (2006). Wireless Communication in KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 15). http://hdl.handle.net/20.500.12708/51782
  • EIBsec: A Security Extension to KNX/EIB / Granzer, W., Kastner, W., & Neugschwandtner, G. (2006). EIBsec: A Security Extension to KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 13). http://hdl.handle.net/20.500.12708/51685
  • Interoperable Web Services for Building Automation: Integrating KNX / Neugschwandtner, M., Neugschwandtner, G., & Kastner, W. (2006). Interoperable Web Services for Building Automation: Integrating KNX. In Proceedings KNX Scientific Conference 2006 (p. 14). http://hdl.handle.net/20.500.12708/51684
  • A versatile networked embedded platform for KNX/EIB / Praus, F., Neugschwandtner, G., & Kastner, W. (2006). A versatile networked embedded platform for KNX/EIB. In Proceedings KNX Scientific Conference 2006 (p. 18). http://hdl.handle.net/20.500.12708/51683
  • ConceptWorld: Uncovering the Pragmatic Depth of Semantic Concepts Using the WWW / Dittenbach, M., Berger, H., Merkl, D., & Eckkrammer, F. (2006). ConceptWorld: Uncovering the Pragmatic Depth of Semantic Concepts Using the WWW. In Proc. Asian Semantic Web Conf. 2006 (pp. 301–312). Jilin University Press. http://hdl.handle.net/20.500.12708/51747
  • Experiments in Multi-Class e-Mail Categorization / Berger, H., Merkl, D., & Dittenbach, M. (2006). Experiments in Multi-Class e-Mail Categorization. In Proc. Seventh Intern. Baltic Conf. on Databases and Information Systems 2006 (pp. 79–90). http://hdl.handle.net/20.500.12708/51746
  • Towards a Community-Driven 3D e-Tourism Environment / Berger, H., Dittenbach, M., & Merkl, D. (2006). Towards a Community-Driven 3D e-Tourism Environment. In Proc. IADIS International Conf. E-Society 2006 (pp. 168–172). http://hdl.handle.net/20.500.12708/51745
  • Exploiting Partial Decision Trees for Feature Subset Selection in e-Mail Categorization / Berger, H., Merkl, D., & Dittenbach, M. (2006). Exploiting Partial Decision Trees for Feature Subset Selection in e-Mail Categorization. In Proc. Applied Computing 2006 (pp. 1105–1109). ACM Press. http://hdl.handle.net/20.500.12708/51741
  • Developing User Interface Guidelines for DVD Menus / Kappel, K., Tomitsch, M., Költringer, T., & Grechenig, T. (2006). Developing User Interface Guidelines for DVD Menus. In Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2006 (pp. 177–182). ACM Press. http://hdl.handle.net/20.500.12708/51707
  • Experiences from Designing a Tangible Musical Toy / Tomitsch, M., Grechenig, T., Kappel, K., & Költringer, T. (2006). Experiences from Designing a Tangible Musical Toy. In Proceedings of the 5th International Conference for Interaction Design and Children - IDC 2006 (pp. 169–170). ACM Press. http://hdl.handle.net/20.500.12708/51706
  • Guidelines for Designing Usable DVD Menus / Költringer, T., Tomitsch, M., Kappel, K., & Grechenig, T. (2006). Guidelines for Designing Usable DVD Menus. In Proceedings of the 20th British HCI conference - HCI 2006, Vol. 2 (pp. 74–78). ACM Press. http://hdl.handle.net/20.500.12708/51705
  • Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks / Robertson, W., Vigna, G., Krügel, C., & Kemmerer, R. (2006). Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In Proc. Network and Distributed System Security Symposium (NDSS) (pp. 31–46). Internet Society. http://hdl.handle.net/20.500.12708/51702
  • An Anomaly-driven Reverse Proxy for Web Applications / Valeur, F., Vigna, G., Krügel, C., & Kirda, E. (2006). An Anomaly-driven Reverse Proxy for Web Applications. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 361–369). ACM Press. http://hdl.handle.net/20.500.12708/51701
  • Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / Kirda, E., Krügel, C., Vigna, G., & Jovanovic, N. (2006). Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. In Proc. 21st ACM Symposium on Applied Computing (SAC) (pp. 330–338). ACM Press. http://hdl.handle.net/20.500.12708/51700
  • TTAnalyze: A Tool for Analyzing Malware / Bayer, U., Krügel, C., & Kirda, E. (2006). TTAnalyze: A Tool for Analyzing Malware. In Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR) (pp. 180–192). http://hdl.handle.net/20.500.12708/51699
