Dipl.-Ing. Tobias Dam BSc

  • Junior Researcher Institut für IT Sicherheitsforschung
  • Department Informatik und Security
Arbeitsplatz: B - Campus-Platz 1


  • IT Security (BA)


  • Informatik und Security


  • 2008-2013: HTL St. Pölten, Abteilung EDVO/Informatik
  • 2013-2016: Bachelorstudium IT Security, FH St. Pölten
  • 2015: Software Development, Security, Configuration Management beim Projekt “upribox”
  • seit 2016: Masterstudium Information Security, FH St. Pölten

Ausgewählte Publikationen


Dam, T., Klausner, L. D., Neumaier, S., & Priebe, T. (2024). A Survey of Dataspace Connector Implementations. Proceedings of the 2nd Italian Conference on Big Data and Data Science, 3606. https://ceur-ws.org/Vol-3606/paper41.pdf
Dam, T., Krimbacher, A., & Neumaier, S. (2023, September). Policy Patterns for Usage Control in Data Spaces. Fifth International Workshop On A Semantic Data Space For Transport @ SEMANTiCS 2023. SEMANTiCS 2023.
Dam, T., Klausner, L. D., & Neumaier, S. (2023). Towards a Critical Open-Source Software Database. Companion Proceedings of the ACM Web Conference 2023, 156–159. https://doi.org/10.1145/3543873.3587336
Dam, Tobias, & Neumaier, Sebastian. (2023). Towards Measuring Vulnerabilities and Exposures in Open-Source Packages. Proceedings of the 5th International Data Science Conference – IDSC2023. https://doi.org/10.48550/arXiv.2206.14527
Anderluh, A., Dam, T., Eigner, O., Herburger, M., Hochstrasser, C., Kieseberg, P., & Wagner, A. (2022, July). Cyber security in resilient multimodal logistics. EUROMA 2022 Papers. EUROMA 2022, Berlin. https://www.dropbox.com/sh/ugxee11d2k3vxy0/AAB6PSRUyN8gG3cMHaF62K8Ja/Papers/189%20Cyber%20security%20in%20resilient%20multimodal%20logistics.pdf?dl=0
Slijepčević, D., Henzl, M., Klausner, L. D., Dam, T., Kieseberg, P., & Zeppelzauer, M. (2021). k‑Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers. Computers & Security, 111, 19. https://doi.org/10.1016/j.cose.2021.102488
Dam, T. (2020, May 15). Cloud-Dienste oder selbst betriebene Programme. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Dam, T. (2020, April 24). Sicherer Fernzugang zur IT des Unternehmens. https://www.youtube.com/channel/UCPNzC6shWnNmveD_8VoiMxg
Dam, T., Klausner, L. D., & Schrittwieser, S. (2020). Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam. Journal of Cyber Security and Mobility, 2020(2), 265–300. https://doi.org/10/gh4wrk
Schrittwieser, S., Rauchberger, J., Dam, T., & Buhov, D. (2019, April 24). Coineater: Automatisierte Erkennung Von Krypto-Mining Im Webbrowser. FFH Forum, Wiener Neustadt, Österreich.
Dam, T., Klausner, L. D., Buhov, D., & Schrittwieser, S. (2019). Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. Proceedings of the 14th International Conference on Availability, Reliability and Security, 53:1-53:9. https://doi.org/10/gh378k
Rauchberger, J., Schrittwieser, S., Dam, T., Luh, R., Buhov, D., Pötzelsberger, G., & Kim, H. (2018). The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018, Hamburg, Deutschland. https://doi.org/10/gh373c