Giuseppe Settanni
Giuseppe Settanni
Bestätigte E-Mail-Adresse bei ait.ac.at
TitelZitiert vonJahr
Combating advanced persistent threats: From network event correlation to incident detection
I Friedberg, F Skopik, G Settanni, R Fiedler
Computers & Security 48, 35-57, 2015
1092015
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
F Skopik, G Settanni, R Fiedler
Computers & Security 60, 154-176, 2016
662016
A collaborative cyber incident management system for European interconnected critical infrastructures
G Settanni, F Skopik, Y Shovgenya, R Fiedler, M Carolan, D Conroy, ...
Journal of Information Security and Applications 34 (Part 2), 166-182, 2016
182016
Semi-synthetic data set generation for security software evaluation
F Skopik, G Settanni, R Fiedler, I Friedberg
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
162014
Establishing national cyber situational awareness through incident information clustering
F Skopik, M Wurzenberger, G Settanni, R Fiedler
2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015
102015
Network security and anomaly detection with Big-DAMA, a big data analytics framework
P Casas, F Soro, J Vanerio, G Settanni, A D'Alconzo
2017 IEEE 6th International Conference on Cloud Networking (CloudNet), 1-7, 2017
92017
Correlating cyber incident information to establish situational awareness in critical infrastructures
G Settanni, Y Shovgenya, F Skopik, R Graf, M Wurzenberger, R Fiedler
2016 14th Annual Conference on Privacy, Security and Trust (PST), 78-81, 2016
92016
A blueprint for a pan-European cyber incident analysis system
G Settanni, F Skopik, Y Shovgenya, R Fiedler, H Kaufmann, T Gebhardt, ...
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber …, 2015
82015
The Importance of Information Sharing and its Numerous Dimensions to Circumvent Incidents and Mitigate Cyber Threats
F Skopik, G Settanni, R Fiedler
Collaborative Cyber Threat Intelligence: Detecting and Responding to …, 2017
7*2017
POSTER:(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data
P Casas, A D'Alconzo, G Settanni, P Fiadino, F Skopik
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
72016
Complex log file synthesis for rapid sandbox-benchmarking of security-and computer network analysis tools
M Wurzenberger, F Skopik, G Settanni, W Scherrer
Information Systems 60, 13-33, 2016
62016
Improved Software Vulnerability Patching Techniques Using CVSS and Game Theory
L Maghrabi, E Pfluegel, L Al-Fagih, R Graf, G Settanni, F Skopik
International Conference on Cyber Security and Protection of Digital Services, 2017
52017
Dynamic log file analysis: an unsupervised cluster evolution approach for anomaly detection
M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser
computers & security 79, 94-116, 2018
42018
Acquiring Cyber Threat Intelligence through Security Information Correlation
G Settanni, Y Shovgenya, F Skopik, R Graf, M Wurzenberger, R Fiedler
3rd International Conference on Cybernetics (CYBCONF), Exeter, UK., 2017
42017
A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
G Settanni, F Skopik, Y Shovgenya, R Fiedler
ICISSP, 105-116, 2016
42016
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
M Wurzenberger, F Skopik, G Settanni, R Fiedler
ICISSP, 386-397, 2018
32018
Time series analysis: unsupervised anomaly detection beyond outlier detection
M Landauer, M Wurzenberger, F Skopik, G Settanni, P Filzmoser
International Conference on Information Security Practice and Experience, 19-36, 2018
22018
Protecting cyber physical production systems using anomaly detection to enable self-adaptation
G Settanni, F Skopik, A Karaj, M Wurzenberger, R Fiedler
2018 IEEE Industrial Cyber-Physical Systems (ICPS), 173-180, 2018
22018
The Importance of Information Sharing and Its Numerous Dimensions to Circumvent Incidents and Mitigate Cyber Threats
R FIEDLER, G SETTANNI, F SKOPIK
Collaborative Cyber Threat Intelligence, 145-202, 2017
2017
Real-World Implementation of an Information Sharing Network: Lessons Learned from the Large-Scale European Research Project ECOSSIAN
G Settanni, T Pahi
Collaborative Cyber Threat Intelligence: Detecting and Responding to …, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20