Mobirise

Clemens Sauerwein

Assistant Professor for Security Engineering

University of Innsbruck
Department of Computer Science

ICT Building Room 3S03 
Technikerstraße 21a
A-6020 Innsbruck
Austria - Europe

Email: Firstname.Secondname [AT_NOSPAM] uibk.ac.at
Phone:  +43 512 507 53345

LinkedIn 

Research Interests

  • Information Security - Cyber Threat Intelligence Sharing, Information Security Risk Management, Security Engineering, Organizational Security Culture, Open Source Intelligence, SMEs Cyber Security
  • Information Systems - Information and Knowledge Sharing, Crowdsourcing, Socio-technical Systems Analysis, Qualitative and Quantitative Empirical Studies
  • Security & Software Engineering Education - Innovative & Scalable Approaches, E-Learning & Interactive Training Environments, Security Awareness Trainings, Integration of AI

Available Theses Topics

I offer topics for seminar's (SE), bachelor's (BSC) and master's (MSC) theses in the fields of computer science (CS), software engineering (SE) and information systems (IS). I supervise students studying computer science or information systems at the University of Innsbruck and other European universities. The following table provides an overview of available theses topics. If you are interested in one of the topics, feel free to contact me.


After we have agreed on a master’s thesis topic, you are asked to write an exposè. Details on how to write a good exposè can be found here.

If we have agreed on a bachelor's thesis topic, your are asked to present your planned work in the "Seminar mit Bachelorarbeit". Details on how to prepare a good initial presentation can be found here

