photo
Florian SKOPIK
Mag.rer.soc.oec. Dipl.-Ing. Dr.techn. Dr.rer.soc.oec.
Research Scientist | Senior Project Manager
Current Affiliation: AIT Austrian Institute of Technology
Digital Safety and Security Department
ICT Security Research Team
Email (AIT): firstname.lastname@ait.ac.at
LinkedIn: Profile of Florian Skopik on LinkedIn

Last updated: June 09th, 2016

This personal page shows my complete scientific track record.
All information on this page is publically available elsewhere and collected here for a coherent track record.

[Short CV]
[Books]
[Research Videos]
[Research Interests]
[Research Projects]
[Publications]
[Professional Activities]
[Certificates]
[Patents]

Valid HTML 4.01 Transitional

Short CV
Florian currently works in the ICT Security Research Team at the Austrian Institute of Technology (AIT) as Senior Scientist, where he is responsible for national and international research projects (in course of the EU FP7). The main topics of these projects are centered around smart grid security, security of critical infrastructures, and national cyber security and defense. Due to this research focus, the ICT Security Research Team works in close collaboration with national authorities, such as the Minstry of the Interior and the Ministry of Defense.

Before joining AIT, Florian was with the Distributed Systems Group at the Vienna University of Technology as a research assistant and post-doctoral research scientist from 2007 to 2011, where he was involved in a number of international research projects dealing with cross-organizational collaboration over the Web. In context of these projects, he also finished his PhD studies. Florian further spent a sabbatical at IBM Research India in Bangalore for several months. He published around 75 scientific conference papers and journal articles, and is member of various conference program committees and editorial boards. In parallel to his studies, he was working in the industry as firmware developer for microcontroller systems for more than 10 years.

Florian is IEEE Senior Member and Member of the Association for Computing Machinery (ACM).

Books

Smart Grid Security Book cover     Smart Grid Security - Innovative Solutions for a Modernized Grid (2015)

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times.

Skopik F., Smith P.: Smart Grid Security - Innovative Solutions for a Modernized Grid, Elsevier Science Publishing, 2015, ISBN: 978-0-12-802122-4.
Link: http://www.elsevier.com/books/smart-grid-security/skopik/978-0-12-802122-4
Order on Amazon: http://www.amazon.com/Smart-Grid-Security-Innovative-Modernized/dp/0128021225


CAIS Book cover     Cyber Attack Information System (2015) [in German]

In den letzten Jahren hat sich das Internet schnell zu einem massiven wirtschaftlichen Betätigungsfeld entwickelt, leider auch für illegale Unternehmungen. Das Ausnutzen von Schwachstellen in IKT-Systemen ist inzwischen ein profitables Geschäftsmodell. Das staatlich geförderte Forschungsprojekt CAIS beschäftigte sich deshalb mit der Implementierung eines Cyber Attack Information Systems auf nationaler Ebene mit dem Ziel, die Widerstandsfähigkeit der heutigen vernetzten Systeme zu stärken und ihre Verfügbarkeit und Vertrauenswürdigkeit zu erhöhen. Hauptziele dieses Projektes waren die Identifizierung der künftigen Cyber-Risiken und -Bedrohungen, die Untersuchung neuartiger Techniken zur Anomalieerkennung, die Entwicklung modularer Infrastrukturmodelle und agentenbasierter Simulationen zur Risiko- und Bedrohungsanalyse, und schließlich die Analyse und mögliche Umsetzung eines nationalen Cyber Attack Information Systems.

Leopold H., Bleier T., Skopik F.: Cyber Attack Information System, Springer, 2015, ISBN: 978-3-662-44305-7.
Link: http://www.springer.com/de/book/9783662443057


HPS Book cover     Socially Enhanced Services Computing (2011)

Socially enhanced Services Computing deals with a novel and exciting new field at the intersection between Social Computing, Service-oriented Computing, Crowd Computing, and Cloud Computing. The present work presents a collection of selected papers by the editors of this volume, which they feel will help the reader in understanding this field. The approach discussed allows for a seamless integration of people into trusted dynamic compositions of Human-provided Services and Software-based services, thus empowering new interaction models and processes in massive collaboration scenarios in a Future Internet.

Dustdar, S., Schall, D., Skopik, F., Juszczyk, L., Psaier, H.: Socially Enhanced Services Computing, Springer, 2011, ISBN: 978-3-7091-0812-3.
Link: http://www.springer.com/en/book/9783709108123




Research Videos


    CAIS - Cyber Attack Information System (in German)

An advanced persistent threat (also known as APT) is a deliberately slow-moving cyber-attack that is applied to quietly compromise interconnected information systems without revealing itself. APTs often use a variety of attack methods to get unauthorized system access initially and then gradually spread throughout the network. In contrast to traditional attacks, they are not used to interrupt services but primarily to steal intellectual property, sensitive internal business and legal documents and other data. If an attack on a system is successful, timely detection is of paramount importance to mitigate its impact and prohibit APTs from further spreading. However, recent security incidents, such as Operation Shady Rat, Operation Red October or the discovery of MiniDuke - just to name a few - have impressively demonstrated that current security mechanisms are mostly insufficient to prohibit targeted and customized attacks.

This talk provides an overview of the research cluster CAIS and software solution's portfolio spanning from tools to detect advanced mutli-stage attacks using AECID, the mitigation and appropirate response to current issues using CAESAIR and the proactive improvement of preventive security measures using BAESE. An overview of this solutions portfolio can be downloaded as pdf.

Published online on March 20th, 2016 on Youtube.
    AECID - Automatic Event Correlation for Incident Detection

With the emergence of comprehensive ICT networks and their increasing interconnection, number of participants and access points, attack surfaces and vectors multiply. Specifically, advanced persistent threats (APTs), which are targeted and highly customized attacks against organizational assets, pose serious security threats. However, typical security systems that are applied in today's ICT networks, including malware scanners and intrusion detection systems, apply common black-list approaches, which consider only actions and behavior that match to well-known attack patterns and signatures of malware traces. We argue that for future critical infrastructures, a more restrictive approach, that cannot be circumvented by customized malware, will increase the security level tremendously.

Therefore, AECID ("automatic event correlation for incident detection") applies a smart white-list approach. Our anomaly detection technique keeps track of system events, their dependencies and occurrences, to learn the "normal" system behavior over time and reports all actions that differ from a dynamically created system model. The application of such a system is specifically promising in control networks, as applied in the emerging smart grid, which mostly implement well-specified processes, resulting in rather predictable and static behavior.

