Publication list for
Stefan Schauer
as author or essentially involved person

93 records (2010 - 2019)

The following list contains presentations with proceedings-entry twice, once as printed contributions, and once as presentations. In general, the total number of records given below is therefore greater than the number shown above.


Books and Book Editorships

1 record:
  1. S. Rass, B. An, C. Kiekintveld, F. Fang, S. Schauer (ed.):
    "Decision and Game Theory for Security, 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings";
    Springer International Publishing AG, Schweiz, 2017, ISBN: 978-3-319-68710-0; 534 pages.


Publications in Scientific Journals

16 records:
  1. A. Fielder, S. König, E. Panaousis, S. Schauer, S. Rass:
    "Risk Assessment Uncertainties in Cybersecurity Investments";
    Games, 9 (2018), 34; 1 - 14.

  2. S. König, S. Rass, S. Schauer, A. Beck:
    "Risk Propagation Analysis and Visualization using Percolation Theory";
    International Journal of Advanced Computer Science and Applications, 7 (2016), 1; 694 - 701.

  3. S. Rass, A. Alshawish, A. Mohamed Amine, S. Schauer, Q. Zhu, H. De Mee:
    "Physical Intrusion Games-Optimizing Surveillance by Simulation and Game Theory";
    IEEE Access, 5 (2017), 8394 - 8407.

  4. S. Rass, S. König, S. Schauer:
    "Decisions with Uncertain Consequences - A Total Ordering on Loss-Distributions";
    Plos One, PLOS (2016), 1 - 23.

  5. S. Rass, S. König, S. Schauer:
    "Defending Against Advanced Persistent Threats Using Game-Theory";
    Plos One, PLOS (2017), 1 - 43.

  6. S. Rass, S. König, S. Schauer, O. Maurhart:
    "Implementation and Evaluation of Intrinsic Authentication in Quantum Key Distribution Protocols";
    International Journal on Advances in Security, 1&2 (2016), 9; 59 - 65.

  7. S. Rass, B. Rainer, S. Schauer:
    "On the Practical Feasibility of Secure Multipath Communication";
    International Journal of Advanced Computer Science and Applications, 4 (2013), 10; 99 - 108.

  8. S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer:
    "Secure Communication Over Software-Defined Networks";
    Mobile Networks and Applications, 20 (2015), 1; 105 - 110.

  9. S. Schauer, M. Huber, B. Hiesmayr:
    "Experimentally feasible security check for n-qubit secret sharing";
    Physical Review A, 82 (2011), ++ - ##.

  10. S. Schauer, N. Polemi, M. Haralambos:
    "MITIGATE: a dynamic supply chain cyber risk assessment methodology";
    Journal of Transportation Security, vol 12 (2019), 1 - 35.

  11. S. Schauer, N. Polemi, H. Mouratidis:
    "MITIGATE: a dynamic supply chain cyber risk assessment methodology";
    Journal of Transportation Security, 11 (2018), 1 - 35.

  12. S. Schauer, B. Rainer, R. Schmid:
    "Ein spieltheoretischer Ansatz für das IT-Security-Risikomanagement";
    Datenschutz und Datensicherheit DuD, 7 (2012), 492 - 496.

  13. S. Schauer, M. Suda:
    "Application of the Simulation Attack on Entanglement Swapping Based QKD and QSS Protocols";
    International Journal on Advances in Systems and Measurements, 1 & 2 (2013), 6; 137 - 148.

  14. S. Schauer, M. Suda:
    "Robustness of Optimal Basis Transformations to Secure Entanglement Swapping Based QKD Protocols";
    International Journal on Advances in Systems and Measurements, 8 (2015), 1&2; 135 - 144.

  15. S. Schiebeck, M. Latzenhofer, B. Palensky, S. Schauer, G. Quirchmayr, T. Benesch, J. Göllner, C. Meurers, I. Mayr:
    "Practical Use Case Evaluation of a Generic ICT Meta-Risk Model Implemented with Graph Database Technology";
    International Journal on Advances in Security, 9 (2016), 1 & 2; 66 - 79.

  16. C. Schuster, M. Latzenhofer, S. Schauer, J. Göllner, C. Meurers, A. Peer, P. Prah, G. Quirchmayr, T. Benesch:
    "The Influence of the Human Factor on ICT Security: An Empirical Study within the Corporate Landscape in Austria";
    International Journal on Advances in Security, 10 (2017), 1&2; 48 - 60.


Contributions to Books

5 records:
  1. A. Alshawish, A. Mohamed Amine, H. de Meer, S. Schauer, S. König, A. Gouglidis, D. Hutchinson:
    "G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games";
    in: "Game Theory for Security and Risk Management", Birkhäuser (Springer), Cham, Cham, 2018, ISBN: 978-3-319-75268-6, 129 - 156.

  2. S. Rass, S. Schauer:
    "Game Theory for Security and Risk Management";
    in: "Game Theory for Security and Risk Management", Birkhäuser, Basel, 2018, ISBN: 978-3-319-75267-9, 1.

  3. S. Schauer:
    "A Risk Management Approach for Highly Interconnected Networks";
    in: "Game Theory for Security and Risk Management", Birkhäuser, Basel, 2018, ISBN: 978-3-319-75267-9, 285 - 311.

  4. S. Schauer:
    "Attack Strategies on QKD Protocols";
    in: "Applied Quantum Cryptography", C. Kollmitzer, M. Pivk (ed.); issued by: Springer; Springer, Berlin Heidelberg, 2010, ISBN: 978-3-642-04829-6, 71 - 96.

  5. S. Schauer:
    "Attack Strategies on QKD Protocols";
    in: "Applied Quantum Cryptography - Chinese Edition", issued by: Science Press, China Science Publishing & Media LTD; China Science Publishing & Media LTD, China, 2015, ISBN: 978-7-03-042305-4, 59 - 81.


