Research Outputs

2024 2024 2023 2023 2022 2022 2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0
Now showing 1 - 4 of 4
Loading...
Thumbnail Image
Publication

Role-Playing Simulation Games using ChatGPT

2024-01-08, Stampfl, Rita, Ivkić, Igor, Geyer, Barbara

Loading...
Thumbnail Image
Publication

Temperature Monitoring of Agricultural Areas in a Secure Data Room

2023-10, Ederer, Thomas, Ivancsits, Martin, Ivkić, Igor

Loading...
Thumbnail Image
Publication

Towards Comparing Programming Paradigms

2017-12, Ivkić, Igor, Tauber, Markus, Wöhrer, Alexander

Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today’s programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so- called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.

Loading...
Thumbnail Image
Publication

On the Cost of Security Compliance in Information Systems

2019, Hofbauer, David, Ivkić, Igor, Maksuti, Silia, Aldrian, Andreas, Tauber, Markus

The onward development of information and communication technology has led to a new industrial revolution called Industry 4.0. This revolution involves Cyber-Physical Production Systems (CPPS), which consist of intelligent Cyber-Physical Systems that may be able to adapt themselves autonomously in a production environment. At the moment, machines in industrial environments are often not connected to the internet, which thus needs a point-to-point connection to access the device if necessary. Through Industry 4.0, these devices should enable remote access for smart maintenance through a connection to the outside world. However, this connection opens the gate for possible cyber-attacks and thus raises the question about providing security for these environments. Therefore, this paper used an adapted approach based on SixSigma to solve this security problem by investigating security standards. Security requirements were gathered and mapped to controls from well known security standards, formed into a catalog. This catalog includes assessment information to check how secure a solution for a use case is and also includes a link to an estimation method for implementation cost. Thus this paper’s outcome shows how to make Industry 4.0 use cases secure by fulfilling security standard controls and how to estimate the resulting implementation costs.