Mobirise

Clemens Sauerwein

Assistant Professor for Security Engineering

University of Innsbruck
Department of Computer Science

ICT Building Room 3S03 
Technikerstraße 21a
A-6020 Innsbruck
Austria - Europe

Email: Firstname.Secondname [AT_NOSPAM] uibk.ac.at
Phone:  +43 512 507 53345

Twitter - LinkedIn 

Research Interests

  • Information Security - Cyber Threat Intelligence Sharing, Information Security Risk Management, Cyber Resilience, Security Controls, Security Operations, Information Security Culture, Open Source & Threat Intelligence
  • Information Systems - Information and Knowledge Sharing, Crowdsourcing, Market Studies, Qualitative and Quantitative Empirical Studies
  • Security & Software Engineering Education - Novel Approaches, E-Learning, Security Awareness Trainings

Available Theses Topics

I offer topics for seminar's (SE), bachelor's (BSC) and master's (MSC) theses in the fields of computer science (CS), software engineering (SE) and information systems (IS). I supervise students studying computer science or information systems at the University of Innsbruck and other European universities. The following table provides an overview of available theses topics. If you are interested in one of the topics, feel free to contact me.

TitleTypeStudy
Analyzing the Dynamics of Security Information on Publicly Available Information SourcesBSC/MSCCS/SE
Detecting and Characterizing Misleading Cyber Threat Intelligence MSCCS/IS/SE
Unveiling the Interconnected Security Tools Landscape: Mapping the Relationships between Cybersecurity ToolsMSCCS/SE

After we have agreed on a master’s thesis topic, you are asked to write an exposè. Details on how to write a good exposè can be found here.

If we have agreed on a bachelor's thesis topic, your are asked to present your planned work in the "Seminar mit Bachelorarbeit". Details on how to prepare a good initial presentation can be found here

For a comprehensive oveview of my current courses, please visit the course catalogue of the University of Innsbruck.