Published online on April 15th, 2014 on Youtube.


Research Interests
COLLABORATIVE CYBER SECURITY

Information and communication technology (ICT) systems underpin many of today's societal functions and economic development. Consequently, protecting a nation's ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. This is particularly the case as cyber threats become increasingly sophisticated and distributed. Therefore, we need new paradigms for detecting them in complex connected critical infrastructure systems. Currently, many attack detection tasks are performed within single organizations only. We argue that cross-organiszational security information sharing is a crucial step to correctly understand large-scale cyber-attack situations. Collaboration among all parties across all domains of the cyberspace is the key to effective and coordinated effort to cope with cyber threats. In practice, security information sharing is usually accomplished via ad-hoc and informal relationships. Often, national Computer Emergency Response Teams (CERTs) assume the role of a contact point for coordinating and aggregating security incidence reports. However, the information that is provided is usually not targeted to particular vertical industry sectors. We suggest that, in order to make such platforms more effective, sector-oriented views, along with rich information and experience reports are required. Furthermore, there is a crucial trade-off to be considered: existing platforms require information to be verified centrally (in order to avoid hoaxes); therefore, the speed of information distribution suffers. Timeliness of information is very important when protecting against aggressive attackers and zero-day exploits. Consequently, we foresee a need for new standards that employ suitable direct sharing models, which allow the targeted exchange of specific information about discovered vulnerabilities of ICT systems, as well as current threats (such as new malware) and recent incidents. The application of these standards further implies the existence of a federated trust and reputation model to address reservations of users, and to attract a critical mass of users.

Selected Publications:
Computers and Security Journal Information Security and Application


SMART GRID SECURITY

A drastic change in modern power grids is underway. Conventional means of providing energy by centralised suppliers will not be sufficient to ensure the energy supply of our society in the future. Therefore, Information and Communication Technologies (ICT) are increasingly applied, for example, to allow a flexible integration of wind-, solar-, or biomass energy into the existing power grid. This integration of energy providers, consumers, producers and utilities by means of ICT is the cornerstone of a Smart Grid. With the increasing use of novel smart grid technologies, a comprehensive ICT network is established parallel to the electricity grid, which due to its large size, number of participants and access points will be exposed to similar hazards as the current Internet. However, the reliable energy supply of this system depends on the effective operation of ICT, and similar security problems such as in the current Internet would have severe consequences. Potential threats range from meter manipulation to directed, high-impact attacks on the critical infrastructure of the energy carrier that could damage or bring down parts of the national power grid, which can also affect adjacent power lines. It is essential that security measures are put in place to ensure a future smart grid does not succumb to these threats, and endanger this critical national infrastructure.

Selected Publications:
IEEE ISGT Journal of Communications Journal of Smart Grid and Clean Energy


SOCIAL TRUST IN SERVICE-ORIENTED NETWORKS

The global scale and distribution of companies have changed the economy and dynamics of businesses. Web-based collaborations and cross-organizational processes typically require dynamic and context-based interactions between people and services. However, finding the right partner to work on joint tasks or to solve emerging problems in such scenarios is challenging due to scale and temporary nature of collaborations. Furthermore, actor competencies evolve over time, thus requiring dynamic approaches for their management. Web services and SOA are the ideal technical framework to automate interactions spanning people and services. To support such complex interaction scenarios, we discuss mixed service-oriented systems that are composed of both humans and software services, interacting to perform certain activities. As an example, consider a professional online support community consisting of interactions between human participants and software-based services. We argue that trust between members is essential for successful collaborations. This research aims at covering, models, algorithms and architectures that support the management of trust in such mixed service-oriented systems environments.

Selected Publications:
Journal of Systems and Software Journal on Cooperative Systems Journal on Information Systems

Research Projects

Current Projects

  1. Cyber Incident Situational Awareness (CISA), 2015 - 2017. Coordinator.
    National research project funded by the FFG in course of the KIRAS security research programme.
    Abstract: The project CISA aims towards a consistent fusion of existing research activities in the field of national cyber security, in order to develop a process to establish cyber-situational awareness within a scientifically sound concept. At the operational and technical level, solutions for the collection and aggregation of information regarding cyber threats have been developed in the recent years, and at the strategic level the assessment and handling of cyber threats based on cyber situational awareness pictures has been studied. However, an important link, specifically the question of how the technical information from the cyberspace can be processed and presented in such a cyber-situational awareness picture, turned out to be a challenging problem, for which there are still no sufficient solutions. Therefore, the project CISA is carried out in close cooperation with national stakeholders to create a sound definition of the concept of cyber-situational awareness (both military and civilian), describe the creation and utilisation processes, and combine (existing) tools to new instruments. At the same time, the involvement of Austrian legal experts is crucial in order to ensure the real-world applicability of the newly developed solutions. Ultimately, these efforts are evaluated and assessed in a demonstrator during a cyber exercise.

  2. European Control System Security Incident Analysis Network (ECOSSIAN), 2014 - 2017. Work Package Leader.
    EU large-scale integrated project. FP7 Security Call; Grant agreement no: 607577
    Abstract: The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of individual CI, across CIs which are depending on each other, and across borders. An approach is required which really integrates functionalities across all these levels. Cooperation of privately operated CIs and public bodies (governments and EU) is difficult but mandatory. After about 10 years of analysis and research on partial effects in CIP and for individual infrastructure sectors, ECOSSIAN is supposed to be the first attempt to develop this holistic system in the sense portrayed above. A prototype system will be developed which facilitates preventive functions like threat monitoring, early indicator and real threat detection, alerting, support of threat mitigation and disaster management. In the technical architecture with an operations centre and the interfaces to legacy systems (e.g., SCADA), advanced technologies need to be integrated, including fast data aggregation and fusion, visualization of the situation, planning and decision support, and flexible networks for information sharing and coordination support, and the connection of local operations centres. This system will only be successful, if the technical solutions will be complemented by an effective and agreed organizational concept and the implementation of novel rules and regulations. And finally, the large spectrum of economically intangible factors will have significant influence on the quality and acceptance of the system. These factors of societal perception and appreciation, the existing and required legal framework, questions of information security and implications on privacy will be analyzed, assessed and regarded in the concept. The system will be tested, demonstrated and evaluated in realistic use cases. They will be developed with the community of stakeholders and cover the sectors energy, transportation and finance, and the ubiquitous sector of ICT.

