Florian Skopik

Orcid: 0000-0002-1922-7892

Affiliations:
  • Austrian Institute of Technology, Vienna, Austria


According to our database1, Florian Skopik authored at least 130 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024

Taranis AI: Applying Natural Language Processing for Advanced Open-Source Intelligence Analysis.
ERCIM News, 2024

2023
Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Maintainable Log Datasets for Evaluation of Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2023

SD4MSD: Using a Single Device for Multiple Security Domains.
ERCIM News, 2023

A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques.
CoRR, 2023

Introducing a New Alert Data Set for Multi-Step Attack Analysis.
CoRR, 2023

A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

Detecting Unknown Cyber Security Attacks Through System Behavior Analysis.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022

From scattered data to actionable knowledge: flexible cyber security reporting in the military domain.
Int. J. Inf. Sec., 2022

Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey.
IEEE Secur. Priv., 2022

Online Log Data Analysis With Efficient Machine Learning: A Review.
IEEE Secur. Priv., 2022

Fighting Cybercrime - Introduction to the Special Theme.
ERCIM News, 2022

Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022

SPOTTED: Systematic Mapping of Detection Approaches on Data Sources for Enhanced Cyber Defence.
ERCIM News, 2022

Deep Learning for Anomaly Detection in Log Data: A Survey.
CoRR, 2022

Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

A Tailored Model for Cyber Security Education Utilizing a Cyber Range.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021

Enabling exercises, education and research with a comprehensive cyber range.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection.
IEEE Secur. Priv., 2021

Preparing for National Cyber Crises Using Non-linear Cyber Exercises.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Iterative Selection of Categorical Variables for Log Data Anomaly Detection.
Proceedings of the Computer Security - ESORICS 2021, 2021

Smart Log Data Analytics - Techniques for Advanced Security Analysis
Springer, ISBN: 978-3-030-74449-6, 2021

2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020

DECEPT: Detecting Cyber-Physical Attacks using Machine Learning on Log Data.
ERCIM News, 2020

Under false flag: using technical artifacts for cyber attack attribution.
Cybersecur., 2020

System log clustering approaches for cyber security applications: A survey.
Comput. Secur., 2020

Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Big Data for Cybersecurity.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

A blueprint and proof-of-concept for a national cyber security sensor network.
Int. J. Cyber Situational Aware., 2019

INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data.
ERCIM News, 2019

AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

A Framework for Cyber Threat Intelligence Extraction from Raw Log Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Collective Intelligence for Crowdsourcing and Community Q&A.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018

Cross-Organizational Cyber Risk Assessments.
ERCIM News, 2018

Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotech. Informationstechnik, 2018

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018

Trust and Distrust: On Sense and Nonsense in Big Data.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.
Proceedings of the Information Security Practice and Experience, 2018

Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Secur. Appl., 2017

Über die datenschutzrechtliche Problematik in CERTs/CSIRTs-Netzwerken.
Datenschutz und Datensicherheit, 2017

Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Improved software vulnerability patching techniques using CVSS and game theory.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Acquiring Cyber Threat Intelligence through Security Information Correlation.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016

A Public-Private-Partnership Model for National Cyber Situational Awareness.
Int. J. Cyber Situational Aware., 2016

The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments.
ERCIM News, 2016

CISA: Establishing National Cyber Situational Awareness to Counter New Threats.
ERCIM News, 2016

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Comput. Secur., 2016

From old to new: Assessing cybersecurity risks for an evolving smart grid.
Comput. Secur., 2016

Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A decision support model for situational awareness in National Cyber Operations Centers.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A structural design for a pan-European early warning system for critical infrastructures.
Elektrotech. Informationstechnik, 2015

Cyber situational awareness through network anomaly detection: state of the art and new approaches.
Elektrotech. Informationstechnik, 2015

Keine Cyber-Sicherheit ohne Datenschutz.
Datenschutz und Datensicherheit, 2015

Combating advanced persistent threats: From network event correlation to incident detection.
Comput. Secur., 2015

A Blueprint for a Pan-European Cyber Incident Analysis System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Beyond gut instincts: Understanding, rating and comparing self-learning IDSs.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

On demand for situational awareness for preventing attacks on the smart grid.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Collective Intelligence for Crowdsourcing and Community Q&A.
Encyclopedia of Social Network Analysis and Mining, 2014

