Here I have a collection of papers, regarding computer science, which I wrote during my study at the university of Innsbruck.
Contact me if you want to get more information about one of my papers.
Like other industries, the tourism industry includes a lot of inefficient and expensive processes. This makes it rather slow on implementing new operations or adapting existing ones. Additionally, the online travel agency market is dominated by a handful of big players, which act as intermediaries and charge high fees.
To overcome these issues the advantages of blockchain technology can be used. To better understand the benefits and characteristics behind blockchain technology this thesis starts with a general description about them. To catch the current state of the art, existing blockchain frameworks are presented and an overview about their most important features is given.
The master thesis also analyses which tourism processes and use cases would benefit the most from blockchain concepts. Furthermore, requirements for implementing these processes are elaborated.
The main goal of this thesis is to demonstrate the possibilities and flexibility of blockchain based systems, by developing a working prototype for the tourism domain. Therefore, the collected requirements were taken to find the best suitable blockchain framework. Additionally, further components were added to establish a good user experience. The thesis presents challenges and solutions to issues, which arise during the implementation of a (tourism) blockchain system. Finally, the developed system is evaluated by performance tests, to prove that it is capable for real-world use cases.
Cyber threat intelligence is used more and more to help protecting companies or organizations against cyber-attacks. Also, more and more platforms are offering to share cyber threat information. One very important part which comes along with using and sharing cyber threat knowledge, is about how informative and useful these information are.
With other words, it is important to have a high data quality. To get a relation what means data quality in a special domain like cyber threats, this paper tries to find metrics which can be applied on threat information.
Therefore some, for this domain specific, measurements are analyzed and new ones are developed.
Over the last years cyber threat information (sharing) got more and more interesting for organisation and companies. As a reaction, some security software vendors developed platforms for exchanging the knowledge about cyber threats. These platforms often offer different services and different information formats. Also, in the literature various descriptions and approaches can be found. To get a more common understanding of cyber threat intelligence and what is important about it, this paper analyses the state of the art. An overview is important to get closer to a general definition. To formulate this definition, the analysed literature was minimized to their main statements. In the end, the topics which were often discussed in various papers were taken for the definition. This unified definition should make cyber threat intelligence (sharing) easier and more efficient.
The amount of malicious applications like Viruses, Trojans, Backdoors, Rootkits, Ransomware is growing daily. Therefore, each user should protect his personal computer or mobile device by using an antivirus solution, which should be certified by an independent testing lab.
To evaluate antivirus solutions properly, many different testing procedures have to be applied to check if each individual component is working properly. Plenty of these tests are complex, challenging, time consuming and resource intensive. Not to mention that human errors cause inaccurate test results, automation is one of the key points which could not always be realized.
To improve such non-automated tests like the Malware Removal Test (section 2.1), a workflow system was implemented. The system guides the testers through the workflow to minimize human mistakes.
Another goal was to automate any steps of the Malware Removal Test where it was practicable. Therefore, a client tool was implemented that is executed on the testing machine and can be monitored via the workflow system. The automated steps of the workflow are executed by the client tool and the results are returned back to the system.
Therefore, the main contribution of this bachelor thesis is a tool for improving complex testing methodologies through using workflows and automation.
This paper offers a short introduction into process configuration and a collection of useful tools to handle process models. This collection of tools is known under the name Synergia. The reason why process models can have a lot of different variants is, because they are often reused in different application environments. Therefore it is important to have good and stable tools to work with. The idea behind process configuration and the different techniques, which are used by the tools fill the first part of the paper. This part is followed by the description of Synergia and the included tools.