Publications

2016

Correlating Cyber Incident Information to Establish Situational Awareness in Critical Infrastructures
G. Settanni, Y. Shovgenya, F. Skopik, M. Wurzenberger, R. Graf, R. Fiedler, 14th Annual Conference on Privacy, Security and Trust, December 2016.

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools
M. Wurzenberger, F. Skopik, R. Fiedler, W. Kastner, 23rd ACM Conference on Computer and Communications Security - Posters/Demos, October 2016.

Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures
K. Ferdous Wahid, H. Kaufmann, K. Jones, CRITIS 2016, 10th – 12th October 2016.

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F. Skopik, G. Settanni, R. Fiedler, in Elsevier Computers & Security Journal, July 2016.

A collaborative cyber incident management system for European interconnected critical infrastructures
G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, M. Carolan, D. Conroy, K. Boettinger, M. Gall, G. Brost, C. Ponchel, M. Haustein, H. Kaufmann, K. Theuerkauf, P. Olli, in Journal of Information Security and Applications, May 2016.

Outlining comprehensive security analysis of a critical infrastructure network
T. Tyrväinen, I. Karanta, in International Journal of Safety and Security Engineering, March 2016.

K-Word Proximity Search on Encrypted Data
M. Gall, G. Brost, in Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016.

Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools
M. Wurzenberger, F. Skopik, G. Settani, W. Scherrer, in Elsevier, February 2016.

A Collaborative Analysis System for Cross-Organization Cyber Incident Handling
G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, in Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP) 2016, February 2016.

2015

A Blueprint for a Pan-European Cyber Incident Analysis System
Y. Shovgenya, F. Skopik, G. Settani, R. Fiedler, K. Theuerkauf, H. Kaufmann, T. Gebhardt, C. Ponchel, K. Böttinger, M. Carolan, D. Conroy, G. Davey, P. Olli, H. Pentikaeinen, in Proceedings of the 3rd International Symposium for ICS Cyber Security Research 2015, May 2015.

On Demand for Situational Awareness for Preventing Attacks on the Smart Grid
Y. Shovgenya, F. Skopik, K. Theuerkauf, in Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2015), April 2015.

Establishing National Cyber Situational Awareness through Incident Information Clustering
F. Skopik, M. Wurzenberger, G. Settanni, R. Fiedler, in Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2015), April 2015.

Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs
F. Skopik, M. Wurzenberger, G. Settanni, R. Fiedler, Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2015), April 2015.

Cyber situational awareness through network anomaly detection: state of the art and new approaches
I. Friedberg, F. Skopik, R. Fiedler, E&I Journal; Speical Issue on Cyber Situational Awareness, Springer Ling, March 2015.

2014

Network Security Analysis Using Behavior History Graph
M. Sailio, S. Noponen, M. Mantere, in 2014 Ninth International Conference on Availability, Reliability and Security (ARES), IEEE, September 2014.

A structural design for a pan-European early warning system for critical infrastructures
H. Kaufmann, R. Hutter, F. Skopik, M. Mantere, in Elektrotechnik und Informationstechnik, Springer Link, November 2014.

Semi-Synthetic Data Set Generation for Security Software Evaluation
F. Skopik, G. Settanni, R. Fiedler, I. Friedberg, in proceedings of the International Conference on Privacy, Security and Trust, IEEE, 2014.

Combating Advanced Persistent Threats: From Network Event Correlation to Incident Detection
I. Friedberg, F. Skopik, G. Settanni, R. Fiedler, in Elsevier Computer and Security, Elsevier, 2014.

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok Decline