Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Max Landauer
@article{DBLP:journals/compsec/WurzenbergerHLS24, author = {Markus Wurzenberger and Georg H{\"{o}}ld and Max Landauer and Florian Skopik}, title = {Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security}, journal = {Comput. Secur.}, volume = {137}, pages = {103631}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103631}, doi = {10.1016/J.COSE.2023.103631}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WurzenbergerHLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SkopikWHLK23, author = {Florian Skopik and Markus Wurzenberger and Georg H{\"{o}}ld and Max Landauer and Walter Kuhn}, title = {Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3158--3175}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3197265}, doi = {10.1109/TDSC.2022.3197265}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SkopikWHLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LandauerSFHWR23, author = {Max Landauer and Florian Skopik and Maximilian Frank and Wolfgang Hotwagner and Markus Wurzenberger and Andreas Rauber}, title = {Maintainable Log Datasets for Evaluation of Intrusion Detection Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3466--3482}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3201582}, doi = {10.1109/TDSC.2022.3201582}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LandauerSFHWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/HimlerLSW23, author = {Patrick Himler and Max Landauer and Florian Skopik and Markus Wurzenberger}, editor = {Aleksandra Mileva and Steffen Wendzel and Virginia N. L. Franqueira}, title = {Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges}, booktitle = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, pages = {71--77}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590777.3590789}, doi = {10.1145/3590777.3590789}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/HimlerLSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-12627, author = {Max Landauer and Florian Skopik and Markus Wurzenberger}, title = {Introducing a New Alert Data Set for Multi-Step Attack Analysis}, journal = {CoRR}, volume = {abs/2308.12627}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.12627}, doi = {10.48550/ARXIV.2308.12627}, eprinttype = {arXiv}, eprint = {2308.12627}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-12627.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-02854, author = {Max Landauer and Florian Skopik and Markus Wurzenberger}, title = {A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques}, journal = {CoRR}, volume = {abs/2309.02854}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.02854}, doi = {10.48550/ARXIV.2309.02854}, eprinttype = {arXiv}, eprint = {2309.02854}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-02854.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SkopikLW22, author = {Florian Skopik and Max Landauer and Markus Wurzenberger}, title = {Online Log Data Analysis With Efficient Machine Learning: {A} Review}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {80--90}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3113275}, doi = {10.1109/MSEC.2021.3113275}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SkopikLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SkopikLW22a, author = {Florian Skopik and Max Landauer and Markus Wurzenberger}, title = {Blind Spots of Security Monitoring in Enterprise Infrastructures: {A} Survey}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {6}, pages = {18--26}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3133764}, doi = {10.1109/MSEC.2021.3133764}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SkopikLW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LandauerSWR22, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Andreas Rauber}, title = {Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {18:1--18:36}, year = {2022}, url = {https://doi.org/10.1145/3510581}, doi = {10.1145/3510581}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LandauerSWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LandauerSHW22, author = {Max Landauer and Florian Skopik and Georg H{\"{o}}ld and Markus Wurzenberger}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {4285--4294}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020672}, doi = {10.1109/BIGDATA55660.2022.10020672}, timestamp = {Fri, 18 Aug 2023 17:39:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/LandauerSHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LandauerFSHWR22, author = {Max Landauer and Maximilian Frank and Florian Skopik and Wolfgang Hotwagner and Markus Wurzenberger and Andreas Rauber}, editor = {Maanak Gupta and Sajad Khorsandroo and Mahmoud Abdelsalam}, title = {A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for {HIDS} Evaluation}, booktitle = {Sat-CPS@CODASPY 2022: Proceedings of the 2022 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022}, pages = {77--86}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510547.3517924}, doi = {10.1145/3510547.3517924}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LandauerFSHWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KernSLW22, author = {Manuel Kern and Florian Skopik and Max Landauer and Edgar R. Weippl}, editor = {Jiman Hong and Miroslav Bures and Juw Won Park and Tom{\'{a}}s Cern{\'{y}}}, title = {Strategic selection of data sources for cyber attack detection in enterprise networks: a survey and approach}, booktitle = {{SAC} '22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, pages = {1656--1665}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3477314.3507022}, doi = {10.1145/3477314.3507022}, timestamp = {Wed, 11 May 2022 08:59:01 +0200}, biburl = {https://dblp.org/rec/conf/sac/KernSLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/SkopikWL22, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Detecting Unknown Cyber Security Attacks Through System Behavior Analysis}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {103--119}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_5}, doi = {10.1007/978-3-031-04036-8\_5}, timestamp = {Sat, 30 Sep 2023 10:30:32 +0200}, biburl = {https://dblp.org/rec/series/lncs/SkopikWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/WurzenbergerLBS22, author = {Markus Wurzenberger and Max Landauer and Agron Bajraktari and Florian Skopik}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Automatic Attack Pattern Mining for Generating Actionable {CTI} Applying Alert Aggregation}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {136--161}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_7}, doi = {10.1007/978-3-031-04036-8\_7}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/WurzenbergerLBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08580, author = {Max Landauer and Florian Skopik and Maximilian Frank and Wolfgang Hotwagner and Markus Wurzenberger and Andreas Rauber}, title = {Maintainable Log Datasets for Evaluation of Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2203.08580}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08580}, doi = {10.48550/ARXIV.2203.08580}, eprinttype = {arXiv}, eprint = {2203.08580}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-03820, author = {Max Landauer and Sebastian Onder and Florian Skopik and Markus Wurzenberger}, title = {Deep Learning for Anomaly Detection in Log Data: {A} Survey}, journal = {CoRR}, volume = {abs/2207.03820}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.03820}, doi = {10.48550/ARXIV.2207.03820}, eprinttype = {arXiv}, eprint = {2207.03820}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-03820.