Demystifying deception technology: A survey D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ... arXiv preprint arXiv:1804.06196, 2018 | 73 | 2018 |
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot D Fraunholz, D Krohmer, SD Anton, HD Schotten 2017 international conference on cyber security and protection of digital …, 2017 | 46 | 2017 |
A matter of definition: Criteria for digital ecosystems M Koch, D Krohmer, M Naab, D Rost, M Trapp Digital Business 2 (2), 100027, 2022 | 43 | 2022 |
YAAS-On the Attribution of Honeypot Data. D Fraunholz, D Krohmer, SD Anton, HD Schotten Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017 | 30 | 2017 |
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework D Fraunholz, D Krohmer, F Pohl, HD Schotten 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 15 | 2018 |
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world SDD Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, HD Schotten IEEE Internet of Things Journal 8 (24), 17525-17540, 2021 | 13 | 2021 |
Catch me if you can: Dynamic concealment of network entities D Fraunholz, D Krohmer, S Duque Anton, HD Schotten Proceedings of the 5th ACM Workshop on Moving Target Defense, 31-39, 2018 | 11 | 2018 |
Demystifying deception technology: a survey. arXiv D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ... arXiv preprint arXiv:1804.06196, 2019 | 9 | 2019 |
Demystifying deception technology: A survey. arXiv 2018 D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ... arXiv preprint arXiv:1804.06196, 0 | 7 | |
Introducing FALCOM: A multifunctional high-interaction honeypot framework for industrial and embedded applications D Fraunholz, D Krohmer, HD Schotten, C Nogueira 2018 International Conference on Cyber Security and Protection of Digital …, 2018 | 6 | 2018 |
Adapting Static Taint Analyzers to Software Marketplaces: A Leverage Point for Mass Vulnerability Detection? D Krohmer, K Sharma, S Chen Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022 | 2 | 2022 |
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World SD Duque Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, ... arXiv e-prints, arXiv: 2111.13862, 2021 | 1 | 2021 |
A qualitative empirical analysis of human post-exploitation behavior D Schneider, D Fraunholz, D Krohmer arXiv preprint arXiv:2101.02102, 2021 | 1 | 2021 |
Decentralized Identifier Distribution for Moving Target Defense and beyond D Krohmer, HD Schotten 2020 International Conference on Cyber Situational Awareness, Data Analytics …, 2020 | 1 | 2020 |
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment SD Duque Anton, D Fraunholz, D Krohmer, D Reti, HD Schotten, F Selgert, ... Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops: DECSoS …, 2020 | 1 | 2020 |
Understanding Resilience: Looking at Frameworks & Standards-A Systematic Study from Cyber Perspective N Laxman, D Krohmer, M Damm, R Schwarz, PO Antonino 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | | 2023 |
Digital Ecosystem Service Classification M Koch, D Krohmer, M Naab, D Rost, M Trapp | | 2021 |