Two decades of SCADA exploitation: A brief history SD Anton, D Fraunholz, C Lipps, F Pohl, M Zimmermann, HD Schotten 2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017 | 105 | 2017 |
Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set SD Anton, S Kanoor, D Fraunholz, HD Schotten Proceedings of the 13th international conference on availability …, 2018 | 104 | 2018 |
Demystifying deception technology: A survey D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ... arXiv preprint arXiv:1804.06196, 2018 | 76 | 2018 |
An adaptive honeypot configuration, deployment and maintenance strategy D Fraunholz, M Zimmermann, HD Schotten 2017 19th International Conference on Advanced Communication Technology …, 2017 | 72 | 2017 |
Time is of the essence: Machine learning-based intrusion detection in industrial time series data SD Anton, L Ahrens, D Fraunholz, HD Schotten 2018 IEEE International Conference on Data Mining Workshops (ICDMW), 1-6, 2018 | 52 | 2018 |
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot D Fraunholz, D Krohmer, SD Anton, HD Schotten 2017 international conference on cyber security and protection of digital …, 2017 | 48 | 2017 |
Defending web servers with feints, distraction and obfuscation D Fraunholz, HD Schotten 2018 International Conference on Computing, Networking and Communications …, 2018 | 32 | 2018 |
Cloxy: A context-aware deception-as-a-service reverse proxy for web services D Fraunholz, D Reti, S Duque Anton, HD Schotten Proceedings of the 5th ACM workshop on moving target defense, 40-47, 2018 | 30 | 2018 |
Data mining in long-term honeypot data D Fraunholz, M Zimmermann, A Hafner, HD Schotten 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 649-656, 2017 | 30 | 2017 |
YAAS-On the Attribution of Honeypot Data. D Fraunholz, D Krohmer, SD Anton, HD Schotten Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017 | 30 | 2017 |
Distributed and highly-scalable wan network attack sensing and sophisticated analysing framework based on honeypot technology D Fraunholz, M Zimmermann, SD Anton, J Schneider, HD Schotten 2017 7th International Conference on Cloud Computing, Data Science …, 2017 | 26 | 2017 |
Highly scalable and flexible model for effective aggregation of context-based data in generic IIoT scenarios SD Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten arXiv preprint arXiv:1906.03064, 2019 | 24 | 2019 |
Introducing gamfis: A generic attacker model for information security D Fraunholz, SD Anton, HD Schotten 2017 25th International Conference on Software, Telecommunications and …, 2017 | 24 | 2017 |
Implementing scada scenarios and introducing attacks to obtain training data for intrusion detection methods SD Anton, M Gundall, D Fraunholz, HD Schotten ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019 | 21 | 2019 |
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world SDD Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, HD Schotten IEEE Internet of Things Journal 8 (24), 17525-17540, 2021 | 19 | 2021 |
Towards basic design principles for high-and medium-interaction honeypots D Fraunholz, F Pohl, HD Schotten Proceedings of 16th European Conference on Cyber Warfare and Security, 120, 2017 | 18 | 2017 |
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework D Fraunholz, D Krohmer, F Pohl, HD Schotten 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 16 | 2018 |
Towards deployment strategies for deception systems D Fraunholz, M Zimmermann, HD Schotten Advances in Science, Technology and Engineering Systems Journal 2 (3), 1272-1279, 2017 | 15 | 2017 |
Using temporal and topological features for intrusion detection in operational networks SDD Anton, D Fraunholz, HD Schotten Proceedings of the 14th International Conference on Availability …, 2019 | 12 | 2019 |
Catch me if you can: Dynamic concealment of network entities D Fraunholz, D Krohmer, S Duque Anton, HD Schotten Proceedings of the 5th ACM Workshop on Moving Target Defense, 31-39, 2018 | 12 | 2018 |