Daniel Fraunholz
Orcid: 0000-0002-9201-261X
According to our database1,
Daniel Fraunholz
authored at least 37 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
Proceedings of the Secure IT Systems, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
IEEE Internet Things J., 2021
2020
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
The Deceptive Angle: Threat Intelligence and Resiliency for Industrial Information Assurance.
PhD thesis, 2019
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods.
CoRR, 2019
A Question of Context: Enhancing Intrusion Detection by Providing Context Information.
CoRR, 2019
Using Temporal and Topological Features for Intrusion Detection in Operational Networks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware., 2018
On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments.
Proceedings of the Central European Cybersecurity Conference 2018, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
CoRR, 2017
Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios.
Proceedings of the 9th Central European Workshop on Services and their Composition (ZEUS 2017), 2017
Proceedings of the 25th International Conference on Software, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Deception in Information Security: Legal Considerations in the Context of German and European Law.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017