Wolfgang Kastner - Vice Rector Digitalisation and Infrastructure

Vice Rector Digitalisation and Infrastructure
Press Photos

© TU Wien, Foto: Matthias Heisler

© TU Wien, Foto: Matthias Heisler
Research Profile of Vice Rector Wolfgang Kastner
Keywords
Distributed Automation, Industry 4.0, Smart Grids, Internet of Things, Smart Cities, Control Networks, Computer Engineering, Home and Building Automation, Security, Safety, Automation
Research Focal Areas
Energy and Environment, Information and Communication Technology, Information and Communication Technology
Areas of expertise according to Statistik Austria
Informatics, Automation, Pervasive Computing, Computer networks, Software engineering, Distributed systems
- Seminar for Master Students in Computer Engineering , opens an external URL in a new window , 180.778, SE
- Pv.aus Automatisierungssystemen , opens an external URL in a new window , 183.183, PV
- Bachelor Thesis , opens an external URL in a new window , 183.609, PR
- Computer Engineering Practical , opens an external URL in a new window , 191.005, PR
- Computer Engineering Project , opens an external URL in a new window , 191.006, PR
- Scientific Project Computer Engineering , opens an external URL in a new window , 191.007, PR
- Project in Computer Science 1 , opens an external URL in a new window , 191.008, PR
- Project in Computer Science 2 , opens an external URL in a new window , 191.009, PR
-
| Why to Fail Fast and Often: A Strategy for OT Safety and Security Evaluation at reposiTUm , opens an external URL in a new windowBhole, M., Sauter, T., Semper, S., & Kastner, W. (2025). Why to Fail Fast and Often: A Strategy for OT Safety and Security Evaluation. IEEE Access, 13, 51793–51812. https://doi.org/10.1109/ACCESS.2025.3553011
-
| Enhancing Industrial Cybersecurity: Insights from Analyzing Threat Groups and Strategies in Operational Technology Environments at reposiTUm , opens an external URL in a new windowBhole, M., Sauter, T., & Kastner, W. (2025). Enhancing Industrial Cybersecurity: Insights from Analyzing Threat Groups and Strategies in Operational Technology Environments. IEEE Open Journal of the Industrial Electronics Society, 6, 145–157. https://doi.org/10.1109/OJIES.2025.3527585
-
| Self-Adaptive Intelligent Deployment of Message Brokers: An Empirical Study on IoT Performance at reposiTUm , opens an external URL in a new windowAmiri, A., Nastic, S., Javadi, B., & Kastner, W. (2025). Self-Adaptive Intelligent Deployment of Message Brokers: An Empirical Study on IoT Performance. In 2025 IEEE International Conference on Mechatronics (ICM). 2025 IEEE International Conference on Mechatronics (ICM), Wollongong, Australia. https://doi.org/10.34726/9080
-
| Supply chain optimization using model-based systems engineering and the internet of things at reposiTUm , opens an external URL in a new windowAmiri, A., Nastic, S., & Kastner, W. (2025). Supply chain optimization using model-based systems engineering and the internet of things. Elektrotechnik Und Informationstechnik : E & i. https://doi.org/10.1007/s00502-025-01321-5
-
| Integrated Safety and Security by Design in the IT/OT Convergence of Industrial Systems: A Graph-Based Approach at reposiTUm , opens an external URL in a new windowAmiri, A., Steindl, G., Gorton, I., Hollerer, S., Kastner, W., & Sauter, T. (2024). Integrated Safety and Security by Design in the IT/OT Convergence of Industrial Systems: A Graph-Based Approach. In 2024 IEEE International Conference on Software Services Engineering (SSE) (pp. 123–129). IEEE. https://doi.org/10.34726/8522
-
| Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach at reposiTUm , opens an external URL in a new windowBhosale, P., Kastner, W., & Sauter, T. (2024). Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach. In ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security. ARES 2024: The 19th International Conference on Availability, Reliability and Security, Wien, Austria. https://doi.org/10.1145/3664476.3670875
-
| Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach at reposiTUm , opens an external URL in a new windowBhole, M., Kastner, W., & Sauter, T. (2024). Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach. In 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA) (pp. 1–8). https://doi.org/10.34726/7161