Zurück

FH-Prof. Mag. Dr. Simon Tjoa

  • Departmentleiter
  • Studiengangsleiter Cyber Security and Resilience (MA)
  • Studiengangsleiter Information Security (MA)
  • Internationaler Koordinator
  • Department Informatik und Security
Arbeitsplatz: A - Matthias Corvinus-Straße 15
M: +43/676/847 228 641

Studiengänge

  • Cyber Security and Resilience (MA)
  • Information Security (MA)
  • IT-Security Expert (akad.)
  • Applied Research and Innovation in Computer Science (MA)
  • Digital Healthcare (MA)
  • IT Security (BA)

Departments

  • Informatik und Security
  • Medien und Digitale Technologien

Kurzprofil

  • 1997 – 2007: Mitglied des Organisationsteams der DEXA Konferenz
  • 2000 – 2003: Technischer Angestellter bei der Ärzte und Logistikfirma Computer Software Production (CSP)
  • Seit 2006: Wissenschaftlicher Mitarbeiter beim industriellen Kompetenzzentrum Secure Business Austria
  • Seit 2007: Security Consultant bei Security Research

Publikationen

Kieseberg, P., Tjoa, S., & Geyer, H. (2021). Security Management and the Slow Adoption of Blockchains. ERCIM News, 125, 47–48.
Tjoa, S., Buttinger, C., Holzinger, K., & Kieseberg, P. (2020). Penetration Testing Artificial Intelligence. ERCIM News, 123, 36–37. https://phaidra.fhstp.ac.at/o:4338
Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., & Janicke, H. (2019). PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. Journal of Computer Virology and Hacking Techniques. https://doi.org/10/gh378z
Tjoa, S. (2019, January 29). Nostradamus 4.0 – Die Wissenschaft hinter Vorhersagen. Security Day, FH St. Pölten.
Tjoa, S. (2018, February 20). Neuer Studiengang „Data Science and Business Analytics. Studiengangbeirat, Fachhochschule St. Pölten.
Geko, M., & Tjoa, S. (2018). An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018. CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018, Ljubljana, Slovenia. https://doi.org/10/gfxqw4
Rieger, D., & Tjoa, S. (2018). A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. International Conference on Intelligent Networking and Collaborative Systems (INCoS-2018).
Luh, Robert, Temper, M., Tjoa, S., & Schrittwieser, S. (2018). APT RPG: Design of a Gamified Attacker/Defender Meta Model. International Workshop on FORmal Methods for Security Engineering. International Workshop on FORmal methods for Security Engineering.
Tjoa, S. (2018). Data Science and Business Analytics - Staune was mit Daten alles möglich ist. BEST, Wien.
Tjoa, S., & Temper, M. (2018, January 30). Data Science Innovations. Security Day, FH St. Pölten.
Tjoa, S. (2018). Campus Talk "Data Science studieren" [Campus & City Radio 94.4]. https://soundcloud.com/fhstp/campus-talk-data-science-studieren-mit-simon-tjoa
Tjoa, S. (2018). Big Challenges – Future cyber-security challenges and the role of software security and assurance in the era of IoT, industry 4.0 and big data. ICSSA Konferenz, Seoul, South Korea.
Ryoo, J., Kim, S., Cho, J., Kim, H., Tjoa, S., & Derobertis, C. (2017). IoE Security Threats and You. International Conference on Software Security and Assurance (ICSSA). ICSSA 2017. https://doi.org/10/gh374c
KAUSPADIENE, L., CENYS, A., GORANIN, N., TJOA, S., & RAMANAUSKAITE, S. (2017). High-Level Self-Sustaining Information Security Management Framework. Baltic J. Modern Computing, 5, 107–123. https://doi.org/10/gh372r
Temper, M., & Tjoa, S. (2016). The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. the 2016 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/gh3747
Wegerer, M., & Tjoa, S. (2016). Defeating the Database Adversary Using Deception – A MySQL Database Honeypot. 2016 International Conference on Software Security and Assurance (ICSSA). https://doi.org/10/gh3745
Tjoa, A. M., & Tjoa, S. (2016). The Role of ICT to Achieve the UN Sustainable Development Goals (SDG). ICT for Promoting Human Development and Protecting the Environment, 3–13. https://doi.org/10.1007/978-3-319-44447-5_1
Tjoa, S., Kochberger, P., Malin, C., & Schmoll, A. (2015). An Open Source Code Analyzer and Reviewer (OSCAR) Framework. 2nd International Workshop on Software Assurance. https://doi.org/10/gh3733
Temper, M., Tjoa, S., & Kaiser, M. (2015). Touch to Authenticate – Continuous Biometric Authentication on Mobile Devices. International Conference on Software Security and Assurance (ICSSA), Korea.
Koinig, U., Tjoa, S., & Ryoo, J. (2015). Contrology - an ontology-based cloud assurance approach. IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
Tjoa, S., & Rybnicek, M. (2015). Modellierung und Simulation kritischer IKT Infrastrukturen und deren Abhängigkeiten. In Cyber Attack Information System - Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung. Vieweg+Teubner Verlag.
