default search action
Stefan Schauer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Lazaros Papadopoulos, Konstantinos P. Demestichas, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Pérez-Llopis, Tim H. Stelkens-Kobsch, Tamara Hadjina, Jelena Levak:
Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach. Int. J. Crit. Infrastructure Prot. 44: 100657 (2024) - [c23]Maximilian Greiner, Judith Strussenberg, Andreas Seiler, Stefan Hofbauer, Michael Schuster, Damian Stano, Günter Fahrnberger, Stefan Schauer, Ulrike Lechner:
Scared? Prepared? Toward a Ransomware Incident Response Scenario. I4CS 2024: 289-320 - 2023
- [j8]Sebastian Chlup, Korbinian Christl, Christoph Schmittner, Abdelkader Magdy Shaaban, Stefan Schauer, Martin Latzenhofer:
THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity. Inf. 14(1): 14 (2023) - [c22]Stefan Schauer, Tamara Hadjina, Melita Damjanovic, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Javier Hingant Gómez, Lazaros Papadopoulos:
Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework. ARES 2023: 109:1-109:7 - [c21]Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina:
PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats. ARES 2023: 112:1-112:6 - 2022
- [j7]Stefan Rass, Sandra König, Stefan Schauer:
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements. Games 13(6): 80 (2022) - [i3]Stefan Rass, Sandra König, Stefan Schauer:
Defending Against Advanced Persistent Threats using Game-Theory. CoRR abs/2205.00956 (2022) - [i2]Stefan Rass, Sandra König, Stefan Schauer:
Decisions with Uncertain Consequences - A Total Ordering on Loss-Distributions. CoRR abs/2205.00957 (2022) - 2021
- [j6]Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martín, Stefan Schauer, Andreas Poppe, Christoph Pacher, Miroslav Voznák:
Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 53(5): 96:1-96:41 (2021) - [c20]Sandra König, Stefan Schauer, Stefan Rass:
Multi-categorical Risk Assessment for Urban Critical Infrastructures. CRITIS 2021: 152-167 - [c19]Stefan Schauer, Stefan Rass, Sandra König:
Simulation-driven Risk Model for Interdependent Critical Infrastructures. ISCRAM 2021: 404-415 - 2020
- [b1]Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu:
Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach. Springer 2020, ISBN 978-3-030-46907-8, pp. 1-282 - [c18]Stefan Schauer, Stefan Rass:
Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities. Critical Infrastructure Protection 2020: 307-323 - [c17]Stefan Schauer, Stefan Rass, Sandra König, Klaus Steinnocher, Thomas Schaberreiter, Gerald Quirchmayr:
Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS Approach. ISCRAM 2020: 652-662
2010 – 2019
- 2019
- [c16]Stefan Schauer, Thomas Grafenauer, Sandra König, Manuel Warum, Stefan Rass:
Estimating Cascading Effects in Cyber-Physical Critical Infrastructures. CRITIS 2019: 43-56 - [c15]Stefan Schauer, Eleni-Maria Kalogeraki, Spyros Papastergiou, Christos Douligeris:
Detecting Sophisticated Attacks in Maritime Environments using Hybrid Situational Awareness. ICT-DM 2019: 1-7 - [c14]Sandra König, Stefan Schauer:
Cascading Threats in Critical Infrastructures with Control Systems. ISCRAM 2019 - 2018
- [j5]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Risk Assessment Uncertainties in Cybersecurity Investments. Games 9(2): 34 (2018) - [c13]Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer:
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. ARES 2018: 30:1-30:8 - [c12]Sandra König, Thomas Schaberreiter, Stefan Rass, Stefan Schauer:
A Measure for Resilience of Critical Infrastructures. CRITIS 2018: 57-71 - [c11]Stefan Schauer, Benjamin Rainer, Nicolas Museux, David Faure, Javier Hingant, Federico Jesús Carvajal Rodrigo, Stefan Beyer, Rafael Company Peris, Sergio Zamarripa Lopez:
Conceptual Framework for Hybrid Situational Awareness in Critical Port Infrastructures. CRITIS 2018: 191-203 - [c10]Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer:
Disappointment-Aversion in Security Games. GameSec 2018: 314-325 - [c9]Stefan Schauer, Stefan Rass, Sandra König, Thomas Grafenauer, Martin Latzenhofer:
Analyzing Cascading Effects among Critical Infrastructures. ISCRAM 2018 - 2017
- [j4]Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann de Meer:
Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. IEEE Access 5: 8394-8407 (2017) - [c8]Stefan Rass, Sandra König, Stefan Schauer:
On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. GameSec 2017: 494-505 - [e1]Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0 [contents] - [i1]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Uncertainty in Cyber Security Investments. CoRR abs/1712.05893 (2017) - 2016
- [c7]Volker Skwarek, Thorsten Kistler, Mark Rawer, Stefan Schauer:
IoT und Sensornetzwerke: Entwurf und Programmierung von Niedrigstenergiesystemen anhand einer Metaarchitektur. GI-Jahrestagung 2016: 1917-1925 - [c6]Sandra König, Stefan Schauer, Stefan Rass:
A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. NordSec 2016: 67-81 - [c5]Antonios Gouglidis, Benjamin Green, Jeremy Busby, Mark Rouncefield, David Hutchison, Stefan Schauer:
Threat awareness for critical infrastructures resilience. RNDM 2016: 196-202 - 2015
- [j3]Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer:
Secure Communication over Software-Defined Networks. Mob. Networks Appl. 20(1): 105-110 (2015) - [c4]Stefan Rass, Sandra König, Stefan Schauer:
Uncertainty in Games: Using Probability-Distributions as Payoffs. GameSec 2015: 346-357 - 2014
- [c3]Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer:
Secure Communication over Software-Defined Networks. IoT360 (2) 2014: 211-221 - 2013
- [c2]Stefan Rass, Benjamin Rainer, Matthias Vavti, Stefan Schauer:
A Network Modeling and Analysis Tool for Perfectly Secure Communication. AINA 2013: 267-275 - 2012
- [j2]Stefan Schauer, Benjamin Rainer, Rene Schmid:
Ein spieltheoretischer Ansatz für das IT-Security-Risikomanagement - Ergebnisse des SERIMA-Projekts. Datenschutz und Datensicherheit 36(7): 492-496 (2012)
2000 – 2009
- 2008
- [j1]Stefan Schauer, Ulrich Kutschera:
Methylotrophic bacteria on the surfaces of field-grown sunflower plants: a biogeographic perspective. Theory Biosci. 127(1): 23-29 (2008) - [c1]Christian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass:
Application framework for high security requirements in R&D environments based on quantum cryptography. CRiSIS 2008: 193-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint