Search parameters:
  • Search in name records for: "skopik" ("skopik" interpreted as a name)
  • Search restricted to types of publications: All
  • Search restricted to time interval All data in the database
165 matching records have been found with your search parameters:
165 - Center "Digital Safety & Security"




Bücher und Buch-Herausgaben:


  1. Source: Center "Digital Safety & Security"

    H. Leopold, T. Bleier, F. Skopik (ed.):
    "Cyber Attack Information System";
    Springer, Berlin Heidelberg, 2015, ISBN: 978-3-662-44305-7; 208 pages.

  2. Source: Center "Digital Safety & Security"

    F. Skopik (ed.):
    "Collaborative Cyber Threat Intelligence - Detecting and Responding to Advanced Cyber Attacks at the National Level";
    Taylor & Francis, Boca Raton, 2017, ISBN: 978-1-138-03182-1; 430 pages.

  3. Source: Center "Digital Safety & Security"

    F. Skopik, T. Pahi, M. Leitner (ed.):
    "Cyber Situational Awareness in Public-Private-Partnerships";
    Springer, Wiesbaden, 2018, ISBN: 978-3-662-56083-9; 347 pages.

  4. Source: Center "Digital Safety & Security"

    F. Skopik, P. Smith (ed.):
    "Smart Grid Security: Innovative Solutions for a Modernized Grid";
    Elsevier , xx, 2015, ISBN: 978-0128021224; 324 pages.

  5. Source: Center "Digital Safety & Security"

    F. Skopik, K. Stefanidis (ed.):
    "ERCIM News 128, "Fighting Cyber Crime"";
    Ercim Eeig, 2022, 47 pages.

  6. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer (ed.):
    "Smart Log Data Analytics";
    Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6; 208 pages.


Zeitschriftenbeiträge:


  1. Source: Center "Digital Safety & Security"

    K. Einzinger, F. Skopik:
    "Über die datenschutzrechtliche Problematik in CERTs/CSIRTs-Netzwerken";
    Datenschutz und Datensicherheit DuD, 41 (2017), 572 - 576.

  2. Source: Center "Digital Safety & Security"

    K. Einzinger, F. Skopik, R. Fiedler:
    "Keine Cyber-Sicherheit ohne Datenschutz";
    Datenschutz und Datensicherheit DuD, 11 (2015), 723 - 729.

  3. Source: Center "Digital Safety & Security"

    I. Friedberg, F. Skopik, R. Fiedler:
    "Cyber situational awareness through network anomaly detection: state of the art and new approaches";
    e&i elektrotechnik und informationstechnik, 2 (2015), 132; 101 - 105.

  4. Source: Center "Digital Safety & Security"

    I. Friedberg, F. Skopik, G. Settanni, R. Fiedler:
    "Combating Advanced Persistent Threats: From Network Event Correlation to Incident Detection";
    Computers & Security, 48 (2014), 35 - 57.

  5. Source: Center "Digital Safety & Security"

    H. Kaufmann, R. Hutter, F. Skopik, M. Mantere:
    "A Structural Design for a Pan-European Eearly Warning System for Critical Infrastructures";
    Elektrotechnik & Informationstechnik, 2 (2015), 132; 117 - 121.

  6. Source: Center "Digital Safety & Security"

    M. Kern, F. Skopik:
    "SPOTTED: Systematic Mapping of Detection Approaches on Data Sources for Enhanced Cyber Defence";
    ERCIM News, 129 (2022), 22 - 23.

  7. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik:
    "INDICÆTING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data";
    ERCIM News, 116 (2019), 25 - 26.

  8. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner:
    "Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations";
    ERCIM News, 129 (2022), 24; 24 - 25.

  9. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, A. Rauber:
    "Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed";
    Transactions on Reliability, 70 (2021), 402 - 415.

  10. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, A. Rauber:
    "Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation";
    ACM Transactions on Privacy and Security, 25 (2022), 18; 1 - 36.

  11. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, A. Rauber:
    "System Log Clustering Approaches for Cyber Security Applications: A Survey";
    Computers & Security, - (2020), 92; 1 - 17.

  12. Source: Center "Digital Safety & Security"

    M. Landauer, M. Wurzenberger, F. Skopik, G. Settanni, P. Filzmoser:
    "Dynamic Log File Analysis: An Unsupervised Cluster Evolution Approach for Anomaly Detection";
    Computers & Security, 79 (2018), 94 - 116.

  13. Source: Center "Digital Safety & Security"

    L. Langer, F. Skopik, P. Smith, M. Kammerstetter:
    "From Old to New: Assessing Cybersecurity Risks for an Evolving Smart Grid";
    Computers & Security, 62 (2016), 165 - 175.

  14. Source: Center "Digital Safety & Security"

    M. Leitner, M. Frank, G. Langner, M. Landauer, F. Skopik, P. Smith, B. Akhras, W. Hotwagner, S. Kucek, T. Pahi, L. Reuter, M. Warum:
    "Enabling exercises, education and research with a comprehensive cyber range";
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 12 (2021), 3; 37 - 61.

  15. Source: Center "Digital Safety & Security"

    Z. Ma, C. Wagner, R. Woitsch, F. Skopik, T. Bleier:
    "Model-driven Security: from Theory to Application";
    International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), 5 (2012), 151 - 158.

  16. Source: Center "Digital Safety & Security"

    T. Pahi, M. Leitner, F. Skopik:
    "Preparation, Modelling, and Visualization of Cyber Common Operating Pictures for National Cyber Security Centres";
    Journal of Information Warfare, 16 (2017), 26 - 40.

  17. Source: Center "Digital Safety & Security"

    T. Pahi, F. Skopik:
    "A Public-Private-Partnership Model for National Cyber Situational Awareness";
    Intl. Journal on Cyber Situational Awareness, 1 (2016), 1 - 23.

  18. Source: Center "Digital Safety & Security"

    D. Schall, F. Skopik:
    "Social network mining of requester communities in crowdsourcing markets";
    Social Network Analysis and Mining, 4 (2012), 2; 329 - 344.

  19. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, M. Carolan, D. Conroy, K. Boettinger, M. Gall, G. Brost, C. Ponchel, M. Haustein, H. Kaufmann, K. Theuerkauf, P. Olli:
    "A Collaborative Cyber Incident Management System for European Interconnected Critical Infrastructures";
    Journal of Information Security and Applications, 34 (2017), part 2; 166 - 182.