Contributions to Proceedings

44 records:
  1. A. Gouglidis, B. Green, J. Busby, M. Rouncfield, D. Hutchison, S. Schauer:
    "Threat Awareness for Critical Infrastructures Resilience";
    Talk: RNDM 2016 International Workshop on Resilient Networks Design and Modeling, Halmstad, Schweden; 09-13-2016 - 09-15-2016; in: "Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on Resilient Networks Design and Modeling", IEEE Publishing, (2016), ISBN: 978-1-4673-9023-1; 196 - 202.

  2. T. Grafenauer, S. König, S. Rass, S. Schauer:
    "A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures";
    Talk: ARES Conference, Hamburg; 08-27-2018 - 08-30-2018; in: "ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security", ACM, New York, (2018), ISBN: 978-1-4503-6448-5; 8 pages.

  3. S. König, T. Grafenauer, S. Rass, S. Schauer:
    "Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To";
    Talk: SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies, Mestre, Italien; 09-16-2018 - 09-20-2018; in: "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies", IARIA, (2018), ISBN: 978-1-61208-661-3; 150 - 157.

  4. S. König, S. Rass, S. Schauer:
    "Stochastic Dependencies Between Critical Infrastructures";
    Talk: The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), Rom, Italien; 09-10-2017 - 09-24-2017; in: "The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)", IARIA XPS Press, (2017), ISBN: 978-1-61208-582-1; 106 - 110.

  5. S. König, S. Rass, S. Schauer, J. Wachter:
    "Disappointment-Aversion in Security Games";
    Talk: GameSec 2018, Seattle; 10-29-2018 - 10-31-2018; in: "Lecture Notes in Computer Science", Springer, Cham, 11199 (2018), ISBN: 978-3-030-01554-1; 314 - 325.

  6. S. König, S. Schauer, S. Rass:
    "A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks";
    Talk: 21st Nordic Conference, NordSec 2016, Oulu; 11-02-2016 - 11-04-2016; in: "Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finnland, November 2-4, 2016. Proceedings.", Springer International Publishing, (2016), ISBN: 978-3-319-47560-8; 67 - 81.

  7. S. König, S. Schauer, T. Schaberreiter, S. Rass:
    "A Measure for Resilience of Critical Infrastructures";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen; 09-24-2018 - 09-26-2018; in: "Lecture Notes in Computer Science", Springer, (2018), ISBN: 978-3-030-05849-4; 57 - 71.

  8. M. Latzenhofer, S. Schauer, S. König, C. Kollmitzer:
    "Ansatz zur Auswahl von Risikomanagement-Methoden";
    Talk: DACH Security 2018, Gelsenkirchen; 09-04-2018 - 09-05-2018; in: "DACH Security 2018: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven", syssec, Patrick Horster, (2018), ISBN: 978-3-00-060424-9; 298 - 312.

  9. C. Merkle Westphall, H. Hof, A. Olmsted, S. Schauer, M. Latzenhofer, A. Abidin, G. Yee:
    "SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies";
    in: "Proceedings, 32 Articles", http://www.thinkmind.org/index.php?view=instance&instance=SECURWARE+2017, Rome, Italy, 2017, ISBN: 978-1-61208-582-1, Paper ID from September 10, 2017 to September 14, 2017, 209 pages.

  10. G. Quirchmayr, J. Göllner, T. Benesch, S. Schauer, K. Schuch, S. Schiebeck, M. Latzenhofer, A. Peer:
    "Framework for a Generic Meta Organisational Model";
    Talk: 14th FRAP - Finance, Risk and Accounting Management Perspectives Conference, Oxford, England; 09-22-2014 - 09-24-2014; in: "FRAP 2014", ACRN Oxford Ltd., (2014), 101.

  11. S. Rass, S. König, S. Schauer:
    "On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies";
    Talk: 2017 Conference on Decision and Game Theory for Security, Wien; 10-23-2017 - 10-25-2017; in: "Decision and Game Theory for Security. Proceedings of 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017.", S. Rass, B. An, C. Kiekintveld, F. Fang, S. Schauer (ed.); (2017), ISSN: 0302-9743; 494 - 505.

  12. S. Rass, S. König, S. Schauer:
    "Uncertainty in Games: Using Probability-Distributions as Payoffs";
    Talk: 2015 Conference on Decision and Game, London, UK; 11-04-2015 - 11-05-2015; in: "Decision and Game Theory for Security", Springer, 9406 (2015), 346 - 357.

  13. S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer:
    "Secure Communication over Software-Defined Networks";
    Talk: International Conference on Software-Defined and Virtualized Future Wireless Networks, Rom; 10-27-2014; in: "SDWN 2014", Springer, (2014), 1.

  14. S. Rass, B. Rainer, M. Vavti, S. Schauer:
    "A Network Modeling and Analysis Tool for Perfectly Secure Communication";
    Talk: IEEE AINA 2013 - The 27th IEEE International Conference on Advanced Information Networking and Applications, Barcelona, Spain; 03-25-2013 - 03-28-2013; in: "2013 27th IEEE International Conference on Advanced Information Networking and Applications", IEEE, (2013), ISBN: 978-1-4673-5550-6; 267 - 275.

  15. S. Rass, S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner:
    "Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf";
    Talk: DACH Security 2015, Bonn; 09-08-2015 - 09-09-2015; in: "DACH Security 2015", syssec, (2015), ISBN: 978-3-00-049965-4; 253 - 266.

  16. S. Rass, S. Schauer, A. Peer, J. Göllner:
    "Sicherheit auf Basis Multikriterieller Spieltheorie";
    Talk: DACH Security 2013, Nürnberg; 09-17-2013 - 09-18-2013; in: "DACH Security 2013", (2013), ISBN: 978-3-00-042097-9; 289 - 301.