Publications


  • Pekaric, Irdin; Sauerwein, Clemens; Laichner, Simon, Breu, Ruth (2025): How do Mobile Applications enhance Security? An Exploratory Analysis of Use Cases and Provided Information. Accepted for publication ate the ACM Southeast Conference 2025 (ACMSE 2025)
  • Bjarne, Lill; Sauerwein, Clemens; Zeisler, Alexander; Hochstrasser, Carina; Mexis, Nico (2025): Assessing Cybersecurity Readiness Among SMEs. In: Proceedings of the 27th International Conference on Enterprise Information Systems - Volume 2 (ICEIS 2025), p. 253 - 263, Link
  • Sauerwein, Clemens; Haas, Christoph; Breu, Ruth (2025): A Framework for Collecting and Processing Publicly Available Security Information into Actionable Threat Intelligence. In: Proceedings of the 58th Hawaii International Conference on System Sciences 2025 (HICSS 2025), p. 6191, Link 
  • Fischer, Daniel; Sauerwein, Clemens; Sayin, Marie-Liz; Stelzer, Dirk; Breu, Ruth (2024): The Role of Threat Intelligence Sharing Platforms in Companies, Public Authorities, and Universities: Insights from an Exploratory Global Survey. In: Proceedings of the IEEE International Conference on Big Data (BigData 2024), pp. 2616-2623, Link
  • Vierhauser, Michael; Groher, Iris; Antensteiner, Tobias; Sauerwein, Clemens (2024): Towards integrating emerging AI applications in SE education. In: Proceedings of the 36th International Conference on Software Engineering Education and Training (CSEE&T 2024), pp. 1-5, Link
  • Frankford, Eduard; Hoehn, Ingo; Sauerwein, Clemens; Breu, Ruth (2024): A Survey Study on the State of the Art of Programming Exercise Generation using Large Language Models. In: Proceedings of the 36th International Conference on Software Engineering Education and Training (CSEE&T 2024), pp. 1-5, Link
  • Vierhauser, Michael; Groher, Iris; Sauerwein, Clemens; Antensteiner, Tobias; Hastmanstorfer, Sebastian (2024): Learning Analytics Support in Higher-Education: Towards a Multi-Level Shared Learning Analytics Framework. In: Proceedings of the 16th International Conferece on Computer Supported Education 2024 (CSEDU 2024), Link
  • Frankford, Eduard; Crazzolara, Daniel; Sauerwein, Clemens; Vierhauser, Michael; Breu, Ruth (2024): Requirements for an Online Integrated Development Environment for Automated Programming Assessment Systems. In: Proceedings of the 16th International Conferece on Computer Supported Education 2024 (CSEDU 2024), Link
  • Frankford, Eduard; Sauerwein, Clemens; Bassner, Patrick; Krusche, Stefan; Breu, Ruth (2024): AI-Tutoring in Software Engineering Education. In: Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training (ICSE SEET 2024), pp. 309 - 319, Link
  • Sauerwein, Clemens; Antensteiner, Tobias; Salhofer, Peter; Breu, Ruth (2024): Success Factors of Automated Programming Assessment Systems in Different Learning Environments. In: Proceedings of the 56th Hawaii International Conference on System Sciences (HICSS 2024), pp. 94 - 103, Link
  • Sauerwein, Clemens; Wenzl, Christina; Breu, Ruth (2024): Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms. In: Proceedings of the 56th Hawaii International Conference on System Sciences (HICSS 2024), pp. 1921 - 1930, Link
  • Martin Werchan, Daniel Fischer, Clemens Sauerwein, Dirk Stelzer (2023): Nutzung von Threat Intelligence Sharing Platforms - eine empirische Untersuchung im DACH-Raum. Ilmenauer Beiträge zur Wirtschaftsinformatik 2023, Bd. 02
  • Ruth, Breu; Philipp, Zech; Sashko, Ristov; Clemens Sauerwein (2023): Planung, Entwicklung und Betrieb digitaler Zwillinge im BIM-Kontext. Beton-Kalendar 2024, pp. 653 - 683
  • Fischer, Daniel; Sauerwein, Clemens; Werchan, Martin (2023): An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland. In: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES 2023), pp. 1-7
  • Sauerwein, Clemens; Antensteiner, Tobias; Oppl, Stefan; Groher, Iris; Meschtscherjakov, Alexander; Zech Philipp; Breu, Ruth (2023): Towards a Success Model for Automated Programming Assessment Systems. In: Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education (ITiCSE 2023), p.271-277
  • Fischer, Daniel; Werchan, Martin; Sauerwein, Clemens (2023): Tauschringe für Bedrohungsdaten: Status quo der Nutzung von Threat- Intelligence-Sharing-Platforms im DACH Raum. KES - Die Zeitschrift für Informations-Sicherheit, 2 (2023)
  • Sauerwein, Clemens; Breu, Ruth; Oppl, Stefan; Groher, Iris; Antensteiner, Tobias;  Podlipnig, Stefan; Prodan, Radu (2023): CodeAbility Austria – Digitally Supported Programming Education at Austrian Universities. Zeitschrift für Hochschulentwicklung, 18 (2023)
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2023): A Maturity Model for Digital Business Ecosystems from an IT Perspective. JUCS - Journal of Universal Computer Science, 29 (2023)
  • Sauerwein, Clemens; Priller, Simon; Dobiasch, Martin; Oppl, Stefan; Felderer, Michael; Breu, Ruth (2023): Lecturers' and Students' Experiences with an Automated Programming Assessment System. In: Proceedings of the 56th Hawaii International Conference on System Sciences (HICSS 2023), ISBN: 978-0-9981331-6-4, p. 54 - 63.
  • Zibak, Adam; Sauerwein, Clemens; Simpson, Andrew C. (2022): Threat Intelligence Quality Dimensions for Research and Practice. Digital Threats: Research and Practice, 4 (2022), 3484202
  • Zibak, Adam; Sauerwein, Clemens; Simpson, Andrew C. (2021): A Success Model for Cyber Threat Intelligence Management Platforms. Computers & Security, 111 (2021): 102466.
  • Ehrensperger, Robert; Sauerwein, Clemens; Breu, Ruth (2021): Towards a Maturity Model for Digital Business Ecosystems from an IT perspective. In: Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021), p. 11 - 20.
