Markus Wurzenberger

Orcid: 0000-0003-3259-6972

According to our database1, Markus Wurzenberger authored at least 44 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024

2023
Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Maintainable Log Datasets for Evaluation of Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2023

A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques.
CoRR, 2023

Introducing a New Alert Data Set for Multi-Step Attack Analysis.
CoRR, 2023

Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

Detecting Unknown Cyber Security Attacks Through System Behavior Analysis.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022

Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey.
IEEE Secur. Priv., 2022

Online Log Data Analysis With Efficient Machine Learning: A Review.
IEEE Secur. Priv., 2022

Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022

Deep Learning for Anomaly Detection in Log Data: A Survey.
CoRR, 2022

A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021

The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection.
IEEE Secur. Priv., 2021

Iterative Selection of Categorical Variables for Log Data Anomaly Detection.
Proceedings of the Computer Security - ESORICS 2021, 2021

Smart Log Data Analytics - Techniques for Advanced Security Analysis
Springer, ISBN: 978-3-030-74449-6, 2021

2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020

DECEPT: Detecting Cyber-Physical Attacks using Machine Learning on Log Data.
ERCIM News, 2020

System log clustering approaches for cyber security applications: A survey.
Comput. Secur., 2020

Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Big Data for Cybersecurity.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

A Framework for Cyber Threat Intelligence Extraction from Raw Log Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018

Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotech. Informationstechnik, 2018

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018

Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.
Proceedings of the Information Security Practice and Experience, 2018

Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Acquiring Cyber Threat Intelligence through Security Information Correlation.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016

The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments.
ERCIM News, 2016

Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards a Resilience Metric Framework for Cyber-Physical Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015


  Loading...