Markus Wurzenberger
Orcid: 0000-0003-3259-6972
According to our database1,
Markus Wurzenberger
authored at least 48 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security.
Comput. Secur., February, 2024
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-Based Anomaly Detection Techniques.
Proc. ACM Softw. Eng., 2024
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation.
CoRR, 2024
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
DTRAP, 2023
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Proceedings of the Cybersecurity of Digital Service Chains, 2022
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation.
ACM Trans. Priv. Secur., 2022
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Kyoushi Testbed Environment: A Model-driven Simulation Framework to Generate Open Log Data Sets for Security Evaluations.
ERCIM News, 2022
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed.
IEEE Trans. Reliab., 2021
IEEE Secur. Priv., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Springer, ISBN: 978-3-030-74449-6, 2021
2020
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems.
J. Inf. Secur. Appl., 2020
ERCIM News, 2020
Comput. Secur., 2020
Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Creating Character-based Templates for Log Data to Enable Security Event Classification.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
synERGY: Detecting Advanced Attacks Across Multiple Layers of Cyber-Physical Systems.
ERCIM News, 2018
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Elektrotech. Informationstechnik, 2018
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection.
Comput. Secur., 2018
Proceedings of the Information Security Practice and Experience, 2018
Protecting cyber physical production systems using anomaly detection to enable self-adaptation.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools.
Inf. Syst., 2016
The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments.
ERCIM News, 2016
Correlating cyber incident information to establish situational awareness in Critical Infrastructures.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
Establishing national cyber situational awareness through incident information clustering.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015