  • SecuBat: A Web Vulnerability Scanner / Kals, S., Kirda, E., Krügel, C., & Jovanovic, N. (2006). SecuBat: A Web Vulnerability Scanner. In Proc. 15th International World Wide Web Conference (WWW) (pp. 247–257). http://hdl.handle.net/20.500.12708/51698
  • Using Static Program Analysis to Aid Intrusion Detection / Egele, M., Szydlowski, M., Kirda, E., & Krügel, C. (2006). Using Static Program Analysis to Aid Intrusion Detection. In Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science (pp. 17–37). Springer-Verlag. http://hdl.handle.net/20.500.12708/51697
  • Extending .NET Security to Unmanaged Code / Klinkoff, P., Krügel, C., Kirda, E., & Vigna, G. (2006). Extending .NET Security to Unmanaged Code. In Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science (pp. 1–16). Springer-Verlag. http://hdl.handle.net/20.500.12708/51696
  • Towards Plug and Play in Home and Building Automation Networks / Neugschwandtner, G. (2006). Towards Plug and Play in Home and Building Automation Networks. In 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA’06) (p. 4). http://hdl.handle.net/20.500.12708/51693
  • Security in Networked Building Automation Systems / Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). Security in Networked Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 283–292). http://hdl.handle.net/20.500.12708/51682
  • A Modular Architecture for Building Automation Systems / Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). A Modular Architecture for Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 99–102). http://hdl.handle.net/20.500.12708/51681
  • Fire Safety Alarm Transmission in Networked Building Automation Systems / Neugschwandtner, G., Kastner, W., & Erb, B. (2006). Fire Safety Alarm Transmission in Networked Building Automation Systems. In Proceedings 6th IEEE International Workshop on Factory Communication Systems (pp. 79–82). http://hdl.handle.net/20.500.12708/51680
  • An Embedded Systems Programming Environment for C / Burgstaller, B., Scholz, B., & Ertl, M. A. (2006). An Embedded Systems Programming Environment for C. In Euro-Par 2006 Parallel Processing (pp. 1204–1216). Lecture Notes in Computer Science, Springer Verlag. http://hdl.handle.net/20.500.12708/51629
  • Embedded Real-Time Ball Detection Unit for the YABIRO Biped Robot / Bader, M., Alberto, M., Sablatnig, R., Simo, J., Benet, G., Novak, G., & Blanes, F. (2006). Embedded Real-Time Ball Detection Unit for the YABIRO Biped Robot. In Proc. of 4th Workshop on Intelligent Solutions in Embedded Systems (pp. 3–12). http://hdl.handle.net/20.500.12708/51574
  • A µController Lab for Distance Learning / Gridling, G., & Weiss, B. (2006). A µController Lab for Distance Learning. In EWME 2006 - Proceedings (pp. 129–132). http://hdl.handle.net/20.500.12708/51522
  • Embedded Systems Exams With True/False Questions: A Case Study / Gridling, G., Weiss, B., Elmenreich, W., & Trödhandl, C. (2006). Embedded Systems Exams With True/False Questions: A Case Study. In Proceedings of the Second International Conference on Education and Technology (pp. 168–172). http://hdl.handle.net/20.500.12708/51519
  • Preventing Cross Site Request Forgery Attacks / Jovanovic, N., Kirda, E., & Krügel, C. (2006). Preventing Cross Site Request Forgery Attacks. In 2nd International Conference on Security and Privacy in Communication Networks & the Workshops. SecureComm 2006, Baltimore, MD, USA, Non-EU. IEEE. http://hdl.handle.net/20.500.12708/51397
  • Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (pp. 258–263). IEEE Inc. http://hdl.handle.net/20.500.12708/51372
  • Precise Alias Analysis for Static Detection of Web Application Vulnerabilities / Jovanovic, N., Krügel, C., & Kirda, E. (2006). Precise Alias Analysis for Static Detection of Web Application Vulnerabilities. In Proceedings of the 2006 Programming Languages and Analysis for Security Workshop (pp. 27–36). ACM Inc. http://hdl.handle.net/20.500.12708/51371
  • Impulstechnik / Schildt, G.-H. (2006). Impulstechnik. LyK Informationstechnik. http://hdl.handle.net/20.500.12708/22338

