TU Wien Informatics

About

The “Internet of Things” (IoT) is commonly anticipated with numerous applications including but not limited to manufacturing, power grids, buildings, rescue and relief operations, environmental monitoring, and traffic management.

Yet, complex applications in the IoT realm are inconceivable without increased mutual penetration of IT systems and automation technology. The integrated automation equipment is responsible for measuring, open and closed loop control, monitoring, supervision, diagnosis, and optimization. Following the divide and conquer paradigm, the push for distribution of processing functions is unbowed, while the heterogeneity of technologies used in automation remains a major obstacle.

On the other side, demands are made on the field of informatics to design, implement and validate (secure and safe) system architectures that allow for a seamless integration and combination of those different systems.For this reason, our research focus is put on the general theme of distributed automation and “automation systems integration”, moving away from manual integration to machine-aided solutions.

This includes the analysis and enhancement of industrial communication technologies (wired and wireless), guaranteeing specific quality of services for dependable distributed systems with safety and security in mind. Also, the integration of automation systems exploiting information modeling and knowledge representation is addressed, e.g. based on the vision and technologies of the Semantic Web.

Another aspect is the incorporation of research on safe programming languages, which by construction lead to increased safety and reliability of the created artifacts for safety-critical applications. To ensure extensibility and interoperability, additional effort is put in standardization and thus in the research of and collaboration on existing and emerging standards. Results of these research directions aim to enable not only human-to-machine but in particular genuine machine-to-machine communications, with consideration of extensibility, reliability and safety. Incarnations of the research results will thus add to applications of the “Industrial Internet of Things” (IIoT) including but not limited to the domains of cyber-physical production systems (Industry 4.0), smart grids, and intelligent buildings.

Automation Systems is part of the faculty’s Institute of Computer Engineering.

Johann Blieberger
Johann Blieberger J. Blieberger

Associate Professor
Ao.Univ.Prof. DI Dr.

Wolfgang Kastner
Wolfgang Kastner W. Kastner

Head of Institute
Ao.Univ.Prof. DI Dr.

Gerhard-Helge Schildt
Gerhard-Helge Schildt G. Schildt

Emerit. Professor
Em.O.Univ.Prof. DI Dr.

Patrick Heinrich Denzler
Patrick Heinrich Denzler P. Denzler

PreDoc Researcher
DI(FH) /MSc MBA

Monika di Angelo
Monika di Angelo M. di Angelo

PostDoc Researcher
Ass.Prof. DI Mag. Dr.

Dieter Etz
Dieter Etz D. Etz

PreDoc Researcher
DI(FH) /MBA

Thomas Frühwirth
Thomas Frühwirth T. Frühwirth

PreDoc Researcher
DI /BSc

Stefan Gaida
Stefan Gaida S. Gaida

PreDoc Researcher
DI /BSc

Bernhard Heinzl
Bernhard Heinzl B. Heinzl

PreDoc Researcher
DI /BSc

Martin Kronegger
Martin Kronegger M. Kronegger

Senior Lecturer
DI Dr.

Jürgen Pannosch
Jürgen Pannosch J. Pannosch

PreDoc Researcher
DI /BSc

Franz Josef Preyser
Franz Josef Preyser F. Preyser

PreDoc Researcher
DI /BSc

Philipp Raich
Philipp Raich P. Raich

PreDoc Researcher
DI /BSc

Daniel Ramsauer
Daniel Ramsauer D. Ramsauer

PreDoc Researcher
DI /BSc

Gernot Steindl
Gernot Steindl G. Steindl

PreDoc Researcher
DI DI /BSc

Axel Brunnbauer
Axel Brunnbauer A. Brunnbauer

Project Administration
BSc

Firat Berk Cakar
Firat Berk Cakar F. Cakar

Project Administration

Felix König
Felix König F. König

Project Administration
BSc

Thomas Pintaric
Thomas Pintaric T. Pintaric

Project Administration
BSc

Thomas Preindl
Thomas Preindl T. Preindl

Project Administration
BSc

2018W

2019S

 