  17. S. Rass, J. Wachter, S. Schauer, S. König:
    "Subjektive Risikobewertung - Über Datenerhebung und Opinion Pooling";
    Talk: DACH Security 2017, Universität der Bundeswehr, München; 09-05-2017 - 09-06-2017; in: "DACH Security 2017, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT Security & Management", P. Schartner (ed.); syssec, Frechen, Deutschland, (2017), ISBN: 978-3-00-0572906; 225 - 237.

  18. S. Schauer:
    "A Hybrid Risk Management Process for Interconnected Infrastructures";
    Talk: Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures, Wien (invited); 09-19-2017 - 09-20-2017; in: "Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures", (2017), 5 pages.

  19. S. Schauer:
    "HyRiM - Hybrid Risk Management for Utility Networks. A Project Overview";
    Talk: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien (invited); 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017).

  20. S. Schauer:
    "Identifying and Managing Risks in Interconnected Utility Networks. The HyRiM Risk Management Process";
    Talk: Symposium on Innovative Smart Grid Cybersecurity Solutions, Wien, Österreich (invited); 03-13-2017 - 03-14-2017; in: "Symposium on Innovative Smart Grid Cybersecurity Solutions", (2017), 5 pages.

  21. S. Schauer:
    "MITIGATE - Multidimensional Integrated Risk Assessment Framework and Dynamic Collaborative Risk Management Tools for Critical Information Infrastructure. A Project Overview";
    Talk: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien (invited); 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017).

  22. S. Schauer, C. Douligeris, H. Mouratidis:
    "MITIGATE: A Dynamic Maritime Supply Chain Cyber Risk Assessment Methodology";
    Poster: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien; 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017), Paper ID 45.

  23. S. Schauer, S. König, M. Latzenhofer, S. Rass:
    "Identifying and Managing Risks in Interconnected Utility Networks. The HyRiM Risk Management Process";
    Talk: The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), Rom, Italien; 09-10-2017 - 09-24-2017; in: "The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)", IARIA XPS Press, (2017), ISBN: 978-1-61208-582-1; 79 - 86.

  24. S. Schauer, S. König, M. Latzenhofer, S. Rass, T. Grafenauer:
    "Analyzing Cascading Effects among Critical Infrastructures: The CERBERUS Approach";
    Talk: ISCRAM Conference, Ronchester,NY, USA; 05-20-2018 - 05-23-2018; in: "Proceedings of the 15th ISCRAM Conference, Rochester, NY, USA, May 2018", (2018), ISBN: 978-0-692-12760-5; 428 - 437.

  25. S. Schauer, S. König, M. Latzenhofer, R. Stollnberger, K. Steinnocher, S. Rass, T. Grafenauer, J. Wachter, T. Schaberreiter, G. Quirchmayr, S. Poledna:
    "Risikobewertung für vernetzte kritische Infrastrukturen";
    Talk: DACH Security 2018, Gelsenkirchen; 09-04-2018 - 09-05-2018; in: "DACH Security 2018: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven", syssec, Patrick Horster, (2018), ISBN: 978-3-00-060424-9; 313 - 323.

  26. S. Schauer, S. König, S. Rass:
    "Mathematical Aspects of Risk Management in Interconnected Utility Networks";
    Talk: 18th International Conference on Mathematical Methods, Computational Techniques and Intelligent Systems (MAMECTIS '16), Venedig, Italien (invited); 01-29-2016 - 01-31-2016; in: "Advances in Mathematic and Computer Science & their Applications", WSEAS Press, (2016), ISBN: 978-1-61804-360-3; 11 - 17.

  27. S. Schauer, S. König, S. Rass, A. Gouglidis, A. Alshawish, H. de Meer:
    "Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game";
    Poster: 2016 Conference on Decision and Game Theory for Security, New York University Tandon School of Engineering, Brooklyn, New York, USA; 11-02-2016 - 11-04-2016; in: "Decision and Game Theory for Security", Q. Zhu, T. Alpcan, E. Panaousis, M. Tambe, W. Casey (ed.); Springer International Publishing, LNCS 9996 (2016), ISBN: 978-3-319-47413-7; 471.

  28. S. Schauer, S. König, S. Rass, M. Latzenhofer:
    "Spieltheoretische Risikominimierung in IKT-Infrastrukturen";
    Talk: DACH Security 2016, Klagenfurt; 09-26-2016 - 09-27-2016; in: "DACH Security 2016, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT & Security Management", Peter Schartner, (2016), ISBN: 978-3-00-053829-2; 14 pages.

  29. S. Schauer, M. Latzenhofer:
    "CIP-NCT: Critical Infrastructure Protection - Novel Concepts and Technologies";
    Talk: SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Rome (invited); 09-10-2017 - 09-14-2017; in: "Additonal Publications / Netware 2017 - Rome, Italy", IARIA, (2017).

  30. S. Schauer, A. Peer, J. Göllner, S. Rass:
    "Entwicklung einer Test-Umgebung für Risiko-Assessmenttools";
    Talk: D.A.CH 2014, Graz; 09-16-2014 - 09-17-2014; in: "D.A.CH Security 2014", Peter Lipp, syssec, Frechen (2014), ISBN: 978-3-00-046463-8; 157 - 169.

  31. S. Schauer, B. Rainer, N. Museux, D. Faure, J. Hingant, J. Rodriguez, S. Beyer, R. Company, S. Lopez:
    "Conceptual Framework for Hybrid Situational Awareness in Critical Port Infrastructures";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen; 09-24-2018 - 09-26-2018; in: "Critical Information Infrastructures Security, 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers", (2018), ISBN: 978-3-030-05848-7; 191 - 203.

