Mobirise

Clemens Sauerwein

Assistant Professor

University of Innsbruck
Department of Computer Science
Quality Engineering Research Group

ICT Building Room 3S03 
Technikerstraße 21a
A-6020 Innsbruck
Austria - Europe

Email: Firstname.Secondname [AT_NOSPAM] uibk.ac.at
Phone:  +43 512 507 53345

Twitter - LinkedIn 

Research Interests

  • Information Security - Cyber Threat Intelligence Sharing, Information Security Risk Management, Cyber Resilience, Security Controls, Security Operations, Information Security Culture, Open Source & Threat Intelligence
  • Information Systems - Information and Knowledge Sharing, Crowdsourcing, Market Studies, Qualitative and Quantitative Empirical Studies
  • Security & Software Engineering Education - Novel Approaches, E-Learning, Security Awareness Trainings

Available Theses Topics

I offer topics for seminar's (SE), bachelor's (BSC) and master's (MSC) theses in the fields of computer science (CS) and information systems (IS). I supervise students studying computer science or information systems at the University of Innsbruck and other european universities. The following table provides an overview of available theses topics. If you are interested in one of the topics, feel free to contact me.

TitleTypeStudy
A Generic Framework to Mine Threat and Vulnerability from Publicly Available Information Sources
BSC/MSCCS
Modeling and Analyzing the Dynamics of Security Information on Publicly Available Information Sources
BSCCS
Development of a Natural Language Processing (NLP) Toolset for Processing Security InformationBSC/MSCCS/IS
Development of a Data Warehouse for Cyber Threat Intelligence
BSC/MSCCS/IS
Development of a Quality Assessment and Assurance Framework for Security Information
BSCCS
Development of a (Component-based) Information Security Assessment Framework for Software ArchitectsMSCCS/IS
Gamify Cybersecurity Awareness in the Construction Industry
BSC/MSCCS
A Comprehensive Analysis of the Relationship between Indicators of Compromise in Threat Intelligence Sharing Practice MSCIS
Development of Model-driven Threat Intelligence Management Approach
MSCCS

After we have agreed on a master’s thesis topic, you are asked to write an exposè. Details on how to write a good exposè can be found here.

If we have agreed on a bachelor's thesis topic, your are asked to present your planned work in the "Seminar mit Bachelorarbeit". Details on how to prepare a good initial presentation can be found here

For a comprehensive oveview of my current courses, please visit the course catalogue of the University of Innsbruck.