2019

2018

2017

2016

2015

2014

2013

2012

2011

  • KNX / W. Kastner, F. Praus, G. Neugschwandtner, W. Granzer / in: "Industrial Electronics Handbook, volume 2: Industrial Communication Systems", CRC Press, 2011, ISBN: 978-1439802892
  • Building and Home Automation / W. Kastner, S. Soucek, C. Reinisch, A. Klapproth / in: "Industrial Electronics Handbook, volume 2: Industrial Communication Systems", CRC Press, 2011, ISBN: 978-1439802892
  • Towards normalized connection elements in industrial automation / D. Van Der Linden, H. Mannaert, W. Kastner, H. Peremans / Advances in Internet Technology, 4 (2011), 3&4; 133 - 146
  • ThinkHome Energy Efficiency in Future Smart Homes / C. Reinisch, M. J. Kofler, F. Iglesias Vazquez, W. Kastner / EURASIP Journal on Embedded Systems, 2011 (2011), 18
  • The Evolution of Factory and Building Automation / T. Sauter, S. Soucek, W. Kastner, D. Dietrich / IEEE Transactions on Industrial Electronics, 5 (2011), 3; 35 - 48
  • Detecting Environment-Sensitive Malware / M. Lindorfer, C. Kolbitsch, P. Milani Comparetti / in: "Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011)", Springer, 2011, ISBN: 978-3-642-23643-3
  • Sequence-Based Bot Detection in Massive Multiplayer Online Games / Ch. Platzer / Talk: 8th International Conference on Information, Communications and Signal Processing, Singapur; 2011-12-13 - 2011-12-16; in: "Proceedings of the 8th International Conference on Information, Communications and Signal Processing", IEEE, (2011), ISBN: 978-1-4577-0030-9; Paper ID 433, 5 pages
  • An OPC UA interface for an evolvable ISA88 control module / D. Van Der Linden, H. Mannaert, W. Kastner, V. Vanderputten, H. Peremans, J. Verelst / Talk: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), Toulouse, France; 2011-09-05 - 2011-09-09; in: "IEEE International Conference on Emerging Technologies and Factory Automation", (2011), 9 pages
  • Procedure-based availability SLAs for Traffic Management Systems / C. Stögerer, T. Novak, W. Kastner, L. Krammer / Talk: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), Toulouse, France; 2011-09-05 - 2011-09-09; in: "IEEE International Conference on Emerging Technologies", (2011), 8 pages
  • Impact of user habits in smart home control / F. Iglesias Vazquez, W. Kastner, C. Reinisch / Talk: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), Toulouse, France; 2011-09-05 - 2011-09-09; in: "16th IEEE International Conference on Emerging Technologies and Factory Automation", (2011), 8 pages
  • BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients / M. Szydlowski, B. Zhao, E. Kirda, Ch. Krügel / Talk: 20th International Conference on Computer Communication Networks (ICCCN 2011), Maui, HI; 2011-07-31 - 2011-08-04; in: "Proceedings of the 20th International Conference on Computer Communication Networks (ICCCN 2011)", IEEE, (2011), 6 pages
  • Procedural Modelling of Traditional Balinese Settlements / P. Ferschin, M. Di Angelo / Talk: CHNT 2011 16th International Conference on Cultural Heritage and New Technologies, Wien, Österreich; 2011-11-14 - 2011-11-16; in: "Proc. 16th International Conference on Cultural Heritage and New Technologies", W. Börner et al. (ed.); (2011), 304 - 313
  • ForeCast - Skimming off the Malware Cream / M. Neugschwandtner, P. Milani Comparetti, G. Jacob, C. Krügel / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, Florida; 2011-12-05 - 2011-12-09; in: "Proceedings of the 27th Annual Computer Security Applications Conference", ACM, New York (2011), ISBN: 978-1-4503-0672-0
  • Energy Efficient Production - A Holistic Modeling Approach / I. Leobner, K. Ponweiser, G. Neugschwandtner, W. Kastner / Talk: World Congress on Sustainable Technologies (WCST-2011), London, England; 2011-11-07 - 2011-11-11; in: "World Congress on Sustainable Technologies (WCST-2011)", (2011), 62 - 67
  • Integration Aspects of Wireless Industrial Automation / A. Nagy, F. Ring, P. Loschmidt, A. Mahmood, G. Gaderer, W. Kastner / Talk: 37th Annual Conference on IEEE Industrial Electronics Society (IECON'11), Melbourne, Australia; 2011-11-07 - 2011-11-11; in: "37th Annual Conference on IEEE Industrial Electronics Society", (2011), 2998 - 3003
  • Informatics Classes in Austria´s Lower Secondary Schools - a Survey / P. Smejkal, M. Di Angelo / Talk: ISSEP2011, Bratislava; 2011-10-26 - 2011-10-29; in: "Informatics in Schools: Situation, Evolution and Perspectives", D. Bezakova, I. Kalas (ed.); (2011), ISBN: 978-80-89186-90-7; 37
  • Unterrichtsveränderungen in Notebook-Klassen / G. Kurz, M. Di Angelo / Talk: INFOS 2011, Münster; 2011-09-12 - 2011-09-15; in: "Informatik mit Kopf, Herz und Hand - Praxisbeiträge zur INFOS 2011", M. Weigend, F. Otte, M. Thomas (ed.); ZfL-Verlag Münster, (2011), ISBN: 978-3-86877-009-4; 111 - 120
  • Toward a Management Catalog of Security Measures against Social Engineering Attacks / A. Ehringfeld, L. Naber, K. Kappel, G. Fischer, T. Grechenig / Talk: The International Conference on Engineering and Information Management (ICEIM 2011), Chengdu, China; 2011-04-15 - 2011-04-18; in: "Proceedings of the International Conference on Engineering and Information Management", (2011), ISBN: 978-1-4244-9770-6; 1 - 5