  3. Cyber Incident Information Sharing (CIIS), 2013 - 2016. Coordinator.
    National research project funded by the FFG in course of the KIRAS security research programme.
    Abstract: The smooth operation of critical infrastructures, such as telecommunications or electricity supply is essential for our society. In recent years, however, operators of critical infrastructure have increasingly struggled with cyber security problems. Through the use of ICT standard products and the increasing network interdependencies, the attack surfaces and channels have multiplied. Therefore, the goals in CIIS are twofold: the development of mechanisms for information correlation, aggregation, and fingerprinting of status and attack data, as well as the development of methods and technologies for the exchange of information on cyber incidents to better defend against cyber attacks and to streamline the analysis of the current threat. As a result, the resilience of systems to be improved (e.g., operators of critical infrastructures) both between organizations and between organizational units within large organizations (e.g., within ministries) and increased regarding cyber attacks in sensitive areas.

Past Projects

  1. Smart Grid Security Guidance (SG2), 2012 - 2015. Coordinator (AIT).
    National research project funded by the FFG in course of the KIRAS security research programme.
    Abstract: Future energy grids will make extensive use of the integration of ICT technologies. Thus, cyber security risks become a threat even for energy suppliers. Numerous security issues are completely unsolved today, because these special environments require novel security mechanisms and processes. The aim of the project SG2 is therefore a systematic study of smart grid technologies in terms of ICT security issues and the research of countermeasures. Based on a thorough threat and risk analysis from a state-level perspective and security analysis of Smart Grid components, SG2 explores measures for power grid operators that serve to increase the security of computer systems deployed in the future critical infrastruc-ture of "energy".

  2. Cyber Attack Information System (CAIS), 2011 - 2013. Coordinator (AIT).
    National research project funded by the FFG in course of the KIRAS security research programme.
    Abstract: In the last years ICT has changed our lives considerably. This brings in some new dependencies - hardly anything is working without ICT these days, and this trend is even increasing. To reduce IT related risks the CAIS project is developing two tools as the foundation of a comprehensive Cyber Attack Information System. The project is focusing on a methodology and accompanying software tool for modelling, analysing and simulating IT infrastructures and specifically the interdependencies of them. It supports the identification of problematic areas and the simulation of threats for the development of countermeasures. The second tool developed within the project complements the first one and builds upon multiple data sources to correlate the data and analyse current threats and anomalies. It starts with information about traffic flows and incorporates interfaces to malware analysis systems and other security relevant information sources. Prospective users include large companies, e.g. operators of critical infrastructures, as well as public authorities responsible for security in Austria.

  3. Collaboration and Interoperability for Networked Enterprises (COIN), 2008 - 2011. Work Package Leader (TUV)
    EU Framework 7 IP project, Call 1, Theme ICT 1.1.3 ICT in support of the networked enterprise
    Overview of TUV's contributions.
    Abstract: "By 2020 enterprise collaboration and interoperability services will become an invisible, pervasive and self-adaptive knowledge and business utility at disposal of the European networked enterprises from any industrial sector and domain in order to rapidly set-up, efficiently manage and effectively operate different forms of business collaborations, from the most traditional supply chains to the most advanced and dynamic business ecosystems." The mission of the COIN IP is to study, design, develop and prototype an open, self-adaptive, generic ICT integrated solution to support the above 2020 vision, starting from notable existing research results in the field of Enterprise Interoperability (and made available by the whole Enterprise Interoperability DG INFSO D4 Cluster and specifically by the projects ATHENA, INTEROP, ABILITIES, SATINE, TRUSTCOM) and Enterprise Collaboration (and made available by the projects ECOLEAD, DBE, E4 and ECOSPACE). In particular, a COIN business-pervasive open-source service platform will be able to expose, integrate, compose and mash-up in a secure and adaptive way existing and innovative to-bedeveloped Enterprise Interoperability and Enterprise Collaboration services, by applying intelligent maturity models, business rules and self-adaptive decision-support guidelines to guarantee the best combination of the needed services in dependence of the business context, as industrial sector and domain, size of the companies involved, openness and dynamics of collaboration. This way, the Information Technology vision of Software as a Service (SaaS) will find its implementation in the field of interoperability among collaborative enterprises, supporting the various collaborative business forms, from supply chains to business ecosystems, and becoming for them like a utility, a commodity, the so-called Interoperability Service Utility (ISU). The COIN project will finally develop an original business model based on the SaaS-U (Software as a Service-Utility) paradigm where the open-source COIN service platform will be able to integrate both free-of-charge and chargeable, open and proprietary services depending on the case and business policies.

  4. Current and Future Technologies for Collaborative Working Environments (ESA-CWE), 2008.
    funded by the European Space Agency (ESA), ESA ITT Number AO/3-12280/07/NL/CB.
    conducted in close collaboration with the ESA Advanced Concepts Team.

Publications

Copyright Policy on Published Papers
Several papers are available for download. By following these links you agree to respect the copyrights of the papers.
The papers obtained from this Web page are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Journal and Magazine Articles

  1. Settanni G., Skopik F. et al. (2016): A collaborative cyber incident management system for European interconnected critical infrastructures [pdf]
    Elsevier Journal of Information Security and Applications (JISA), forthcoming. Elsevier.

  2. Skopik F., Settanni G., Fiedler R. (2016): A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense through Security Information Sharing. [pdf]
    Elsevier Computers & Security Journal, Volume 60. July 2016, pp. 154-176. Elsevier.

  3. Wurzenberger M., Skopik F., Settanni G., Scherrer W. (2016): Complex Log File Synthesis for Rapid Sandbox-Benchmarking of Security- and Computer Network Analysis Tools. [pdf]
    Elsevier Information Systems (IS), Volume 60, Aug./Sept. 2016, pp. 13-33. Elsevier.

  4. Einzinger K., Skopik F., Fiedler R. (2015): Keine Cyber-Sicherheit ohne Datenschutz.
    Datenschutz und Datensicherheit (DuD), Vol. 39, Issue 11. Gabler Verlag | Springer Fachmedien.