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/LandauerSWH22, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner}, title = {Kyoushi Testbed Environment: {A} Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations}, journal = {{ERCIM} News}, volume = {2022}, number = {129}, pages = {0}, year = {2022}, url = {https://ercim-news.ercim.eu/en129/special/kyoushi-testbed-environment-a-model-driven-simulation-framework-to-generate-open-log-data-sets-for-security-evaluations}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/LandauerSWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SkopikWL21, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, title = {Smart Log Data Analytics - Techniques for Advanced Security Analysis}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-74450-2}, doi = {10.1007/978-3-030-74450-2}, isbn = {978-3-030-74449-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/SkopikWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SkopikWL21, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, title = {The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {36--45}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3090444}, doi = {10.1109/MSEC.2021.3090444}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SkopikWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeitnerFLLSSAHK21, author = {Maria Leitner and Maximilian Frank and Gregor Langner and Max Landauer and Florian Skopik and Paul Smith and Benjamin Akhras and Wolfgang Hotwagner and Stela Kucek and Timea Pahi and Lenhard Reuter and Manuel Warum}, title = {Enabling exercises, education and research with a comprehensive cyber range}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {37--61}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.037}, doi = {10.22667/JOWUA.2021.12.31.037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeitnerFLLSSAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LandauerSWHR21, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, title = {Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed}, journal = {{IEEE} Trans. Reliab.}, volume = {70}, number = {1}, pages = {402--415}, year = {2021}, url = {https://doi.org/10.1109/TR.2020.3031317}, doi = {10.1109/TR.2020.3031317}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LandauerSWHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LandauerHWSR21, author = {Max Landauer and Georg H{\"{o}}ld and Markus Wurzenberger and Florian Skopik and Andreas Rauber}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Iterative Selection of Categorical Variables for Log Data Anomaly Detection}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {757--777}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_36}, doi = {10.1007/978-3-030-88418-5\_36}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LandauerHWSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LandauerSWR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Andreas Rauber}, title = {System log clustering approaches for cyber security applications: {A} survey}, journal = {Comput. Secur.}, volume = {92}, pages = {101739}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101739}, doi = {10.1016/J.COSE.2020.101739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LandauerSWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SkopikLWVMFPKWT20, author = {Florian Skopik and Max Landauer and Markus Wurzenberger and Gernot Vormayr and Jelena Milosevic and Joachim Fabini and Wolfgang Pr{\"{u}}ggler and Oskar Kruschitz and Benjamin Widmann and Kevin Truckenthanner and Stefan Rass and Michael Simmer and Christoph Zauner}, title = {synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102544}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102544}, doi = {10.1016/J.JISA.2020.102544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SkopikLWVMFPKWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WurzenbergerHLS20, author = {Markus Wurzenberger and Georg H{\"{o}}ld and Max Landauer and Florian Skopik and Wolfgang Kastner}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Creating Character-based Templates for Log Data to Enable Security Event Classification}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {141--152}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384722}, doi = {10.1145/3320269.3384722}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WurzenbergerHLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/LandauerSWHR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {349--360}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008918703490360}, doi = {10.5220/0008918703490360}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/LandauerSWHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LandauerSWHR20, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, title = {Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2020, Macau, China, December 11-14, 2020}, pages = {52}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS51102.2020.00019}, doi = {10.1109/QRS51102.2020.00019}, timestamp = {Mon, 08 Feb 2021 12:13:14 +0100}, biburl = {https://dblp.org/rec/conf/qrs/LandauerSWHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/SkopikWL20, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, title = {{DECEPT:} Detecting Cyber-Physical Attacks using Machine Learning on Log Data}, journal = {{ERCIM} News}, volume = {2020}, number = {123}, year = {2020}, url = {https://ercim-news.ercim.eu/en123/r-i/decept-detecting-cyber-physical-attacks-using-machine-learning-on-log-data}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/SkopikWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LandauerSWHR19, author = {Max Landauer and Florian Skopik and Markus Wurzenberger and Wolfgang Hotwagner and Andreas Rauber}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {A Framework for Cyber Threat Intelligence Extraction from Raw Log Data}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {3200--3209}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006328}, doi = {10.1109/BIGDATA47090.2019.9006328}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/LandauerSWHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/WurzenbergerLSK19, author = {Markus Wurzenberger and Max Landauer and Florian Skopik and Wolfgang Kastner}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {{AECID-PG:} {A} Tree-Based Log Parser Generator To Enable Log Analysis}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {7--12}, publisher = {{IFIP}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8717887}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/WurzenbergerLSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/LandauerS19, author = {Max Landauer and Florian Skopik}, title = {INDIC{\AE}TING - Automatically Detecting, Extracting, and Correlating Cyber Threat Intelligence from Raw Computer Log Data}, journal = {{ERCIM} News}, volume = {2019}, number = {116}, year = {2019}, url = {https://ercim-news.ercim.eu/en116/special/indicaeting-automatically-detecting-extracting-and-correlating-cyber-threat-intelligence-from-raw-computer-log-data}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/LandauerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LandauerWSSF18, author = {Max Landauer and Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Peter Filzmoser}, title = {Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection}, journal = {Comput. Secur.}, volume = {79}, pages = {94--116}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.08.009}, doi = {10.1016/J.COSE.2018.08.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LandauerWSSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LandauerWSSF18, author = {Max Landauer and Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Peter Filzmoser}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {19--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_2}, doi = {10.1007/978-3-319-99807-7\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LandauerWSSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WurzenbergerSLG17, author = {Markus Wurzenberger and Florian Skopik and Max Landauer and Philipp Greitbauer and Roman Fiedler and Wolfgang Kastner}, title = {Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098973}, doi = {10.1145/3098954.3098973}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WurzenbergerSLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.