FH-Prof. Mag. Dr. Simon Tjoa

International Coordinator
Department of Computer Science and Security
  • Computer Science and Security
Study programmes:
  • IT Security (BA)
  • Information Security (MA)
Continuing Education Course:
  • IT-Security Expert (acad.)
  • Institute of IT Security Research

Selected Publications

A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
Rieger David, Tjoa Simon, , International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018), Springer, 2018.
APT RPG: Design of a Gamified Attacker/Defender Meta Model
Robert Luh, Temper Marlies, Tjoa Simon, Schrittwieser Sebastian, In: International Workshop on FORmal methods for Security Engineering, International Workshop on FORmal methods for Security Engineering, 2018.
The Role of ICT to Achieve the UN Sustainable Development Goals (SDG)
Tjoa A Min, Tjoa Simon, In: ICT for Promoting Human Development and Protecting the Environment, 6th IFIP World Information Technology Forum, WITFOR 2016, Springer, pp. 3-13, URL: http://link.springer.com/chapter/10.1007/978-3-319-44447-5_1/fulltext.html, 10.1007/978-3-319-44447-5_1, 2016.
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication
Temper Marlies, Tjoa Simon, , the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
Defeating the Database Adversary Using Deception – A MySQL Database Honeypot
Wegerer Mathias, Tjoa Simon, , 2016 International Conference on Software Security and Assurance (ICSSA), IEEE, 2016.
Contrology - an ontology-based cloud assurance approach
Koinig Ulrich, Tjoa Simon, Ryoo Jungwoo, In: IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Larcana, Cyprus, IEEE, 2015.
An Open Source Code Analyzer and Reviewer (OSCAR) Framework
Tjoa Simon, Kochberger Patrick, Malin Christoph, Schmoll Andreas, In: 2nd International Workshop on Software Assurance, Toulouse, France, IEEE, 2015.
Touch to Authenticate – Continuous Biometric Authentication on Mobile Devices
Temper Marlies, Tjoa Simon, Kaiser Manfred, , International Conference on Software Security and Assurance (ICSSA), Korea, IEEE Computer Society, 2015.
Modellierung und Simulation kritischer IKT Infrastrukturen und deren Abhängigkeiten
Tjoa Simon, Rybnicek Marlies, In: Cyber Attack Information System - Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung. , Xpert.press, Vieweg+Teubner Verlag, 2015.
Taxonomy of Data Fragment Classification Technique
Poisel Rainer, Rybnicek Marlies, Tjoa Simon, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 5th International Conference on Digital Forensics & Cyber Crime, 132, Moscow, Russia, Springer, pp. 67-85, 2014.