Skopik, Florian.
Overview
| Works: | 2 works in 2 publications in 1 languages | |
|---|---|---|
Titles
Availability, reliability and security = ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
by:
Naessens, Vincent.; Workshop on the Preservation of Stability under Discretization ((2001 :); De Sutter, Bjorn.; SpringerLink (Online service); Skopik, Florian.
(Language materials, printed)
Cyber Situational Awareness in Public-Private-Partnerships = Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen /
by:
Leitner, Maria.; Skopik, Florian.; SpringerLink (Online service); Páhi, Tímea.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Smart Log Data Analytics = Techniques for Advanced Security Analysis /
by:
Wurzenberger, Markus.; Skopik, Florian.; SpringerLink (Online service); Landauer, Max.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Availability, reliability and security = ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part I /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Naessens, Vincent.; De Sutter, Bjorn.; Skopik, Florian.; SpringerLink (Online service)
(Language materials, printed)
Cyber Attack Information System = Erfahrungen und Erkenntnisse aus der IKT-Sicherheitsforschung /
by:
Skopik, Florian.; SpringerLink (Online service); Bleier, Thomas.; Leopold, Helmut.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Subjects
Computer organization.
Systems and Data Security.
Data protection.
Pattern recognition.
Law and legislation.
Machine learning.
Computer Systems Organization and Communication Networks.
Computer security
Management of Computing and Information Systems.
Security.
Legal Aspects of Computing.
Data mining.
Machine Learning.
Computers
Computer science.
Management information systems.
Computers.
Principles and Models of Security.
Data and Information Security.
Computer security.
Pattern Recognition.
Data Mining and Knowledge Discovery.