Publications

  • Adam, Zibak; Clemens, Sauerwein; Andrew C., Simpson (2021):  A Success Model for Cyber Threat Intelligence Management Platforms. Accepted for publication in Computers & Security (COSE2021)
  • Adam, Zibak; Clemens, Sauerwein; Andrew C., Simpson (2021): Threat Intelligence Quality Dimensions for Research and Practice. Accepted for publication in Digital Threats: Research and Practice (DTRAP 2021)
  • Robert, Ehrensperger; Clemens, Sauerwein; Ruth, Breu (2021): Towards a Maturity Model for Digital Business Ecosystems from an IT perspective. Accepted for publication in the Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021)
  • Robert, Ehrensperger; Clemens, Sauerwein; Ruht, Breu (2021): Rethinking Information Technology Governance for Digital Business Ecosystems. Accepted for publication in the Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2021)
  • Sauerwein, Clemens; Fischer, Daniel; Rubsamen, Milena; Rosenberger, Guido; Stelzer, Dirk; Breu, Ruth (2021): From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. Accepted for publication in the Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021)
  • Pekaric, Irdin; Sauerwein, Clemens; Haselwanter, Stefan; Felderer, Michael (2021): A Taxonomy of Attack Mechanisms in the Automotive Domain. Computer Standards & Interfaces, 78 (2021) 103539
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Usage of Inter-Enterprise Architecture Models for the Management of Business Ecosystems. In: Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference Conference (EDOC 2020), p. 21 - 29.
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Current Practices in the Information Collection for Enterprise Architecture Management.  In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 717-727
  • Ehrensberger, Robert; Sauerwein, Clemens; Breu, Ruth (2020): Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review. In: Proceedings of the 22nd International Conference on Enterprise Information Systems (ICEIS 2020), p. 728-737.
  • Brunner, Michael; Sauerwein, Clemens; Felderer, Michael; Breu, Ruth (2020): Risk Management Practices in Information Security: Exploring the Status Quo in the DACH Region.  Computers & Security (2020): 101776.
  • Bauer, Sara; Daniel, Fischer; Clemens, Sauerwein; Simon, Latzel; Dirk, Stelzer; Ruth, Breu (2020): Towards an Evaluation Framework for Threat Intelligence Sharing Platforms. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS 2020),  ISBN: 978-0-9981331-3-3, p. 1947 - 1956.
  • Pekaric, Iridin; Sauerwein, Clemens; Felderer, Michael (2019): Applying Security Testing Techniques to Automotive Engineering. In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), p. 1 - 10,
  • Sauerwein, Clemens; Pekaric, Irdin; Felderer, Michael; Breu, Ruth (2019): An analysis and classification of public information security data sources used in research and practice. Computers & Security, 82, p. 140-155.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): An Empirical Analysis of -Day Vulnerability Information Shared on Twitter. In: Proceedings of the 33rd International Conference on Information Security and Privacy Protection (IFIP TC- SEC). Dordrecht - Heidelberg - London - New York - Berlin: Springer.
  • Huber, Michael; Brunner, Michael; Sauerwein, Clemens; Carlan, Carmen; Breu, Ruth (2018): Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry. In: Proceedings of the 37th International Conference, (SAFECOMP 2018). New York: Springer, ISBN 978-3-319-99129-0, p. 157 - 171.
  • Ammenwerth, Elske; Hackl, Werner O.; Felderer, Michael; Sauerwein, Clemens; Hörbst, Alexander (2018): Building a Community of Inquiry Within an Online-Based Health Informatics Program: Instructional Design and Lessons Learned. In: Studies in Health Technology and Informatics 253, p. 196 - 200.
  • Sauerwein, Clemens; Sillaber, Christian; Breu, Ruth (2018): Shadow Cyber Threat Intelligence and their Usage in Information Security and Risk Management Processes. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Lüneburg: Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, p. 1333 - 1344.
  • Sillaber, Christian.; Sauerwein, Clemens.; Mussmann, Aandrea.; Breu, Ruth. (2018): Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share. In:  Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018). Leuphana Universität Lüneburg, 6.-9. März 2018. Leuphana Universität Lüneburg, ISBN 978-3-935786-72-0, Bd. IV, p. 1409 - 1420.
  • Brunner, Michael; Huber, Michael; Sauerwein, Clemens; Breu, Ruth (2017): Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems. In: Proceeding of 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, ISBN 978-1-5386-2072-4, p. 334 - 340. 
  • Sauerwein, Clemens; Sillaber, Christian; Mussmann, Andrea; Breu, Ruth (2017): Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), p. 837 - 851.
  • Carver, Jeffrey C.; Burcham, Morgan; Kocak, Sedef Akinli; Bener, Ayse; Felderer, Michael; Gander, Matthias; King, Jason; Markkula, Jouni; Oivo, Markku; Sauerwein, Clemens; Williams, Laurie (2016): Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSos'16). Pittsburgh, Pennsylvania — April 19 - 21, 2016. New York: ACM Digital Library, ISBN 978-1-4503-4277-3, p. 38 - 51.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2016): Tracing masquerading attacks in distributed healthcare information systems. In: Proceedings of the 2016 SAI Computing Conference (SAI). Los Alamitos: IEEE Computer Society Press, ISBN 978-1-4673-8460-5, p. 1107 - 1117. 
  • Sauerwein, Clemens; Gander, Matthias; Felderer, Michael; Breu, Ruth (2016): A Systematic Literature Review of Crowdsourcing-Based Research in Information Security. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). March 29 2016-April 2 2016. Los Alamitos: IEEE Computer Society Press, ISBN 978-1-5090-2253-3, p. 364 - 371
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS '16. New York: ACM Digital Library, ISBN 978-1-4503-4565-1, p. 65 - 70.
  • Sillaber, Christian; Sauerwein, Clemens; Mussmann, Andrea; Breu, Ruth (2016): Shadow threat intelligence sources and their impact on security and risk management processes.  In: Proceedings of the 2016 SIGSEC Workshop on Information Security and Privacy. Association for Information Systems (AIS) / AIS Electronic Library (AISeL), online.
  • Gander, Matthias; Sauerwein, Clemens; Breu, Ruth (2015): Assessing Real-Time Malware Threats.  In: 2015 IEEE International Conference on Software Quality, Reliability, and Security - Companion (QRS-C). Los Alamitos, California: Conference Publishing Services (CPS) - IEEE Computer Society, p. 6 - 13

© Copyright 2021 Clemens Sauerwein  - Imprint & Privacy Policy

This website was started with Mobirise site themes