  • Learning from a Distributed Denial of Service Attack against a Legally Binding Electronic Election: Scenario, Operational Experience, Legal Consequences / A. Ehringfeld, L. Naber, K. Kappel, G. Fischer, E. Pichl, T. Grechenig / Talk: The Second international conference on Electronic government and the information systems perspective (EGOVIS'11), Toulouse, France; 2011-08-29 - 2011-09-02; in: "Proceedings of the Second international conference on Electronic government and the information systems perspective (EGOVIS'11)", K. Andersen, E. Francesconi, Å. Grönlund, T. van Engers (ed.); Springer-Verlag, Berlin, Heidelberg (2011), ISBN: 978-3-642-22960-2; 56 - 67
  • The Effects of Personal Displays and Transfer Techniques on Collaboration Strategies in Multi-touch Based Multi-display Environments / S. Bachl, M. Tomitsch, K. Kappel, T. Grechenig / Talk: Human-Computer Interaction - INTERACT 2011, Lissabon, PT; 2011-09-05 - 2011-09-09; in: "Proceedings of 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT ´11)", P. Campos et al. (ed.); Springer Berlin / Heidelberg, Part III (2011), 373 - 390
  • An Intelligent Knowledge Representation of Smart Home Energy Parameters / M. J. Kofler, C. Reinisch, W. Kastner / Talk: World Renewable Energy Congress (WREC '11), Linköping, Sweden; 2011-05-08 - 2011-05-13; in: "World Renewable Energy Congress", (2011), ISBN: 978-91-7393-070-3; 921 - 928
  • Accessing KNX networks via BACnet/WS / W. Kastner, S. Szucsich / Talk: 21st IEEE International Symposium on Industrial Electronics (ISIE 2011), Gdansk, Poland; 2011-06-27 - 2011-06-30; in: "Proceedings ISIE 2011", IEEE, (2011), ISBN: 978-1-4244-9312-8; 1315 - 1320
  • Privacy enabled Web service access control using SAML and XACML for home automation gateways / M. Jung, G. Kienesberger, W. Granzer, M. Unger, W. Kastner / Talk: 6th International Conference for Internet Technology and Secured Transactions, Abu Dhabi; 2011-12-11 - 2011-12-14; in: "Proceedings of the 6th International Conference for Internet Technology and Secured Transactions", IEEE, (2011), 584 - 591
  • A Knowledge Representation for Energy Parameters in Sustainable Smart Homes / M. J. Kofler, C. Reinisch, W. Kastner / Talk: Third International Conference on Applied Energy (ICAE '11), Perugia, Italy; 2011-05-16 - 2011-05-18; in: "Third International Conference on Applied Energy (ICAE '11)", (2011), 1065 - 1078
  • Electricity Load Management in Smart Home Control / F. Iglesias Vazquez, W. Kastner, S. Gaceo, C. Reinisch / Talk: 12th Conference of International Building Performance Simulation Association, Sydney, Australia; 2011-11-14 - 2011-11-16; in: "12th Conference of 12th Conference of International Building Performance Simulation Association", (2011), 957 - 964
  • The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code / C. Kolbitsch, E. Kirda, C. Krügel / Talk: ACM Conference on Computer and Communications Security (CCS), Chicago; 2011-10-17 - 2011-10-21; in: "Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)", ACM, (2011)
  • Agent based control in the Smart Home / C. Reinisch, W. Kastner / Talk: 37th Annual Conference on IEEE Industrial Electronics Society (IECON'11), Melbourne, Australia; 2011-11-07 - 2011-11-10; in: "37th Annual Conference of the IEEE Industrial Electronics Society", (2011), 334 - 339
  • Behavioral Profiles for Building Energy Performance Using eXclusive SOM / F. Iglesias Vazquez, S. Gaceo, W. Kastner, J. Morales / Talk: Engineering Applications of Neural Networks, Corfu, Greece; 2011-09-15 - 2011-09-18; in: "IFIP Advances in Information and Communication Technology", (2011), ISBN: 978-3-642-23956-4; 31 - 40
  • Clustering methods for occupancy prediction in smart home control / F. Iglesias Vazquez, W. Kastner / Talk: 21st IEEE International Symposium on Industrial Electronics (ISIE 2011), Gdansk, Poland; 2011-06-27 - 2011-06-30; in: "Proceedings ISIE 2011", IEEE, (2011), ISBN: 978-1-4244-9312-8; 1321 - 1328
  • A new Approach for Robot Motion Planning using Rapidly-exploring Randomized Trees / L. Krammer, W. Granzer, W. Kastner / Talk: IEEE 9th International Conference on. Industrial Informatics (INDIN'2011), Caparica, Lisbon, Portugal; 2011-07-26 - 2011-07-29; in: "Proceedings IEEE Conference on Industrial Informatics (INDIN '11)", (2011), 263 - 268
  • Integrating CCTV Systems into BACnet / C. Mauser, W. Granzer, W. Kastner / Talk: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), Bilbao, Spain; 2011-09-05 - 2011-09-09; in: "Proceedings IEEE Conference on Emerging Technologies and Factory Automation (ETFA '11)", (2011), 1 - 4
  • Interoperability at the Management Level of Building Automation Systems: A Case Study for BACnet and OPC UA / A. Fernbach, W. Granzer, W. Kastner / Talk: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), Toulouse, France; 2011-09-05 - 2011-09-09; in: "Proceedings IEEE Conference on Emerging Technologies and Factory Automation (ETFA '11)", (2011), 1 - 8
  • Social Snapshots: Digital Forensics for Online Social Networks / M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl / Talk: Annual Computer Security Applications Conference (ACSAC), Orlando, FL; 2011-12-05 - 2011-12-09; in: "Proceedings of 27th Annual Computer Security Applications Conference (ACSAC)", (2011), 113 - 122
  • Applying availability SLAs to Traffic Management Systems / C. Stögerer, I. Brandic, V. Emeakaroha, W. Kastner, T. Novak / Talk: Intelligent Transportation Systems (ITSC), 2011 14th International IEEE Conference, Washington, DC, USA; 2011-10-05 - 2011-10-07; in: "Intelligent Transportation Systems (ITSC), 2011 14th International IEEE Conference Proceedings", IEEE Computer Society, (2011), ISBN: 978-1-4577-2198-4; 1501 - 1506