  5. Friedberg I., Skopik F., Fiedler R. (2015): Cyber Situational Awareness through Network Anomaly Detection: State of the Art and New Approaches.
    e&i Elektrotechnik und Informationstechnik
    , Volume 132, Issue 2, pp. 101-105. Springer.

  6. Kaufmann H., Hutter R., Skopik F., Mantere M. (2015): A Structural Design for a Pan-European Early Warning System for Critical Infrastructures.
    e&i Elektrotechnik und Informationstechnik
    , Volume 132, Issue 2, pp. 117-121. Springer.

  7. Friedberg I., Skopik F., Settanni G., Fiedler R. (2015): Combating Advanced Persistent Threats: From Network Event Correlation to Incident Detection [pdf].
    Elsevier Computers & Security Journal, Volume 48, pp. 35-57. Elsevier.

  8. Skopik F., Bleier T. (2014): Securing Interconnected Cyber-Physical Systems through Strategic Information Sharing.
    ERCIM News, Number 97, April 2014, pp. 20-21. ERCIM - The European Research Consortium for Informatics and Mathematics.

  9. Skopik F., Fiedler R., Lendl O. (2014): Cyber Attack Information Sharing.
    Datenschutz und Datensicherheit (DuD), Vol. 38, Issue 4. Gabler Verlag | Springer Fachmedien.

  10. Skopik F. (2014): The Social Smart Grid: Dealing with Constrained Energy Resources through Social Coordination. [pdf]
    Journal of Systems and Software (JSS), Volume 89, March 2014, pp. 3-18. Elsevier.

  11. Skopik F., Langer L. (2013): Cyber Security Challenges in Heterogeneous ICT Infrastructures of Smart Grids.
    Journal of Communications (JCM), Volume 8, Issue 8, August 2013, pp. 463-472. Engineering and Technology Publishing.

  12. Skopik F., Smith P., Bleier T. (2013): Secure Smart Grids or Say 'Goodnight Vienna!'.
    ERCIM News, Number 92, January 2013, pp 38-39. ERCIM - The European Research Consortium for Informatics and Mathematics.

  13. Skopik F., Schall D., Dustdar S. (2012): Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems.
    International Journal of Cooperative Information Systems (IJCIS), Volume 21, Issue 4, December 2012, pp 279-341. World Scientific.

  14. Schall D., Skopik F. (2012): Social Network Mining of Requester Communities in Crowdsourcing Markets.
    Social Network Analysis and Mining, Volume 2, Issue 4, December 2012, pp 329-344. Springer.

  15. Skopik F., Bleier T. (2012): Cybercrime and the Security of Critical Infrastructures.
    ERCIM News, Number 91, October 2012, pp 26-28. ERCIM - The European Research Consortium for Informatics and Mathematics.

  16. Skopik F., Ma Z., Bleier T., Grüneis H. (2012): A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures.
    International Journal of Smart Grid and Clean Energy (IJSGCE), Volume 1, Issue 1, September 2012, pp 22-28. Engineering and Technology Publishing.

  17. Skopik F. (2012): Security is not enough! On Privacy Challenges in Smart Grids.
    International Journal of Smart Grid and Clean Energy (IJSGCE), Volume 1, Issue 1, September 2012, pp 7-14. Engineering and Technology Publishing.

  18. Ma Z., Wagner C., Woitsch R., Skopik F., Bleier T. (2012): Model-driven Security: from Theory to Application.
    International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), Volume 5, 2012, pp. 151-158. MIR Labs.

  19. Schall D., Skopik F., Dustdar S. (2012): Expert Discovery and Interactions in Mixed Service-Oriented Systems.
    IEEE Transactions on Services Computing (TSC), Volume 5, Issue 2, April-June 2012, pp 233-245. IEEE.

  20. Skopik F., Schall D., Dustdar S. (2012): Trusted Information Sharing Using SOA-Based Social Overlay Networks.
    International Journal of Computer Science and Applications, Volume 9, Issue 1, 2012, pp 116-151. Technomathematics Research Foundation.

  21. Dorn C., Skopik F., Schall D., Dustdar S. (2011): Interaction Mining and Skill-dependent Recommendations for Multi-objective Team Composition.
    Data & Knowledge Engineering, Volume 70, Issue 10, October 2011, pp 866-891. Elsevier.

  22. Skopik F., Schall D., Psaier H., Treiber M., Dustdar S. (2011): Towards Social Crowd Environments using Service-oriented Architectures.
    it - Information Technology: Special Issue on Knowledge Processes and Services, Volume 53, Issue 3, 3/2011, pp 108-116. Oldenbourg Wissenschaftsverlag.

  23. Skopik F., Schall D., Dustdar S. (2010): Modeling and Mining of Dynamic Trust in Complex Service-oriented Systems.
    Elsevier Information Systems Journal (IS), Volume 35, Issue 7, November 2010, pp 735-757. Elsevier.

Conference Proceedings

    2016
  1. Graf R., Skopik F., Whitebloom K. (2016): A Decision Support Model for Situational Awareness in National Cyber Operations Centers.
    International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016), June 13-14, 2016, London, UK. C-MRIC.

  2. Settanni G., Skopik F., Shovgenya Y., Fiedler R.(2016): A Collaborative Analysis System for Cross-Organization Cyber Incident Handling.
    2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), February 19-21, 2016, Rome, Italy. INSTICC.


  3. 2015
  4. Settanni G., Skopik F., Shovgenya Y., Fiedler R., et al. (2015): A Blueprint for a Pan-European Cyber Incident Analysis System.
    3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), September 17-18, 2015, Ingolstadt, Germany. BCS.

  5. Skopik F., Wurzenberger M., Settanni G., Fiedler R. (2015): Establishing National Cyber Situational Awareness through Incident Information Clustering.
    International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015), June 8-9, 2015, London, UK. C-MRIC.

  6. Wurzenberger M., Skopik F., Settanni G., Fiedler R. (2015): Beyond Gut Instincts: Understanding, Rating and Comparing Self-Learning IDSs (Poster and Extended Abstract).
    International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015), June 8-9, 2015, London, UK. C-MRIC.

  7. Shovgenya Y., Theuerkauf K., Skopik F. (2015): On Demand for Situational Awareness for Preventing Attacks on the Smart Grid.
    International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015), June 8-9, 2015, London, UK. C-MRIC.


