Two decades of SCADA exploitation: A brief history SD Anton, D Fraunholz, C Lipps, F Pohl, M Zimmermann, HD Schotten 2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017 | 97 | 2017 |
Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set SD Anton, S Kanoor, D Fraunholz, HD Schotten Proceedings of the 13th international conference on availability …, 2018 | 93 | 2018 |
Demystifying deception technology: A survey D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ... arXiv preprint arXiv:1804.06196, 2018 | 71 | 2018 |
An adaptive honeypot configuration, deployment and maintenance strategy D Fraunholz, M Zimmermann, HD Schotten 2017 19th International Conference on Advanced Communication Technology …, 2017 | 65 | 2017 |
Time is of the essence: Machine learning-based intrusion detection in industrial time series data SD Anton, L Ahrens, D Fraunholz, HD Schotten 2018 IEEE International Conference on Data Mining Workshops (ICDMW), 1-6, 2018 | 46 | 2018 |
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot D Fraunholz, D Krohmer, SD Anton, HD Schotten 2017 International Conference on Cyber Security And Protection Of Digital …, 2017 | 44 | 2017 |
YAAS-On the Attribution of Honeypot Data. D Fraunholz, D Krohmer, SD Anton, HD Schotten Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017 | 30 | 2017 |
Defending web servers with feints, distraction and obfuscation D Fraunholz, HD Schotten 2018 International Conference on Computing, Networking and Communications …, 2018 | 28 | 2018 |
Data mining in long-term honeypot data D Fraunholz, M Zimmermann, A Hafner, HD Schotten 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 649-656, 2017 | 28 | 2017 |
Distributed and highly-scalable wan network attack sensing and sophisticated analysing framework based on honeypot technology D Fraunholz, M Zimmermann, SD Anton, J Schneider, HD Schotten 2017 7th International Conference on Cloud Computing, Data Science …, 2017 | 27 | 2017 |
Highly scalable and flexible model for effective aggregation of context-based data in generic IIoT scenarios SD Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten arXiv preprint arXiv:1906.03064, 2019 | 25 | 2019 |
Introducing gamfis: A generic attacker model for information security D Fraunholz, SD Anton, HD Schotten 2017 25th International Conference on Software, Telecommunications and …, 2017 | 25 | 2017 |
Cloxy: A context-aware deception-as-a-service reverse proxy for web services D Fraunholz, D Reti, S Duque Anton, HD Schotten Proceedings of the 5th ACM workshop on moving target defense, 40-47, 2018 | 20 | 2018 |
Implementing scada scenarios and introducing attacks to obtain training data for intrusion detection methods SD Anton, M Gundall, D Fraunholz, HD Schotten ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019 | 18 | 2019 |
Towards basic design principles for high-and medium-interaction honeypots D Fraunholz, F Pohl, HD Schotten Proceedings of 16th European Conference on Cyber Warfare and Security, 120, 2017 | 18 | 2017 |
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework D Fraunholz, D Krohmer, F Pohl, HD Schotten 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 14 | 2018 |
Towards deployment strategies for deception systems D Fraunholz, M Zimmermann, HD Schotten Advances in Science, Technology and Engineering Systems Journal 2 (3), 1272-1279, 2017 | 14 | 2017 |
Using temporal and topological features for intrusion detection in operational networks SDD Anton, D Fraunholz, HD Schotten Proceedings of the 14th International Conference on Availability …, 2019 | 12 | 2019 |
A question of context: Enhancing intrusion detection by providing context information SD Anton, D Fraunholz, HD Schotten, S Teuber 2017 Internet of Things Business Models, Users, and Networks, 1-8, 2017 | 12 | 2017 |
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world SDD Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, HD Schotten IEEE Internet of Things Journal 8 (24), 17525-17540, 2021 | 11 | 2021 |