Florian Skopik
Citat de
Citat de
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F Skopik, G Settanni, R Fiedler
Computers & Security 60, 154-176, 2016
Combating advanced persistent threats: From network event correlation to incident detection
I Friedberg, F Skopik, G Settanni, R Fiedler
Computers & Security 48, 35-57, 2015
Modeling and mining of dynamic trust in complex service-oriented systems
F Skopik, D Schall, S Dustdar
Socially Enhanced Services Computing: Modern Models and Algorithms for …, 2011
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser
computers & security 79, 94-116, 2018
Start trusting strangers? bootstrapping and prediction of trust
F Skopik, D Schall, S Dustdar
Web Information Systems Engineering-WISE 2009: 10th International Conference …, 2009
System log clustering approaches for cyber security applications: A survey
M Landauer, F Skopik, M Wurzenberger, A Rauber
Computers & Security 92, 101739, 2020
A collaborative cyber incident management system for European interconnected critical infrastructures
G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ...
Journal of Information Security and Applications 34, 166-182, 2017
Dealing with advanced persistent threats in smart grid ICT networks
F Skopik, I Friedberg, R Fiedler
ISGT 2014, 1-5, 2014
A survey on threats and vulnerabilities in smart metering infrastructures
F Skopik, Z Ma, T Bleier, H Grüneis
International Journal of Smart Grid and Clean Energy 1 (1), 22-28, 2012
Trust and reputation mining in professional virtual communities
F Skopik, HL Truong, S Dustdar
Web Engineering: 9th International Conference, ICWE 2009 San Sebastián …, 2009
Interaction mining and skill-dependent recommendations for multi-objective team composition
C Dorn, F Skopik, D Schall, S Dustdar
Data & Knowledge Engineering 70 (10), 866-891, 2011
Expert discovery and interactions in mixed service-oriented systems
D Schall, F Skopik, S Dustdar
IEEE Transactions on services computing 5 (2), 233-245, 2011
Runtime behavior monitoring and self-adaptation in service-oriented systems
H Psaier, L Juszczyk, F Skopik, D Schall, S Dustdar
2010 Fourth IEEE International Conference on Self-Adaptive and Self …, 2010
Semi-synthetic data set generation for security software evaluation
F Skopik, G Settanni, R Fiedler, I Friedberg
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Smart grid security: Innovative solutions for a modernized grid
F Skopik, PD Smith
Syngress, 2015
Incremental clustering for semi-supervised anomaly detection applied on log data
M Wurzenberger, F Skopik, M Landauer, P Greitbauer, R Fiedler, ...
Proceedings of the 12th International Conference on Availability …, 2017
Trustworthy interaction balancing in mixed service-oriented systems
F Skopik, D Schall, S Dustdar
Proceedings of the 2010 ACM Symposium on Applied Computing, 799-806, 2010
Attack vectors to metering data in smart grids under security constraints
F Skopik, Z Ma
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
Protecting cyber physical production systems using anomaly detection to enable self-adaptation
G Settanni, F Skopik, A Karaj, M Wurzenberger, R Fiedler
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 173-180, 2018
Under false flag: Using technical artifacts for cyber attack attribution
F Skopik, T Pahi
Cybersecurity 3, 1-20, 2020
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20