2010

  • Security in building automation systems / W. Granzer, F. Praus, W. Kastner / IEEE Transactions on Industrial Electronics, 57 (2010), 11; 3622 - 3630
  • Automated Extraction of Proprietary Gadgets from Malware Binaries / C. Kolbitsch, T. Holz, C. Krügel, E. Kirda / in: "Proceedings of the 2010 IEEE Symposium on Security and Privacy", issued by: IEEE; IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, 29 - 44
  • A Practical Attack to De-Anonymize Social Network Users / G. Wondracek, T. Holz, E. Kirda, C. Krügel / in: "Proceedings of the 2010 IEEE Symposium on Security and Privacy", issued by: IEEE; IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, 223 - 238
  • Identifying Dormant Functionality in Malware Programs / P. Milani Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Krügel, S. Zanero / in: "Proceedings of the 2010 IEEE Symposium on Security and Privacy", issued by: IEEE; IEEE Computer Society, Oakland, 2010, ISBN: 978-0-7695-4035-1, 61 - 76
  • Abusing Social Networks for Automated User Profiling / M. Balduzzi, Ch. Platzer, T. Holz, E. Kirda, D. Balzarotti, Ch. Krügel / in: "Recent Advances in Intrusion Detection (RAID 2010)", Springer, 2010, ISBN: 978-3-642-15511-6, 20 pages
  • Covertly Probing Underground Economy Marketplaces / H. Fallmann, G. Wondracek, Ch. Platzer / in: "Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010)", issued by: IEEE; IEEE Computer Society, 2010, 10 pages
  • Is the Internet for Porn? An Insight Into the Online Adult Industry / G. Wondracek, T. Holz, Ch. Platzer, E. Kirda, C. Krügel / in: "The Ninth Workshop on the Economics of Information Security (WEIS 2010)", ACM Press, 2010, 14 pages
  • Extending Mondrian Memory Protection / C. Kolbitsch, C. Krügel, E. Kirda / in: "IST-091 Information Assurance and Cyber Defence", issued by: NATO; NATO Research and Technology Organization (NATO RTO), 2010, ISBN: 978-92-837-0115-6, 18 pages
  • AdaStreams: A Type-based Programming Extension for Stream-Parallelism with Ada 2005 / J. Hong, K. Hong, B. Burgstaller, J. Blieberger / Talk: Reliable Software Technologies - Ada-Europe, Valencia; 2010-06-14 - 2010-06-18; in: "Reliable Software Technologies - Ada Europe 2010", Springer-Verlag, LNCS 6106 (2010), ISBN: 978-3-642-13549-1; 208 - 221
  • Integrating process communication in building information models with IFC and LON / B. Malinowsky, W. Kastner / Talk: 8th IEEE International Workshop on Factory Communication Systems, Nancy; 2010-05-18 - 2010-05-21; in: "8th IEEE International Workshop on Factory Communication Systems", (2010), 221 - 230
  • Challenges for Designing the User Experience of Multi-touch Interfaces / S. Bachl, M. Tomitsch, C. Wimmer, T. Grechenig / Talk: Engineering Patterns for Multi-Touch Interfaces 2010, Berlin; 2010-06-20; in: "Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems", ACM, New York, NY, USA (2010), ISBN: 978-1-4503-0083-4
  • The Use of E-Voting in the Austrian Federation of Students Elections 2009 / R. Krimmer, A. Ehringfeld, M. Traxl / Talk: 4th International Conference on Electronic Voting 2010 (EVOTE 2010), Bregenz, Austria; 2010-07-21 - 2010-07-24; in: "Electronic Voting", R. Krimmer, R. Grimm (ed.); Gi, Lni, 167 (2010), ISBN: 978-3-88579-261-1; 33 - 44
  • Analysis of Recommendation Rec(2004)11 Based on the Experiences of Specific Attacks Against the First Legally Binding Implementation of E-Voting in Austria / A. Ehringfeld, L. Naber, T. Grechenig, R. Krimmer, M. Traxl, G. Fischer / Talk: 4th International Conference on Electronic Voting 2010 (EVOTE 2010), Bregenz, Austria; 2010-07-21 - 2010-07-24; in: "Electronic Voting", R. Krimmer, R. Grimm (ed.); Gi, Lni, 167 (2010), ISBN: 978-3-88579-261-1; 225 - 237
  • A Knowledge Base for Energy-Efficient Smart Homes / M. J. Kofler, W. Kastner / Talk: IEEE International Energy Conference & Exhibition, Manama, Bahrain; 2010-12-18 - 2010-12-22; in: "Proceedings IEEE International Energy Conference & Exhibition", (2010)
  • Open Source Approaches to Integrate KNX into Media Centers / F. Praus, C. Reinisch, P. Leitner, W. Kastner / Talk: KNX Scientific Conference 2010, Pamplona, Navarra, Spain; 2010-11-04 - 2010-11-05; in: "Proceedings KNX Scientific Conference 2010", (2010)
  • Security Analysis of Open Building Automation Systems / W. Granzer, W. Kastner / Talk: International Conference on Computer Safety, Reliability and Security (SAFECOMP '10), Wien; 2010-09-14 - 2010-09-17; in: "Proceedings 29th International Conference on Computer Safety, Reliability and Security (SAFECOMP '10)", Springer, (2010), 303 - 316
  • ThinkHome: A Smart Home as Digital Ecosystem / C. Reinisch, M. J. Kofler, W. Kastner / Talk: 4th IEEE International Conference on Digital Ecosystems and Technologies, Dubai; 2010-04-13 - 2010-04-16; in: "4th IEEE International Conference on Digital Ecosystems and Technologies", (2010), 256 - 261
  • Secure Control Applications in Building Automation using Domain Knowledge / F. Praus, W. Kastner / Talk: IEEE International Conference on Industrial Informatics (INDIN 2010), Osaka, Japan; 2010-07-13 - 2010-07-16; in: "Proceedings 8th IEEE International Conference on Industrial Informatics (INDIN 2010)", (2010), 52 - 57
  • Using AI to Realize Energy Efficient Yet Comfortable Smart Homes / W. Kastner, M. J. Kofler, C. Reinisch / Talk: 8th IEEE International Workshop on Factory Communication Systems, Nancy; 2010-05-18 - 2010-05-21; in: "8th IEEE International Workshop on Factory Communication Systems", (2010), 169 - 172
  • Usage Profiles for Sustainable Buildings / F. Iglesias Vazquez, W. Kastner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Bilbao, Spain; 2010-09-13 - 2010-09-16; in: "15th IEEE Conference on Emerging Techonologies and Factory Automation", (2010), 1 - 8
  • Communication Services for Secure Building Automation Networks / W. Granzer, W. Kastner / Talk: IEEE International Symposium on Industrial Electronics (ISIE '10), Bari, Italy; 2010-07-04 - 2010-07-07; in: "Proceedings IEEE International Symposium on Industrial Electronics (ISIE '10)", (2010), 3380 - 3385
  • Mapping KNX to BACnet/Web Services / S. Szucsich, W. Kastner / Talk: KNX Scientific Conference 2010, Pamplona, Navarra, Spain; 2010-11-04 - 2010-11-05; in: "Proceedings KNX Scientific Conference 2010", (2010)
  • Approaches for increasing availability of component-based traffic management software / C. Stögerer, W. Kastner / Talk: International IEEE Conference on Intelligent Transportation Systems, Madeira; 2010-09-19 - 2010-09-22; in: "13th IEEE Conference on Intelligent Transportation Systems", (2010), 1608 - 1613
  • Towards the life-cycle of VMS configurations / C. Stögerer, T. Novak, W. Kastner / Talk: International IEEE Conference on Intelligent Transportation Systems, Madeira; 2010-09-19 - 2010-09-22; in: "13th IEEE Conference on Intelligent Transportation Systems", (2010), 783 - 788
  • Distributed monitoring for component-based traffic management systems gement software / C. Stögerer, W. Kastner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Bilbao, Spain; 2010-09-13 - 2010-09-16; in: "15th IEEE Conference on Emerging Techonologies and Factory Automation", (2010), 1 - 4
  • KNX and OPC UA / W. Granzer, W. Kastner, P. Furtak / Talk: KNX Scientific Conference 2010, Pamplona, Navarra, Spain; 2010-11-04 - 2010-11-05; in: "Proceedings KNX Scientific Conference 2010", (2010)
  • A Solution for the Automated Detection of Clickjacking Attacks / M. Balduzzi, M. Egele, D. Balzarotti, E. Kirda, C. Krügel / Talk: ACM Symposium on Information computer and Communication Security (AsiaCCS), Bejing, China; 2010-04-13 - 2010-04-16; in: "Proceedings of the 5th ACM Symposium on Information computer and Communication Security", ACM, 5 (2010), ISBN: 978-1-60558-936-7; 135 - 144
  • Informatikunterricht in der Wiener AHS-Unterstufe / P. Smejkal, M. Di Angelo / Talk: 25 Jahre Schulinformatik, Melk; 2010-09-27 - 2010-09-29; in: "25 Jahre Schulinformatik", G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7; 326 - 331
  • Von der Kamera ins Web / R. Planinc, E. Wetzinger, M. Di Angelo / Talk: 25 Jahre Schulinformatik, Melk; 2010-09-27 - 2010-09-29; in: "25 Jahre Schulinformatik", G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7; 285 - 290
  • Facebook im Unterricht / R. Planinc, M. Di Angelo / Talk: 25 Jahre Schulinformatik, Melk; 2010-09-27 - 2010-09-29; in: "25 Jahre Schulinformatik", G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, 271//Wien (2010), ISBN: 978-3-85403-271-7; 296 - 304
  • Experimentieren mit digitalem Ton / M. Eisenbarth, M. Di Angelo / Talk: 25 Jahre Schulinformatik, Melk; 2010-09-27 - 2010-09-29; in: "25 Jahre Schulinformatik", G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7; 291 - 295
  • Begabtenförderung mit LEGO Mindstorms / M. Di Angelo, K. Berger, A. Schönbauer / Talk: 25 Jahre Schulinformatik, Melk; 2010-09-27 - 2010-09-29; in: "25 Jahre Schulinformatik", G. Brandhofer, G. Futschek, P. Micheuz, A. Reiter, K. Schoder (ed.); OCG, Wien (2010), ISBN: 978-3-85403-271-7; 275 - 279
  • Exploring the potential of game engines for real-time light simulation / P. Ferschin, M. Di Angelo, G. Suter / Talk: BAUSIM 2010, Vienna; 2010-09-22 - 2010-09-24; in: "BAUSIM 2010", A. Mahdavi, B. Martens (ed.); (2010), ISBN: 978-3-85437-317-9; 499 - 504
  • Availability Analysis for Railway Infrastructure based on Graph Theory / A. Schöbel, J. Blieberger / Talk: EURO - Zel 2010, Zilina; 2010-05-26 - 2010-05-27; in: "Revitalisation of Economy - New Challenge for European Railways", EDIS Zilina, (2010), ISBN: 978-80-554-0198-0; 141 - 148