  32. S. Schauer, S. Rass, J. Göllner, A. Peer:
    "Security strategies towards mutually dependent goals";
    Talk: European Meetings on Cybernetics and Systems Research 2014 (EMCSR), Wien, Österreich; 04-22-2014 - 04-25-2014; in: "Civilisation at the Crossroads- Response and Responsibility of the Systems Sciences", Jennifer Wilby, Stefan Blachfellner, Wolfgang Hofkirchner, Bertalanffy Center for the Study of Systems Science, (2014), ISSN: 2227-7803; 630 - 634.

  33. S. Schauer, S. Rass, S. König:
    "BB84 Quantum Key Distribution with Intrinsic Authentication";
    Talk: The Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2015), Venedig, Italien; 08-23-2015 - 08-28-2015; in: "ICQNM 2015", IARIA XPS Press, (2015), ISBN: 978-1-61208-431-2; 41 - 44.

  34. S. Schauer, S. Rass, B. Rainer:
    "IT-Security Risiko Management mit Elementen der Spieltheorie";
    Talk: DACH Security 2012, Konstanz, Deutschland; 09-25-2012 - 09-26-2012; in: "DACH Security 2012", syssec, (2012), ISBN: 978-3-00-039221-4; 106 - 117.

  35. S. Schauer, S. Schiebeck, M. Latzenhofer, B. Palensky, G. Quirchmayr, T. Benesch, J. Göllner, C. Meurers, A. Peer:
    "IKT-Risikoanalyse am Beispiel APT";
    Talk: DACH Security 2015, Bonn; 09-08-2015 - 09-09-2015; in: "DACH Security 2015", syssec, (2015), ISBN: 978-3-00-049965-4; 145 - 158.

  36. S. Schauer, S. Schiebeck, C. Meurers, J. Göllner, A. Peer, M. Stierle:
    "Meta Risk Model for Critical Infrastructures";
    Talk: European Meetings on Cybernetics and Systems Research 2014 (EMCSR), Wien, Österreich; 04-22-2014 - 04-25-2014; in: "Civilisation at the Crossroads- Response and Responsibility of the Systems Sciences", Jennifer Wilby, Stefan Blachfellner, Wolfgang Hofkirchner, Bertalanffy Center for the Study of Systems Science, (2014), ISSN: 2227-7803; 613 - 618.

  37. S. Schauer, M. Stamer, C. Bosse, M. Pavlidis, H. Mouratidis, S. König, S. Papastergiou:
    "An Adaptive Supply Chain Cyber Risk Management Methodology";
    Talk: Hamburg International Conference of Logistics (HICL) 2017, Hamburg, Deutschland; 10-11-2017 - 10-13-2017; in: "Digitalization in Supply Chain Management and Logistics. Proceedings of the Hamburg International Conference of Logistics (HICL).", epubli GmbH, Berlin, (2017), ISSN: 2365-5070; 403 - 423.

  38. S. Schauer, M. Suda:
    "Effect of Noise on the Security of Entanglement Swapping Based QKD Protocols";
    Talk: ICQNM 2013 - The Seventh International Conference on Quantum, Nano and Micro Technologies, Barcelona; 08-25-2013 - 08-31-2013; in: "ICQNM 2013, The Seventh International Conference on Quantum, Nano and Micro Technologies", (2013), ISBN: 978-1-61208-303-2; 23 - 27.

  39. S. Schauer, M. Suda:
    "Optimal Choice of Basis Transformations for Entanglement Swapping Based QKD Protocols";
    Talk: ICQNM 2014, Lissabon, Portugal; 11-16-2014 - 11-20-2014; in: "The Eight International Conference on Quantum, Nano/Bio, and Micro Technologies", Lissabon (2014), ISBN: 978-1-61208-380-3; 8 - 13.

  40. S. Schauer, M. Suda:
    "Security of Entanglement Swapping QKD Ptotocols against Collective Attacks";
    Talk: ICQNM 2012, The Sixth International Conference on Quantum, Nano and Micro Technologies, Rom, Italien; 08-19-2012 - 08-24-2012; in: "ICQNM 2012, The Sixth International Conference on Quantum, Nano and Micro Technologies", (2012), ISBN: 978-1-61208-214-1; 60 - 64.

  41. S. Schiebeck, S. König, S. Schauer, M. Latzenhofer:
    "High-Level Risikoanalyse im Bereich Internet of Things";
    Keynote Lecture: DACH Security 2017, Universität der Bundeswehr, München; 09-05-2017 - 09-06-2017; in: "DACH Security 2017, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT Security & Management", P. Schartner (ed.); syssec, Frechen, Deutschland, (2017), ISBN: 978-3-00-0572906; 11 pages.

  42. S. Schiebeck, M. Latzenhofer, B. Palensky, S. Schauer, G. Quirchmayr, T. Benesch, J. Göllner, C. Meurers, I. Mayr:
    "Implementation of a Generic ICT Risk Model using Graph Databases";
    Talk: SECUREWARE 2015, Venedig; 08-23-2015 - 08-28-2015; in: "SECUREWARE 2015 - The Ninth International Conference on Emerging Security Information, Systems and Technologies", (2015), ISBN: 978-1-61208-427-5; 146 - 153.

  43. C. Schuster, M. Latzenhofer, S. Schauer, J. Göllner, C. Meurers, A. Peer, P. Prah, G. Quirchmayr, T. Benesch:
    "A Study on User Perceptions of ICT Security";
    Talk: SECUREWARE 2016, Nizza, Frankreich; 07-24-2016 - 07-28-2016; in: "SECUREWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies, 2016", (2016), ISBN: 978-1-61208-493-0; Paper ID 2016-14-10-30098, 8 pages.

  44. G. Yee, S. Rass, S. Schauer, M. Latzenhofer:
    "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies";
    in: "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies", IARIA, Wilmington, 2018, ISBN: 978-1-61208-661-3, 1.