  20. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, M. Wurzenberger, R. Fiedler:
    "Countering Targeted Cyber Attacks in Industry 4.0 through Anomaly Detection for Self-Adapting CPS";
    Elektrotechnik & Informationstechnik, 135 (2018), 3; 278 - 285.

  21. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Crisismanagment/RISkanalysis - CROSSover system";
    ERCIM News, 115 (2018), 42 - 43.

  22. Source: Center "Digital Safety & Security"

    F. Skopik:
    "National Cyber Security Sensor Networks and the Human in the Loop";
    Journal of Information Warfare, 18 (2019), 1 - 14.

  23. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Security Is Not Enough! On Privacy Challenges in Smart Grids";
    International Journal of Smart Grid and Clean Energy, 1 (2012), 1; 7 - 14.

  24. Source: Center "Digital Safety & Security"

    F. Skopik:
    "The Social Smart Grid: Dealing with Constrained Energy Resources through Social Coordination";
    Journal of Systems and Software, 89 (2014), 3 - 18.

  25. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier:
    "Cybercrime and the Security of Critical Infrastructures";
    ERCIM News, October (2012), 91; 26 - 28.

  26. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier:
    "Securiing Interconnected Cyber-Physical Systems through Strategic Information Sharing";
    ERCIM News, 97 (2014), 20 - 21.

  27. Source: Center "Digital Safety & Security"

    F. Skopik, A. Bonitz, V. Grantz, G. Göhler:
    "From scattered data to actionable knowledge: flexible cyber security reporting in the military domain";
    International Journal of Information Security, 21 (2022), 1323 - 1347.

  28. Source: Center "Digital Safety & Security"

    F. Skopik, R. Fiedler, O. Lendl:
    "Cyber Attack Information Sharing - Pilotstudie eines Österreichischen Cyber Lagezentrums";
    Datenschutz und Datensicherheit DuD, 38 (2014), 4; 251 - 256.

  29. Source: Center "Digital Safety & Security"

    F. Skopik, S. Filip:
    "A blueprint and proof-of-concept for a national cyber security sensor network";
    International Journal on Cyber Situational Awareness, 4 (2019), 155 - 184.

  30. Source: Center "Digital Safety & Security"

    F. Skopik, M. Landauer, M. Wurzenberger:
    "Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey";
    IEEE Security & Privacy, 20 (2022), 6; 18 - 26.

  31. Source: Center "Digital Safety & Security"

    F. Skopik, M. Landauer, M. Wurzenberger:
    "Online Log Data Analysis With Efficient Machine Learning: A Review";
    IEEE Security & Privacy, 20 (2022), 2022.03; 80 - 90.

  32. Source: Center "Digital Safety & Security"

    F. Skopik, M. Landauer, M. Wurzenberger, G. Vormayr, J. Milosevic, J. Fabini, W. Prüggler, O. Kruschitz, B. Widmann, K. Truckenthanner, S. Rasse, M. Simmer, C. Zauner:
    "synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems";
    Journal of Information Security and Applications, 54 (2020), 1 - 23.

  33. Source: Center "Digital Safety & Security"

    F. Skopik, L. Langer:
    "Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids";
    JCM - Journal of Communications, 8 (2013), 8; 462 - 472.

  34. Source: Center "Digital Safety & Security"

    F. Skopik, M. Leitner, T. Pahi:
    "CISA: Establishing National Cyber Situational Awareness to Counter New Threats";
    ERCIM News, 106 (2016), 52 - 53.

  35. Source: Center "Digital Safety & Security"

    F. Skopik, Z. Ma, T. Bleier, H. Grüneis:
    "A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures";
    International Journal of Smart Grid and Clean Energy, 1 (2012), 1; 22 - 28.

  36. Source: Center "Digital Safety & Security"

    F. Skopik, T. Pahi:
    "Under false flag: Using technical artifacts for cyber attack attribution";
    Springer Cybersecurity, 3 (2020), 1 - 20.

  37. Source: Center "Digital Safety & Security"

    F. Skopik, D. Schall, S. Dustdar:
    "Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems";
    International Journal of Cooperative Information Systems, 4 (2013), 21; 279 - 341.

  38. Source: Center "Digital Safety & Security"

    F. Skopik, D. Schall, S. Dustdar:
    "Trusted Information Sharing Using SOA-Based Social Overlay Networks";
    International Journal of Computer Science and Applications, 9 (2012), 1; 116 - 151.

  39. Source: Center "Digital Safety & Security"

    F. Skopik, G. Settanni, R. Fiedler:
    "A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing";
    Computers & Security, 60 (2016), 154 - 176.

  40. Source: Center "Digital Safety & Security"

    F. Skopik, P. Smith, T. Bleier:
    "Secure Smart Grids or Say 'Goodnight Vienna!'";
    ERCIM News, 92 (2012), 38 - 39.

  41. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, R. Fiedler:
    "synERGY: Detecting advanced attacks across multiple layers of cyber-physical systems";
    ERCIM News, 114 (2018), 30 - 31.

  42. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "DECEPT: Detecting Cyber-Physical Attacks using Machine Learning on Log Data";
    ERCIM News, 123 (2020), 33 - 34.

  43. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection";
    IEEE Security & Privacy, 19 (2021), 36 - 45.

  44. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik:
    "The BAESE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments";
    ERCIM News, 107 (2016), 51 - 52.

  45. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik:
    "The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments";
    ERCIM News, 107 (2016), 51 - 52.

  46. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, G. Settanni, W. Scherrer:
    "Complex Log File Synthesis for Rapid Sandbox-Benchmarking of Security- and Computer Network Analysis Tools";
    Information Systems, 60 (2016), 13 - 33.


Buchbeiträge:


  1. Source: Center "Digital Safety & Security"

    R. Fiedler, F. Skopik, T. Mandl, K. Einzinger:
    "Erkennen von Anomalien und Angriffsmustern";
    in: "Cyber Attack Information System", Springer, Berlin Heidelberg, 2015, ISBN: 978-3-662-44305-7, 89 - 118.