2005

  • Communication Systems for Building Automation and Control / Kastner, W., Neugschwandtner, G., Soucek, S., & Newman, H. M. (2005). Communication Systems for Building Automation and Control. Proceedings of the IEEE, 93(6), 1178–1203. http://hdl.handle.net/20.500.12708/173354
  • A multi-model approach to the detection of web-based attacks / Krügel, C., Vigna, G., & Robertson, W. (2005). A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5), 717–738. http://hdl.handle.net/20.500.12708/173353
  • Mnemonic SOMs: Recognizable Shapes for Self-Organizing Maps / Mayer, R., Merkl, D., & Rauber, A. (2005). Mnemonic SOMs: Recognizable Shapes for Self-Organizing Maps. In Proceedings of the 5th Workshop On Self-Organizing Maps Paris (WSOM 2005) (pp. 131–138). WSOM. http://hdl.handle.net/20.500.12708/51085
  • Analysing and Detecting Malicious Code / Krügel, C. (2005). Analysing and Detecting Malicious Code. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84467
  • Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84466
  • Malicious Code Analysis: Detecting Metamorphic Worms / Krügel, C. (2005). Malicious Code Analysis: Detecting Metamorphic Worms. Technische Universität Berlin, Austria. http://hdl.handle.net/20.500.12708/84465
  • Advanced Techniques for Malicious Code Detection / Krügel, C. (2005). Advanced Techniques for Malicious Code Detection. NATO ASI Workshop, Yerevan, Armenien, Non-EU. http://hdl.handle.net/20.500.12708/84464
  • Identification of Anomalous System Calls for Intrusion Detection / Krügel, C. (2005). Identification of Anomalous System Calls for Intrusion Detection. Informatik Kolloquium, TU Muenchen, Garching, Deutschland, Austria. http://hdl.handle.net/20.500.12708/84463
  • Intrusion Detection und Korrelation / Krügel, C. (2005). Intrusion Detection und Korrelation. FH Hagenberg, Hagenberg, Austria. http://hdl.handle.net/20.500.12708/84462
  • Dekomposition und Enumeration von Flussgraphen / Blieberger, J. (2005). Dekomposition und Enumeration von Flussgraphen. Department Mathematik und Informationstechnologie, Lehrstuhl für Mathematik & Statistik, Leoben, Austria, Austria. http://hdl.handle.net/20.500.12708/84436
  • GlueBar: A Solution Pattern for Integrating Interfaces into Self-Contained Applications / Költringer, T., Kappel, K., & Grechenig, T. (2005). GlueBar: A Solution Pattern for Integrating Interfaces into Self-Contained Applications. In roceedings of the 2005 Conference On Human Factors In Computing Systems (p. 8). Mira Digital Publishing. http://hdl.handle.net/20.500.12708/51197
  • An open approach to EIB/KNX software development / Kastner, W., Neugschwandtner, G., & Kögler, M. (2005). An open approach to EIB/KNX software development. In Proc. 6th IFAC International Conference on Fieldbus Systems and their Applications (FET’05) (pp. 255–262). http://hdl.handle.net/20.500.12708/51196
  • System Architecture for Variable Message Signs / Kulovits, H., Stögerer, C., & Kastner, W. (2005). System Architecture for Variable Message Signs. In Proc. 10th IEEE Intl. Conference on Emerging Technologies and Factory Automation (ETFA’05) (pp. 903–910). http://hdl.handle.net/20.500.12708/51195
  • Programming fieldbus nodes: A RAD approach to customizable applications / Neugschwandtner, G., Kastner, W., & Kögler, M. (2005). Programming fieldbus nodes: A RAD approach to customizable applications. In Proc. 10th IEEE Intl. Conf. on Emerging Technologies and Factory Automation (pp. 1061–1064). http://hdl.handle.net/20.500.12708/51187
  • Rapid Application Development for KNX/EIB BCUs / Kögler, M., Kastner, W., & Neugschwandtner, G. (2005). Rapid Application Development for KNX/EIB BCUs. In Proccedings of Konnex Scientific Conference 2005 (p. 14). http://hdl.handle.net/20.500.12708/51186
  • Open-source foundations for PC based KNX/EIB access and management / Erb, B., Neugschwandtner, G., Kastner, W., & Kögler, M. (2005). Open-source foundations for PC based KNX/EIB access and management. In Proccedings of Konnex Scientific Conference 2005 (p. 12). http://hdl.handle.net/20.500.12708/51185