Talks and Poster Presentations at Conferences

59 records:
  1. T. Fenzl, A. Golla, S. Herda, C. Kollmitzer, S. Schauer, H. Gosling, M. Hauke:
    "AuthentiFace - Kann ein Gesicht ein Passwort sein";
    Poster: ÖGP-Tagung 2012, Graz; 04-12-2012.

  2. A. Gouglidis, B. Green, J. Busby, M. Rouncfield, D. Hutchison, S. Schauer:
    "Threat Awareness for Critical Infrastructures Resilience";
    Talk: RNDM 2016 International Workshop on Resilient Networks Design and Modeling, Halmstad, Schweden; 09-13-2016 - 09-15-2016; in: "Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on Resilient Networks Design and Modeling", IEEE Publishing, (2016), ISBN: 978-1-4673-9023-1; 196 - 202.

  3. T. Grafenauer, S. König, S. Rass, S. Schauer:
    "A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures";
    Talk: ARES Conference, Hamburg; 08-27-2018 - 08-30-2018; in: "ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security", ACM, New York, (2018), ISBN: 978-1-4503-6448-5; 8 pages.

  4. S. König, T. Grafenauer, S. Rass, S. Schauer:
    "Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To";
    Talk: SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies, Mestre, Italien; 09-16-2018 - 09-20-2018; in: "SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies", IARIA, (2018), ISBN: 978-1-61208-661-3; 150 - 157.

  5. S. König, S. Rass, S. Schauer:
    "Stochastic Dependencies Between Critical Infrastructures";
    Talk: The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), Rom, Italien; 09-10-2017 - 09-24-2017; in: "The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)", IARIA XPS Press, (2017), ISBN: 978-1-61208-582-1; 106 - 110.

  6. S. König, S. Rass, S. Schauer, J. Wachter:
    "Disappointment-Aversion in Security Games";
    Talk: GameSec 2018, Seattle; 10-29-2018 - 10-31-2018; in: "Lecture Notes in Computer Science", Springer, Cham, 11199 (2018), ISBN: 978-3-030-01554-1; 314 - 325.

  7. S. König, S. Schauer, S. Rass:
    "A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks";
    Talk: 21st Nordic Conference, NordSec 2016, Oulu; 11-02-2016 - 11-04-2016; in: "Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finnland, November 2-4, 2016. Proceedings.", Springer International Publishing, (2016), ISBN: 978-3-319-47560-8; 67 - 81.

  8. S. König, S. Schauer, T. Schaberreiter, S. Rass:
    "A Measure for Resilience of Critical Infrastructures";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen; 09-24-2018 - 09-26-2018; in: "Lecture Notes in Computer Science", Springer, (2018), ISBN: 978-3-030-05849-4; 57 - 71.

  9. C. Meurers, J. Göllner, A. Peer, K. Mak, G. Quirchmayr, M. Latzenhofer, S. Schiebeck, S. Schauer, C. Schuster:
    "A Meta Risk Model for Supporting Interactive Decision Making in Situation Awarness Centers";
    Talk: ISMS Annual Conference 2014, Wien; 10-21-2014 - 10-23-2014.

  10. G. Quirchmayr, J. Göllner, T. Benesch, S. Schauer, K. Schuch, S. Schiebeck, M. Latzenhofer, A. Peer:
    "Framework for a Generic Meta Organisational Model";
    Talk: 14th FRAP - Finance, Risk and Accounting Management Perspectives Conference, Oxford, England; 09-22-2014 - 09-24-2014; in: "FRAP 2014", ACRN Oxford Ltd., (2014), 101.

  11. G. Quirchmayr, M. Stierle, S. Schiebeck, J. Göllner, M. Latzenhofer, S. Schauer, C. Meurers, P. Prah:
    "MetaRisk - Meta-Risiko-Modell für kritische Infrastrukturen";
    Talk: Knowledge Development, Operations Reserach, Risk Management sowie Integrierte Einsatzführung für die EInsatzorganisationen und ÖBH (1. Wissensmanagementveranstaltung 2015 im ÖBH), Wien (invited); 05-07-2015.

  12. S. Rass, S. König, S. Schauer:
    "On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies";
    Talk: 2017 Conference on Decision and Game Theory for Security, Wien; 10-23-2017 - 10-25-2017; in: "Decision and Game Theory for Security. Proceedings of 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017.", S. Rass, B. An, C. Kiekintveld, F. Fang, S. Schauer (ed.); (2017), ISSN: 0302-9743; 494 - 505.

  13. S. Rass, S. König, S. Schauer:
    "Uncertainty in Games: Using Probability-Distributions as Payoffs";
    Talk: 2015 Conference on Decision and Game, London, UK; 11-04-2015 - 11-05-2015; in: "Decision and Game Theory for Security", Springer, 9406 (2015), 346 - 357.

  14. S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer:
    "Secure Communication over Software-Defined Networks";
    Talk: International Conference on Software-Defined and Virtualized Future Wireless Networks, Rom; 10-27-2014; in: "SDWN 2014", Springer, (2014), 1.

  15. S. Rass, B. Rainer, M. Vavti, S. Schauer:
    "A Network Modeling and Analysis Tool for Perfectly Secure Communication";
    Talk: IEEE AINA 2013 - The 27th IEEE International Conference on Advanced Information Networking and Applications, Barcelona, Spain; 03-25-2013 - 03-28-2013; in: "2013 27th IEEE International Conference on Advanced Information Networking and Applications", IEEE, (2013), ISBN: 978-1-4673-5550-6; 267 - 275.

  16. S. Rass, S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner:
    "Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf";
    Talk: DACH Security 2015, Bonn; 09-08-2015 - 09-09-2015; in: "DACH Security 2015", syssec, (2015), ISBN: 978-3-00-049965-4; 253 - 266.