  2. Source: Center "Digital Safety & Security"

    H. Köck, M. Krumböck, W. Ebner, T. Mandl, R. Fiedler, F. Skopik, O. Lendl:
    "Evaluierung von CAIS im praktischen Einsatz";
    in: "Cyber Attack Information System", Springer, Berlin Heidelberg, 2015, ISBN: 978-3-662-44305-7, 119 - 148.

  3. Source: Center "Digital Safety & Security"

    M. Leitner, T. Pahi, F. Skopik:
    "Situational Awareness for Strategic Decision Making on a National Level";
    in: "Collaborative Cyber Threat Intelligence", CRC Press, Abingdon, 2017, ISBN: 978-1138031821, 225 - 276.

  4. Source: Center "Digital Safety & Security"

    H. Leopold, F. Skopik, T. Bleier, J. Schröfl, M. Fandler, R. Ledinger, T. Mischitz:
    "Einleitung zum Cyber Attack Information System";
    in: "Cyber Attack Information System", Springer, Berlin Heidelberg, 2015, ISBN: 978-3-662-44305-7, 1 - 12.

  5. Source: Center "Digital Safety & Security"

    M. Möderl, W. Rauch, S. Achleitner, L. Aditya, E. Mayr, R. Neunteufel, R. Perfler, C. Neuhold, R. Godina, H. Wiesenegger, F. Friedl, D. Fuchs-Hanusch, J. Lammel, P. Hohenblum, F. Skopik, T. Bleier, K. Weber, F. Eder, M. Brugger:
    "Austrian Activities in Protecting Critical Water Infrastructure";
    in: "Securing Watre and Wastewater Systems", issued by: Springer International; Springer International Publishing, Switzerland, 2013, ISBN: 978-3-319-01091-5, 343 - 373.

  6. Source: Center "Digital Safety & Security"

    T. Pahi, F. Skopik:
    "A Systematic Study and Comparison of Attack Sceanarios and Involved threat Actors";
    in: "Collaborative Cyber threat Intelligence", CRC Press, USA, 2017, ISBN: 978-1138031821, 19 - 68.

  7. Source: Center "Digital Safety & Security"

    D. Schall, F. Skopik:
    "Collective Intelligence for Crowdsourcing and Community Q&A";
    in: "Encyclopedia of Social Network Analysis and Mining", issued by: Springer; Springer International Publishing, Uni Trier, 2014, ISBN: 978-1-4614-6169-2, 169 - 177.

  8. Source: Center "Digital Safety & Security"

    F. Skopik:
    "APT-CC: Studie zur Errichtung eines APT Competence Centers in Österreich";
    in: "Wissenschaf(f)t Sicherheit - Studienband 5", Bundesministerium für Landwirtschaft, Regionen und Tourismus, Wien, 2021, 6 - 14.

  9. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier, R. Fiedler:
    "Cyber Attack Information System: Gesamtansatz";
    in: "Cyber Attack Information System", Springer, Berlin Heidelberg, 2015, ISBN: 978-3-662-44305-7, 53 - 70.

  10. Source: Center "Digital Safety & Security"

    F. Skopik, G. Settanni, R. Fiedler:
    "The Importance of Information Sharing and its Numerous Dimensions to Circumvent Incidents and Mitigate Cyber Threats";
    in: "Collaborative Cyber Threat Intelligence", CRC Press, USA, 2017, ISBN: 978-1138031821, 129 - 186.

  11. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "A Concept for a Tree-Based Log Parser Generator";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 131 - 149.

  12. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "AECID: A Light-Weight Log Analysis Approach for Online Anomaly Detection";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 99 - 129.

  13. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Detecting Unknown Cyber Security Attacks Through System Behavior Analysis";
    in: "Cybersecurity of Digital Service Chains", 13300; J. Kołodziej, M. Repetto, A. Duzha (ed.); issued by: Springer; Springer, 2022, ISBN: 978-3-031-04036-8, 103 - 119.

  14. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Final Remarks";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 173.

  15. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Generating Character-Based Templates for Log Data";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 63 - 81.

  16. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Incremental Log Data Clustering for Processing Large Amounts of Data Online";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 43 - 61.

  17. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Introduction";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 1 - 11.

  18. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Survey on Log Clustering Approaches";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 13 - 41.

  19. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Time Series Analysis for Temporal Anomaly Detection";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 83 - 98.

  20. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Variable Type Detector for Statistical Analysis of Log Tokens";
    in: "Smart Log Data Analytics", Springer Nature, Cham, Schweiz, 2021, ISBN: 978-3-030-74449-6, 151 - 171.

  21. Source: Center "Digital Safety & Security"

    M. Wurzenberger, M. Landauer, A. Bajraktari, F. Skopik:
    "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation";
    in: "Cybersecurity of Digital Service Chains", 13300; J. Kołodziej, M. Repetto, A. Duzha (ed.); issued by: Springer; Springer, 2022, ISBN: 978-3-031-04036-8, 136 - 161.

  22. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, G. Settanni:
    "Big Data for Cybersecurity";
    in: "Encyclopedia of Big Data Technologies", Springer, Cham, 2018, ISBN: 978-3-319-63962-8, 1 - 9.


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag):


  1. Source: Center "Digital Safety & Security"

    P. Casas, A. DŽAlconzo, G. Settanni, P. Fiadino, F. Skopik:
    "(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data";
    Poster: CCS'16 - ACM SIGSAC Conference on Computer and Communications Security, New York; 2016-10-24 - 2016-10-28; in: "Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security", ACM - Association for Computing Machinery, New York (2016), ISBN: 978-1-4503-4139-4; 1805 - 1807.

  2. Source: Center "Digital Safety & Security"

    R. Graf, F. Skopik, K. Whitebloom:
    "A Decision Support Model for Situational Awareness in National Cyber Operations Centers";
    Talk: International Conference on Cyber Situational Awareness Data Analytics and Assessment, London, UK; 2016-06-13 - 2016-06-14; in: "International Conference on Cyber Situational Awareness Data Analytics and Assessment", London (2016), ISBN: 978-0-9932338-0-7; 74 - 84.

  3. Source: Center "Digital Safety & Security"

    M. Kammerstetter, L. Langer, F. Skopik, W. Kastner:
    "Architecture-Driven Smart Grid Security Management";
    Talk: The 2nd ACM Workshop on Information Hiding and Multimedia Security, Salzburg; 2014-06-11 - 2014-06-13; in: "ICH&MMsec'14; Proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop", ACM - Association for Computing Machinery, New York (2014), ISBN: 978-1-4503-2647-6; 153 - 158.