  • Ehrensperger, Robert; Sauerwein, Clemens; Breu, Ruth (2021): Rethinking Information Technology Governance for Digital Business Ecosystems. In: Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021), p. 1 - 10.
  • Sauerwein, Clemens; Fischer, Daniel; Rubsamen, Milena; Rosenberger, Guido; Stelzer, Dirk; Breu, Ruth (2021): From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. In: Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021), p. 1 - 9.
  • Pekaric, Irdin; Sauerwein, Clemens; Haselwanter, Stefan; Felderer, Michael (2021): A Taxonomy of Attack Mechanisms in the Automotive Domain. Computer Standards & Interfaces, 78 (2021): 103539
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Usage of Inter-Enterprise Architecture Models for the Management of Business Ecosystems. In: Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference Conference (EDOC 2020), p. 21 - 29.
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Information Collection for Enterprise Architecture Management.  In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 717-727
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review. In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 728-737.
  • Brunner, Michael; Sauerwein, Clemens; Felderer, Michael; Breu, Ruth (2020): Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region.  Computers & Security (2020): 101776.
  • Bauer, Sara; Daniel, Fischer; Clemens, Sauerwein; Simon, Latzel; Dirk, Stelzer; Ruth, Breu (2020): Towards an Evaluation Framework for Threat Intelligence Sharing Platforms. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS 2020),  ISBN: 978-0-9981331-3-3, p. 1947 - 1956.
  • Pekaric, Iridin; Sauerwein, Clemens; Felderer, Michael (2019): Applying Security Testing Techniques to Automotive Engineering. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), p. 1 - 10,
  • Sauerwein, Clemens; Pekaric, Irdin; Felderer, Michael; Breu, Ruth (2019): An analysis and classification of public information security data sources used in research and practice. Computers & Security, 82, p. 140-155.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): An Empirical Analysis of -Day Vulnerability Information Shared on Twitter. In: Proceedings of the 33rd International Conference on Information Security and Privacy Protection (IFIP TC- SEC). Dordrecht - Heidelberg - London - New York - Berlin: Springer.
  • Huber, Michael; Brunner, Michael; Sauerwein, Clemens; Carlan, Carmen; Breu, Ruth (2018): Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry. In: Proceedings of the 37th International Conference, (SAFECOMP 2018). New York: Springer, ISBN 978-3-319-99129-0, p. 157 - 171.
  • Ammenwerth, Elske; Hackl, Werner O.; Felderer, Michael; Sauerwein, Clemens; Hörbst, Alexander (2018): Building a Community of Inquiry Within an Online-Based Health Informatics Program: Instructional Design and Lessons Learned. In: Studies in Health Technology and Informatics 253, p. 196 - 200.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): Shadow Cyber Threat Intelligence and their Usage in Information Security and Risk Management Processes. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Lüneburg: Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, p. 1333 - 1344.
  • Sillaber, Christian.; Sauerwein, Clemens.; Mussmann, Aandrea.; Breu, Ruth. (2018): Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share. In:  Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, Bd. IV, p. 1409 - 1420.
  • Brunner, Michael; Huber, Michael; Sauerwein, Clemens; Breu, Ruth (2017): Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems. In: Proceeding of 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, ISBN 978-1-5386-2072-4, p. 334 - 340. 
  • Sauerwein, Clemens; Sillaber, Christian; Mussmann, Andrea; Breu, Ruth (2017): Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), p. 837 - 851.
  • Carver, Jeffrey C.; Burcham, Morgan; Kocak, Sedef Akinli; Bener, Ayse; Felderer, Michael; Gander, Matthias; King, Jason; Markkula, Jouni; Oivo, Markku; Sauerwein, Clemens; Williams, Laurie (2016): Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSos'16). Pittsburgh, Pennsylvania — April 19 - 21, 2016. New York: ACM Digital Library, ISBN 978-1-4503-4277-3, p. 38 - 51.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2016): Tracing masquerading attacks in distributed healthcare information systems. In: Proceedings of the 2016 SAI Computing Conference (SAI). Los Alamitos: IEEE Computer Society Press, ISBN 978-1-4673-8460-5, p. 1107 - 1117. 
  • Sauerwein, Clemens; Gander, Matthias; Felderer, Michael; Breu, Ruth (2016): A Systematic Literature Review of Crowdsourcing-Based Research in Information Security. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). March 29 2016-April 2 2016. Los Alamitos: IEEE Computer Society Press, ISBN 978-1-5090-2253-3, p. 364 - 371
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS '16. New York: ACM Digital Library, ISBN 978-1-4503-4565-1, p. 65 - 70.
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Shadow threat intelligence sources and their impact on security and risk management processes.  In: Proceedings of the 2016 SIGSEC Workshop on Information Security and Privacy. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), online.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2015): Assessing Real-Time Malware Threats.  In: 2015 IEEE International Conference on Software Quality, Reliability, and Security - Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, p. 6 - 13

© Copyright 2025 Clemens Sauerwein  - Imprint & Privacy Policy

Designed with Mobirise - Learn more