2009

2008

  • Security for KNXnet/IP / D. Lechner, W. Granzer, W. Kastner / Talk: Konnex Scientific Conference, St. Katelijne-Waver, Belgien; 2008-11-20 - 2008-11-21; in: "Proc. of Konnex Scientific Conference 2008", (2008), 17 pages
  • Secure Vertical Integration for Building Automation Networks / C. Reinisch, W. Granzer, W. Kastner / Talk: IEEE International Workshop on Factory Communication Systems, Dresden, Deutschland; 2008-05-21 - 2008-05-23; in: "Proceedings of 7th IEEE International Workshop on Factory Communication Systems (WFCS '08)", (2008), ISBN: 978-1-4244-2349-1; 239 - 242
  • Accessible Real-World Tagging through Audio-Tactile Location Markers / M. Tomitsch, R. Schlögl, T. Grechenig, C. Wimmer, T. Költringer / Talk: Nordic conference on Human-computer interaction (NordiCHI'08), Lund, Sweden; 2008-10-20 - 2008-10-22; in: "Proceedings of the Nordic conference on Human-computer interaction", (2008), ISBN: 978-1-59593-704-9
  • Key Set Management in Networked Building Automation Systems using Multiple Key Servers / W. Granzer, C. Reinisch, W. Kastner / Talk: IEEE International Workshop on Factory Communication Systems, Dresden, Deutschland; 2008-05-21 - 2008-05-23; in: "Proc. 7th IEEE International Workshop on Factory Communication Systems (WFCS '08)", (2008), ISBN: 978-1-4244-2349-1; 205 - 214
  • Denial-of-Service in Automation Systems / W. Granzer, C. Reinisch, W. Kastner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation, Hamburg, Deutschland; 2008-09-15 - 2008-09-18; in: "Proc. of 13th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '08)", (2008), 468 - 471
  • Secure and customizable software applications in embedded networks / F. Praus, T. Flanitzer, W. Kastner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation, Hamburg, Deutschland; 2008-09-15 - 2008-09-18; in: "Proc. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2008)", (2008), 1473 - 1480
  • Extending the Watchdog Pattern for Multi-threaded Windows based Traffic Management and Control Applications / C. Stögerer, W. Kastner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation, Hamburg, Deutschland; 2008-09-15 - 2008-09-18; in: "Proc. of 13th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '08)", (2008), 854 - 860
  • Integration of Heterogeneous Building Automation Systems using Ontologies / C. Reinisch, W. Granzer, F. Praus, W. Kastner / Talk: Annual Conference of the IEEE Industrial Electronics Society, Orlando, FL, USA; 2008-11-10 - 2008-11-13; in: "Proceedings of 34th Annual Conference of the IEEE Industrial Electronics Society (IECON '08)", (2008), ISBN: 978-1-4244-1766-7; 2736 - 2741
  • Static Partial-Order Reduction of Concurrent Systems in Polynomial Time / R. Mittermayr, J. Blieberger / Talk: 3rd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISOLA'08), Griechenland; 2008-10-13 - 2008-10-15; in: "Leveraging Applications of Formal Methods, Verification and Validation", Springer Berlin Heidelberg, 17 (2008), ISBN: 978-3-540-88478-1; 619 - 633
  • A Framework for CFG-based Static Program Analysis of Ada Programs / R. Fechete, G. Kienesberger, J. Blieberger / Talk: Reliable Software Technologies - Ada-Europe, Venice, Italy; 2008-06-16 - 2008-06-20; in: "Ada-Europe'2008 International Conference on Reliable Software Technologies", Springer - LNCS, 5026 (2008), ISBN: 978-3-540-68621-7; 130 - 143
  • Gateway-free Integration of BACnet and KNX using Multi-Protocol Devices / W. Granzer, W. Kastner, C. Reinisch / Talk: Proceedings IEEE INDIN 2008, 6th IEEE International Conference on Industrial Informatics, Daejon Korea; 2008-07-13 - 2008-07-16; in: "Proc. 6th IEEE International Conference on Industrial Informatics", IEEE, (2008), ISBN: 978-1-4244-2171-8; 973 - 978

