default search action
Florian Skopik
Person information
- affiliation: Austrian Institute of Technology, Vienna, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2021
- [b1]Florian Skopik, Markus Wurzenberger, Max Landauer:
Smart Log Data Analytics - Techniques for Advanced Security Analysis. Springer 2021, ISBN 978-3-030-74449-6, pp. 1-208
Journal Articles
- 2024
- [j40]Markus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik:
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security. Comput. Secur. 137: 103631 (2024) - [j39]Manuel Kern, Max Landauer, Florian Skopik, Edgar R. Weippl:
A logging maturity and decision model for the selection of intrusion detection cyber security solutions. Comput. Secur. 141: 103844 (2024) - [j38]Maria Leitner, Florian Skopik, Timea Pahi:
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries. Inf. Secur. J. A Glob. Perspect. 33(5): 486-507 (2024) - [j37]Florian Skopik, Arndt Bonitz, Daniel Slamanig, Markus Kirschner, Wolfgang Hacker:
Towards a single device for multiple security domains. J. Univers. Comput. Sci. 30(5): 563-589 (2024) - [j36]Max Landauer, Florian Skopik, Markus Wurzenberger:
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-Based Anomaly Detection Techniques. Proc. ACM Softw. Eng. 1(FSE): 1354-1375 (2024) - 2023
- [j35]Florian Skopik, Markus Wurzenberger, Georg Höld, Max Landauer, Walter Kuhn:
Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3158-3175 (2023) - [j34]Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber:
Maintainable Log Datasets for Evaluation of Intrusion Detection Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3466-3482 (2023) - 2022
- [j33]Florian Skopik, Max Landauer, Markus Wurzenberger:
Online Log Data Analysis With Efficient Machine Learning: A Review. IEEE Secur. Priv. 20(3): 80-90 (2022) - [j32]Florian Skopik, Max Landauer, Markus Wurzenberger:
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey. IEEE Secur. Priv. 20(6): 18-26 (2022) - [j31]Florian Skopik, Arndt Bonitz, Volker Grantz, Günter Göhler:
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. Int. J. Inf. Sec. 21(6): 1323-1347 (2022) - [j30]Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber:
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation. ACM Trans. Priv. Secur. 25(3): 18:1-18:36 (2022) - 2021
- [j29]Florian Skopik, Markus Wurzenberger, Max Landauer:
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. IEEE Secur. Priv. 19(5): 36-45 (2021) - [j28]Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, Manuel Warum:
Enabling exercises, education and research with a comprehensive cyber range. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 37-61 (2021) - [j27]Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed. IEEE Trans. Reliab. 70(1): 402-415 (2021) - 2020
- [j26]Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber:
System log clustering approaches for cyber security applications: A survey. Comput. Secur. 92: 101739 (2020) - [j25]Florian Skopik, Timea Pahi:
Under false flag: using technical artifacts for cyber attack attribution. Cybersecur. 3(1): 8 (2020) - [j24]Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner:
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. J. Inf. Secur. Appl. 54: 102544 (2020) - 2019
- [j23]Florian Skopik, Stefan Filip:
A blueprint and proof-of-concept for a national cyber security sensor network. Int. J. Cyber Situational Aware. 4(1): 155-184 (2019) - 2018
- [j22]Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser:
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection. Comput. Secur. 79: 94-116 (2018) - [j21]Giuseppe Settanni, Florian Skopik, Markus Wurzenberger, Roman Fiedler:
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems. Elektrotech. Informationstechnik 135(3): 278-285 (2018) - 2017
- [j20]Kurt Einzinger, Florian Skopik:
Über die datenschutzrechtliche Problematik in CERTs/CSIRTs-Netzwerken. Datenschutz und Datensicherheit 41(9): 572-576 (2017) - [j19]Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler, Mark Carolan, Damien Conroy, Konstantin Böttinger, Mark Gall, Gerd Brost, Christophe Ponchel, Mirko Haustein, Helmut Kaufmann, Klaus Theuerkauf, Pia Olli:
A collaborative cyber incident management system for European interconnected critical infrastructures. J. Inf. Secur. Appl. 34: 166-182 (2017) - 2016
- [j18]Florian Skopik, Giuseppe Settanni, Roman Fiedler:
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60: 154-176 (2016) - [j17]Lucie Langer, Florian Skopik, Paul Smith, Markus Kammerstetter:
From old to new: Assessing cybersecurity risks for an evolving smart grid. Comput. Secur. 62: 165-176 (2016) - [j16]Timea Pahi, Florian Skopik:
A Public-Private-Partnership Model for National Cyber Situational Awareness. Int. J. Cyber Situational Aware. 1(1): 31-53 (2016) - [j15]Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Wolfgang Scherrer:
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools. Inf. Syst. 60: 13-33 (2016) - 2015
- [j14]Ivo Friedberg, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
Combating advanced persistent threats: From network event correlation to incident detection. Comput. Secur. 48: 35-57 (2015) - [j13]Kurt Einzinger, Florian Skopik, Roman Fiedler:
Keine Cyber-Sicherheit ohne Datenschutz. Datenschutz und Datensicherheit 39(11): 723-729 (2015) - [j12]Ivo Friedberg, Florian Skopik, Roman Fiedler:
Cyber situational awareness through network anomaly detection: state of the art and new approaches. Elektrotech. Informationstechnik 132(2): 101-105 (2015) - [j11]Helmut Kaufmann, Reinhard Hutter, Florian Skopik, Matti Mantere:
A structural design for a pan-European early warning system for critical infrastructures. Elektrotech. Informationstechnik 132(2): 117-121 (2015) - 2014
- [j10]Florian Skopik, Roman Fiedler, Otmar Lendl:
Cyber Attack Information Sharing. Datenschutz und Datensicherheit 38(4): 251-256 (2014) - [j9]Florian Skopik:
The social smart grid: Dealing with constrained energy resources through social coordination. J. Syst. Softw. 89: 3-18 (2014) - 2013
- [j8]Florian Skopik, Lucie Langer:
Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids. J. Commun. 8(8): 463-472 (2013) - 2012
- [j7]Florian Skopik, Daniel Schall, Schahram Dustdar:
Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems. Int. J. Cooperative Inf. Syst. 21(4): 297-342 (2012) - [j6]Florian Skopik, Daniel Schall, Schahram Dustdar:
Trusted Information Sharing using SOA-Based Social Overlay Networks. Int. J. Comput. Sci. Appl. 9(1): 116-151 (2012) - [j5]Daniel Schall, Florian Skopik:
Social network mining of requester communities in crowdsourcing markets. Soc. Netw. Anal. Min. 2(4): 329-344 (2012) - [j4]Daniel Schall, Florian Skopik, Schahram Dustdar:
Expert Discovery and Interactions in Mixed Service-Oriented Systems. IEEE Trans. Serv. Comput. 5(2): 233-245 (2012) - 2011
- [j3]Christoph Dorn, Florian Skopik, Daniel Schall, Schahram Dustdar:
Interaction mining and skill-dependent recommendations for multi-objective team composition. Data Knowl. Eng. 70(10): 866-891 (2011) - [j2]Florian Skopik, Daniel Schall, Harald Psaier, Martin Treiber, Schahram Dustdar:
Towards Social Crowd Environments Using Service-Oriented Architectures. it Inf. Technol. 53(3): 108-116 (2011) - 2010
- [j1]Florian Skopik, Daniel Schall, Schahram Dustdar:
Modeling and mining of dynamic trust in complex service-oriented systems. Inf. Syst. 35(7): 735-757 (2010)
Conference and Workshop Papers
- 2024
- [c72]Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. ARES 2024: 69:1-69:11 - [c71]Florian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer:
On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence. ARES 2024: 71:1-71:10 - [c70]Tobias Pfaller, Florian Skopik, Paul Smith, Maria Leitner:
Towards Customized Cyber Exercises using a Process-based Lifecycle Model. EICC 2024: 37-45 - [c69]Max Landauer, Florian Skopik, Markus Wurzenberger:
Introducing a New Alert Data Set for Multi-Step Attack Analysis. CSET @ USENIX Security Symposium 2024: 41-53 - 2023
- [c68]Patrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger:
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges. EICC 2023: 71-77 - [c67]Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik:
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education. HAISA 2023: 105-115 - 2022
- [c66]Max Landauer, Florian Skopik, Georg Höld, Markus Wurzenberger:
A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing. IEEE Big Data 2022: 4285-4294 - [c65]Max Landauer, Maximilian Frank, Florian Skopik, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber:
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation. SAT-CPS@CODASPY 2022: 77-86 - [c64]Gregor Langner, Florian Skopik, Steven Furnell, Gerald Quirchmayr:
A Tailored Model for Cyber Security Education Utilizing a Cyber Range. ICISSP 2022: 365-377 - [c63]Manuel Kern, Florian Skopik, Max Landauer, Edgar R. Weippl:
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach. SAC 2022: 1656-1665 - 2021
- [c62]Max Landauer, Georg Höld, Markus Wurzenberger, Florian Skopik, Andreas Rauber:
Iterative Selection of Categorical Variables for Log Data Anomaly Detection. ESORICS (1) 2021: 757-777 - [c61]Florian Skopik, Maria Leitner:
Preparing for National Cyber Crises Using Non-linear Cyber Exercises. PST 2021: 1-5 - 2020
- [c60]Markus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik, Wolfgang Kastner:
Creating Character-based Templates for Log Data to Enable Security Event Classification. AsiaCCS 2020: 141-152 - [c59]Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, Oliver Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith, Manuel Warum:
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. EICC 2020: 2:1-2:6 - [c58]Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection. ICISSP 2020: 349-360 - [c57]Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed. QRS 2020: 52 - 2019
- [c56]Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:
A Framework for Cyber Threat Intelligence Extraction from Raw Log Data. IEEE BigData 2019: 3200-3209 - [c55]Florian Skopik, Stefan Filip:
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. Cyber Security 2019: 1-8 - [c54]Markus Wurzenberger, Max Landauer, Florian Skopik, Wolfgang Kastner:
AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis. IM 2019: 7-12 - 2018
- [c53]Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models. ICISSP 2018: 386-397 - [c52]Giuseppe Settanni, Florian Skopik, Anjeza Karaj, Markus Wurzenberger, Roman Fiedler:
Protecting cyber physical production systems using anomaly detection to enable self-adaptation. ICPS 2018: 173-180 - [c51]Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser:
Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. ISPEC 2018: 19-36 - [c50]Stefan Rass, Andreas Schorn, Florian Skopik:
Trust and Distrust: On Sense and Nonsense in Big Data. Privacy and Identity Management 2018: 81-94 - 2017
- [c49]Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner:
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. ARES 2017: 31:1-31:6 - [c48]Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler:
Acquiring Cyber Threat Intelligence through Security Information Correlation. CYBCONF 2017: 1-7 - [c47]Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner:
Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data. CYBCONF 2017: 1-10 - [c46]Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner:
Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data. CYBCONF 2017: 1-8 - [c45]Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Giuseppe Settanni, Florian Skopik:
Improved software vulnerability patching techniques using CVSS and game theory. Cyber Security 2017: 1-6 - [c44]Timea Pahi, Maria Leitner, Florian Skopik:
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. ICISSP 2017: 334-345 - 2016
- [c43]Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner:
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. MIST@CCS 2016: 109-112 - [c42]Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik:
POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data. CCS 2016: 1805-1807 - [c41]Roman Graf, Florian Skopik, Kenny Whitebloom:
A decision support model for situational awareness in National Cyber Operations Centers. CyberSA 2016: 1-6 - [c40]Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler:
A Collaborative Analysis System for Cross-organization Cyber Incident Handling. ICISSP 2016: 105-116 - [c39]Giuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler:
Correlating cyber incident information to establish situational awareness in Critical Infrastructures. PST 2016: 78-81 - 2015
- [c38]Yegor Shovgenya, Florian Skopik, Klaus Theuerkauf:
On demand for situational awareness for preventing attacks on the smart grid. CyberSA 2015: 1-4 - [c37]Florian Skopik, Markus Wurzenberger, Giuseppe Settanni, Roman Fiedler:
Establishing national cyber situational awareness through incident information clustering. CyberSA 2015: 1-8 - [c36]Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs. CyberSA 2015: 1 - [c35]Giuseppe Settanni, Florian Skopik, Helmut Kaufmann, Tobias Gebhardt, Klaus Theuerkauf, Konstantin Böttinger, Mark Carolan, Damien Conroy, Pia Olli:
A Blueprint for a Pan-European Cyber Incident Analysis System. ICS-CSR 2015 - 2014
- [c34]Kieran McLaughlin, Sakir Sezer, Paul Smith, Zhendong Ma, Florian Skopik:
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ICS-CSR 2014 - [c33]Markus Kammerstetter, Lucie Langer, Florian Skopik, Wolfgang Kastner:
Architecture-driven smart grid security management. IH&MMSec 2014: 153-158 - [c32]Florian Skopik, Ivo Friedberg, Roman Fiedler:
Dealing with advanced persistent threats in smart grid ICT networks. ISGT 2014: 1-5 - [c31]Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg:
Semi-synthetic data set generation for security software evaluation. PST 2014: 156-163 - [c30]Markus Kammerstetter, Lucie Langer, Florian Skopik, Friederich Kupzog, Wolfgang Kastner:
Practical Risk Assessment Using a Cumulative Smart Grid Model. SMARTGREENS 2014: 31-42 - 2013
- [c29]Florian Skopik, Roman Fiedler:
Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation. GI-Jahrestagung 2013: 2240-2254 - [c28]Lucie Langer, Florian Skopik, Georg Kienesberger, Qin Li:
Privacy issues of smart e-mobility. IECON 2013: 6682-6687 - [c27]Florian Skopik, Qin Li:
Trustworthy incident information sharing in social cyber defense alliances. ISCC 2013: 233-239 - [c26]Markus Gerhard Tauber, Florian Skopik, Thomas Bleier, David Hutchison:
A Self-organising Approach for Smart Meter Communication Systems. IWSOS 2013: 169-175 - 2012
- [c25]Florian Skopik, Zhendong Ma:
Attack Vectors to Metering Data in Smart Grids under Security Constraints. COMPSAC Workshops 2012: 134-139 - [c24]Florian Skopik, Christian Wagner:
Novel Energy Saving Opportunities in Smart Grids Using a Secure Social Networking Layer. COMPSAC 2012: 557-566 - [c23]Florian Skopik, Zhendong Ma, Paul Smith, Thomas Bleier:
Designing a Cyber Attack Information System for National Situational Awareness. Future Security 2012: 277-288 - [c22]Florian Skopik, Thomas Bleier, Roman Fiedler:
Information Management and Sharing for National Cyber Situational Awareness. ISSE 2012: 217-227 - [c21]Florian Skopik, Albert Treytl, Arjan Geven, Bernd Hirschler, Thomas Bleier, Andreas Eckel, Christian El Salloum, Armin Wasicek:
Towards Secure Time-Triggered Systems. SAFECOMP Workshops 2012: 365-372 - 2011
- [c20]Daniel Schall, Florian Skopik:
An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities. ADBIS 2011: 285-301 - [c19]Harald Psaier, Florian Skopik, Daniel Schall, Schahram Dustdar:
Resource and Agreement Management in Dynamic Crowdcomputing Environments. EDOC 2011: 193-202 - [c18]Florian Skopik, Daniel Schall, Schahram Dustdar:
Computational Social Network Management in Crowdsourcing Environments. ICECCS 2011: 273-282 - [c17]Daniel Schall, Florian Skopik, Harald Psaier, Schahram Dustdar:
Bridging socially-enhanced virtual communities. SAC 2011: 792-799 - [c16]Florian Skopik, Daniel Schall, Harald Psaier, Schahram Dustdar:
Adaptive provisioning of human expertise in service-oriented systems. SAC 2011: 1568-1575 - [c15]Florian Skopik, Daniel Schall, Schahram Dustdar:
Opportunistic Information Flows through Strategic Social Link Establishment. Web Intelligence 2011: 308-315 - [c14]Florian Skopik, Daniel Schall, Schahram Dustdar:
Managing social overlay networks in semantic open enterprise systems. WIMS 2011: 50 - 2010
- [c13]Harald Psaier, Florian Skopik, Daniel Schall, Schahram Dustdar:
Behavior Monitoring in Self-Healing Service-Oriented Systems. COMPSAC 2010: 357-366 - [c12]Florian Skopik, Daniel Schall, Harald Psaier, Schahram Dustdar:
Social Formation and Interactions in Evolving Service-Oriented Communities. ECOWS 2010: 27-34 - [c11]Florian Skopik, Daniel Schall, Schahram Dustdar:
Trust-Based Adaptation in Complex Service-Oriented Systems. ICECCS 2010: 31-40 - [c10]Harald Psaier, Florian Skopik, Daniel Schall, Lukasz Juszczyk, Martin Treiber, Schahram Dustdar:
A programming model for self-adaptive open enterprise systems. MW4SOC 2010: 27-32 - [c9]Florian Skopik, Daniel Schall, Schahram Dustdar:
Trusted Interaction Patterns in Large-scale Enterprise Service Networks. PDP 2010: 367-374 - [c8]Florian Skopik, Daniel Schall, Schahram Dustdar:
Trustworthy interaction balancing in mixed service-oriented systems. SAC 2010: 799-806 - [c7]Florian Skopik, Daniel Schall, Schahram Dustdar:
Supporting Network Formation through Mining under Privacy Constraints. SAINT 2010: 105-108 - [c6]Harald Psaier, Lukasz Juszczyk, Florian Skopik, Daniel Schall, Schahram Dustdar:
Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems. SASO 2010: 164-173 - [c5]Daniel Schall, Florian Skopik:
Mining and Composition of Emergent Collectives in Mixed Service-Oriented Systems. CEC 2010: 212-219 - 2009
- [c4]Florian Skopik, Daniel Schall, Schahram Dustdar:
The Cycle of Trust in Mixed Service-Oriented Systems. EUROMICRO-SEAA 2009: 72-79 - [c3]Florian Skopik, Hong Linh Truong, Schahram Dustdar:
Trust and Reputation Mining in Professional Virtual Communities. ICWE 2009: 76-90 - [c2]Florian Skopik, Hong Linh Truong, Schahram Dustdar:
VIeTE - Enabling Trust Emergence in Service-oriented Collaborative Environments. WEBIST 2009: 471-478 - [c1]Florian Skopik, Daniel Schall, Schahram Dustdar:
Start Trusting Strangers? Bootstrapping and Prediction of Trust. WISE 2009: 275-289
Parts in Books or Collections
- 2022
- [p5]Florian Skopik, Markus Wurzenberger, Max Landauer:
Detecting Unknown Cyber Security Attacks Through System Behavior Analysis. Cybersecurity of Digital Service Chains 2022: 103-119 - [p4]Markus Wurzenberger, Max Landauer, Agron Bajraktari, Florian Skopik:
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation. Cybersecurity of Digital Service Chains 2022: 136-161 - 2011
- [p3]Florian Skopik, Daniel Schall, Schahram Dustdar:
Modeling and Mining of Dynamic Trust in Complex Service-Oriented Systems. Socially Enhanced Services Computing 2011: 29-75 - [p2]Harald Psaier, Florian Skopik, Daniel Schall, Schahram Dustdar:
Behavior Monitoring in Self-Healing Service-Oriented Systems. Socially Enhanced Services Computing 2011: 95-116 - [p1]Harald Psaier, Lukasz Juszczyk, Florian Skopik, Daniel Schall, Schahram Dustdar:
Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems. Socially Enhanced Services Computing 2011: 117-138
Editorship
- 2011
- [e1]Schahram Dustdar, Daniel Schall, Florian Skopik, Lukasz Juszczyk, Harald Psaier:
Socially Enhanced Services Computing, Modern Models and Algorithms for Distributed Systems. Springer 2011, ISBN 978-3-7091-0812-3 [contents]
Reference Works
- 2019
- [r3]Markus Wurzenberger, Florian Skopik, Giuseppe Settanni:
Big Data for Cybersecurity. Encyclopedia of Big Data Technologies 2019 - 2018
- [r2]Daniel Schall, Florian Skopik:
Collective Intelligence for Crowdsourcing and Community Q&A. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2014
- [r1]Daniel Schall, Florian Skopik:
Collective Intelligence for Crowdsourcing and Community Q&A. Encyclopedia of Social Network Analysis and Mining 2014: 169-177
Informal and Other Publications
- 2024
- [i21]Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern:
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation. CoRR abs/2408.15645 (2024) - [i20]Florian Skopik, Benjamin Akhras:
Taranis AI: Applying Natural Language Processing for Advanced Open-Source Intelligence Analysis. ERCIM News 2024(136) (2024) - 2023
- [i19]Max Landauer, Florian Skopik, Markus Wurzenberger:
Introducing a New Alert Data Set for Multi-Step Attack Analysis. CoRR abs/2308.12627 (2023) - [i18]Max Landauer, Florian Skopik, Markus Wurzenberger:
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques. CoRR abs/2309.02854 (2023) - [i17]Florian Skopik, Arndt Bonitz, Daniel Slamanig, Markus Kirschner, Wolfgang Hacker:
SD4MSD: Using a Single Device for Multiple Security Domains. ERCIM News 2023(134) (2023) - 2022
- [i16]Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber:
Maintainable Log Datasets for Evaluation of Intrusion Detection Systems. CoRR abs/2203.08580 (2022) - [i15]Max Landauer, Sebastian Onder, Florian Skopik, Markus Wurzenberger:
Deep Learning for Anomaly Detection in Log Data: A Survey. CoRR abs/2207.03820 (2022) - [i14]Manuel Kern, Florian Skopik:
SPOTTED: Systematic Mapping of Detection Approaches on Data Sources for Enhanced Cyber Defence. ERCIM News 2022(129): 0 (2022) - [i13]Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner:
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations. ERCIM News 2022(129): 0 (2022) - [i12]Florian Skopik, Kyriakos Stefanidis:
Fighting Cybercrime - Introduction to the Special Theme. ERCIM News 2022(129): 0 (2022) - 2021
- [i11]Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner:
Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data. CoRR abs/2101.07113 (2021) - 2020
- [i10]Florian Skopik, Markus Wurzenberger, Max Landauer:
DECEPT: Detecting Cyber-Physical Attacks using Machine Learning on Log Data. ERCIM News 2020(123) (2020) - 2019
- [i9]Max Landauer, Florian Skopik:
INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data. ERCIM News 2019(116) (2019) - 2018
- [i8]Florian Skopik, Markus Wurzenberger, Roman Fiedler:
synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems. ERCIM News 2018(114) (2018) - [i7]Florian Skopik:
Cross-Organizational Cyber Risk Assessments. ERCIM News 2018(115) (2018) - 2016
- [i6]Florian Skopik, Maria Leitner, Timea Pahi:
CISA: Establishing National Cyber Situational Awareness to Counter New Threats. ERCIM News 2016(106) (2016) - [i5]Markus Wurzenberger, Florian Skopik:
The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments. ERCIM News 2016(107) (2016) - 2014
- [i4]Florian Skopik, Thomas Bleier:
Securing Interconnected Cyber-Physical Systems through Strategic Information Sharing. ERCIM News 2014(97) (2014) - 2013
- [i3]Florian Skopik, Paul Smith, Thomas Bleier:
Secure Smart Grids or Say ‘Goodnight Vienna!'. ERCIM News 2013(92) (2013) - 2012
- [i2]Zhendong Ma, Paul Smith, Florian Skopik:
Towards a Layered Architectural View for Security Analysis in SCADA Systems. CoRR abs/1211.3908 (2012) - [i1]Florian Skopik, Thomas Bleier:
Cybercrime and the Security of Critical Infrastructures. ERCIM News 2012(91) (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint