Übersicht
Die zentralen Forschungsergebnisse von CONTAIN sind:
- CONTAIN-Rahmenwerk für effektive und effiziente Bewältigung von Cybervorfällen
- Serious Games zur verbesserten Unterstützung in der Vorbereitung
- Simulationsmodelle zur Darstellung von Abläufen und Auswirkungen
- Referenzszenare, Vorgehensmodelle, Roadmap für Auditierung und Zertifizierung
- Vorgehen für Liquidität in der Krise und Zusammenarbeit mit Cloud- und Logistikdienstleistungsunternehmen
- Informationssicherheitsmaßnahmen und Security-by-Design-Lösungen für digitale Währungen
- Methoden zur Durchführung von Übungen
CONTAIN Monitor
Resilienz angesichts von Ransomware:
Einblicke in die Praxis
PDF downloaden
Publikationen
- Zhao, T., Gasiba, T., Lechner, U., Pinto-Albuquerque, M., Ongu, D. (2024). COPYCAT: Applying Serious Games in Industry for Defending Supply Chain Attack. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_18
- Seiler, A., Lechner, U., Strussenberg, J., Hofbauer, S. (2024). Operation Raven. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_19
- Iosif, A.-C., et al (2023). Raising Awareness in the Industry on Secure Code Review Practices in IARIA CYBER23. Full text available: https://www.thinkmind.org/articles/cyber_2023_1_100_80050.pdf
- Zhao, T. et al. (2023). An ontology-based model for evaluating cloud attack scenarios in CATS – a serious game in cloud security in ICE/ITMC 2023. https://doi.org/10.1109/ICE/ITMC58018.2023.10332371
- Iosif, A.-C., et al (2024). Cybersecurity Awareness Training for Industrial Software Developers via a Serious Game for Code Review, Wirtschaftsinformatik 2024 Proceedings (p.60). Full text available: https://aisel.aisnet.org/wi2024/60?utm_source=aisel.aisnet.org%2Fwi2024%2F60&utm_medium=PDF&utm_campaign=PDFCoverPages
- Iosif, A.-C., et al (2024). Code Review for CyberSecurity in the Industry: Insights from Gameplay Analytics, in ICPEC’24 https://doi.org/10.4230/OASIcs.ICPEC.2024.14
- Iosif, A.-C., et al (2024). To Kill a Mocking Bug: Open Source Repo Mining of Security Patches for Programming Education, in ICPEC’24. https://doi.org/10.4230/OASIcs.ICPEC.2024.16
- Zhao, T. et al. (2024). A Deep Dive Into CATS Evaluator Algorithm: Quantification Of The Probability in Serious Game Cloud Security Defense Scenarios, in CSEE&T 2024 https://doi.org/10.1109/CSEET62301.2024.10663050
- Zhao, T. et al. (2024). Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings, in Journal of Systems and Software , Vol. 210 (Journal first submission CSEE&T) https://doi.org/10.1016/j.jss.2023.111946
- Iosif, A.-C., et al (2024). Serious Game for Industrial Cybersecurity: Experiential Learning Through Code Review, in CSEE&T’24 https://doi.org/10.1109/CSEET62301.2024.10663058
- Greiner, M. et al. (2024). Scared? Prepared? Toward a Ransomware Incident Response Scenario. In: Phillipson, F., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2024. Communications in Computer and Information Science, vol 2109. Springer, Cham. https://doi.org/10.1007/978-3-031-60433-1_17
- Friedl, S., Reittinger, T., Pernul, G. (2024). Digital Detectives: A Serious Point-and-Click Game for Digital Forensics. In: Drevin, L., Leung, W.S., von Solms, S. (eds) Information Security Education – Challenges in the Digital Age. WISE 2024. IFIP Advances in Information and Communication Technology, vol 707. Springer, Cham. https://doi.org/10.1007/978-3-031-62918-1_9
- Friedl, S., Reittinger, T., Pernul, G. (2024). From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. In: Ferrara, A.L., Krishnan, R. (eds) Data and Applications Security and Privacy XXXVIII. DBSec 2024. Lecture Notes in Computer Science, vol 14901. Springer, Cham. https://doi.org/10.1007/978-3-031-65172-4_17
- Terru Stübinger, Lars Hupel: Go Code Generation for Isabelle. Archive of Formal Proofs, 2024. https://www.isa-afp.org/entries/Go.html
- Lars Hupel: Interoperability aspects of CBDC across ecosystems and borders. Journal of Payments Strategy & Systems, 2023. https://doi.org/10.69554/MBDJ6710 (full text: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4636197)
- Terru Stübinger, Lars Hupel: Extending Isabelle/HOL’s Code Generator with support for the Go programming language. Formal Methods, 2024 (to appear). http://arxiv.org/abs/2310.02704
- Lars Hupel, Makan Rafiee: How does post-quantum cryptography affect Central Bank Digital Currency? UbiSec, 2023. https://doi.org/10.1007/978-981-97-1274-8_4 (full text: http://arxiv.org/abs/2308.15787)
- Reittinger, T., Glas, M., Aminzada, S., Pernul, G. (2025). Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. In: Clarke, N., Furnell, S. (eds) Human Aspects of Information Security and Assurance. HAISA 2024. IFIP Advances in Information and Communication Technology, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-031-72559-3_1
- Schachenhofer, L., & Hirsch, P. (2024). Pharmaceutical Logistics under Cyberattack Conditions. 14th International Defense and Homeland Security Simulation Workshop, 004. doi: 10.46354/i3m.2024.dhss.004
- Hupel, Lars (2024, December 1). A conceptual model for point-of-sale payment with retail central bank digital currency. In the Journal of Payments Strategy & Systems, Volume 18, Issue 4. https://doi.org/10.69554/ETQK2745.
- Rafiee, M., & Hupel, L. (2024). How to design a Public Key Infrastructure for a Central Bank Digital Currency. arXiv preprint arXiv:2412.04051.
- Strussenberg, J., Seidenfad, K., Greiner, M., Riesel, K., Biermann, J., Lechner, U. (2025). From Paper to Pixel: The Digitalization of a Serious Game. In: Zielinski, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2025. Communications in Computer and Information Science, vol 2513. Springer, Cham. https://doi.org/10.1007/978-3-031-94263-1_18
- Schachenhofer, L. et al. (2025). A Simulation-Oriented Approach to Securing Logistics Processes Based on the NIST CSF and OODA Loop. In: Zielinski, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2025. Communications in Computer and Information Science, vol 2513. Springer, Cham. https://doi.org/10.1007/978-3-031-94263-1_20
- Iosif, AC., Lechner, U., Pinto-Albuquerque, M. (2025). Bring Your Own Bug: Enabling User-Generated Content in Serious Games for Industrial Cybersecurity and AppSec Education. In: Zielinski, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2025. Communications in Computer and Information Science, vol 2513. Springer, Cham. https://doi.org/10.1007/978-3-031-94263-1_17
- Fahrnberger, G. et al. (2025). Cybersecurity Awareness Education by Making Ransomware Tangible Securely. In: Zielinski, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2025. Communications in Computer and Information Science, vol 2513. Springer, Cham. https://doi.org/10.1007/978-3-031-94263-1_22
- Tiange Zhao (2025) Raising Awareness of Cloud Security through a Serious Game, PhD Thesis, UniBW