  17. S. Rass, S. Schauer, A. Peer, J. Göllner:
    "Sicherheit auf Basis Multikriterieller Spieltheorie";
    Talk: DACH Security 2013, Nürnberg; 09-17-2013 - 09-18-2013; in: "DACH Security 2013", (2013), ISBN: 978-3-00-042097-9; 289 - 301.

  18. S. Rass, J. Wachter, S. Schauer, S. König:
    "Subjektive Risikobewertung - Über Datenerhebung und Opinion Pooling";
    Talk: DACH Security 2017, Universität der Bundeswehr, München; 09-05-2017 - 09-06-2017; in: "DACH Security 2017, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT Security & Management", P. Schartner (ed.); syssec, Frechen, Deutschland, (2017), ISBN: 978-3-00-0572906; 225 - 237.

  19. S. Schauer:
    "A Hybrid Risk Management Process for Interconnected Infrastructures";
    Talk: Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures, Wien (invited); 09-19-2017 - 09-20-2017; in: "Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures", (2017), 5 pages.

  20. S. Schauer:
    "A Novel Risk Mitigation Approach. Identifying Optimal Mitigation Strategies";
    Talk: ARES Conference 2017, Reggio di Calabria, Italien (invited); 08-29-2017 - 09-01-2017.

  21. S. Schauer:
    "CI interdependencies and cascading effects";
    Talk: PANEL 2: Resilience of Critical Infrastructures - in search of new ideas, Wien (invited); 07-11-2018.

  22. S. Schauer:
    "HyRiM - Hybrid Risk Management for Utility Networks. A Project Overview";
    Talk: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien (invited); 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017).

  23. S. Schauer:
    "Identifying and Managing Risks in Interconnected Utility Networks";
    Talk: European Utility Week 2016, Fira Barcelona Gran Via, Barcelona, Spanien (invited); 11-15-2016 - 11-17-2016.

  24. S. Schauer:
    "Identifying and Managing Risks in Interconnected Utility Networks. The HyRiM Risk Management Process";
    Talk: Symposium on Innovative Smart Grid Cybersecurity Solutions, Wien, Österreich (invited); 03-13-2017 - 03-14-2017; in: "Symposium on Innovative Smart Grid Cybersecurity Solutions", (2017), 5 pages.

  25. S. Schauer:
    "Innovations for Port Security";
    Talk: World Port Security Summit, London, England (invited); 06-13-2018.

  26. S. Schauer:
    "MITIGATE - Multidimensional Integrated Risk Assessment Framework and Dynamic Collaborative Risk Management Tools for Critical Information Infrastructure. A Project Overview";
    Talk: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien (invited); 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017).

  27. S. Schauer:
    "Next Generation Cloud Security";
    Talk: KSÖ Workshop, Wien; 04-08-2015.

  28. S. Schauer:
    "The CERBERUS Project - An Overview";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen (invited); 09-24-2018 - 09-26-2018.

  29. S. Schauer:
    "The SAURON Project - An Overview";
    Talk: ARES Conference - PCSCP Workshop, Hamburg; 08-27-2018.

  30. S. Schauer:
    "The SAURON Project - An Overview";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen (invited); 09-24-2018 - 09-26-2018.

  31. S. Schauer, C. Douligeris, H. Mouratidis:
    "MITIGATE: A Dynamic Maritime Supply Chain Cyber Risk Assessment Methodology";
    Poster: International Conference on Critical Information Infrastructures Security (CRITIS) 2017, Lucca, Italien; 10-08-2017 - 10-13-2017; in: "International Conference on Critical Information Infrastructures Security (CRITIS) 2017", (2017), Paper ID 45.

  32. S. Schauer, J. Göllner:
    "MetaRisk - Meta-Risiko-Modell für kritische Infrastrukturen";
    Poster: 4. Kiras Fachtagung, Wien; 10-22-2014.

  33. S. Schauer, S. König, M. Latzenhofer, S. Rass:
    "Identifying and Managing Risks in Interconnected Utility Networks. The HyRiM Risk Management Process";
    Talk: The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017), Rom, Italien; 09-10-2017 - 09-24-2017; in: "The Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017)", IARIA XPS Press, (2017), ISBN: 978-1-61208-582-1; 79 - 86.

  34. S. Schauer, S. König, M. Latzenhofer, S. Rass, T. Grafenauer:
    "Analyzing Cascading Effects among Critical Infrastructures: The CERBERUS Approach";
    Talk: ISCRAM Conference, Ronchester,NY, USA; 05-20-2018 - 05-23-2018; in: "Proceedings of the 15th ISCRAM Conference, Rochester, NY, USA, May 2018", (2018), ISBN: 978-0-692-12760-5; 428 - 437.

  35. S. Schauer, S. König, S. Rass:
    "Mathematical Aspects of Risk Management in Interconnected Utility Networks";
    Talk: 18th International Conference on Mathematical Methods, Computational Techniques and Intelligent Systems (MAMECTIS '16), Venedig, Italien (invited); 01-29-2016 - 01-31-2016; in: "Advances in Mathematic and Computer Science & their Applications", WSEAS Press, (2016), ISBN: 978-1-61804-360-3; 11 - 17.

  36. S. Schauer, S. König, S. Rass, A. Gouglidis, A. Alshawish, H. de Meer:
    "Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game";
    Poster: 2016 Conference on Decision and Game Theory for Security, New York University Tandon School of Engineering, Brooklyn, New York, USA; 11-02-2016 - 11-04-2016; in: "Decision and Game Theory for Security", Q. Zhu, T. Alpcan, E. Panaousis, M. Tambe, W. Casey (ed.); Springer International Publishing, LNCS 9996 (2016), ISBN: 978-3-319-47413-7; 471.

  37. S. Schauer, S. König, S. Rass, M. Latzenhofer:
    "Spieltheoretische Risikominimierung in IKT-Infrastrukturen";
    Talk: DACH Security 2016, Klagenfurt; 09-26-2016 - 09-27-2016; in: "DACH Security 2016, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT & Security Management", Peter Schartner, (2016), ISBN: 978-3-00-053829-2; 14 pages.

