Skip to main content Skip to main navigation

Publikationen

Seite 1 von 2.

  1. Honey Infiltrator: Injecting Honeytoken Using Netfilter

    In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE European Symposium on Security and Privacy Workshops …

  2. SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

    In: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP. International Conference on Information …

  3. Merijn van Tooren; Daniel Reti; Daniel Schneider; Cédric Bassem; Raúl Santos de la Cámara; Hans Dieter Schotten

    Research Questions in the Acceptance of Cybersecurity by SMEs in the EU

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. …

  4. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    In: Proceedings of the 9th ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security (CCS), Los Angeles, MTD'22, …

  5. Daniel Reti; David Klaaßen; Simon Duque Antón; Hans Dieter Schotten

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE International Conference on Cyber …

  6. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Daniel Schneider; Hans Dieter Schotten

    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    In: IEEE Internet of Things Journal (IoT), Vol. Early Access, Pages 1-1, IEEE, 2021.

  7. Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?

    In: 2020 IEEE 18th International Conference on Industrial Informatics (INDIN). IEEE International Conference on Industrial Informatics (INDIN-2020), …

  8. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Hans Dieter Schotten; Franklin Selgert; Marcell Marosvölgyi; Morten Larsen; Krishna Sudhakar; Tobias Koch; Till Witt; Cédric Bassem

    Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    In: Proceedings of the 1st International Workshop on Underpinnings for Safe Distributed AI. International Workshop on Underpinnings for Safe …

  9. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). International Conference on Cyber Security …

  10. Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

    In: Hans Dieter Schotten; Bin Han (Hrsg.). Proceedings of the 1st Workshop on Next Generation Networks and Applications. Workshop on Next Generation …