Research results

Overview

The key research results of CONTAIN are:

  • CONTAIN framework for effective and efficient management of cyber incidents
  • Serious games for improved support in preparation
  • Simulation models to visualize processes and effects
  • Reference scenarios, process models, roadmap for auditing and certification
  • Procedure for liquidity in the crisis and cooperation with cloud and logistics service providers
  • Information security measures and security-by-design solutions for digital currencies
  • Methods for conducting exercises

Serious Games

Spielerisch zu mehr IT-Sicherheit

Download PDF

Contain Monitor

Resilienz angesichts von Ransomware:
Einblicke in die Praxis

Download PDF


Publications

  • Zhao, T., Gasiba, T., Lechner, U., Pinto-Albuquerque, M., Ongu, D. (2024). COPYCAT: Applying Serious Games in Industry for Defending Supply Chain Attack. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_18
  • Seiler, A., Lechner, U., Strussenberg, J., Hofbauer, S. (2024). Operation Raven. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_19
  • Greiner, M. et al. (2024). Scared? Prepared? Toward a Ransomware Incident Response Scenario. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_17
  • Friedl, S., Reittinger, T., Pernul, G. (2024). Digital Detectives: A Serious Point-and-Click Game for Digital Forensics. In: Drevin, L., Leung, W.S., von Solms, S. (eds) Information Security Education – Challenges in the Digital Age. WISE 2024. IFIP Advances in Information and Communication Technology, vol 707. Springer, Cham. https://doi.org/10.1007/978-3-031-62918-1_9
  • Friedl, S., Reittinger, T., Pernul, G. (2024). From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. In: Ferrara, A.L., Krishnan, R. (eds) Data and Applications Security and Privacy XXXVIII. DBSec 2024. Lecture Notes in Computer Science, vol 14901. Springer, Cham. https://doi.org/10.1007/978-3-031-65172-4_17
  • Terru Stübinger, Lars Hupel: Go Code Generation for Isabelle. Archive of Formal Proofs, 2024. https://www.isa-afp.org/entries/Go.html
  • Lars Hupel: Interoperability aspects of CBDC across ecosystems and borders. Journal of Payments Strategy & Systems, 2023. https://doi.org/10.69554/MBDJ6710 (full text: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4636197)
  • Terru Stübinger, Lars Hupel: Extending Isabelle/HOL’s Code Generator with support for the Go programming language. Formal Methods, 2024 (to appear). http://arxiv.org/abs/2310.02704
  • Lars Hupel, Makan Rafiee: How does post-quantum cryptography affect Central Bank Digital Currency? UbiSec, 2023. https://doi.org/10.1007/978-981-97-1274-8_4 (full text: http://arxiv.org/abs/2308.15787)
  • Reittinger, T., Glas, M., Aminzada, S., & Pernul, G. (2024). Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality.
  • Schachenhofer, L., & Hirsch, P. (2024). Pharmaceutical Logistics under Cyberattack Conditions. 14th International Defense and Homeland Security Simulation Workshop, 004. doi: 10.46354/i3m.2024.dhss.004