  38. S. Schauer, C. Kollmitzer, O. Maurhart:
    "SeCom - Sichere IT-Services auf mobilen Endgeräten";
    Poster: WFE Forschungsmarkttag, Wien; 04-28-2015 - 04-29-2015.

  39. S. Schauer, M. Latzenhofer:
    "CIP-NCT: Critical Infrastructure Protection - Novel Concepts and Technologies";
    Talk: SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Rome (invited); 09-10-2017 - 09-14-2017; in: "Additonal Publications / Netware 2017 - Rome, Italy", IARIA, (2017).

  40. S. Schauer, M. Latzenhofer:
    "MetaRisk - Meta-Risiko-Modell für kritische Infrastrukturen";
    Poster: WFE Forschungsmarkttag, Wien; 04-28-2015 - 04-29-2015.

  41. S. Schauer, A. Peer, J. Göllner, S. Rass:
    "Entwicklung einer Test-Umgebung für Risiko-Assessmenttools";
    Talk: D.A.CH 2014, Graz; 09-16-2014 - 09-17-2014; in: "D.A.CH Security 2014", Peter Lipp, syssec, Frechen (2014), ISBN: 978-3-00-046463-8; 157 - 169.

  42. S. Schauer, B. Rainer, N. Museux, D. Faure, J. Hingant, J. Rodriguez, S. Beyer, R. Company, S. Lopez:
    "Conceptual Framework for Hybrid Situational Awareness in Critical Port Infrastructures";
    Talk: CRITIS 2018, The 13th International Conference on Critical Information Infrastructures Security, Kaunas, Litauen; 09-24-2018 - 09-26-2018; in: "Critical Information Infrastructures Security, 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers", (2018), ISBN: 978-3-030-05848-7; 191 - 203.

  43. S. Schauer, S. Rass, J. Göllner, A. Peer:
    "Security strategies towards mutually dependent goals";
    Talk: European Meetings on Cybernetics and Systems Research 2014 (EMCSR), Wien, Österreich; 04-22-2014 - 04-25-2014; in: "Civilisation at the Crossroads- Response and Responsibility of the Systems Sciences", Jennifer Wilby, Stefan Blachfellner, Wolfgang Hofkirchner, Bertalanffy Center for the Study of Systems Science, (2014), ISSN: 2227-7803; 630 - 634.

  44. S. Schauer, S. Rass, S. König:
    "BB84 Quantum Key Distribution with Intrinsic Authentication";
    Talk: The Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2015), Venedig, Italien; 08-23-2015 - 08-28-2015; in: "ICQNM 2015", IARIA XPS Press, (2015), ISBN: 978-1-61208-431-2; 41 - 44.

  45. S. Schauer, S. Rass, B. Rainer:
    "IT-Security Risiko Management mit Elementen der Spieltheorie";
    Talk: DACH Security 2012, Konstanz, Deutschland; 09-25-2012 - 09-26-2012; in: "DACH Security 2012", syssec, (2012), ISBN: 978-3-00-039221-4; 106 - 117.

  46. S. Schauer, S. Schiebeck, M. Latzenhofer, B. Palensky, G. Quirchmayr, T. Benesch, J. Göllner, C. Meurers, A. Peer:
    "IKT-Risikoanalyse am Beispiel APT";
    Talk: DACH Security 2015, Bonn; 09-08-2015 - 09-09-2015; in: "DACH Security 2015", syssec, (2015), ISBN: 978-3-00-049965-4; 145 - 158.

  47. S. Schauer, S. Schiebeck, C. Meurers, J. Göllner, A. Peer, M. Stierle:
    "Meta Risk Model for Critical Infrastructures";
    Talk: European Meetings on Cybernetics and Systems Research 2014 (EMCSR), Wien, Österreich; 04-22-2014 - 04-25-2014; in: "Civilisation at the Crossroads- Response and Responsibility of the Systems Sciences", Jennifer Wilby, Stefan Blachfellner, Wolfgang Hofkirchner, Bertalanffy Center for the Study of Systems Science, (2014), ISSN: 2227-7803; 613 - 618.

  48. S. Schauer, P. Smith, A. Solar:
    "Panel: Addressing New Forms of Cybersecurity Risks to European Energy Utilities";
    Talk: European Utility Week 2016, Fira Barcelona Gran Via, Barcelona, Spanien; 11-15-2016 - 11-17-2016.

  49. S. Schauer, M. Stamer, C. Bosse, M. Pavlidis, H. Mouratidis, S. König, S. Papastergiou:
    "An Adaptive Supply Chain Cyber Risk Management Methodology";
    Talk: Hamburg International Conference of Logistics (HICL) 2017, Hamburg, Deutschland; 10-11-2017 - 10-13-2017; in: "Digitalization in Supply Chain Management and Logistics. Proceedings of the Hamburg International Conference of Logistics (HICL).", epubli GmbH, Berlin, (2017), ISSN: 2365-5070; 403 - 423.

  50. S. Schauer, M. Suda:
    "Effect of Noise on the Security of Entanglement Swapping Based QKD Protocols";
    Talk: ICQNM 2013 - The Seventh International Conference on Quantum, Nano and Micro Technologies, Barcelona; 08-25-2013 - 08-31-2013; in: "ICQNM 2013, The Seventh International Conference on Quantum, Nano and Micro Technologies", (2013), ISBN: 978-1-61208-303-2; 23 - 27.

  51. S. Schauer, M. Suda:
    "Effects of Noise on the Security of Entanglement Swapping Based QKD Protocols";
    Poster: 10th Central European Quantum Information Processing Workshop (CEQIP), Valtice, Tschechien; 06-05-2013 - 06-09-2013.

