Skip to main content Skip to main navigation

Publikationen

Seite 1 von 2.

  1. Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models

    In: AACD '24: Proceedings of the 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. ACM Workshop on Adaptive and Autonomous Cyber Defense (AACD-24), located at ACM Conference on Computer and Communications Security (CCS '24), October 14, Salt Lake City, USA, ISBN 979-8-4007-1231-9, Association for Computing Machinery, New York, NY, USA, 12/2024.

  2. False Flavor Honeypot: Deceiving Vulnerability Scanning Tools

    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE European Symposium on Security and Privacy Workshops (EuroSPW-2024), 3rd Workshop on Active Defense and Deception (AD&D), July 8-12, Vienna, Austria, IEEE, 7/2024.

  3. Honey Infiltrator: Injecting Honeytoken Using Netfilter

    In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE European Symposium on Security and Privacy Workshops (EuroSPW-2023), 2nd Workshop on Active Defense and Deception (AD&D), July 7, Delft, Netherlands, Pages 465-469, IEEE, 7/2023.

  4. SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

    In: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP. International Conference on Information Systems Security and Privacy (ICISSP-2023), Pages 485-492, ISBN 978-989-758-624-8, SciTePress, 2023.

  5. Merijn van Tooren; Daniel Reti; Daniel Schneider; Cédric Bassem; Raúl Santos de la Cámara; Hans Dieter Schotten

    Research Questions in the Acceptance of Cybersecurity by SMEs in the EU

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2022), located at SAFECOMP, September 6-9, Garching b. München, Germany, Pages 247-255, ISBN 978-3-031-14862-0, Springer International Publishing, 2022.

  6. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    In: Proceedings of the 9th ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security (CCS), Los Angeles, MTD'22, ISBN 9781450398787, Association for Computing Machinery, 2022.

  7. Daniel Reti; David Klaaßen; Simon Duque Antón; Hans Dieter Schotten

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA-2021), IEEE, 2021.

  8. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Daniel Schneider; Hans Dieter Schotten

    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    In: IEEE Internet of Things Journal (IoT), Vol. Early Access, Pages 1-1, IEEE, 2021.

  9. Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?

    In: 2020 IEEE 18th International Conference on Industrial Informatics (INDIN). IEEE International Conference on Industrial Informatics (INDIN-2020), July 20-23, Warwick, United Kingdom, IEEE, 7/2020.

  10. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Hans Dieter Schotten; Franklin Selgert; Marcell Marosvölgyi; Morten Larsen; Krishna Sudhakar; Tobias Koch; Till Witt; Cédric Bassem

    Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    In: Proceedings of the 1st International Workshop on Underpinnings for Safe Distributed AI. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2020), located at SAFECOMP2020, September 15, Online, Springer, 2020.