  8. 2014
  9. McLaughlin K., Sezer S., Smith P., Ma Z., Skopik F. (2014): PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems.
    2nd International Symposium for ICS & SCADA Cyber Security Research, September 11-12, 2014, St. Pölten, Austria. BCS.

  10. Skopik F., Settanni G., Fiedler R., Friedberg I. (2014): Semi-Synthetic Data Set Generation for Security Software Evaluation.
    12th International Conference on Privacy, Security and Trust, July 23-14, 2014, Toronto, Canada. IEEE.

  11. Kammerstetter M, Langer L., Skopik F., Kastner W. (2014): Architecture-Driven Smart Grid Security Management.
    2nd ACM Workshop on Information Hiding and Multimedia Security, June 11-13, 2014, Salzburg, Austria. ACM.

  12. Kammerstetter M, Langer L., Skopik F., Kupzog F., Kastner W. (2014): Practical Risk Assessment Using a Cumulative Smart Grid Model.
    3rd International Conference on Smart Grids and Green IT Systems, April 03-04, 2014, Barcelona, Spain. INSTICC.

  13. Skopik F., Friedberg I., Fiedler R. (2014): Dealing with Advanced Persistent Threats in Smart Grid ICT Networks.
    5th IEEE Innovative Smart Grid Technologies Conference, February 19-22, 2014, Washington DC, USA. IEEE.


  14. 2013
  15. Langer L., Skopik F., Kienesberger G., Li Q. (2013): Privacy Issues of Smart E-Mobility.
    39th Annual Conference of the IEEE Industrial Electronics Society, November 10-13, 2013, Vienna, Austria. IEEE.

  16. Bleier T., Langer L., Skopik F., Smith P. (2013): Smart grid cyber-security standards: today and tomorrow.
    World Smart Grid Forum 2013, September 23-25, 2013, Berlin, Germany. VDE.

  17. Skopik F., Bonitz A. (2013): An Architectural Blueprint for a National Cyber Attack Information System.
    8th Future Security Research Conference, September 17-19, 2013, Berlin, Germany. Frauenhofer.

  18. Skopik F., Fiedler R. (2013): Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation.
    43. Jahrestagung der Gesellschaft für Informatik e.V. (GI) (INFORMATIK 2013), September 16-20, 2013, Koblenz, Germany. GI.

  19. Ma Z., Smith P., Skopik F. (2013): Architectural Model for Information Security Analysis of Critical Information Infrastructures.
    IDIMT - Interdisciplinary Information and Management Talks, September 11-13, 2013, Prague, Czech Republic. Universitätsverlag Rudolf Trauner, Linz, Austria.

  20. Skopik F., Li Q. (2013): Trustworthy Incident Information Sharing in Social Cyber Defense Alliances.
    18th IEEE Symposium on Computers and Communications (ISCC), July 07-13, 2013, Split, Croatia. IEEE.

  21. Tauber M., Skopik F., Bleier T., Hutchison D. (2013): A Self-Organising Approach for Smart Meter Communication Systems.
    7th International Workshop on Self-Organizing Systems (IWSOS), May 09-10, 2013, Palma de Mallorca, Spain. Springer.


  22. 2012
  23. Skopik F., Bleier T., Fiedler R. (2012): Information Management and Sharing for National Cyber Situational Awareness.
    Information Security Solution Conference (ISSE), October 23-24, 2012, Brussels, Belgium. Vieweg Verlag.

  24. Skopik F., Treytl A., Geven A., Hirschler B., Bleier T., Eckel A., El-Salloum C., Wasicek A. (2012): Towards Secure Time-Triggered Systems.
    ERCIM/EWICS DECOS Dependable Cyber-physical Systems Workshop colocated with:
    31st International Conference on Computer Safety, Reliability and Security (SAFECOMP), September 25-28, 2012, Magdeburg, Germany. Springer.

  25. Skopik F., Bleier T., Kammerstetter M., Kienesberger G. (2012): Smart Grid Security Guidance: Eine Sicherheitsinitiative für Intelligente Stromnetze.
    42. Jahrestagung der Gesellschaft für Informatik e.V. (GI) (INFORMATIK 2012), September 16-21, 2012, Braunschweig, Germany. GI.

  26. Skopik F., Ma Z., Smith P., Bleier T. (2012): Designing a Cyber Attack Information System for National Situational Awareness.
    7th Security Research Conference, September 4-6, 2012, Bonn, Germany. Springer.

  27. Skopik F., Ma Z. (2012): Attack Vectors to Metering Data in Smart Grids under Security Constraints.
    The First IEEE International Workshop on Methods for Establishing Trust with Open Data (METHOD 2012) colocated with:
    IEEE 36th International Conference on Computer Software and Applications (COMPSAC), July 16-20, 2012, Izmir, Turkey. IEEE.

  28. Skopik F., Wagner C. (2012): Novel Energy Saving Opportunities in Smart Grids using a Secure Social Networking Layer.
    IEEE 36th International Conference on Computer Software and Applications (COMPSAC), July 16-20, 2012, Izmir, Turkey. IEEE.

  29. Skopik F. (2012): Towards a National Cyber Attack Information System.
    The Sixth Conference on Cyberterrorism and Cybercrime, June 12-13, 2012, Prague, Czech Republic.

  30. Raml R., Schuster C., Skopik F., Wagner C. (2012): An Empirical Study on the Acceptance of a Security Information System for Citizens.
    IADIS e-society 2012, March 10-13, 2012, Berlin, Germany. IADIS Press.


  31. 2011
  32. Schall D., Skopik F. (2011): An Analysis of the Structure and Dynamics of Large-scale Q/A Communities.
    15th East-European Conference on Advances in Databases and Information Systems (ADBIS), September 20-23, 2011, Vienna, Austria. Springer.

  33. Psaier H., Skopik F., Schall D., Dustdar S. (2011): Resource and Agreement Management in Dynamic Crowdcomputing Environments.
    15th IEEE International EDOC Conference (EDOC), August 29 - September 2, 2011, Helsinki, Finland. IEEE.

  34. Skopik F., Schall D., Dustdar S. (2011): Opportunistic Information Flows Through Strategic Social Link Establishment.
    10th IEEE/WIC/ACM International Conference on Web Intelligence (WI), August 22-27, 2011, Lyon, France. IEEE.

  35. Skopik F., Schall D., Dustdar S. (2011): Managing Social Overlay Networks in Semantic Open Enterprise Systems.
    1st International Conference on Web Intelligence, Mining and Semantics (WIMS), May 25-27, 2011, Sogndal, Norway. ACM.