2007

  • Extending .NET Security to Unmanaged Code / P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna / International Journal of Information Security, 6 (2007), 6; 417 - 428
  • Understanding Spatial Mobile Service Discovery using Pointing and Touching. / T. Költringer, M. Tomitsch, K. Kappel, M. Zrno, T. Grechenig / Poster: CHI 2007 Workshop on "Mobile Spatial Interaction", San Jose, California, USA; 2007-04-28 - 2007-05-03; in: "ACM CHI 2007 Workshop on Mobile Spatial Interaction", (2007), 4 pages
  • Designing Tangible Tabletop Interfaces for Patients in Rehabilitation / M. Leitner, M. Tomitsch, T. Költringer, K. Kappel, T. Grechenig / Talk: Conference & Workshop on Assistive Technologies for People with Vision & Hearing Impairments: Assistive Technology for All Ages, CVHI 2007, Granada, Spain; 2007-08-28 - 2007-08-31; in: "Proceedings of the Conference and Workshop on Assistive Technology for People with Vision and Hearing Impairments", M. Hersh (ed.); (2007), 7 pages
  • Plug and Play in Distributed Home and in Building Automation Systems: An Introduction / G. Neugschwandtner / Talk: Konnex Scientific Conference, Duisburg; 2007-11-15 - 2007-11-16; in: "Proceedings Konnex Scientific Conference", (2007), 10 pages
  • Calimero: Next Generation / B. Malinowsky, G. Neugschwandtner, W. Kastner / Talk: Konnex Scientific Conference, Dusiburg; 2007-11-15 - 2007-11-16; in: "Proceedings Konnex Scientific Conference", (2007), 10 pages
  • Considering a technical realization of a neuro-psychoanalytical model of the mind / D. Dietrich, G. Fodor, W. Kastner, M. Ulieru / Talk: 1st International Engineering & Neuro-Psychoanalysis Forum (ENF 2007), Wien; 2007-07-23; in: "Proceedings of ENF 2007 - 1st International Engineering & Neuro-Psychoanalysis Forum", (2007), 13 - 20
  • Building Anti-Phishing Browser Plug-Ins: An Experience Report / T. Raffetseder, E. Kirda, Ch. Krügel / Talk: International Workshop on Software Engineering for Secure Systems (SESS), Minneapolis, USA; 2007-05-19; in: "3rd International Workshop on Software Engineering for Secure Systems (SESS)", IEEE Computer Society, (2007), ISBN: 978-0-7695-2830-4; 1 - 7
  • Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters / C. Karlberger, G. Bayler, Ch. Krügel, E. Kirda / Talk: Usenix Workshop on Offensive Technologies (WOOT), Boston, USA; 2007-08-06; in: "Usenix Workshop on Offensive Technologies (WOOT)", (2007), 1 - 7
  • A Simulation Framework for Fault-Tolerant Clock Synchronization in Industrial Automation Networks / F. Praus, W. Granzer, G. Georg, T. Sauter / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Patras; 2007-09-25 - 2007-09-27; in: "Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '07)", (2007), 1465 - 1472
  • Mining Specifications of Malicious Behavior / M. Christodorescu, S. Jha, Ch. Krügel / Talk: European Software Engineering Conference (ESEC), Dubrovnik, Kroatien; 2007-09-03; in: "Proceedings of the European Software Engineering Conference (ESEC)", (2007), 1 - 10
  • Dynamic Spyware Analysis / M. Egele, Ch. Krügel, E. Kirda, H. Yin, D. Song / Talk: Usenix Annual Technical Conference (ATC), Santa Clara, USA; 2007-06-17; in: "Proceedings of the Usenix Annual Technical Conference", (2007), 1 - 14
  • Improving Signature Testing Through Dynamic Data Flow Analysis / D. Balzarotti, W. Robertson, Ch. Krügel, G. Vigna / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 22 - 32
  • Exploring Multiple Execution Paths for Malware Analysis / A. Moser, Ch. Krügel, E. Kirda / Talk: IEEE Symposium on Security and Privacy, Oakland, USA; 2007-05-20; in: "Proceedings of the IEEE Symposium on Security and Privacy", (2007), 1 - 15
  • Detecting System Emulators / T. Raffetseder, Ch. Krügel, E. Kirda / Talk: Information Security Conference (ISC), Valparaiso, Chile; 2007-10-09; in: "Proceedings of the Information Security Conference (ISC )", (2007), 1 - 18
  • Secure Input for Web Applications / M. Szydlowski, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 1 - 11
  • Limits of Static Analysis for Malware Detection / A. Moser, Ch. Krügel, E. Kirda / Talk: Annual Computer Security Applications Conference (ACSAC), Miami, USA; 2007-12-10; in: "Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)", (2007), 12 - 21
  • Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis / H. Yin, D. Song, M. Egele, Ch. Krügel, E. Kirda / Talk: ACM Conference on Computer and Communications Security (CCS), Washington, USA; 2007-10-29; in: "Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)", (2007), 1 - 12
  • A Layout-Similarity-Based Approach for Detecting Phishing Pages / A. Rosiello, Ch. Krügel, E. Kirda, F. Ferrandi / Talk: IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), Nizza, Frankreich; 2007-09-17; in: "Proceedings of the IEEE International Conference on Security and Privacy in Communication Networks (SecureComm)", (2007), 1 - 10
  • On the Effectiveness of Techniques to Detect Phishing Sites / C. Ludl, S. McAllister, E. Kirda, Ch. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Luzern, Schweiz; 2007-07-12; in: "Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment Conference (DIMVA)", (2007), 1 - 20
  • Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis / Ph. Vogt, F. Nentwich, N. Jovanovic, Ch. Krügel, E. Kirda, G. Vigna / Talk: Network and Distributed System Security Symposium (NDSS), San Diego, USA; 2007-02-27; in: "Proceedings of the Network and Distributed System Security Symposium (NDSS)", (2007), 1 - 12
  • TwoStick: Writing with a Game Controller / T. Költringer, P. Isokoski, T. Grechenig / Talk: Graphics Interface 2007, Montreal, Canada; 2007-05-28 - 2007-05-30; in: "Proceedings of Graphics Interface 2007 (GI 2007)", Ch. Healey, E. Lank (ed.); ACM International Conference Proceeding Series, 234 (2007), ISBN: 0713-5424, ISSN: 978-1-56881-337-0; 103 - 110
  • Game Controller Text Entry with Alphabetic and Multi-Tap Selection Keyboards / T. Költringer, M. Ngo Van, T. Grechenig / Talk: ACM Conference on Human Factors in Computing Systems (CHI 2007), San Jose, California, USA; 2007-04-28 - 2007-05-03; in: "Extended Abstracts of the ACM Conference on Human Factors in Computing Systems", ACM Press, (2007), ISBN: 978-1-59593-642-4; 2513 - 2518
  • Multicast Communication in Wireless Home and Building Automation: ZigBee and DCMP / C. Reinisch, W. Kastner, G. Neugschwandtner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Patras; 2007-09-25 - 2007-09-27; in: "Proceedings of 12th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '07)", (2007), 1380 - 1383
  • Wireless Technologies in Home and Building Automation / C. Reinisch, W. Kastner, G. Neugschwandtner, W. Granzer / Talk: IEEE International Conference on Industrial Informatics - INDIN 2007, Wien; 2007-07-23 - 2007-07-27; in: "Proceedings 5th IEEE International Conference on Industrial Informatics", (2007), 93 - 98
  • Web Services in Building Automation: Mapping KNX to oBIX / M. Neugschwandtner, G. Neugschwandtner, W. Kastner / Talk: IEEE International Conference on Industrial Informatics - INDIN 2007, Wien; 2007-07-23 - 2007-07-27; in: "Proceedings 5th IEEE International Conference on Industrial Informatics", (2007), 87 - 92
  • Synchronous Consensus with Mortal Byzantines / J. Widder, G. Gridling, B. Weiss, J. Blanquart / Talk: IEEE Conference on Dependable Systems and Networks (DSN), Edinburgh; 2007-06-25 - 2007-06-28; in: "Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks", (2007)
  • A new Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees / B. Scholz, J. Blieberger / Talk: International Conference on Compiler Construction, Braga, Portugal; 2007-03-26 - 2007-03-30; in: "Proc. ETAPS'07", LNCS, Springer-Verlag, 4420 (2007), ISBN: 978-3-540-71228-2; 202 - 217

