Folgen
Daniel Krohmer
Daniel Krohmer
Bestätigte E-Mail-Adresse bei iese.fraunhofer.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Demystifying deception technology: A survey
D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ...
arXiv preprint arXiv:1804.06196, 2018
712018
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
D Fraunholz, D Krohmer, SD Anton, HD Schotten
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
442017
A matter of definition: Criteria for digital ecosystems
M Koch, D Krohmer, M Naab, D Rost, M Trapp
Digital Business 2 (2), 100027, 2022
362022
YAAS-On the Attribution of Honeypot Data.
D Fraunholz, D Krohmer, SD Anton, HD Schotten
Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017
302017
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework
D Fraunholz, D Krohmer, F Pohl, HD Schotten
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
142018
Catch me if you can: Dynamic concealment of network entities
D Fraunholz, D Krohmer, S Duque Anton, HD Schotten
Proceedings of the 5th ACM Workshop on Moving Target Defense, 31-39, 2018
112018
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world
SDD Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, HD Schotten
IEEE Internet of Things Journal 8 (24), 17525-17540, 2021
102021
Demystifying deception technology: a survey. arXiv
D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ...
arXiv preprint arXiv:1804.06196, 2019
92019
Demystifying deception technology: A survey. arXiv 2018
D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ...
arXiv preprint arXiv:1804.06196, 0
7
Introducing FALCOM: A multifunctional high-interaction honeypot framework for industrial and embedded applications
D Fraunholz, D Krohmer, HD Schotten, C Nogueira
2018 International Conference on Cyber Security and Protection of Digital …, 2018
52018
Adapting Static Taint Analyzers to Software Marketplaces: A Leverage Point for Mass Vulnerability Detection?
D Krohmer, K Sharma, S Chen
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022
12022
A qualitative empirical analysis of human post-exploitation behavior
D Schneider, D Fraunholz, D Krohmer
arXiv preprint arXiv:2101.02102, 2021
12021
Decentralized Identifier Distribution for Moving Target Defense and Beyond
D Krohmer, HD Schotten
2020 International Conference on Cyber Situational Awareness, Data Analytics …, 2020
12020
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment
SD Duque Anton, D Fraunholz, D Krohmer, D Reti, HD Schotten, F Selgert, ...
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops: DECSoS …, 2020
12020
Understanding Resilience: Looking at Frameworks & Standards-A Systematic Study from Cyber Perspective
N Laxman, D Krohmer, M Damm, R Schwarz, PO Antonino
2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023
2023
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
SD Duque Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, ...
arXiv e-prints, arXiv: 2111.13862, 2021
2021
Digital Ecosystem Service Classification
M Koch, D Krohmer, M Naab, D Rost, M Trapp
2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–17