  36. Skopik F., Schall D., Dustdar S. (2011): Computational Social Network Management in Crowdsourcing Environments.
    16th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), April 27-29, 2011, Las Vegas, USA. IEEE.

  37. Schall D., Skopik F., Psaier H., Dustdar S. (2011): Bridging Socially-Enhanced Virtual Communities.
    26th ACM Symposium On Applied Computing (SAC), March 21-25, 2011, Taichung, Taiwan. ACM.

  38. Skopik F., Schall D., Psaier H., Dustdar S. (2011): Adaptive Provisioning of Human Expertise in Service-oriented Systems.
    26th ACM Symposium On Applied Computing (SAC), March 21-25, 2011, Taichung, Taiwan. ACM.


  39. 2010
  40. Skopik F., Schall D., Psaier H., Dustdar S. (2010): Social Formation and Interactions in Evolving Service-oriented Communities.
    8th European Conference on Web Services (ECOWS), December 1-3, 2010, Ayia Napa, Cyprus. IEEE.

  41. Psaier H., Skopik F., Schall D., Juszczyk L., Treiber M., Dustdar S. (2010): A Programming Model for Self-Adaptive Open Enterprise Systems.
    5th MW4SOC Workshop of the 11th International Middleware Conference, November 29 - December 3, 2010, Bangalore, India. ACM.

  42. Schall D., Skopik F. (2010): Mining and Composition of Emergent Collectives in Mixed Service-Oriented Systems.
    12th IEEE Conference on Commerce and Enterprise Computing (CEC), November 10-12, 2010, Shanghai, China. IEEE.

  43. Psaier H., Juszczyk L., Skopik F., Schall D., Dustdar S. (2010): Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems.
    4th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), September 27 - October 01, 2010, Budapest, Hungary. IEEE.

  44. Skopik F., Schall D., Dustdar S. (2010): Supporting Network Formation through Mining under Privacy Constraints.
    10th Annual International Symposium on Applications and the Internet (SAINT), July 19-23, 2010, Seoul, South Korea. IEEE.

  45. Psaier H., Skopik F., Schall D., Dustdar S. (2010): Behavior Monitoring in Self-healing Service-oriented Systems.
    34th Annual IEEE Computer Software and Applications Conference (COMPSAC), July 19-23, 2010, Seoul, South Korea. IEEE.

  46. Skopik F., Schall D., Dustdar S., Sesana M. (2010): Context-Aware Interaction Models in Cross-Organizational Processes.
    5th International Conference on Internet and Web Applications and Services (ICIW), May 09-15, 2010, Barcelona, Spain. IEEE.

  47. Treiber M., Skopik F., Schall D., Dustdar S., Haslinger S. (2010): Context-aware Campaigns in Social Networks.
    5th International Conference on Internet and Web Applications and Services (ICIW), May 09-15, 2010, Barcelona, Spain. IEEE.

  48. Skopik F., Schall D., Dustdar S. (2010): Trust-based Adaptation in Complex Service-oriented Systems.
    15th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), March 22-26, 2010, University of Oxford, UK. IEEE.

  49. Skopik F., Schall D., Dustdar S. (2010): Trustworthy Interaction Balancing in Mixed Service-oriented Systems.
    25th ACM Symposium On Applied Computing (SAC), March 22-26, 2010, Sierre, Switzerland. ACM.

  50. Skopik F., Schall D., Dustdar S. (2010): Trusted Interaction Patterns in Large-scale Enterprise Service Networks.
    18th Euromicro International Conference on Parallel, Distributed and Network-Based Computing (PDP), February 17-19, 2010, Pisa, Italy. IEEE.


  51. 2009
  52. Skopik F., Schall D., Dustdar S. (2009): Start Trusting Strangers? Bootstrapping and Prediction of Trust.
    10th International Conference on Web Information Systems Engineering (WISE), October 05-07, 2009, Poznan, Poland. Springer.

  53. Skopik F., Schall D., Dustdar S. (2009): The Cycle of Trust in Mixed Service-oriented Systems.
    35th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), August 27-29, 2009, Patras, Greece. IEEE.

  54. Skopik F., Truong H.-L., Dustdar S. (2009): Trust and Reputation Mining in Professional Virtual Communities (Slides).
    9th International Conference on Web Engineering (ICWE), June 24-26, 2009, San Sebastian, Spain. Springer.

  55. Skopik F., Truong H.-L., Dustdar S. (2009): VieTE - Enabling Trust Emergence in Service-oriented Collaborative Environments (Slides).
    5th International Conference on Web Information Systems and Technologies (WEBIST), March 23-26, 2009, Lisbon, Portugal. INSTICC.

Books

  1. Skopik F., Smith P. (2015): Smart Grid Security - Innovative Solutions for a Modernized Grid.
    324p., 1st edition, ISBN-10: 0128021225, ISBN-13: 978-0128021224, Elsevier Science Publishing.

  2. Leopold H., Skopik F., Bleier T. (2015): Cyber Attack Information System: Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung.
    German, 208p., 1st edition, ISBN-10: 3662443058, ISBN-13: 978-3662443057, Springer Wien.

  3. Dustdar S., Schall D., Skopik F., Juszczyk L., Psaier H. (2011): Socially Enhanced Services Computing: Modern Models and Algorithms for Distributed Systems.
    153p., 1st edition, ISBN-10: 3709108128, ISBN-13: 978-3709108123, Springer Wien.

Book Chapters

  1. Schall D., Skopik F. (2014): Collective Intelligence for Crowdsourcing and Community Q&A.
    In Encyclopedia of Social Network Analysis and Mining. Alhajj, Reda; Rokne, Jon (Eds.)
    Springer International Publishing, Sep. 2014, 2200p., ISBN 978-1-4614-6169-2.

  2. Möderl M., Rauch W., Achleitner S., Lukas A., Mayr E., Neunteufel R., Perfler R., Neuhold C., Godina R., Wiesenegger H., Friedl F., Fuchs-Hanusch D., Lammel J., Hohenblum P., Skopik F., Bleier T., Weber K., Eder F., Brugger M. (2014): Austrian activities in protecting critical water infrastructure. pp. 343-373
    In Securing Water and Wastewater Systems: Global Experiences, Volume 2. Editors: Robert M. Clark, Simon Hakim.
    Springer International Publishing, 2014, ISBN 978-3-319-01091-5.