  4. Source: Center "Digital Safety & Security"

    M. Kammerstetter, L. Langer, F. Skopik, F. Kupzog, W. Kastner:
    "Practical Risk Assessment Using a Cumulative Smart Grid Model";
    Talk: Smartgreens 2014, Barcelona; 2014-04-03 - 2014-04-04; in: "Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems", SciTePress, (2014), 29.

  5. Source: Center "Digital Safety & Security"

    M. Landauer, M. Frank, F. Skopik, M. Wurzenberger, A. Rauber:
    "A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation";
    Talk: ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022-04-27; in: "Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems", ACM - Association for Computing Machinery, (2022), ISBN: 9781450392297; 77 - 86.

  6. Source: Center "Digital Safety & Security"

    M. Landauer, G. Höld, M. Wurzenberger, F. Skopik, A. Rauber:
    "Iterative Selection of Categorical Variables for Log Data Anomaly Detection";
    Talk: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Darmstadt; 2021-10-04 - 2021-10-08; in: "Proceedings of the 26th European Symposium on Research in Computer Security", Springer, 26 (2021), ISBN: 978-3-030-88417-8; 757 - 777.

  7. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, A. Rauber:
    "A Framework for Cyber Threat Intelligence Extraction from Raw Log Data";
    Talk: International Conference on Big Data, Los Angeles; 2019-12-09 - 2019-12-12; in: "Proceedings of the 2019 IEEE International Conference on Big Data (Big Data)", IEEE, (2019), ISBN: 978-1-7281-0858-2; 3200 - 3209.

  8. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, A. Rauber:
    "Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed";
    Talk: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), Macau; 2020-12-11 - 2020-12-14; in: "Proceedings of the 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)", IEEE, (2020), 52.

  9. Source: Center "Digital Safety & Security"

    M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, A. Rauber:
    "Visualizing Syscalls using Self-Organizing Maps for System Intrusion Detection";
    Poster: ICISSP, Valletta; 2020-02-25 - 2020-02-27; in: "Proceedings of the 6th International Conference on Information Systems Security and Privacy", SciTePress, 1 (2020), ISBN: 978-989-758-399-5; 349 - 360.

  10. Source: Center "Digital Safety & Security"

    M. Landauer, M. Wurzenberger, F. Skopik, G. Settanni, P. Filzmoser:
    "Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection";
    Talk: 14th International Conference on Information Security Practice and Experience (ISPEC 2018), Tokyo; 2018-09-25 - 2018-09-27; in: "Information Security Practice and Experience", Springer, (2018), ISBN: 978-3-319-99806-0; 19 - 36.

  11. Source: Center "Digital Safety & Security"

    L. Langer, F. Kupzog, M. Kammerstetter, T. Kerbl, F. Skopik:
    "Smart grid Security Guidance (SG)2 - Empfehlungen für sichere Smart Grids in Österreich";
    Keynote Lecture: ComForEn 2013, Wien (invited); 2013-09-26; in: "Tagungsband ComForEn 2013", Österreichischer Verband für Elektrotechnik, 72 (2013), ISBN: 978-3-85133-078-6; 17 - 21.

  12. Source: Center "Digital Safety & Security"

    L. Langer, F. Skopik, G. Kienesberger, Q. Li:
    "Privacy Issues of Smart E-Mobility";
    Talk: IECON 2013- 39th Annual Conference of the IEEE Industrial Electronics Society, Vienna; 2013-11-10 - 2013-11-13; in: "IECON 2013- 39th Annual Conference of the IEEE Industrial Electronics Society", IEEE, Piscataway, (2013), ISBN: 978-1-4799-0223-1; 6682 - 6687.

  13. Source: Center "Digital Safety & Security"

    G. Langner, F. Skopik, S. Furnell, G. Quirchmayr:
    "A tailored model for cyber security education utilizing a cyber range";
    Talk: International Conference on Information Systems Security and Privacy - ICISSP 2022, 2022-02-09 - 2022-02-11; in: "8th International Conference on Information Systems Security and Privacy", SciTePress, 1 (2022), ISBN: 978-989-758-553-1; 365 - 377.

  14. Source: Center "Digital Safety & Security"

    M. Leitner, M. Frank, W. Hotwagner, G. Langner, O. Maurhart, T. Pahi, L. Reuter, F. Skopik, P. Smith, M. Warum:
    "AIT Cyber Range";
    Talk: European Interdisciplinary Cybersecurity Conference (EICC), Rennes, France; 2020-11-18; in: "Proceedings of the European Interdisciplinary Cybersecurity Conference", ACM - Association for Computing Machinery, (2020), 1 - 6.

  15. Source: Center "Digital Safety & Security"

    Z. Ma, P. Smith, F. Skopik:
    "Architectural model for information security anlaysis of critical information infrastructures";
    Talk: IDIMT 2013, Prag; 2013-09-11 - 2013-09-13; in: "IDIMT-2013 Information Technology Human Values, Innovation and Economy", Trauner Verlag, Schriftenreihe Informatik 42, Linz (2013), ISBN: 978-3-99033-083-8; 197 - 206.

  16. Source: Center "Digital Safety & Security"

    L. Maghrabi, E. Pfluegel, L. Al-Fagih, R. Graf, G. Settanni, F. Skopik:
    "Improved software vulnerability patching techniques using CVSS and game theory";
    Talk: International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), London, UK; 2017-06-19 - 2017-06-20; in: "Proceedings of a 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment", IEEE, (2018), ISBN: 9781509050611; 494 - 505.

  17. Source: Center "Digital Safety & Security"

    T. Pahi, M. Leitner, F. Skopik:
    "Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers";
    Talk: International Conference on Information Systems Security and Privacy (ICISSP), Porto, Portugal; 2017-02-19 - 2017-02-21; in: "Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP)", SciTePress, Volume 1 (2017), ISBN: 978-989-758-209-7; 334 - 345.

  18. Source: Center "Digital Safety & Security"

    T. Pahi, M. Leitner, F. Skopik:
    "Data Exploitation at Large: Your Way to Adequate Cyber Common Operating Pictures";
    Talk: 16th European Conference on Cyber Warfare and Security, Dublin; 2017-06-29 - 2017-06-30; in: "Proceedings of the 16th European Conference on Cyber Warfare and Security", Academic Conferences and Publishing International, (2017), ISBN: 978-1-911218-43-2; 307 - 315.