Ouedraogo, M., Kuo, C.-T., Tjoa, S., Preston, D., Dubois, E., Simoes, P., & Tiago, C. (2014). Keeping an Eye on Your Security Through Assurance Indicators. 12th International Conference on Security and Cryptography (SECRYPT). https://doi.org/10/gh375c
Poisel, R., Rybnicek, M., & Tjoa, S. (2014). Taxonomy of Data Fragment Classification Technique. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 132, 67–85.
Rybnicek, M., Tjoa, S., & Poisel, R. (2014). Simulation-based Cyber-Attack Assessment of Critical Infrastructures. Lecture Notes in Business Information Processing. 10th International Workshop on Enterprise & Organizational Modeling and Simulation (EOMAS 2014), Thessaloniki, Griechenland.
Poisel, R., Rybnicek, M., Schildendorfer, B., & Tjoa, S. (2013). Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 5(3).
Poisel, R., Malzer, E., & Tjoa, S. (2013). Evidence and Cloud Computing: The Virtual Machine Introspection Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4(1), 135–152.
Poisel, R., Rybnicek, M., & Tjoa, S. (2013). Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures. International Conference on Advanced Information Networking and Applications (AINA).
Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Automatisierte Akquise und Auswertung kinderpornographischer Inhalte. 7. Forschungsforum der Österreichischen Fachhochschulen.
Schrattenholzer, M., Ruzicka, M., Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Wer spielt gewinnt. D-A-CH Security.
Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Facebook Watchdog: A Research Agenda For Detecting Online Grooming and Bullying Activities. IEEE International Conference on Systems, Man, and Cybernetics (SMC).
Fischer, M., Rybnicek, M., & Tjoa, S. (2012). A Novel Palm Vein Recognition Approach Based on Enhanced Local Gabor Binary Patterns Histogram Sequence. 19th International Conference on Systems, Signals and Image Processing (IWSSIP"12), 429–432. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6208168
Poisel, R., & Tjoa, S. (2012). Discussion on the Challenges and Opportunities of Cloud Forensics. In Multidisciplinary Research and Practice for Information Systems (Vol. 7465, pp. 593–608). Springer.
Poisel, R., & Tjoa, S. (2012). Discussion on the Challenges and Opportunities of Cloud Forensics. In Multidisciplinary Research and Practice for Information Systems (Vol. 7465, pp. 593–608). Springer.
Poisel, R., & Tjoa, S. (2012). Inhaltsbasierte Wiederherstellung multimedialer Dateien. 6. Forschungsforum Der Österreichischen Fachhochschulen - Tagungsband 1 Informationstechnologie Als Produktionsfaktor, 119–123.
Rybnicek, M., Poisel, R., Ruzicka, M., & Tjoa, S. (2012). A Generic Approach to Critical Infrastructures Modeling and Simulation. ASE International Conference on Cyber Security.
Poisel, R., Tjoa, S., & Tavolato, P. (2011). Advanced File Carving Approaches for Multimedia Files. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2(4), 40–57.
Tjoa, S., Jakoubi, S., Goluch, G., Kitzler, G., Goluch, S., & Quirchmayr, G. (2011). A Formal Approach Enabling Risk-aware Business Process Modeling and Simulation. IEEE Transactions on Services Computing, 4(2), 153–166.
Poisel, R., & Tjoa, S. (2011). Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art. Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, 48–61.
Poisel, R., & Tjoa, S. (2011). Roadmap to Approaches for Carving of Fragmented Multimedia Files. Proceedings of The Fourth International Workshop on Digital Forensics (WSDF"11), 752–757.
Tjoa, S., & Poisel, R. (2011). A reference architecture for a scalable digital forensics toolkit. 5. Forschungsforum Der Österreichischen Fachhochschulen.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). Risk-Aware Business Process Management - Establishing the Link Between Business and Security. In Complex Intelligent Systems and Their Applications (Vol. 41, pp. 109–135). Springer-Verlag.
Tjoa, S., Jakoubi, S., Goluch, S., & Kitzler, G. (2010). Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. International Conference on Availability, Reliability, and Security (ARES"10), 268–274.
Jakoubi, S., Tjoa, S., Goluch, S., & Kitzler, G. (2010). A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. International Conference on Availability, Reliability, and Security (ARES"10), 180–187.
Jakoubi, S., Neubauer, T., & Tjoa, S. (2009). A roadmap to risk-aware business process management. IEEE Asia-Pacific Services Computing Conference (IEEE APSCC"09), 23–27.

Hier geht es zum vollständigen Profil auf www.fhstp.ac.at