The social smart grid: Dealing with constrained energy resources through social coordination.
J. Syst. Softw., 2014

Securing Interconnected Cyber-Physical Systems through Strategic Information Sharing.
ERCIM News, 2014

Cyber Attack Information Sharing.
Datenschutz und Datensicherheit, 2014

Practical Risk Assessment Using a Cumulative Smart Grid Model.
Proceedings of the SMARTGREENS 2014, 2014

Semi-synthetic data set generation for security software evaluation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Dealing with advanced persistent threats in smart grid ICT networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Architecture-driven smart grid security management.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

2013
Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids.
J. Commun., 2013

Secure Smart Grids or Say ‘Goodnight Vienna!'.
ERCIM News, 2013

A Self-organising Approach for Smart Meter Communication Systems.
Proceedings of the Self-Organizing Systems - 7th IFIP TC 6 International Workshop, 2013

Trustworthy incident information sharing in social cyber defense alliances.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Privacy issues of smart e-mobility.
Proceedings of the IECON 2013, 2013

Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

2012
Expert Discovery and Interactions in Mixed Service-Oriented Systems.
IEEE Trans. Serv. Comput., 2012

Social network mining of requester communities in crowdsourcing markets.
Soc. Netw. Anal. Min., 2012

Trusted Information Sharing using SOA-Based Social Overlay Networks.
Int. J. Comput. Sci. Appl., 2012

Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems.
Int. J. Cooperative Inf. Syst., 2012

Cybercrime and the Security of Critical Infrastructures.
ERCIM News, 2012

Towards a Layered Architectural View for Security Analysis in SCADA Systems
CoRR, 2012

Towards Secure Time-Triggered Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Information Management and Sharing for National Cyber Situational Awareness.
Proceedings of the ISSE 2012, 2012

Designing a Cyber Attack Information System for National Situational Awareness.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Novel Energy Saving Opportunities in Smart Grids Using a Secure Social Networking Layer.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Attack Vectors to Metering Data in Smart Grids under Security Constraints.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Towards Social Crowd Environments Using Service-Oriented Architectures.
it Inf. Technol., 2011

Interaction mining and skill-dependent recommendations for multi-objective team composition.
Data Knowl. Eng., 2011

Managing social overlay networks in semantic open enterprise systems.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Opportunistic Information Flows through Strategic Social Link Establishment.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Adaptive provisioning of human expertise in service-oriented systems.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Bridging socially-enhanced virtual communities.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Computational Social Network Management in Crowdsourcing Environments.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

Resource and Agreement Management in Dynamic Crowdcomputing Environments.
Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, 2011

An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities.
Proceedings of the Advances in Databases and Information Systems, 2011

Modeling and Mining of Dynamic Trust in Complex Service-Oriented Systems.
Proceedings of the Socially Enhanced Services Computing, 2011

Behavior Monitoring in Self-Healing Service-Oriented Systems.
Proceedings of the Socially Enhanced Services Computing, 2011

Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems.
Proceedings of the Socially Enhanced Services Computing, 2011

2010
Modeling and mining of dynamic trust in complex service-oriented systems.
Inf. Syst., 2010

Mining and Composition of Emergent Collectives in Mixed Service-Oriented Systems.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems.
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010

Supporting Network Formation through Mining under Privacy Constraints.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Trustworthy interaction balancing in mixed service-oriented systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Trusted Interaction Patterns in Large-scale Enterprise Service Networks.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

A programming model for self-adaptive open enterprise systems.
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010

Trust-Based Adaptation in Complex Service-Oriented Systems.
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010

Social Formation and Interactions in Evolving Service-Oriented Communities.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Behavior Monitoring in Self-Healing Service-Oriented Systems.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Start Trusting Strangers? Bootstrapping and Prediction of Trust.
Proceedings of the Web Information Systems Engineering, 2009

VIeTE - Enabling Trust Emergence in Service-oriented Collaborative Environments.
Proceedings of the WEBIST 2009, 2009

Trust and Reputation Mining in Professional Virtual Communities.
Proceedings of the Web Engineering, 9th International Conference, 2009

The Cycle of Trust in Mixed Service-Oriented Systems.
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009


  Loading...