  19. Source: Center "Digital Safety & Security"

    R. Raml, C. Schuster, F. Skopik, C. Wagner:
    "An Empirical Study on the Acceptance of a Security Information System for Citizens";
    Talk: e-society 2012, Berlin; 2012-03-10 - 2012-03-13; in: "e-society 2012", IADIS Press, (2012), ISBN: 978-972-8939-67-0; 463 - 467.

  20. Source: Center "Digital Safety & Security"

    S. Rass, A. Schorn, F. Skopik:
    "Trust and Distrust: On Sense and Nonsense in Big Data";
    Talk: FIP International Summer School on Privacy and Identity Management, Wien; 2018-08-20 - 2018-08-24; in: "Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data. Privacy and Identity 2018.", Springer, Cham (2018), ISBN: 978-3-030-16743-1; 1 - 15.

  21. Source: Center "Digital Safety & Security"

    G. Settanni, Y. Shovgenya, F. Skopik, M. Wurzenberger, R. Graf, R. Fiedler:
    "Acquiring Cyber Threat Intelligence through Security Information Correlation";
    Talk: 3rd IEEE International Conference on Cybernetics (CYBCONF-2017) WS/SS, Exeter - United Kingdom; 2017-06-21 - 2017-06-23; in: "2017 3rd IEEE International Conference on Cybernetics (CYBCONF)", IEEE, (2017), ISBN: 978-1-5386-2201-8; 415 - 421.

  22. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, A. Karaj, M. Wurzenberger, R. Fiedler:
    "Protecting Cyber Physical Production Systems using Anomaly Detection to enable Self-adaptation";
    Talk: 1st IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2018), Saint Petersburg; 2018-05-15 - 2018-05-18; in: "USB Proceedings 2018 IEEE Industrial Cyber-Physical Systems (ICPS)", IEEE, (2018), ISBN: 978-1-5386-6530-5; 173 - 180.

  23. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler:
    "A Blueprint for a Pan-European Cyber Incident Analysis System";
    Talk: 3rd International Symposium for ICS & SCADA Cyber Security Reserach 2015, Ingolstadt, Deutschland; 2015-09-17 - 2015-09-18; in: "3rd Internatnional Symposium for ICS & SCADA Cyber Security Research 2015", (2015), ISBN: 978-1-78017-317-7; 84 - 88.

  24. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler:
    "A Collaborative Analysis System for Cross-Organization Cyber Incident Handling";
    Talk: International Conference on Information Systems Security and Privacy, Rome; 2016-02-19 - 2016-02-21; in: "2nd International Conference on Information Systems Security and Privacy", SciTePress, (2016), ISBN: 978-989-758-167-0; 105 - 116.

  25. Source: Center "Digital Safety & Security"

    G. Settanni, F. Skopik, M. Wurzenberger, R. Graf, R. Fiedler:
    "Correlating Cyber Incident Information to Establish Situational Awareness in Critical Infrastructures";
    Talk: Fourteenth annual conference on Privacy, Security and Trust, Auckland - New Zeland; 2016-12-12 - 2016-12-14; in: "Proceedings of the 14th International Conference on Privacy, Security and Trust", IEEE, http://ieeexplore.ieee.org/document/7906940/ (2016), ISBN: 978-1-5090-4379-8; 78 - 81.

  26. Source: Center "Digital Safety & Security"

    Y. Shovgenya, K. Theuerkauf, F. Skopik:
    "On the Demand of Situational Awareness for Preventing and Mitigating Attacks on European Power Grids";
    Talk: International Conference on Cyber Situational Awareness Data Analytics and Assessment, London, UK; 2015-06-08 - 2015-06-09; in: "International Conference on Cyber Situational Awareness Data Analytics and Assessment", London (2015), ISBN: 978-0-9932338-0-7; 59 - 66.

  27. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Cyber Security-Herausforderungen durch die voranschreitende Digitalisierung";
    Talk: Digitalisierung in der Siedlungswasserwirtschaft, Innsbruck (invited); 2019-02-06; in: "Digitalisierung in der Siedlungswasserwirtschaft", (2019), ISBN: 978-3-903149-78-6; 1 - 13.

  28. Source: Center "Digital Safety & Security"

    F. Skopik:
    "The limitations of national cyber security sensor networks debunked: Why the human factor matters";
    Talk: 14th International Conference on Cyber Warfare and Security (ICCWS), Capetown; 2019-02-28 - 2019-03-01; in: "Proceedings of the 14th International Conference on Cyber Warfare and Security", ACPI, Reading, (2019), ISBN: 978-1-912764-11-2; 405 - 412.

  29. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Towards a National Cyber Attack Information System";
    Talk: The Sixth International Conference on Cyberterrorism and Cybercrime, Prague, CZ; 2012-06-12 - 2012-06-13; in: "Cyber Terrorism and Crime Conference CYTER 2012", Czech Technical University, Prag (2012), ISBN: 978-80-01-05072-9; Paper ID 2, 1 pages.

  30. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier, R. Fiedler:
    "Information Management and Sharing for National Cyber Situational Awareness";
    Talk: Information Security Solution Conference 2012, Brüssel; 2012-10-23 - 2012-10-24; in: "ISSE 2012 Securing Electronic Business Processes", Springer, (2012), ISBN: 978-3-658-00332-6; 217 - 227.

  31. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier, M. Kammerstetter, G. Kienesberger:
    "Smart Grid Security Guidance: Eine Sicherheitsinitiative für intelligente Stromnetze";
    Talk: 42. Jahrestagung der Gesellschaft für Informatik e.V. (GI) (INFORMATIK 2012), Braunschweig, D; 2012-09-16 - 2012-09-21; in: "Proceedings of the 42. annual conference of the German computer society", Springer Lecture Notes in Infomratics (LNI), (2012), ISBN: 978-3-88579-602-2; ++.

  32. Source: Center "Digital Safety & Security"

    F. Skopik, A. Bonitz, R. Fiedler:
    "An Architectural Blueprint for a National Cyber Attack Information System";
    Poster: 8th Future Security Research Conference, Berlin; 2013-09-17 - 2013-09-19; in: "8th Future Security Research Conference", Fraunhofer Verlag, Stuttgart (2013), ISBN: 978-3-8396-0604-9; 438 - 439.

