Follow
Florian Skopik
Title
Cited by
Cited by
Year
Combating advanced persistent threats: From network event correlation to incident detection
I Friedberg, F Skopik, G Settanni, R Fiedler
Computers & Security 48, 35-57, 2015
2392015
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F Skopik, G Settanni, R Fiedler
Computers & Security 60, 154-176, 2016
2362016
Modeling and mining of dynamic trust in complex service-oriented systems
F Skopik, D Schall, S Dustdar
Socially Enhanced Services Computing: Modern Models and Algorithms for …, 2011
1632011
Start trusting strangers? bootstrapping and prediction of trust
F Skopik, D Schall, S Dustdar
Web Information Systems Engineering-WISE 2009: 10th International Conference …, 2009
702009
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser
computers & security 79, 94-116, 2018
662018
System log clustering approaches for cyber security applications: A survey
M Landauer, F Skopik, M Wurzenberger, A Rauber
Computers & Security 92, 101739, 2020
652020
A collaborative cyber incident management system for European interconnected critical infrastructures
G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ...
Journal of Information Security and Applications 34, 166-182, 2017
622017
Dealing with advanced persistent threats in smart grid ICT networks
F Skopik, I Friedberg, R Fiedler
ISGT 2014, 1-5, 2014
612014
A survey on threats and vulnerabilities in smart metering infrastructures
F Skopik, Z Ma, T Bleier, H Grüneis
International Journal of Smart Grid and Clean Energy 1 (1), 22-28, 2012
602012
Trust and Reputation Mining in Professional Virtual Communities.
F Skopik, HL Truong, S Dustdar
ICWE, 76-90, 2009
602009
Expert discovery and interactions in mixed service-oriented systems
D Schall, F Skopik, S Dustdar
IEEE Transactions on services computing 5 (2), 233-245, 2011
552011
Interaction mining and skill-dependent recommendations for multi-objective team composition
C Dorn, F Skopik, D Schall, S Dustdar
Data & Knowledge Engineering 70 (10), 866-891, 2011
542011
Runtime behavior monitoring and self-adaptation in service-oriented systems
H Psaier, L Juszczyk, F Skopik, D Schall, S Dustdar
2010 Fourth IEEE International Conference on Self-Adaptive and Self …, 2010
542010
Semi-synthetic data set generation for security software evaluation
F Skopik, G Settanni, R Fiedler, I Friedberg
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
452014
Smart grid security: Innovative solutions for a modernized grid
F Skopik, PD Smith
Syngress, 2015
422015
Trustworthy interaction balancing in mixed service-oriented systems
F Skopik, D Schall, S Dustdar
Proceedings of the 2010 ACM Symposium on Applied Computing, 799-806, 2010
402010
Attack vectors to metering data in smart grids under security constraints
F Skopik, Z Ma
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
392012
Incremental clustering for semi-supervised anomaly detection applied on log data
M Wurzenberger, F Skopik, M Landauer, P Greitbauer, R Fiedler, ...
Proceedings of the 12th International Conference on Availability …, 2017
372017
Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level
F Skopik
CRC Press, 2017
332017
Behavior monitoring in self-healing service-oriented systems
H Psaier, F Skopik, D Schall, S Dustdar
2010 IEEE 34th Annual Computer Software and Applications Conference, 357-366, 2010
332010
The system can't perform the operation now. Try again later.
Articles 1–20