Publications


  • Frankford, Eduard; Sauerwein, Clemens; Bassner, Patrick; Krusche, Stefan; Breu, Ruth (2024): AI-Tutoring in Software Engineering Education. Accepted for publication at the International Conference on Software Engineering - Software Engineering Eduaction and Training Track (ICSE SEET 2024)
  • Sauerwein, Clemens; Antensteiner, Tobias; Salhofer, Peter; Breu, Ruth (2024): Success Factors of Automated Programming Assessment Systems in Different Learning Environments. Accepted for publication at the 56th Hawaii International Conference on System Sciences (HICSS 2024) 
  • Sauerwein, Clemens; Wenzl, Christina; Breu, Ruth (2024): Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms. Accepted for publication at the 56th Hawaii International Conference on System Sciences (HICSS 2024)
  • Ruth, Breu; Philipp, Zech; Sashko, Ristov; Clemens Sauerwein (2023): Planung, Entwicklung und Betrieb digitaler Zwillinge im BIM-Kontext. Beton-Kalendar 2024, pp. 653 - 683
  • Fischer, Daniel; Sauerwein, Clemens; Werchan, Martin (2023): An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland. In: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES 2023), pp. 1-7
  • Sauerwein, Clemens; Antensteiner, Tobias; Oppl, Stefan; Groher, Iris; Meschtscherjakov, Alexander; Zech Philipp; Breu, Ruth (2023): Towards a Success Model for Automated Programming Assessment Systems. In: Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education (ITiCSE 2023), p.271-277
  • Fischer, Daniel; Werchan, Martin; Sauerwein, Clemens (2023): Tauschringe für Bedrohungsdaten: Status quo der Nutzung von Threat- Intelligence-Sharing-Platforms im DACH Raum. KES - Die Zeitschrift für Informations-Sicherheit, 2 (2023)
  • Sauerwein, Clemens; Breu, Ruth; Oppl, Stefan; Groher, Iris; Antensteiner, Tobias;  Podlipnig, Stefan; Prodan, Radu (2023): CodeAbility Austria – Digitally Supported Programming Education at Austrian Universities. Zeitschrift für Hochschulentwicklung, 18 (2023)
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2023): A Maturity Model for Digital Business Ecosystems from an IT Perspective. JUCS - Journal of Universal Computer Science, 29 (2023)
  • Sauerwein, Clemens; Priller, Simon; Dobiasch, Martin; Oppl, Stefan; Felderer, Michael; Breu, Ruth (2023): Lecturers' and Students' Experiences with an Automated Programming Assessment System. In: Proceedings of the 56th Hawaii International Conference on System Sciences (HICSS 2023), ISBN: 978-0-9981331-6-4, p. 54 - 63.
  • Zibak, Adam; Sauerwein, Clemens; Simpson, Andrew C. (2022): Threat Intelligence Quality Dimensions for Research and Practice. Digital Threats: Research and Practice, 4 (2022), 3484202
  • Zibak, Adam; Sauerwein, Clemens; Simpson, Andrew C. (2021): A Success Model for Cyber Threat Intelligence Management Platforms. Computers & Security, 111 (2021): 102466.
  • Ehrensperger, Robert; Sauerwein, Clemens; Breu, Ruth (2021): Towards a Maturity Model for Digital Business Ecosystems from an IT perspective. In: Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021), p. 11 - 20.
  • Ehrensperger, Robert; Sauerwein, Clemens; Breu, Ruth (2021): Rethinking Information Technology Governance for Digital Business Ecosystems. In: Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021), p. 1 - 10.
  • Sauerwein, Clemens; Fischer, Daniel; Rubsamen, Milena; Rosenberger, Guido; Stelzer, Dirk; Breu, Ruth (2021): From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. In: Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021), p. 1 - 9.
  • Pekaric, Irdin; Sauerwein, Clemens; Haselwanter, Stefan; Felderer, Michael (2021): A Taxonomy of Attack Mechanisms in the Automotive Domain. Computer Standards & Interfaces, 78 (2021): 103539
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Usage of Inter-Enterprise Architecture Models for the Management of Business Ecosystems. In: Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference Conference (EDOC 2020), p. 21 - 29.
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Information Collection for Enterprise Architecture Management.  In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 717-727
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review. In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 728-737.
  • Brunner, Michael; Sauerwein, Clemens; Felderer, Michael; Breu, Ruth (2020): Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region.  Computers & Security (2020): 101776.
  • Bauer, Sara; Daniel, Fischer; Clemens, Sauerwein; Simon, Latzel; Dirk, Stelzer; Ruth, Breu (2020): Towards an Evaluation Framework for Threat Intelligence Sharing Platforms. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS 2020),  ISBN: 978-0-9981331-3-3, p. 1947 - 1956.
  • Pekaric, Iridin; Sauerwein, Clemens; Felderer, Michael (2019): Applying Security Testing Techniques to Automotive Engineering. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), p. 1 - 10,
  • Sauerwein, Clemens; Pekaric, Irdin; Felderer, Michael; Breu, Ruth (2019): An analysis and classification of public information security data sources used in research and practice. Computers & Security, 82, p. 140-155.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): An Empirical Analysis of -Day Vulnerability Information Shared on Twitter. In: Proceedings of the 33rd International Conference on Information Security and Privacy Protection (IFIP TC- SEC). Dordrecht - Heidelberg - London - New York - Berlin: Springer.
  • Huber, Michael; Brunner, Michael; Sauerwein, Clemens; Carlan, Carmen; Breu, Ruth (2018): Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry. In: Proceedings of the 37th International Conference, (SAFECOMP 2018). New York: Springer, ISBN 978-3-319-99129-0, p. 157 - 171.
  • Ammenwerth, Elske; Hackl, Werner O.; Felderer, Michael; Sauerwein, Clemens; Hörbst, Alexander (2018): Building a Community of Inquiry Within an Online-Based Health Informatics Program: Instructional Design and Lessons Learned. In: Studies in Health Technology and Informatics 253, p. 196 - 200.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): Shadow Cyber Threat Intelligence and their Usage in Information Security and Risk Management Processes. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Lüneburg: Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, p. 1333 - 1344.
  • Sillaber, Christian.; Sauerwein, Clemens.; Mussmann, Aandrea.; Breu, Ruth. (2018): Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share. In:  Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, Bd. IV, p. 1409 - 1420.
  • Brunner, Michael; Huber, Michael; Sauerwein, Clemens; Breu, Ruth (2017): Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems. In: Proceeding of 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, ISBN 978-1-5386-2072-4, p. 334 - 340. 
  • Sauerwein, Clemens; Sillaber, Christian; Mussmann, Andrea; Breu, Ruth (2017): Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), p. 837 - 851.
  • Carver, Jeffrey C.; Burcham, Morgan; Kocak, Sedef Akinli; Bener, Ayse; Felderer, Michael; Gander, Matthias; King, Jason; Markkula, Jouni; Oivo, Markku; Sauerwein, Clemens; Williams, Laurie (2016): Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSos'16). Pittsburgh, Pennsylvania — April 19 - 21, 2016. New York: ACM Digital Library, ISBN 978-1-4503-4277-3, p. 38 - 51.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2016): Tracing masquerading attacks in distributed healthcare information systems. In: Proceedings of the 2016 SAI Computing Conference (SAI). Los Alamitos: IEEE Computer Society Press, ISBN 978-1-4673-8460-5, p. 1107 - 1117. 
  • Sauerwein, Clemens; Gander, Matthias; Felderer, Michael; Breu, Ruth (2016): A Systematic Literature Review of Crowdsourcing-Based Research in Information Security. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). March 29 2016-April 2 2016. Los Alamitos: IEEE Computer Society Press, ISBN 978-1-5090-2253-3, p. 364 - 371
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS '16. New York: ACM Digital Library, ISBN 978-1-4503-4565-1, p. 65 - 70.
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Shadow threat intelligence sources and their impact on security and risk management processes.  In: Proceedings of the 2016 SIGSEC Workshop on Information Security and Privacy. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), online.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2015): Assessing Real-Time Malware Threats.  In: 2015 IEEE International Conference on Software Quality, Reliability, and Security - Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, p. 6 - 13

© Copyright 2023 Clemens Sauerwein  - Imprint & Privacy Policy

Designed with Mobirise - Go now