  3. Jansson K., Sesana M., Skopik F., Olmo A. (2011): COIN Innovative Enterprise Collaboration Services.
    In The COIN Book: Enterprise Collaboration and Interoperability.
    Mainz, Nov. 2011, 200p., ISBN 3-86130-713-8.

  4. Haslinger S., Skopik F., Schall D., Treiber M. (2010): Woodapples: A new approach for Context Aware Mobile Marketing.
    In Mobile Web 2.0: Developing and Delivering Services to Mobile Phones.
    CRC Press, Dec. 2010, 617p., ISBN 9781439800829.

Technical Reports

  1. Ma Z., Smith P., Skopik F. (2012): Towards a Layered Architectural View for Security Analysis in SCADA Systems.
    Technical Report, ArXiv 1211.3908, November 2012.

  2. Dorn C., Skopik F., Schall D., Dustdar S. (2011): Interaction Mining and Skill-dependent Recommendations for Multi-objective Team Composition.
    Technical Report, TUV-1841-2011-03, Vienna University of Technology, April 2011.

  3. Skopik F., Schall D., Dustdar S. (2010): Adaptive Information Disclosure in a Dynamic Web of Trust.
    Technical Report, TUV-1841-2010-03, Vienna University of Technology, April 2010.

  4. Schall D., Skopik F., Dustdar S. (2010): Trust-based Discovery and Interactions in Mixed Service-Oriented Systems.
    Technical Report, TUV-1841-2010-01, Vienna University of Technology, April 2010.

  5. Truong H.-L., Sitek P., Aguilera C., Sesana M., Skopik F., Zarvic N. (2009): The COIN Enterprise Collaboration SaaS Platform.
    Project Report, FP7-216256 COIN, April 2009.

  6. Skopik F., Schall D., Truong H.-L., Dustdar S. (2009): Innovative Human Interaction Services Specification (Slides).
    Technical Report, FP7-216256 COIN, D4.5.1a, January 2009.

  7. Skopik F., Truong H.-L., Dustdar S. (2008): Current and Future Technologies for Collaborative Working Environments.
    Study, Full report for the European Space Agency (PDF), Executive Summary (PDF).
    ESA ITT Number AO/3-12280/07/NL/CB, May 2008.

Theses

  1. Skopik F. (2013): Discovery and Formation Models for Socio-computational Crowd Environments.
    PhD Thesis in Social and Economic Sciences (Dr.rer.soc.oec), Vienna University of Technology.

  2. Skopik F. (2010): Dynamic Trust in Mixed Service-oriented Systems - Models, Algorithms, and Applications.
    PhD Thesis in Computer Science (Dr.techn.), Vienna University of Technology. Slides of the Defense.
    Advisors: Prof. Schahram Dustdar, Prof. Frank Leymann.

Other

  1. Skopik F. (2015): Sicherheit als integrales Gesamtkonzept in IoT-Anwendungen.
    GIT Gesellschaft für Informations- und Kommunikationstechnik im OVE, Newsletter 12/2015.

  2. Skopik F. (2015): Organisationsübergreifender Austausch von Security-Informationen - eine interdisziplinäre Herausforderung!.
    GIT Gesellschaft für Informations- und Kommunikationstechnik im OVE, Newsletter 04/2015.

  3. Langer L., Kupzog F., Kammerstetter M., Kerbl T., Skopik F. (2013): Smart Grid Security Guidance (SG)2 - Empfehlungen für sichere Smart Grids in Österreich.
    Tagung ComForEn 2013 - 4. Fachkonferenz Kommunikation für Energienetze der Zukunft, September 26, 2013. OVE.

  4. Skopik F. (2013): Web Security.
    GIT Gesellschaft für Informations- und Kommunikationstechnik im OVE, Newsletter 09/2013.

  5. Skopik F. (2012): Sichere vernetzte Embedded Systems brauchen vernetzte Forschung und Entwicklung.
    GIT Gesellschaft für Informations- und Kommunikationstechnik im OVE, Newsletter 03/2012.

Professional Activities

Panels

  1. Smart Grid Security: Current and Future Issues, Panel chair at the 5th IEEE Innovative Smart Grid Technologies Conference, February 19-21, 2014, Washington DC, USA.
  2. Smart Grid Security & Privacy - The new Challenges for Distribution System Operators, Panel participant at the Siemens Workshop: Intelligent Distribution Systems in the Smart Grid in conjunction with the E-World: Energy & Water, February 10-14, 2014, Essen, Germany.

Editorial Board Memberships

  1. Open Journal of Web Technologies (OJWT) - Research Online Publishing, Lübeck, Germany, ISSN: 2199-188X
  2. International Journal on Advances in Networks and Services - IARIA, ISSN: 1942-2644
  3. International Journal of Smart Grid and Clean Energy (IJSGCE) - Engineering and Technology Publishing, ISSN: 2315-4462

Program Committee Chair

  1. IWSGNC 2015 - 2015 International Workshop on Smart Grid Networking and Communications, October 20-23, 2015 - Offenburg, Germany.
  2. IWSGNC 2014 - 2014 International Workshop on Smart Grid Networking and Communications, October 29-31, 2014 - Sharjah, U.A.E.