  33. Source: Center "Digital Safety & Security"

    F. Skopik, R. Fiedler:
    "Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation";
    Talk: 43. Jahrestagung der Gesellschaft für Informatik e.V., Koblenz; 2013-09-16 - 2013-09-20; in: "Lecture Notes in Informatics - Informatik 2013", M. Horbach (ed.); (2013), ISBN: 978-3-88579-614-5; 2240 - 2254.

  34. Source: Center "Digital Safety & Security"

    F. Skopik, T. Filip:
    "Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators";
    Poster: International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2019), Oxford; 2019-06-03 - 2019-06-04; in: "Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2019)", (2019), 1 - 8.

  35. Source: Center "Digital Safety & Security"

    F. Skopik, I. Friedberg, R. Fiedler:
    "Dealing with Advanced Persistent Threats in Smart Grid ICT Networks";
    Talk: 5th IEEE Innovative Smart Grid Technologies Conference, Washington, DC; 2014-02-19 - 2014-02-22; in: "Proceedings of the 5th IEEE Innovative Smart Grid Technologies Conference", IEEE, (2014), ISBN: 978--1-4799-3653-3; 1 - 6.

  36. Source: Center "Digital Safety & Security"

    F. Skopik, M. Leitner:
    "Preparing for National Cyber Crises Using Non-linear Cyber Exercises";
    Talk: 18th Annual International Conference on Privacy, Security and Trust (PST2021), 2021-12-13 - 2021-12-15; in: "Proceedings of the 18th Annual International Conference on Privacy, Security and Trust (PST2021)", IEEE, (2021), 1 - 5.

  37. Source: Center "Digital Safety & Security"

    F. Skopik, Q. Li:
    "Trustworthy Incident Information Sharing in Social Cyber Defense Alliances";
    Talk: The IEEE symposium on Computers and Communications, Split, Croatia; 2013-07-07 - 2013-07-10; in: "Computers and Communications (ISCC)", IEEE, (2013), 233 - 239.

  38. Source: Center "Digital Safety & Security"

    F. Skopik, Z. Ma:
    "Attack Vectors to Metering Data in Smart Grids under Security Constraints";
    Talk: The First IEEE International Workshop on Methods for Establishing Trust with Open Data (METHOD 2012), Izmir, Türkei; 2012-07-16 - 2012-07-20; in: "Proceedings of the 2012 IEEE 36th International Conference on Computer Software and Applications Workshops", IEEE, (2012), ISBN: 978-0-7695-4758-9; 134 - 139.

  39. Source: Center "Digital Safety & Security"

    F. Skopik, Z. Ma, P. Smith, T. Bleier:
    "Designing a Cyber Attack Information System for National Situational Awareness";
    Talk: 7th Security Research Conference, Future Security 2012, Bonn; 2012-09-04 - 2012-09-06; in: "7th Security Research Conference, Future Security 2012 Proceedings", Springer, (2012), ISBN: 978-3-642-33160-2; 277 - 288.

  40. Source: Center "Digital Safety & Security"

    F. Skopik, G. Settanni, R. Fiedler, I. Friedberg:
    "Semi-Synthetic Data Set Generation for Security Software Evaluation";
    Talk: 12th International Conference on Privacy, Security and Trust, Toronto, Canada; 2014-07-23 - 2014-07-24; in: "2014 Twelfth Annual International Conference on Privacy, Security and Trust", IEEE, (2014), ISBN: 978-1-4799-3502-4; 156 - 163.

  41. Source: Center "Digital Safety & Security"

    F. Skopik, A. Treytl, A. Geven, B. Hirschler, T. Bleier, A. Eckel, C. El-Salloum, A. Wasicek:
    "Towards Secure Time-Triggered Systems";
    Talk: SAFECOMP 2012 - Workshop at the Computer Safety, Reliability, and Security Conference, Magdeburg; 2012-09-25 - 2012-09-27; in: "Proceedings of the Computer Safety, Reliability, and Security - SAFECOMP 2012 Workshops", Springer, (2012), ISBN: 978-3-642-33674-4; 365 - 372.

  42. Source: Center "Digital Safety & Security"

    F. Skopik, C. Wagner:
    "Novel Energy Saving Opportunities in Smart Grids using a Secure Social Networking Layer";
    Talk: 2012 IEEE 36th International Conference on Computer Software and Applications, Izmir, Türkei; 2012-07-16 - 2012-07-20; in: "Proceedings of the 2012 IEEE 36th International Conference on Computer Software and Applications", IEEE, (2012), ISBN: 978-0-7695-4736-7; 557 - 566.

  43. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, G. Settanni, R. Fiedler:
    "Establishing Cyber Situational Awareness through Incident Information Clustering";
    Talk: International Conference on Cyber Situational Awareness Data Analytics and Assessment, London, UK; 2015-06-08 - 2015-06-09; in: "International Conference on Cyber Situational Awareness Data Analytics and Assessment", London (2015), ISBN: 978-0-9932338-0-7; 300 - 314.

  44. Source: Center "Digital Safety & Security"

    M. Tauber, F. Skopik, D. Hutchison, T. Bleier:
    "A Self-Organising Approach for Smart Meter Communication Systems";
    Talk: 7th International Workshop on Self-Organizing Systems, Mallorca; 2013-05-09 - 2013-05-10; in: "Self-Organizing Systems", Springer, Berlin Heidelberg Wien (2013), ISBN: 978-3-642-54139-1; 169 - 175.

  45. Source: Center "Digital Safety & Security"

    M. Wurzenberger, G. Höld, M. Landauer, F. Skopik, W. Kastner:
    "Creating Character-based Templates for Log Data to Enable Security Event Classification";
    Talk: ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei; 2020-10-05 - 2020-10-09; in: "ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security", ACM - Association for Computing Machinery, (2020), ISBN: 978-1-4503-6750-9; 141 - 152.

  46. Source: Center "Digital Safety & Security"

    M. Wurzenberger, M. Landauer, F. Skopik, W. Kastner:
    "AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis";
    Talk: IFIP/IEEE IM 2019 Workshop: 4th IEEE/IFIP International Workshop on Analytics for Network and Service Management, Washington; 2019-04-08; in: "IFIP/IEEE IM 2019 Workshop: 4th IEEE/IFIP International Workshop on Analytics for Network and Service Management", (2019), ISBN: 978-3-903176-15-7; 7 - 12.