2006

  • Average Case Analysis of DJ Graphs / J. Blieberger / Journal of Discrete Algorithms, 4 (2006), 649 - 675
  • Anomalous System Call Detection / D. Mutz, F. Valeur, Ch. Krügel, G. Vigna / ACM Transactions on Information and System Security, 9 (2006), 1
  • Protecting Users Against Phishing Attacks with AntiPhish / E. Kirda, Ch. Krügel / Computer Journal, 49 (2006), 5
  • Dynamic Analysis of Malicious Code / U. Bayer, A. Moser, Ch. Krügel, E. Kirda / Journal in Computer Virology, 2 (2006), 1
  • Towards Plug and Play in Home and Building Automation Networks / G. Neugschwandtner / Talk: IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Praha, Czech Republic; 2006-09-20 - 2006-09-22; in: "11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'06)", (2006), ISBN: 1-4244-0681-1; Paper ID CF-002852, 4 pages
  • Preventing Cross Site Request Forgery Attacks / N. Jovanovic, E. Kirda, Ch. Krügel / Talk: SecureComm 2006, Baltimore, MD, USA; 2006-08-28 - 2006-09-01; in: "2nd International Conference on Security and Privacy in Communication Networks & the Workshops", IEEE, (2006)
  • Embedded Systems Exams With True/False Questions: A Case Study / G. Gridling, B. Weiss, W. Elmenreich, C. Trödhandl / Talk: Second IASTED International Conference on Education and Technology, Calgary; 2006-07-17 - 2006-07-19; in: "Proceedings of the Second International Conference on Education and Technology", (2006), 168 - 172
  • Symbolic Analysis of Imperative Programming Languages / B. Burgstaller, B. Scholz, J. Blieberger / Talk: 7th Joint Modular Languages Conference (JMLC 2006), Oxford, England; 2006-09-13 - 2006-09-15; in: "Proc. JMLC 2006", Springer-Verlag, LNCS 4228 (2006), ISBN: 978-3-540-40927-4; 172 - 194
  • Static Detection of Access Anomalies in Ada95 / B. Burgstaller, J. Blieberger, R. Mittermayr / Talk: Reliable Software Technologies - Ada-Europe, Porto, Portugal; 2006-06-05 - 2006-06-09; in: "Proc. 11th International Conference on Reliable Software Technologies - Ada-Europe 2006", Springer-Verlag, (2006), ISBN: 3-540-34663-5; 40 - 55
  • Guidelines for Designing Usable DVD Menus / T. Költringer, M. Tomitsch, K. Kappel, T. Grechenig / Talk: British HCI conference (HCI), London, UK; 2006-09-11 - 2006-09-15; in: "Proceedings of the 20th British HCI conference - HCI 2006, Vol. 2", ACM Press, (2006), 74 - 78
  • Developing User Interface Guidelines for DVD Menus / K. Kappel, M. Tomitsch, T. Költringer, T. Grechenig / Talk: ACM Conference on Human Factors in Computing Systems - CHI, Quebec, Canada; 2006-04-22 - 2006-04-27; in: "Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2006", ACM Press, (2006), ISBN: 1-59593-298-4; 177 - 182
  • Experiences from Designing a Tangible Musical Toy / M. Tomitsch, T. Grechenig, K. Kappel, T. Költringer / Talk: International Conference for Interaction Design and Children (IDC), Tampere, Finland; 2006-06-07 - 2006-06-09; in: "Proceedings of the 5th International Conference for Interaction Design and Children - IDC 2006", ACM Press, (2006), 169 - 170
  • Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks / W. Robertson, G. Vigna, Ch. Krügel, R. Kemmerer / Talk: Network and Distributed System Security Symposium (NDSS), USA; 2006-02-02 - 2006-02-03; in: "Proc. Network and Distributed System Security Symposium (NDSS)", Internet Society, (2006), 31 - 46
  • An Anomaly-driven Reverse Proxy for Web Applications / F. Valeur, G. Vigna, Ch. Krügel, E. Kirda / Talk: Symposium on Applied Computing (SAC), France; 2006-04-23 - 2006-04-27; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), 361 - 369
  • Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks / E. Kirda, Ch. Krügel, G. Vigna, N. Jovanovic / Talk: Symposium on Applied Computing (SAC), France; 2006-04-23 - 2006-04-27; in: "Proc. 21st ACM Symposium on Applied Computing (SAC)", ACM Press, (2006), 330 - 338
  • TTAnalyze: A Tool for Analyzing Malware / U. Bayer, Ch. Krügel, E. Kirda / Talk: Conference of the European Institute for Computer Antivirus Research (EICAR), Germany; 2006-04-30 - 2006-05-02; in: "Proc. 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR)", (2006), 180 - 192
  • SecuBat: A Web Vulnerability Scanner / S. Kals, E. Kirda, Ch. Krügel, N. Jovanovic / Talk: International World Wide Web Conference (WWW), UK; 2006-05-23 - 2006-05-26; in: "Proc. 15th International World Wide Web Conference (WWW)", (2006), 247 - 257
  • Using Static Program Analysis to Aid Intrusion Detection / M. Egele, M. Szydlowski, E. Kirda, Ch. Krügel / Talk: Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Germany; 2006-07-13 - 2006-07-14; in: "Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Lecture Notes in Computer Science", Springer-Verlag, (2006), 17 - 37
  • Extending .NET Security to Unmanaged Code / P. Klinkoff, Ch. Krügel, E. Kirda, G. Vigna / Talk: Information Security Conference (ISC), Greece; 2006-08-30 - 2006-09-02; in: "Proc. 9th Information Security Conference (ISC), Lecture Notes in Computer Science", Springer-Verlag, (2006), 1 - 16
  • Security in Networked Building Automation Systems / W. Granzer, W. Kastner, G. Neugschwandtner, F. Praus / Talk: WFCS, Torino, Italy; 2006-06-28 - 2006-06-30; in: "Proceedings 6th IEEE International Workshop on Factory Communication Systems", (2006), 283 - 292
  • A Modular Architecture for Building Automation Systems / W. Granzer, W. Kastner, G. Neugschwandtner, F. Praus / Talk: WFCS, Torino, Italy; 2006-06-28 - 2006-06-30; in: "Proceedings 6th IEEE International Workshop on Factory Communication Systems", (2006), 99 - 102
  • Fire Safety Alarm Transmission in Networked Building Automation Systems / G. Neugschwandtner, W. Kastner, B. Erb / Talk: WFCS, Torino, Italy; 2006-06-28 - 2006-06-30; in: "Proceedings 6th IEEE International Workshop on Factory Communication Systems", (2006), 79 - 82
  • An Embedded Systems Programming Environment for C / B. Burgstaller, B. Scholz, M.A. Ertl / Talk: Euro-Par 2006, Dresden, Germany; 2006-08-29 - 2006-09-01; in: "Euro-Par 2006 Parallel Processing", Lecture Notes in Computer Science, Springer Verlag, Volume 4128 (2006), ISBN: 978-3-540-37783-2; 1204 - 1216
  • Embedded Real-Time Ball Detection Unit for the YABIRO Biped Robot / M. Bader, M. Alberto, R. Sablatnig, J. Simo, G. Benet, G. Novak, F. Blanes / Talk: 4th Workshop on Intelligent Solutions in Embedded Systems - (WISES06), Wien; 2006-06-30; in: "Proc. of 4th Workshop on Intelligent Solutions in Embedded Systems", (2006), ISBN: 3-902463-06-6; 3 - 12
  • A µController Lab for Distance Learning / G. Gridling, B. Weiss / Talk: 6th International Workshop on Microelectronics Education, Stockholm; 2006-06-08 - 2006-06-09; in: "EWME 2006 - Proceedings", (2006), 129 - 132
  • Pixy: A static Analysis Tool for Detecting web Application Vulnerabilities / N. Jovanovic, Ch. Krügel, E. Kirda / Talk: 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, Kalifornien, USA; 2006-05-21 - 2006-05-24; in: "Proceedings of the 2006 IEEE Symposium on Security and Privacy", IEEE Inc., P2574 (2006), ISBN: 0-7695-2574-1; 258 - 263

