Clemens Sauerwein

Orcid: 0009-0009-9464-5080

According to our database1, Clemens Sauerwein authored at least 29 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Success Factors of Automated Programming Assessment Systems in Different Learning Environments.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
A Maturity Model for Digital Business Ecosystems from an IT Perspective.
J. Univers. Comput. Sci., January, 2023

Towards a Success Model for Automated Programming Assessment Systems Used as a Formative Assessment Tool.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

Lecturers' and Students' Experiences with an Automated Programming Assessment System.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Towards Automated Classification of Attackers' TTPs by combining NLP with ML Techniques.
CoRR, 2022

2021
A taxonomy of attack mechanisms in the automotive domain.
Comput. Stand. Interfaces, 2021

A success model for cyber threat intelligence management platforms.
Comput. Secur., 2021

Toward a Maturity Model for Digital Business Ecosystems from an IT perspective.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

Rethinking Information Technology Governance for Digital Business Ecosystems.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Risk management practices in information security: Exploring the status quo in the DACH region.
Comput. Secur., 2020

Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Current Practices in the Information Collection for Enterprise Architecture Management.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Towards an Evaluation Framework for Threat Intelligence Sharing Platforms.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Current Practices in the Usage of Inter-Enterprise Architecture Models for the Management of Business Ecosystems.
Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference, 2020

2019
An analysis and classification of public information security data sources used in research and practice.
Comput. Secur., 2019

Applying Security Testing Techniques to Automotive Engineering.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Building a Community of Inquiry Within an Online-Based Health Informatics Program: Instructional Design and Lessons Learned.
Proceedings of the German Medical Data Sciences: A Learning Healthcare System, 2018

2017
Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives.
Proceedings of the Towards Thought Leadership in Digital Transformation: 13. Internationale Tagung Wirtschaftsinformatik, 2017

Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
A Systematic Literature Review of Crowdsourcing-Based Research in Information Security.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Integrating Shared Cyber Security Information into Information Security Risk Management.
Proceedings of CAiSE 2016 Doctoral Consortium co-located with 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016), 2016

2015
Assessing Real-Time Malware Threats.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015


  Loading...