Simon Duque Antón

Orcid: 0000-0003-4005-9165

According to our database1, Simon Duque Antón authored at least 35 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Data augmentation in predictive maintenance applicable to hydrogen combustion engines: a review.
Artif. Intell. Rev., January, 2025

2024
Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios.
Future Internet, July, 2024

2022
Knowledge Rocks: Adding Knowledge Assistance to Visualization Systems.
IEEE Trans. Vis. Comput. Graph., 2022

On Explainability in AI-Solutions: A Cross-Domain Survey.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops, 2022

2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
IEEE Internet Things J., 2021

Secure (S)Hell: Introducing an SSH Deception Proxy Framework.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Security in Process: Visually Supported Triage Analysis in Industrial Process Data.
IEEE Trans. Vis. Comput. Graph., 2020

Investigating the Ecosystem of Offensive Information Security Tools.
CoRR, 2020

Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

2019
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions.
Future Gener. Comput. Syst., 2019

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods.
CoRR, 2019

The Dos and Don'ts of Industrial Network Simulation: A Field Report.
CoRR, 2019

A Question of Context: Enhancing Intrusion Detection by Providing Context Information.
CoRR, 2019

Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection.
CoRR, 2019

Two Decades of SCADA Exploitation: A Brief History.
CoRR, 2019

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection.
CoRR, 2019

Devil in the Detail: Attack Scenarios in Industrial Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests.
Proceedings of the 2019 International Conference on Software, 2019

Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks.
Proceedings of the 12th IFIP Wireless and Mobile Networking Conference, 2019

Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Security in Process: Detecting Attacks in Industrial Process Data.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Using Temporal and Topological Features for Intrusion Detection in Operational Networks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware., 2018

Demystifying Deception Technology: A Survey.
CoRR, 2018

Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Catch Me If You Can: Dynamic Concealment of Network Entities.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
YAAS - On the Attribution of Honeypot Data.
Int. J. Cyber Situational Aware., 2017

Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO.
CoRR, 2017

Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios.
Proceedings of the 9th Central European Workshop on Services and their Composition (ZEUS 2017), 2017

Introducing GAMfIS: A generic attacker model for information security.
Proceedings of the 25th International Conference on Software, 2017

Deception in Information Security: Legal Considerations in the Context of German and European Law.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017


  Loading...