Roman Fiedler

According to our database1, Roman Fiedler authored at least 22 papers between 2012 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018

Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotech. Informationstechnik, 2018

Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A collaborative cyber incident management system for European interconnected critical infrastructures.
J. Inf. Secur. Appl., 2017

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Acquiring Cyber Threat Intelligence through Security Information Correlation.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Comput. Secur., 2016

Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Cyber situational awareness through network anomaly detection: state of the art and new approaches.
Elektrotech. Informationstechnik, 2015

Keine Cyber-Sicherheit ohne Datenschutz.
Datenschutz und Datensicherheit, 2015

Combating advanced persistent threats: From network event correlation to incident detection.
Comput. Secur., 2015

Beyond gut instincts: Understanding, rating and comparing self-learning IDSs.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Cyber Attack Information Sharing.
Datenschutz und Datensicherheit, 2014

Semi-synthetic data set generation for security software evaluation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Dealing with advanced persistent threats in smart grid ICT networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

2013
Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

2012
Information Management and Sharing for National Cyber Situational Awareness.
Proceedings of the ISSE 2012, 2012


  Loading...