关注
Florian Skopik
标题
引用次数
引用次数
年份
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F Skopik, G Settanni, R Fiedler
Computers & Security 60, 154-176, 2016
2962016
Combating advanced persistent threats: From network event correlation to incident detection
I Friedberg, F Skopik, G Settanni, R Fiedler
Computers & Security 48, 35-57, 2015
2692015
Modeling and mining of dynamic trust in complex service-oriented systems
F Skopik, D Schall, S Dustdar
Socially Enhanced Services Computing: Modern Models and Algorithms for …, 2011
1652011
System log clustering approaches for cyber security applications: A survey
M Landauer, F Skopik, M Wurzenberger, A Rauber
Computers & Security 92, 101739, 2020
1022020
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser
computers & security 79, 94-116, 2018
842018
Start trusting strangers? bootstrapping and prediction of trust
F Skopik, D Schall, S Dustdar
International conference on web information systems engineering, 275-289, 2009
722009
A collaborative cyber incident management system for European interconnected critical infrastructures
G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ...
Journal of Information Security and Applications 34, 166-182, 2017
702017
Under false flag: using technical artifacts for cyber attack attribution
F Skopik, T Pahi
Cybersecurity 3, 1-20, 2020
652020
Deep learning for anomaly detection in log data: A survey
M Landauer, S Onder, F Skopik, M Wurzenberger
Machine Learning with Applications 12, 100470, 2023
632023
A survey on threats and vulnerabilities in smart metering infrastructures
F Skopik, Z Ma, T Bleier, H Grüneis
International Journal of Smart Grid and Clean Energy 1 (1), 22-28, 2012
622012
Dealing with advanced persistent threats in smart grid ICT networks
F Skopik, I Friedberg, R Fiedler
ISGT 2014, 1-5, 2014
612014
Expert discovery and interactions in mixed service-oriented systems
D Schall, F Skopik, S Dustdar
IEEE Transactions on services computing 5 (2), 233-245, 2011
602011
Trust and reputation mining in professional virtual communities
F Skopik, HL Truong, S Dustdar
International Conference on Web Engineering, 76-90, 2009
592009
Interaction mining and skill-dependent recommendations for multi-objective team composition
C Dorn, F Skopik, D Schall, S Dustdar
Data & Knowledge Engineering 70 (10), 866-891, 2011
562011
Smart grid security: Innovative solutions for a modernized grid
F Skopik, PD Smith
Syngress, 2015
532015
Semi-synthetic data set generation for security software evaluation
F Skopik, G Settanni, R Fiedler, I Friedberg
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
532014
Runtime behavior monitoring and self-adaptation in service-oriented systems
H Psaier, L Juszczyk, F Skopik, D Schall, S Dustdar
2010 Fourth IEEE International Conference on Self-Adaptive and Self …, 2010
532010
Incremental clustering for semi-supervised anomaly detection applied on log data
M Wurzenberger, F Skopik, M Landauer, P Greitbauer, R Fiedler, ...
Proceedings of the 12th International Conference on Availability …, 2017
522017
Protecting cyber physical production systems using anomaly detection to enable self-adaptation
G Settanni, F Skopik, A Karaj, M Wurzenberger, R Fiedler
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 173-180, 2018
442018
AIT cyber range: flexible cyber security environment for exercises, training and research
M Leitner, M Frank, W Hotwagner, G Langner, O Maurhart, T Pahi, ...
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020
422020
系统目前无法执行此操作,请稍后再试。
文章 1–20