Program Committee Memberships

  1. IEEE ISGT 2016 - 7th IEEE PES Innovative Smart Grid Technologies Conference, September 06-09, 2016 - Minneapolis, Minnesota, USA.
  2. ICSGCE 2016 - International Conference on Smart Grid and Clean Energy Technologies, October 19-22, 2016 - Chengdu, China.
  3. ICS-CSR 2016 - 4th International Symposium for ICS & SCADA Cyber Security Research 2016, August, 2016 - Belfast, Ireland.
  4. SAC WT 2016 - 31st Annual ACM Symposium on Applied Computing - Web Technologies Track, April 03-08, 2016 - Pisa, Italy.
  5. ICS-CSR 2015 - 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, September 17-18, 2015 - Ingolstadt, Germany.
  6. ICIW 2015 - The Tenth International Conference on Internet and Web Applications and Services, June 21-26, 2015 - Brussels, Belgium.
  7. SAC WT 2015 - 30th Annual ACM Symposium on Applied Computing - Web Technologies Track, April 13-17, 2015 - Salamanca, Spain.
  8. IEEE ISGT 2015 - 6th IEEE PES Innovative Smart Grid Technologies Conference, February 18-20, 2015 - Washington D.C., USA.
  9. METHOD@ISWC 2014 - 3rd International Workshop on Methods for Establishing Trust with Open Data (colocated with The 13th International Semantic Web Conference), October 19-23, 2014 - Riva Del Garda - Trentino, Italy.
  10. ICIW 2014 - The Ninth International Conference on Internet and Web Applications and Services, July 20-24, 2014 - Paris, France.
  11. SAC WT 2014 - 29th Annual ACM Symposium on Applied Computing - Web Technologies Track, March 24-28, 2014 - Gyeongju, Korea.
  12. IEEE ISGT 2014 - 5th IEEE PES Innovative Smart Grid Technologies Conference, February 19-22, 2014 - Washington D.C., USA.
  13. ICSGCE 2013 - International Conference on Smart Grid and Clean Energy Technologies, October 11-13, 2013 - Kuala Lumpur, Malaysia.
  14. METHOD@COMPSAC 2013 - 2nd IEEE International Workshop on Methods for Establishing Trust with Open Data (colocated with The 37th Annual International Computer Software & Applications Conference), July 22-26, 2013 - Kyoto, Japan.
  15. ICIW 2013 - The Eighth International Conference on Internet and Web Applications and Services, June 23-28, 2013 - Rome, Italy.
  16. SAC WT 2013 - 28th Annual ACM Symposium on Applied Computing - Web Technologies Track, March 18-22, 2013 - Coimbra, Portugal.
  17. IEEE ISGT 2013 - 4th IEEE PES Innovative Smart Grid Technologies Conference, February 24-27, 2013 - Washington D.C., USA.
  18. IEEE ICECCS 2012 - 17th IEEE International Conference on Engineering of Complex Computer Systems, July 18-20, 2012 - Ecole Normale Supérieure, Paris, France.
  19. ICIW 2012 - The Seventh International Conference on Internet and Web Applications and Services, May 27-June 01, 2012 - Stuttgart, Germany.
  20. SAC WT 2012 - 27th Annual ACM Symposium on Applied Computing - Web Technologies Track, March 25-29, 2012 - Riva del Garda (Trento), Italy.
  21. IEEE CSE 2011 - 14th IEEE International Conference on Computational Science and Engineering, August 24-26, 2011 - Dalian, China.
  22. ICIW 2011 - The Sixth International Conference on Internet and Web Applications and Services, March 20-25, 2011 - St. Maarten, The Netherlands Antilles.

Reviewer for Journals

  1. IEEE Transactions on Parallel and Distributed Systems - IEEE, ISSN: 1045-9219
  2. IEEE Transactions on Industrial Informatics - IEEE, ISSN: 1551-3203
  3. Journal of Computer and System Sciences - Elsevier, ISSN: 0022-0000
  4. IBM Journal of Research and Development
  5. Software: Practice and Experience - Wiley, ISSN: 1097-024X
  6. Computers in Human Behavior - Elsevier, ISSN: 0747-5632
  7. Computers & Operations Research - Elsevier, ISSN: 0305-0548
  8. IET Information Security - IET, Print ISSN 1751-8709
  9. International Journal of Trust Management in Computing and Communications (IJTMCC) - Inderscience, Print ISSN: 2048-8378
  10. Applied Mathematical Modelling - Elsevier, Print ISSN: 0307-904X
  11. International Journal of Trust Management in Computing and Communications (IJTMCC) - Inderscience, Print ISSN: 2048-8378, Online ISSN: 2048-8386
  12. IEEE Transactions on Smart Grid - IEEE, ISSN: 1949-3053
  13. International Journal of Electrical Power & Energy Systems - Elsevier, ISSN: 0142-0615
  14. Computers & Security - Elsevier, ISSN: 0167-4048
  15. Enterprise Information Systems (EIS) - Taylor and Francis, ISSN: 1751-7575
  16. Electronic Commerce Research and Applications (ECRA) - Elsevier, ISSN: 1567-4223
  17. Transactions on Service Computing (TSC) - IEEE Computer Society, ISSN: 1939-1374
  18. Future Generation Computer Systems (FGCS) - Elsevier, ISSN: 0167-739X
  19. International Journal of Cooperative Information Systems (IJCIS) - World Scientific, Print ISSN: 0218-8430, Online ISSN: 1793-6365
  20. Electronic Markets - The International Journal on Networked Business (EM) - Springer, Print ISSN: 1019-6781, Online ISSN: 1422-8890
  21. Transactions on Human-Computer Interaction (THCI) - AIS, ISSN: 1944-3900
  22. ACM Transactions on Internet Technology (TOIT) - Association for Computing Machinery, Print ISSN: 1533-5399, Online ISSN: 1557-6051
Certificates
  1. Certified Security Analyst (ECSA) - EC Council, ECSAv4, 412-79, November 2013
  2. Certified Ethical Hacker (CEH) - EC Council, CEHv8, 312-50, October 2013
  3. IPMA Level C: Project Manager (CPM) - ICB 3.0, September 2013
  4. CompTIA Security+ - SY0-301, January 2012
Patents
  1. Skopik F., Fiedler R. (2014): EP 1416597.2-1853 - Algorithmus zur Anomalie-Detektion (Algorithm for Anomaly Detection), September 2014 - patent pending
  2. Skopik F., Fiedler R. (2013): A50292/2013 (AT 514.215) - Verfahren zur Feststellung von Abweichungen von einem vorgegebenen Normalzustand (Method to detect deviations from a given normal state), April 2013

Offenlegung gemäß §25 Mediengesetz, Österreich: Inhaber der Website ist DDr. Florian Skopik, Franz Schubertstrasse 43, A-3701 Grossweikersdorf. Ich distanziere mich von den Inhalten aller extern gelinkten Seiten und übernehme diesbezüglich keine Haftung. Alle Texte auf dieser Homepage wurden sorgfältig geprüft. Nichtsdestotrotz kann keine Garantie für die Richtigkeit, Vollständigkeit und Aktualität der Angaben übernommen werden. Eine Haftung meinerseits wird daher ausgeschlossen. Die Links zu anderen Webseiten wurden sorgfältig ausgewählt. Da ich auf deren Inhalt keinen Einfluss habe, übernehme ich dafür keine Verantwortung.