  • Reverse Engineering of Network Signatures / Mutz, D., Krügel, C., Robertson, W., Vigna, G., & Kemmerer, R. (2005). Reverse Engineering of Network Signatures. In Proceedings of the Information Technology Security Conference. AusCERT, Gold Coast, Australia, Non-EU. http://hdl.handle.net/20.500.12708/51184
  • Polymorphic Worm Detection Using Structural Information of Executables / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID). RAID International Symposium on Recent Advances in Intrusion Detection 2002, USA, Non-EU. Springer-Verlag. http://hdl.handle.net/20.500.12708/51179
  • A Case Study in Efficient Microcontroller Education / Weiss, B., Gridling, G., & Proske, M. (2005). A Case Study in Efficient Microcontroller Education. In Proceedings Workshop on Embedded Systems Education WESE 2005 (pp. 36–43). http://hdl.handle.net/20.500.12708/51127
  • Protecting Users Against Phishing Attacks with AntiPhish / Kirda, E., & Krügel, C. (2005). Protecting Users Against Phishing Attacks with AntiPhish. In Proceedings of the 29th Anual International Computer Software and Applications Conference (pp. 517–524). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51050
  • Automating Mimicry Attacks Using Static Binary Analysis / Krügel, C., Kirda, E., Mutz, D., Robertson, W., & Vigna, G. (2005). Automating Mimicry Attacks Using Static Binary Analysis. In Proceedings of the 14th USENIX Security Symposium (pp. 161–176). USENIX Assoication. http://hdl.handle.net/20.500.12708/51049
  • Bedarfserhebung Pflicht- und Wahllehrveranstaltung Automation Systems Group / Kastner, W. (2005). Bedarfserhebung Pflicht- und Wahllehrveranstaltung Automation Systems Group. http://hdl.handle.net/20.500.12708/33036
  • Antrag UNI-Infrastruktur III, Embedded Systems Research Cluster / Schmid, U., Kopetz, H., Puschner, P., Mayerhofer, L., Steininger, A., Grünbacher, H., Kastner, W., & Krall, A. (2005). Antrag UNI-Infrastruktur III, Embedded Systems Research Cluster. http://hdl.handle.net/20.500.12708/33035
  • EIB: European Installation Bus / Kastner, W., & Neugschwandtner, G. (2005). EIB: European Installation Bus. In The Industrial Communication Technology Handbook (pp. 1–18). CRC Press. http://hdl.handle.net/20.500.12708/25365
  • Internet Security / Krügel, C. (2005). Internet Security. In The Industrial Communication Technology Handbook (pp. 1–14). CRC Press. http://hdl.handle.net/20.500.12708/25364
  • Host-Based Intrusion Detection / Vigna, G., & Krügel, C. (2005). Host-Based Intrusion Detection. In Handbook of Information Security (pp. 1–12). John Wiley and Sons. http://hdl.handle.net/20.500.12708/25363
  • Informatik: Aufgaben und Lösungen / Kastner, W., & Schildt, G.-H. (2005). Informatik: Aufgaben und Lösungen. Springer-Verlag. http://hdl.handle.net/20.500.12708/22291
  • Einführung in die Technische Informatik / Schildt, G.-H., Kahn, D., Krügel, C., & Mörz, C. (2005). Einführung in die Technische Informatik. Springer-Verlag. http://hdl.handle.net/20.500.12708/22288
  • Informatik-Grundlagen / Blieberger, J., Burgstaller, B., & Schildt, G.-H. (2005). Informatik-Grundlagen. Springer-Verlag. http://hdl.handle.net/20.500.12708/22282

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1989

1987

  • Monotonically Labelled Motzkin Trees / Blieberger, J. (1987). Monotonically Labelled Motzkin Trees. Discrete Applied Mathematics, 18, 9–24. http://hdl.handle.net/20.500.12708/174810

 

Note: Due to the rollout of TU Wien’s new publication database, the list below may be slightly outdated. Once the migration is complete, everything will be up to date again.

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

 

  • Christopher Krügel: Wirtschaftskammerpreis
    2005 / Wirtschaftskammern / Austria
  • Christopher Krügel: EIB Scientific Award for Excellent Diploma Thesis
    2000 / Germany
  • Monika di Angelo: Mobilitätsstipendium der TU Wien für hervorragende Dissertation
    1989 / Lions-Förderpreis

Soon, this page will include additional information such as reference projects, conferences, events, and other research activities.

Until then, please visit Automation Systems’ research profile in TISS .