Florian Skopik

According to our database1, Florian Skopik authored at least 87 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Big Data for Cybersecurity.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data.
ERCIM News, 2019

AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Collective Intelligence for Crowdsourcing and Community Q&A.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018

Cross-Organizational Cyber Risk Assessments.
ERCIM News, 2018

Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotechnik und Informationstechnik, 2018

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Computers & Security, 2018

Trust and Distrust: On Sense and Nonsense in Big Data.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.
Proceedings of the Information Security Practice and Experience, 2018

Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Sec. Appl., 2017

Über die datenschutzrechtliche Problematik in CERTs/CSIRTs-Netzwerken.
Datenschutz und Datensicherheit, 2017

Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Improved software vulnerability patching techniques using CVSS and game theory.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Acquiring Cyber Threat Intelligence through Security Information Correlation.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016

A Public-Private-Partnership Model for National Cyber Situational Awareness.
IJCSA, 2016

The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments.
ERCIM News, 2016

CISA: Establishing National Cyber Situational Awareness to Counter New Threats.
ERCIM News, 2016

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Computers & Security, 2016

From old to new: Assessing cybersecurity risks for an evolving smart grid.
Computers & Security, 2016

Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A decision support model for situational awareness in National Cyber Operations Centers.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A structural design for a pan-European early warning system for critical infrastructures.
Elektrotechnik und Informationstechnik, 2015

Cyber situational awareness through network anomaly detection: state of the art and new approaches.
Elektrotechnik und Informationstechnik, 2015

Keine Cyber-Sicherheit ohne Datenschutz.
Datenschutz und Datensicherheit, 2015

Combating advanced persistent threats: From network event correlation to incident detection.
Computers & Security, 2015

A Blueprint for a Pan-European Cyber Incident Analysis System.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Beyond gut instincts: Understanding, rating and comparing self-learning IDSs.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

On demand for situational awareness for preventing attacks on the smart grid.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Collective Intelligence for Crowdsourcing and Community Q&A.
Encyclopedia of Social Network Analysis and Mining, 2014

The social smart grid: Dealing with constrained energy resources through social coordination.
Journal of Systems and Software, 2014

Securing Interconnected Cyber-Physical Systems through Strategic Information Sharing.
ERCIM News, 2014

Cyber Attack Information Sharing.
Datenschutz und Datensicherheit, 2014

Practical Risk Assessment Using a Cumulative Smart Grid Model.
Proceedings of the SMARTGREENS 2014, 2014

Semi-synthetic data set generation for security software evaluation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Dealing with advanced persistent threats in smart grid ICT networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Architecture-driven smart grid security management.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

2013
Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids.
JCM, 2013

Secure Smart Grids or Say ‘Goodnight Vienna!'.
ERCIM News, 2013

A Self-organising Approach for Smart Meter Communication Systems.
Proceedings of the Self-Organizing Systems - 7th IFIP TC 6 International Workshop, 2013

Trustworthy incident information sharing in social cyber defense alliances.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation.
Proceedings of the Informatik 2013, 2013

2012
Expert Discovery and Interactions in Mixed Service-Oriented Systems.
IEEE Trans. Services Computing, 2012

Social network mining of requester communities in crowdsourcing markets.
Social Netw. Analys. Mining, 2012

Trusted Information Sharing using SOA-Based Social Overlay Networks.
IJCSA, 2012

Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems.
Int. J. Cooperative Inf. Syst., 2012

Cybercrime and the Security of Critical Infrastructures.
ERCIM News, 2012

Towards Secure Time-Triggered Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Information Management and Sharing for National Cyber Situational Awareness.
Proceedings of the ISSE 2012, 2012

Designing a Cyber Attack Information System for National Situational Awareness.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Novel Energy Saving Opportunities in Smart Grids Using a Secure Social Networking Layer.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Attack Vectors to Metering Data in Smart Grids under Security Constraints.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Towards Social Crowd Environments Using Service-Oriented Architectures.
it - Information Technology, 2011

Interaction mining and skill-dependent recommendations for multi-objective team composition.
Data Knowl. Eng., 2011

Managing social overlay networks in semantic open enterprise systems.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Opportunistic Information Flows through Strategic Social Link Establishment.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Adaptive provisioning of human expertise in service-oriented systems.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Bridging socially-enhanced virtual communities.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Computational Social Network Management in Crowdsourcing Environments.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

Resource and Agreement Management in Dynamic Crowdcomputing Environments.
Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, 2011

An Analysis of the Structure and Dynamics of Large-Scale Q/A Communities.
Proceedings of the Advances in Databases and Information Systems, 2011

Modeling and Mining of Dynamic Trust in Complex Service-Oriented Systems.
Proceedings of the Socially Enhanced Services Computing, 2011

2010
Modeling and mining of dynamic trust in complex service-oriented systems.
Inf. Syst., 2010

Mining and Composition of Emergent Collectives in Mixed Service-Oriented Systems.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems.
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010

Supporting Network Formation through Mining under Privacy Constraints.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Trustworthy interaction balancing in mixed service-oriented systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Trusted Interaction Patterns in Large-scale Enterprise Service Networks.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

A programming model for self-adaptive open enterprise systems.
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010

Trust-Based Adaptation in Complex Service-Oriented Systems.
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010

Social Formation and Interactions in Evolving Service-Oriented Communities.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Behavior Monitoring in Self-Healing Service-Oriented Systems.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Start Trusting Strangers? Bootstrapping and Prediction of Trust.
Proceedings of the Web Information Systems Engineering, 2009

VIeTE - Enabling Trust Emergence in Service-oriented Collaborative Environments.
Proceedings of the WEBIST 2009, 2009

Trust and Reputation Mining in Professional Virtual Communities.
Proceedings of the Web Engineering, 9th International Conference, 2009

The Cycle of Trust in Mixed Service-Oriented Systems.
Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, 2009


  Loading...