  52. S. Schauer, M. Suda:
    "On the Optimality of Basis Transformations to Secure Entanglement Swapping Based QKD Protocols";
    Poster: QCrypt 2014, Paris; 09-01-2014 - 09-05-2014.

  53. S. Schauer, M. Suda:
    "Optimal Choice of Basis Transformations for Entanglement Swapping Based QKD Protocols";
    Talk: ICQNM 2014, Lissabon, Portugal; 11-16-2014 - 11-20-2014; in: "The Eight International Conference on Quantum, Nano/Bio, and Micro Technologies", Lissabon (2014), ISBN: 978-1-61208-380-3; 8 - 13.

  54. S. Schauer, M. Suda:
    "Security of Entanglement Swapping QKD Protocols Against Collective Attacks";
    Poster: CEQIP 2012, Smolenice, Slovakei; 06-07-2012 - 06-10-2012.

  55. S. Schauer, M. Suda:
    "Security of Entanglement Swapping QKD Ptotocols against Collective Attacks";
    Talk: ICQNM 2012, The Sixth International Conference on Quantum, Nano and Micro Technologies, Rom, Italien; 08-19-2012 - 08-24-2012; in: "ICQNM 2012, The Sixth International Conference on Quantum, Nano and Micro Technologies", (2012), ISBN: 978-1-61208-214-1; 60 - 64.

  56. S. Schiebeck, S. König, S. Schauer, M. Latzenhofer:
    "High-Level Risikoanalyse im Bereich Internet of Things";
    Keynote Lecture: DACH Security 2017, Universität der Bundeswehr, München; 09-05-2017 - 09-06-2017; in: "DACH Security 2017, Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, Reihe IT Security & Management", P. Schartner (ed.); syssec, Frechen, Deutschland, (2017), ISBN: 978-3-00-0572906; 11 pages.

  57. S. Schiebeck, M. Latzenhofer, B. Palensky, S. Schauer, G. Quirchmayr, T. Benesch, J. Göllner, C. Meurers, I. Mayr:
    "Implementation of a Generic ICT Risk Model using Graph Databases";
    Talk: SECUREWARE 2015, Venedig; 08-23-2015 - 08-28-2015; in: "SECUREWARE 2015 - The Ninth International Conference on Emerging Security Information, Systems and Technologies", (2015), ISBN: 978-1-61208-427-5; 146 - 153.

  58. C. Schuster, M. Latzenhofer, S. Schauer, J. Göllner, C. Meurers, A. Peer, P. Prah, G. Quirchmayr, T. Benesch:
    "A Study on User Perceptions of ICT Security";
    Talk: SECUREWARE 2016, Nizza, Frankreich; 07-24-2016 - 07-28-2016; in: "SECUREWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies, 2016", (2016), ISBN: 978-1-61208-493-0; Paper ID 2016-14-10-30098, 8 pages.

  59. M. Suda, S. Schauer:
    "On the Optimality of Basis Transformations to Secure Entanglement Swapping Based QKD Protocols";
    Poster: 11th Central European Quantum Information Processing Workshop (CEQIP), Znojmo, Tschechien; 06-05-2014 - 06-08-2014.


Other Talks and Poster Presentations

8 records:
  1. M. Latzenhofer, S. Schauer, S. König, C. Kollmitzer:
    "Ansatz zur Auswahl von Risikomanagement-Methoden";
    Talk: DACH Security 2018, Gelsenkirchen; 09-04-2018 - 09-05-2018; in: "DACH Security 2018: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven", syssec, Patrick Horster, (2018), ISBN: 978-3-00-060424-9; 298 - 312.

  2. S. Schauer:
    "Facing Cyber Security Risks in Port Infrastructures";
    Talk: AICIA / YEAR Workshop "Port of the Future", Sevilla, Spanien (invited); 09-14-2016.

  3. S. Schauer:
    "MITIGATE: A new Approach to Port Security";
    Talk: MEDUSA Conference: Cyber Security in the Supply Chain, Valencia Port Foundation, Valencia, Spanien (invited); 05-06-2016.

  4. S. Schauer:
    "Risk Management 4 Dummies";
    Talk: AIT Science & Technology 4 Dummies, TechGate Wien; 04-14-2016.

  5. S. Schauer, S. Caceres, A. Beltran:
    "HyRiM Project Overview";
    Poster: KSÖ Sicherheitsenquete zum Cyber Sicherheitsgesetz, TechGate Wien; 06-13-2016.

  6. S. Schauer, S. Caceres, A. Beltran:
    "HyRiM Project Overview";
    Poster: AIT Leistungsschau "Sehen und Verstehen", TechGate Wien; 02-25-2016.

  7. S. Schauer, R. Company, N. Polemi:
    "MEDUSA Project Overview";
    Poster: AIT Leistungsschau "Sehen und Verstehen", TechGate Wien; 02-25-2016.

  8. S. Schauer, S. König, M. Latzenhofer, R. Stollnberger, K. Steinnocher, S. Rass, T. Grafenauer, J. Wachter, T. Schaberreiter, G. Quirchmayr, S. Poledna:
    "Risikobewertung für vernetzte kritische Infrastrukturen";
    Talk: DACH Security 2018, Gelsenkirchen; 09-04-2018 - 09-05-2018; in: "DACH Security 2018: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven", syssec, Patrick Horster, (2018), ISBN: 978-3-00-060424-9; 313 - 323.


Lectures

1 record:
  1. S. Schauer:
    "Verletzlichkeit und Schutzmöglichkeiten für kritische Infrastruktur";
    Lecture: Universität Wien, Wien; 05-20-2016 - 05-21-2016.


Doctor's Theses

1 record:
  1. S. Schauer:
    "Security Aspects of Quantum Cryptographic Protocols in Multi-Qubit Systems";
    Supervisor, Reviewer: M. Suda, B. Hiesmayr; TU Wien, 2011.