  47. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, R. Fiedler, W. Kastner:
    "Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data";
    Talk: 3rd IEEE International Conference on Cybernetics (CYBCONF-2017) WS/SS, Exeter - United Kingdom; 2017-06-21 - 2017-06-23; in: "2017 3rd IEEE International Conference on Cybernetics (CYBCONF)", IEEE, (2017), ISBN: 978-1-5386-2201-8; 399 - 406.

  48. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, R. Fiedler, W. Kastner:
    "Discovering Insider Threats from Log Data with High-Performance Bioniformatics Tools";
    Talk: MIST' 16, Wien; 2016-10-28; in: "MIST' 16 Proceedings of the 2016 International Workshop on Managing Inisider Security Threats", ACM - Association for Computing Machinery, New York (2016), ISBN: 9781450345712; 109 - 112.

  49. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, M. Landauer, P. Greitbauer, R. Fiedler, W. Kastner:
    "Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data";
    Talk: ARES - International Conference on Availability, Reliability and Security, Reggio Calabria; 2017-08-29 - 2017-09-01; in: "Proceedings of the 12th International Conference on Availability, Reliability and Security", The Association for Computing Machinery, New York, (2017), ISBN: 978-1-4503-5257-4; 1 - 6.

  50. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, G. Settanni, R. Fiedler:
    "AECID: A Self-learning Anomaly Detection Approach Based on Light-weight Log Parser Models";
    Talk: 4th International Conference on Information Systems Security and Privacy(ICISSP 2018), Funchal, Portugal; 2018-01-22 - 2018-01-24; in: "Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018", SciTePress, (2018), ISBN: 978-989-758-282-0; 386 - 397.

  51. Source: Center "Digital Safety & Security"

    M. Wurzenberger, F. Skopik, G. Settanni, R. Fiedler:
    "Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning ICT Intrusion Detecion Systems";
    Poster: International Conference on Cyber Situational Awareness Data Analytics and Assessment, London, UK; 2015-06-08 - 2015-06-09; in: "International Conference on Cyber Situational Awareness Data Analytics and Assessment", London (2015), ISBN: 978-0-9932338-0-7; 205 - 207.


Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag):


  1. Source: Center "Digital Safety & Security"

    T. Bleier, T. Hecht, L. Langer, Z. Ma, F. Skopik, P. Smith:
    "The SPARKS Project: Smart Grid Protection Against Cyber Attacks";
    Poster: Smart Grids Week 2014, Graz; 2014-05-21 - 2014-05-23.

  2. Source: Center "Digital Safety & Security"

    T. Bleier, L. Langer, F. Skopik, P. Smith:
    "Smart grid cyber-security standards: today and tomorrow";
    Poster: World Smart Grids Forum, Berlin; 2013-09-24 - 2013-09-25.

  3. Source: Center "Digital Safety & Security"

    L. Langer, M. Kammerstetter, F. Skopik, T. Hecht, P. Smith:
    "Smart Grid Security Analysis: The (SG)2 Approach";
    Poster: Smart Grids Week 2014, Graz; 2014-05-21 - 2014-05-23.

  4. Source: Center "Digital Safety & Security"

    F. Skopik:
    "A Survey on Threats and Vulnerabilities in Smart Metering Infrastrucutres";
    Talk: 2012 International Conference on Smart Grid and Clean Energy Technologies, Hongkong; 2012-10-26 - 2012-10-28.

  5. Source: Center "Digital Safety & Security"

    F. Skopik:
    "ACCSA - Austrian Cyber Crises Support Activities";
    Poster: KIRAS Fachtagung 2020, Wien; 2020-09-21.

  6. Source: Center "Digital Safety & Security"

    F. Skopik:
    "APT-CC - Etablierung eines APT Competence Centers in Österreich";
    Poster: KIRAS Fachtagung 2020, Wien; 2020-09-21.

  7. Source: Center "Digital Safety & Security"

    F. Skopik:
    "CADSP - Cyber Attack Decision and Support Platform";
    Talk: FORTISSIMO, Eisenstadt (invited); 2019-11-26.

  8. Source: Center "Digital Safety & Security"

    F. Skopik:
    "CAIS - Cyber Attack Information System: A National Cyber Defense System as a best practice example";
    Talk: NTU AIT Security Workshop 2012, Singapore (invited); 2012-10-29 - 2012-10-30.

  9. Source: Center "Digital Safety & Security"

    F. Skopik:
    "CIIS - Cyber Incident Information Sharing";
    Poster: KIRAS Fachtagung 2015, Wien (invited); 2015-11-05.

  10. Source: Center "Digital Safety & Security"

    F. Skopik:
    "CISA - Cyber Incident Situational Awareness";
    Keynote Lecture: KIRAS Fachtagung 2020, Wien (invited); 2020-09-21.

  11. Source: Center "Digital Safety & Security"

    F. Skopik:
    "CISA - Cyber Incident Situational Awareness";
    Poster: KIRAS Fachtagung 2020, Wien; 2020-09-21.

  12. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Combating Advanced Persistent Threats through Log Data Fusion";
    Talk: International Workshop on Data Fusion and Big Data, Thun, Schweiz; 2014-08-27.

  13. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Combating Advanced Persistent Threats with AECID";
    Talk: Bits That Byte Vortragsreihe FH Burgenland, Eisenstadt (invited); 2014-10-17.

  14. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Cyber Attack Information Systems: Erkennen und Bewältigen von Advanced Persistent Threats";
    Talk: Sehen und Verstehen 2016, Wien (invited); 2016-02-25.

  15. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Cyber Defense and Situational Awareness: CAIS, CIIS and ECOSSIAN";
    Poster: KIRAS Fachtagung 2014, Wien (invited); 2014-10-22.

  16. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids";
    Talk: 2013 International Conference on Smart Grid and Clean Energy Technologies, Kuala Lumpur; 2013-10-11 - 2013-10-13.

  17. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Gefahren in der vernetzten Welt - Überblick über IKT- und Informationssicherheit und deren Relevanz für den HTL Unterricht";
    Keynote Lecture: Konferenz der Abteilungsvorstände der HTLs Österreichs, Windischgarsten (invited); 2017-03-23.

