Florian Skopik
Orcid: 0000-0002-1922-7892Affiliations:
- Austrian Institute of Technology, Vienna, Austria
According to our database1,
Florian Skopik
authored at least 130 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on d-nb.info
-
on flosko.at
On csauthors.net:
Bibliography
2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024
Taranis AI: Applying Natural Language Processing for Advanced Open-Source Intelligence Analysis.
ERCIM News, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques.
CoRR, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain.
Int. J. Inf. Sec., 2022
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022
SPOTTED: Systematic Mapping of Detection Approaches on Data Sources for Enhanced Cyber Defence.
ERCIM News, 2022
Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
IEEE Secur. Priv., 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Springer, ISBN: 978-3-030-74449-6, 2021
2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020
ERCIM News, 2020
Cybersecur., 2020
Comput. Secur., 2020
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Int. J. Cyber Situational Aware., 2019
INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data.
ERCIM News, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotech. Informationstechnik, 2018
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Proceedings of the Information Security Practice and Experience, 2018
Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Secur. Appl., 2017
Datenschutz und Datensicherheit, 2017
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016
Int. J. Cyber Situational Aware., 2016
The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments.
ERCIM News, 2016
ERCIM News, 2016
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Comput. Secur., 2016
Comput. Secur., 2016
Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
A decision support model for situational awareness in National Cyber Operations Centers.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A structural design for a pan-European early warning system for critical infrastructures.
Elektrotech. Informationstechnik, 2015
Cyber situational awareness through network anomaly detection: state of the art and new approaches.
Elektrotech. Informationstechnik, 2015
Combating advanced persistent threats: From network event correlation to incident detection.
Comput. Secur., 2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
2014
Encyclopedia of Social Network Analysis and Mining, 2014
The social smart grid: Dealing with constrained energy resources through social coordination.
J. Syst. Softw., 2014
Securing Interconnected Cyber-Physical Systems through Strategic Information Sharing.
ERCIM News, 2014
Proceedings of the SMARTGREENS 2014, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
2013
J. Commun., 2013
Proceedings of the Self-Organizing Systems - 7th IFIP TC 6 International Workshop, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
2012
IEEE Trans. Serv. Comput., 2012
Soc. Netw. Anal. Min., 2012
Int. J. Comput. Sci. Appl., 2012
Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems.
Int. J. Cooperative Inf. Syst., 2012
CoRR, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the ISSE 2012, 2012
Proceedings of the Future Security - 7th Security Research Conference, 2012
Novel Energy Saving Opportunities in Smart Grids Using a Secure Social Networking Layer.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
it Inf. Technol., 2011
Interaction mining and skill-dependent recommendations for multi-objective team composition.
Data Knowl. Eng., 2011
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011
Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, 2011
Proceedings of the Advances in Databases and Information Systems, 2011
Proceedings of the Socially Enhanced Services Computing, 2011
Proceedings of the Socially Enhanced Services Computing, 2011
Proceedings of the Socially Enhanced Services Computing, 2011
2010
Inf. Syst., 2010
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the Web Information Systems Engineering, 2009
VIeTE - Enabling Trust Emergence in Service-oriented Collaborative Environments.
Proceedings of the WEBIST 2009, 2009
Proceedings of the Web Engineering, 9th International Conference, 2009
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009