Team

FH-Prof. Mag. Dr. Simon Tjoa

  • Studiengangsleiter Information Security (MA)
  • Stellvertretender Departmentleiter
  • Department Informatik und Security
Arbeitsplatz: A - Matthias Corvinus-Straße 15
M: +43/676/847 228 641

Studiengänge

  • Information Security (MA)
  • IT-Security Expert (akad.)
  • Angewandte Forschung und Innovation in Informatik (MA)
  • IT Security (BA)

Departments

  • Informatik und Security

Kurzprofil

  • 1997 – 2007: Mitglied des Organisationsteams der DEXA Konferenz
  • 2000 – 2003: Technischer Angestellter bei der Ärzte und Logistikfirma Computer Software Production (CSP)
  • Seit 2006: Wissenschaftlicher Mitarbeiter beim industriellen Kompetenzzentrum Secure Business Austria
  • Seit 2007: Security Consultant bei Security Research

Hier geht es zum vollständigen Profil auf www.fhstp.ac.at

Publikationen

Tjoa, S. (2019, January). Nostradamus 4.0 – Die Wissenschaft hinter Vorhersagen. Presented at the Security Day, FH St. Pölten.
Tjoa, S. (2018, February). Neuer Studiengang „Data Science and Business Analytics. Presented at the Studiengangbeirat, Fachhochschule St. Pölten.
Tjoa, S., & Temper, M. (2018, January). Data Science Innovations. Presented at the Security Day, FH St. Pölten.
Tjoa, S. (2018). Campus Talk "Data Science studieren" [Campus & City Radio 94.4].
Tjoa, S. (2018). Big Challenges – Future cyber-security challenges and the role of software security and assurance in the era of IoT, industry 4.0 and big data. Presented at the ICSSA Konferenz, Seoul, South Korea.
Luh, Robert, Temper, M., Tjoa, S., & Schrittwieser, S. (2018). APT RPG: Design of a Gamified Attacker/Defender Meta Model. In International Workshop on FORmal methods for Security Engineering.
Tjoa, S. (2018). Data Science and Business Analytics - Staune was mit Daten alles möglich ist. Presented at the BEST, Wien.
Geko, M., & Tjoa, S. (2018). An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. In CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018. Ljubljana, Slovenia: ACM. https://doi.org/10.1145/3277570.3277590
Rieger, D., & Tjoa, S. (2018). A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. Presented at the International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018), Springer.
Ryoo, J., Kim, S., Cho, J., Kim, H., Tjoa, S., & Derobertis, C. (2017). IoE Security Threats and You. In International Conference on Software Security and Assurance (ICSSA). IEEE.
KAUSPADIENE, L., CENYS, A., GORANIN, N., TJOA, S., & RAMANAUSKAITE, S. (2017). High-Level Self-Sustaining Information Security Management Framework. Baltic J. Modern Computing, 5, 107–123. https://doi.org/http://dx.doi.org/10.22364/bjmc.2017.5.1.07
Tjoa, A. M., & Tjoa, S. (2016). The Role of ICT to Achieve the UN Sustainable Development Goals (SDG). In ICT for Promoting Human Development and Protecting the Environment (pp. 3–13). Springer. https://doi.org/10.1007/978-3-319-44447-5_1
Wegerer, M., & Tjoa, S. (2016). Defeating the Database Adversary Using Deception – A MySQL Database Honeypot. Presented at the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Temper, M., & Tjoa, S. (2016). The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. Presented at the the 2016 International Conference on Software Security and Assurance (ICSSA), IEEE.
Temper, M., Tjoa, S., & Kaiser, M. (2015). Touch to Authenticate – Continuous Biometric Authentication on Mobile Devices. Presented at the International Conference on Software Security and Assurance (ICSSA), Korea: IEEE Computer Society.
Koinig, U., Tjoa, S., & Ryoo, J. (2015). Contrology - an ontology-based cloud assurance approach. In IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). Larcana, Cyprus: IEEE.
Tjoa, S., & Rybnicek, M. (2015). Modellierung und Simulation kritischer IKT Infrastrukturen und deren Abhängigkeiten. In Cyber Attack Information System - Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung. Vieweg+Teubner Verlag.
Tjoa, S., Kochberger, P., Malin, C., & Schmoll, A. (2015). An Open Source Code Analyzer and Reviewer (OSCAR) Framework. In 2nd International Workshop on Software Assurance. Toulouse, France: IEEE.
Poisel, R., Rybnicek, M., & Tjoa, S. (2014). Taxonomy of Data Fragment Classification Technique. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 132, pp. 67–85). Moscow, Russia: Springer.
Ouedraogo, M., Kuo, C.-T., Tjoa, S., Preston, D., Dubois, E., Simoes, P., & Tiago, C. (2014). Keeping an Eye on Your Security Through Assurance Indicators. Presented at the 12th International Conference on Security and Cryptography (SECRYPT), Scitpress DigitalLibrary.
Rybnicek, M., Tjoa, S., & Poisel, R. (2014). Simulation-based Cyber-Attack Assessment of Critical Infrastructures. In Lecture Notes in Business Information Processing. Thessaloniki, Griechenland: Springer.
Poisel, R., Rybnicek, M., Schildendorfer, B., & Tjoa, S. (2013). Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 5(3).
Poisel, R., Malzer, E., & Tjoa, S. (2013). Evidence and Cloud Computing: The Virtual Machine Introspection Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4(1), 135–152.
Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Facebook Watchdog: A Research Agenda For Detecting Online Grooming and Bullying Activities. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). Manchester, England: IEEE.
Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Automatisierte Akquise und Auswertung kinderpornographischer Inhalte. In 7. Forschungsforum der Österreichischen Fachhochschulen. Dornbirn, Austria.
Schrattenholzer, M., Ruzicka, M., Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Wer spielt gewinnt. In D-A-CH Security. Nürnberg, Deutschland.
Poisel, R., Rybnicek, M., & Tjoa, S. (2013). Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures. In International Conference on Advanced Information Networking and Applications (AINA). Barcelona, Spain: IEEE.
Poisel, R., & Tjoa, S. (2012). Discussion on the Challenges and Opportunities of Cloud Forensics. In Multidisciplinary Research and Practice for Information Systems (Vol. 7465, pp. 593–608). Springer.
Poisel, R., & Tjoa, S. (2012). Discussion on the Challenges and Opportunities of Cloud Forensics. In Multidisciplinary Research and Practice for Information Systems (Vol. 7465, pp. 593–608). Springer.
Fischer, M., Rybnicek, M., & Tjoa, S. (2012). A Novel Palm Vein Recognition Approach Based on Enhanced Local Gabor Binary Patterns Histogram Sequence. In 19th International Conference on Systems, Signals and Image Processing (IWSSIP"12) (pp. 429–432). Vienna, Austria: IEEE.
Poisel, R., & Tjoa, S. (2012). Inhaltsbasierte Wiederherstellung multimedialer Dateien. In 6. Forschungsforum der Österreichischen Fachhochschulen - Tagungsband 1 Informationstechnologie als Produktionsfaktor (pp. 119–123). Graz, Österreich: Eigenverlag FH Joanneum GmbH.
Rybnicek, M., Poisel, R., Ruzicka, M., & Tjoa, S. (2012). A Generic Approach to Critical Infrastructures Modeling and Simulation. In ASE International Conference on Cyber Security. Washington, DC: IEEE.
Poisel, R., Tjoa, S., & Tavolato, P. (2011). Advanced File Carving Approaches for Multimedia Files. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2(4), 40–57.
Tjoa, S., Jakoubi, S., Goluch, G., Kitzler, G., Goluch, S., & Quirchmayr, G. (2011). A Formal Approach Enabling Risk-aware Business Process Modeling and Simulation. IEEE Transactions on Services Computing, 4(2), 153–166.
Tjoa, S., & Poisel, R. (2011). A reference architecture for a scalable digital forensics toolkit. In 5. Forschungsforum der Österreichischen Fachhochschulen. Wien, Austria: FH Campus Wien.
Poisel, R., & Tjoa, S. (2011). Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art. In Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (pp. 48–61). Stuttgart, Germany: IEEE Computer Society.
Poisel, R., & Tjoa, S. (2011). Roadmap to Approaches for Carving of Fragmented Multimedia Files. In Proceedings of The Fourth International Workshop on Digital Forensics (WSDF"11) (pp. 752–757). Wien, Austria: IEEE.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). Risk-Aware Business Process Management - Establishing the Link Between Business and Security. In Complex Intelligent Systems and Their Applications (Vol. 41, pp. 109–135). Springer-Verlag.
Tjoa, S., Jakoubi, S., Goluch, S., & Kitzler, G. (2010). Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. In International Conference on Availability, Reliability, and Security (ARES"10) (pp. 268–274). Krakow, Poland: IEEE Computer Society.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. In International Conference on Availability, Reliability, and Security (ARES"10) (pp. 180–187). Krakow, Poland: IEEE Computer Society.
Jakoubi, S., Neubauer, T., & Tjoa, S. (2009). A roadmap to risk-aware business process management. In IEEE Asia-Pacific Services Computing Conference (IEEE APSCC"09) (pp. 23–27). Biopolis, Singapore: IEEE Computer Society.