A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing F Skopik, G Settanni, R Fiedler Computers & Security 60, 154-176, 2016 | 296 | 2016 |
Combating advanced persistent threats: From network event correlation to incident detection I Friedberg, F Skopik, G Settanni, R Fiedler Computers & Security 48, 35-57, 2015 | 269 | 2015 |
Modeling and mining of dynamic trust in complex service-oriented systems F Skopik, D Schall, S Dustdar Socially Enhanced Services Computing: Modern Models and Algorithms for …, 2011 | 165 | 2011 |
System log clustering approaches for cyber security applications: A survey M Landauer, F Skopik, M Wurzenberger, A Rauber Computers & Security 92, 101739, 2020 | 102 | 2020 |
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser computers & security 79, 94-116, 2018 | 84 | 2018 |
Start trusting strangers? bootstrapping and prediction of trust F Skopik, D Schall, S Dustdar International conference on web information systems engineering, 275-289, 2009 | 72 | 2009 |
A collaborative cyber incident management system for European interconnected critical infrastructures G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ... Journal of Information Security and Applications 34, 166-182, 2017 | 70 | 2017 |
Under false flag: using technical artifacts for cyber attack attribution F Skopik, T Pahi Cybersecurity 3, 1-20, 2020 | 65 | 2020 |
Deep learning for anomaly detection in log data: A survey M Landauer, S Onder, F Skopik, M Wurzenberger Machine Learning with Applications 12, 100470, 2023 | 63 | 2023 |
A survey on threats and vulnerabilities in smart metering infrastructures F Skopik, Z Ma, T Bleier, H Grüneis International Journal of Smart Grid and Clean Energy 1 (1), 22-28, 2012 | 62 | 2012 |
Dealing with advanced persistent threats in smart grid ICT networks F Skopik, I Friedberg, R Fiedler ISGT 2014, 1-5, 2014 | 61 | 2014 |
Expert discovery and interactions in mixed service-oriented systems D Schall, F Skopik, S Dustdar IEEE Transactions on services computing 5 (2), 233-245, 2011 | 60 | 2011 |
Trust and reputation mining in professional virtual communities F Skopik, HL Truong, S Dustdar International Conference on Web Engineering, 76-90, 2009 | 59 | 2009 |
Interaction mining and skill-dependent recommendations for multi-objective team composition C Dorn, F Skopik, D Schall, S Dustdar Data & Knowledge Engineering 70 (10), 866-891, 2011 | 56 | 2011 |
Smart grid security: Innovative solutions for a modernized grid F Skopik, PD Smith Syngress, 2015 | 53 | 2015 |
Semi-synthetic data set generation for security software evaluation F Skopik, G Settanni, R Fiedler, I Friedberg 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 53 | 2014 |
Runtime behavior monitoring and self-adaptation in service-oriented systems H Psaier, L Juszczyk, F Skopik, D Schall, S Dustdar 2010 Fourth IEEE International Conference on Self-Adaptive and Self …, 2010 | 53 | 2010 |
Incremental clustering for semi-supervised anomaly detection applied on log data M Wurzenberger, F Skopik, M Landauer, P Greitbauer, R Fiedler, ... Proceedings of the 12th International Conference on Availability …, 2017 | 52 | 2017 |
Protecting cyber physical production systems using anomaly detection to enable self-adaptation G Settanni, F Skopik, A Karaj, M Wurzenberger, R Fiedler 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 173-180, 2018 | 44 | 2018 |
AIT cyber range: flexible cyber security environment for exercises, training and research M Leitner, M Frank, W Hotwagner, G Langner, O Maurhart, T Pahi, ... Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020 | 42 | 2020 |