  18. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Security is not enough! On Privacy in Smart Grids";
    Talk: 2012 International Conference on Smart Grid and Clean Energy Technologies, Hongkong; 2012-10-26 - 2012-10-28.

  19. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Sensornetze: Technische Möglichkeiten, Rahmenbedingungen und Herausforderungen";
    Talk: IKT Sicherheitskonferenz 2017, Villach; 2017-09-26 - 2017-09-27.

  20. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Sicherheit in der Informations- und Kommunikationstechnologie: Smart Grid Security";
    Talk: Innovationsplattform Sicherheitsforschung, Wien (invited); 2012-04-25.

  21. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Smart Grid Security & Privacy - The new Challenges for Distribution System Operators";
    Talk: Siemens Workshop: Intelligent Distribution Systems in the Smart Grid, Essen, Germany (invited); 2014-02-12.

  22. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Trustworthy Incident Information Sharing for Collaborative Cyber Defense";
    Talk: ICT Networking Event Vienna - Security and Visualization, Wien; 2013-10-07.

  23. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier:
    "Cyber Defense and Situational Awareness";
    Poster: IKT-Sicherheitskonferenz des Abwehramts 2013, Linz; 2013-11-05 - 2013-11-06.

  24. Source: Center "Digital Safety & Security"

    F. Skopik, R. Fiedler:
    "Erkennen und Abwehr von Advanced Persistent Threats";
    Keynote Lecture: OVE GIT - Cybersecurity Technologien made in Austria, Wien; 2015-09-09.

  25. Source: Center "Digital Safety & Security"

    F. Skopik, R. Fiedler:
    "Erkennen und Bewältigen von Advanced Persistent Threats: Erkenntnisse aus dem Projekt CIIS";
    Talk: CERT Stammtisch Jänner 2016, Wien (invited); 2016-01-13.

  26. Source: Center "Digital Safety & Security"

    F. Skopik, R. Griffin, P. Murdock, J. Reichl, H. Sandberg, L. Kaiser, V. Pillitteri:
    "Panel on Smart Grid Security: Current and Future Issues";
    Keynote Lecture: 5th IEEE Innovative Smart Grid Technologies Conference, Washington, DC; 2014-02-19 - 2014-02-22.

  27. Source: Center "Digital Safety & Security"

    F. Skopik, P. Smith, T. Bleier:
    "SPARKS - Smart Grid Protection Against Cyber Attacks";
    Poster: Smart Grids Week 2013, Salzburg; 2013-05-13 - 2013-05-17.

  28. Source: Center "Digital Safety & Security"

    F. Skopik, P. Smith, T. Bleier:
    "SPARKS: Smart Grid Protection Against Cyber Attacks";
    Poster: Smart Grids Week 2013, Salzburg; 2013-05-13 - 2013-05-17.

  29. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger:
    "Cyber Security Research Program: Overview & Insights";
    Talk: ViSP System Security Research Meetup, Online (invited); 2021-12-10.

  30. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Don't get hacked, get AMiner! Log Data Analysis for Intrusion Detection";
    Talk: In-Depth Security Conference Europe (DeepSec) 2021, Vienna (invited); 2021-11-18 - 2021-11-19.

  31. Source: Center "Digital Safety & Security"

    F. Skopik, M. Wurzenberger, M. Landauer:
    "Machine Learning für Logdatenanalyse - Ein Ausblick auf Morgen";
    Talk: IKT Sicherheitskonferenz 2019, Fürstenfeld (invited); 2019-10-01 - 2019-10-02.


Vorlesungen:


  1. Source: Center "Digital Safety & Security"

    F. Skopik, T. Bleier:
    "System- und Netzwerksicherheit";
    Lecture: FH Burgenland University of Applied Sciences, Burgenland; 2021-01-01 - 2021-01-31.


Dissertationen (eigene und begutachtete):


  1. Source: Center "Digital Safety & Security"

    F. Skopik:
    "Discovery and Formation Models for Socio-computational Crowd Environments";
    Supervisor, Reviewer: S. Dustdar, M. Gaedke; Vienna University of Technology, 2013; oral examination: 2013-09-09.

  2. Source: Center "Digital Safety & Security"

    M. Wurzenberger:
    "Resource-Efficient Log Analysis to Enable Online Anomaly Detection in Cyber Security";
    Supervisor, Reviewer: W. Kastner, F. Skopik; Vienna University of Technology, 2021; oral examination: 2021-03-26.


Diplom- und Master-Arbeiten (eigene und betreute):


  1. Source: Center "Digital Safety & Security"

    I. Friedberg:
    "Anomaly Detection Through Massive Event Correlation in ICT Networks";
    Supervisor: W. Kastner, F. Skopik; Vienna University of Technology, 2014; final examination: 2014-06-04.

  2. Source: Center "Digital Safety & Security"

    A. Karaj:
    "Application of Anomaly Detection for Steering the Security Posture of Self-Adaptive Cyber Physical Systems";
    Supervisor: S. Mitterdorfer, F. Skopik; Carinthia University of Applied Sciences, 2017; final examination: 2017-10-05.

  3. Source: Center "Digital Safety & Security"

    M. Landauer:
    "Dynamic Log File Analysis: An Unsupervised Cluster Evolution Approach for Anomaly Detection";
    Supervisor: P. Filzmoser, F. Skopik, M. Wurzenberger; Vienna University of Technology, 2018; final examination: 2018-04-11.

  4. Source: Center "Digital Safety & Security"

    M. Wurzenberger:
    "Synthetic Log Data Modeling for the Evaluation of Intrusion Detection Systems";
    Supervisor: W. Scherrer, F. Skopik; Vienna University of Technology, 2015; final examination: 2015-11-24.


Bachelorarbeiten (eigene und betreute):


  1. Source: Center "Digital Safety & Security"

    E. Leierzopf:
    "Systematische Evaluierung möglicher Ansätze für Unit Tests in der Software-Qualitätssicherung";
    Supervisor: F. Skopik, D. Vymazal; Upper Austria University of Applied Sciences, 2019.

  2. Source: Center "Digital Safety & Security"

    T. Pahi:
    "Cyber Intelligence Centre Framework - From technical data to strategic decisions in cyber defense";
    Supervisor: S. Tjoa, F. Skopik; St. Pölten University of Applied Sciences, 2016.