Skip to main content Skip to main navigation

Publications

Page 1 of 1.

  1. False Flavor Honeypot: Deceiving Vulnerability Scanning Tools

    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE European Symposium on Security and Privacy Workshops …

  2. Merijn van Tooren; Daniel Reti; Daniel Schneider; Cédric Bassem; Raúl Santos de la Cámara; Hans Dieter Schotten

    Research Questions in the Acceptance of Cybersecurity by SMEs in the EU

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. …

  3. Simon D. Duque Anton; Daniel Schneider; Hans D. Schotten

    On Explainability in AI-Solutions: A Cross-Domain Survey

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. …

  4. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    In: Proceedings of the 9th ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security (CCS), Los Angeles, MTD'22, …

  5. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Daniel Schneider; Hans Dieter Schotten

    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    In: IEEE Internet of Things Journal (IoT), Vol. Early Access, Pages 1-1, IEEE, 2021.

  6. Simon Duque Antón; Daniel Fraunholz; Daniel Schneider

    Investigating the Ecosystem of Offensive Information Security Tools

    In: Hans Dieter Schotten; Bin Han (Hrsg.). Proceedings of the 1st Workshop on Next Generation Networks and Applications. Workshop on Next Generation …

  7. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). International Conference on Cyber Security …

  8. Daniel Schneider; Daniel Fraunholz; Daniel Krohmer

    A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

    In: 2020 1st Workshop on Next Generation Networks and Applications (NGNA). Workshop on Next Generation Networks and Applications (NGNA-2020), …

  9. Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments

    In: Proceedings of the 2nd Central European Cybersecurity Conference. Central European Cybersecurity Conference (CECC-2018), November 15-16, …