2005

2004

  • Wahrnehmungsbewusstsein in der Automation -- ein neuer "bionischer" Ansatz (Perception Awareness in Automation -- A New "Bionic" Approach) / D. Dietrich, W. Kastner, H. Schweinzer / at - Automatisierungstechnik, vol. 52 (2004), 107 - 116
  • Using Alert Verification to Identify Successful Intrusion Attempts / Ch. Krügel, F. Valeur, G. Vigna / Praxis der Informationsverarbeitung und Kommunikation (PIK), 27 (2004), 4; 220 - 228
  • A Comprehensive Approach to Intrusion Detection Alert Correlation / F. Valeur, G. Vigna, Ch. Krügel, R. Kemmerer / IEEE Transactions on Dependable and Secure Computing, 1 (2004), 3; 146 - 169
  • Yet Another All-purpose EIBnet/IP Gateway / W. Kastner, F. Praus, O. Alt / Poster: Konnex Scientific Conference, Deggendorf, Germany; 2004-10-05; in: "Proc. Konnex Scientific Conference 2004", Konnex Association, Diegem, (2004), ISBN: 907781101x; X-1 - X-17
  • EDDL inside FDT/DTM / W. Kastner, F. Kastner-Masilko / Poster: WFCS, Vienna, Austria; 2004-09-22 - 2004-09-24; in: "Proceedings 2004 IEEE International Workshop on Factory Communication Systems (WFCS 2004)", T. Sauter, F. Vasques (ed.); IEEE, Piscataway, (2004), ISBN: 0-7803-8734-1; 365 - 368
  • Situation Modeling / D. Dietrich, W. Kastner, Th. Maly, C. Rösener, G. Russ, H. Schweinzer / Talk: IEEE International Workshop on Factory Communication Systems (WFCS2004), Wien, Österreich; 2004-09-22 - 2004-09-24; in: "2004 IEEE International Workshop on Factory Communication Systems", (2004), ISBN: 0-7803-8734-1; 93 - 102
  • Neuro-bionic Architecture of Automation Systems -- Obstacles and Challenges / E. Brainin, D. Dietrich, W. Kastner, P. Palensky, C. Rösener / Talk: IEEE Africon, Gaborone, Botswana; 2004-09-15 - 2004-09-17; in: "Proceedings 2004 IEEE Africon", G. Hancke (ed.); IEEE, Piscataway, (2004), ISBN: 0-7803-8606-x; 292/1 - 292/4
  • On the Tree Width of Ada Programs / B. Burgstaller, J. Blieberger, B. Scholz / Talk: Reliable Software Technologies - Ada-Europe, Palma de Mallorca, Spain; 2004-06-14 - 2004-06-18; in: "Lecture Notes in Computer Science - Ada-Europe", Springer-Verlag, 3063 (2004), ISBN: 3-540-22011-9; 78 - 90
  • UPnP Connectivity for Home and Building Automation / W. Kastner, H. Scheichelbauer / Talk: IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN), Innsbruck, Austria; 2004-02-17 - 2004-02-19; in: "Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN)", M. H. Hamza (ed.); IASTED, Anaheim, Calgary, Zürich, (2004), ISBN: 0-88986-385-7; 619 - 624
  • Service Interfaces for Field-Level Home and Building Automation / W. Kastner, G. Neugschwandtner / Talk: WFCS, Vienna, Austria; 2004-09-22 - 2004-09-24; in: "Proceedings 2004 IEEE International Workshop on Factory Communication Systems (WFCS 2004)", T. Sauter, F. Vasques (ed.); IEEE, Piscataway, (2004), ISBN: 0-7803-8734-1; 103 - 112
  • A Closer Look on Today s Home and Building Networks / W. Kastner, P. Palensky, T. Rausch, C. Rösener / Talk: IEEE Africon, Gaborone, Botswana; 2004-09-15 - 2004-09-17; in: "Proceedings 2004 IEEE Africon", G. Hancke (ed.); IEEE, Piscataway, (2004), ISBN: 0-7803-8606-x; 293/1 - 293/7
  • Alert Verification - Determining the Success of Intrusion Attempts / Ch. Krügel, W. Robertson / Talk: Workshop on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Dortmund, Germany; 2004-07-06 - 2004-07-07; in: "Proceedings of the Workshop on Detection of Intrusions and Malware and Vulnerability Assessment", (2004), ISBN: 3-88579-375-x; 25 - 39
  • Static Disassembly of Obfuscated Binaries / Ch. Krügel, W. Robertson, F. Valeur, G. Vigna / Talk: Usenix Security Symposium, San Diego, CA, USA; 2004-08-09 - 2004-08-13; in: "Proceedings of the 13th Usenix Security Symposium", (2004), 1-931971-23-2; 255 - 270
  • Detecting Kernel-Level Rootkits Through Binary Analysis / Ch. Krügel, W. Robertson, G. Vigna / Talk: Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA; 2004-12-06 - 2004-12-10; in: "Proceedings of the 20th Annual Computer Security Applications Conference", (2004), ISBN: 0-7695-2252-1; 91 - 100

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1987

 

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1989

1988

 

  • Christopher Krügel: Wirtschaftskammerpreis / Wirtschaftskammern / Austria / 2005
  • Christopher Krügel: EIB Scientific Award for Excellent Diploma Thesis / Germany / 2000
  • Monika di Angelo: Mobilitätsstipendium der TU Wien für hervorragende Dissertation / Lions-Förderpreis / 1989

Soon, this page will include additional information such as reference projects, conferences, events, and other research activities.

Until then, please visit Automation Systems’ research profile in TISS .