Folgen
Simon D Duque Anton
Simon D Duque Anton
comlet Verteilte Systeme GmbH
Bestätigte E-Mail-Adresse bei comlet.de
Titel
Zitiert von
Zitiert von
Jahr
Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests
SD Duque Anton, S Sinha, HD Schotten
2019 International Conference on Software, Telecommunications and Computer …, 2019
1162019
Two decades of SCADA exploitation: A brief history
S Duque Anton, D Fraunholz, C Lipps, F Pohl, M Zimmermann, ...
Proceedings of the 2017 IEEE Conference on Application, Information and …, 2017
952017
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set
S Duque Anton, S Kanoor, D Fraunholz, HD Schotten
Proceedings of the 13th International Conference on Availability …, 2018
91*2018
Demystifying Deception Technology: A Survey
D Fraunholz, S Duque Anton, C Lipps, D Reti, D Krohmer, F Pohl, ...
arXiv preprint arXiv:1804.06196, 2018
712018
Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data
S Duque Anton, L Ahrens, D Fraunholz, HD Schotten
IEEE International Conference on Data Mining Workshops (ICDMW), 1-6, 2018
462018
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
S Plaga, N Wiedermann, S Duque Anton, S Tatschner, H Schotten, ...
Future Generation Computer Systems 93, 596-608, 2019
422019
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
D Fraunholz, D Krohmer, S Duque Anton, HD Schotten
Cyber Security And Protection Of Digital Services (Cyber Security), 2017 …, 2017
422017
Intelligence slicing: A unified framework to integrate artificial intelligence into 5G networks
W Jiang, SD Anton, HD Schotten
2019 12th IFIP Wireless and Mobile Networking Conference (WMNC), 227-232, 2019
392019
Security in process: Visually supported triage analysis in industrial process data
AP Lohfink, SDD Anton, HD Schotten, H Leitte, C Garth
IEEE transactions on visualization and computer graphics 26 (4), 1638-1649, 2020
292020
Yaas-on the attribution of honeypot data
D Fraunholz, D Krohmer, S Duque Anton, HD Schotten
International Journal on Cyber Situational Awareness 2 (1), 31-48, 2017
292017
Distributed and Highly-Scalable WAN Network Attack Sensing and Sophisticated Analysing Framework based on Honeypot Technology
D Fraunholz, M Zimmermann, S Duque Anton, J Schneider, HD Schotten
7th International Conference on Cloud Computing, Data Science & Engineering, 2017
282017
Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios.
S Duque Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten
ZEUS, 51-58, 2017
25*2017
Introducing GAMfIS: A generic attacker model for information security
D Fraunholz, S Duque Anton, HD Schotten
Software, Telecommunications and Computer Networks (SoftCOM), 2017 25th …, 2017
242017
Implementing scada scenarios and introducing attacks to obtain training data for intrusion detection methods
S Duque Antón, M Gundall, D Fraunholz, HD Schotten
ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019
202019
Cloxy: A context-aware deception-as-a-service reverse proxy for web services
D Fraunholz, D Reti, S Duque Anton, HD Schotten
Proceedings of the 5th ACM workshop on moving target defense, 40-47, 2018
202018
Security in Process: Detecting Attacks in Industrial Process Data
SD Duque Anton, AP Lohfink, C Garth, HD Schotten
arXiv preprint arXiv:1909.03730, 2019
19*2019
Devil in the Detail: Attack Scenarios in Industrial Applications
S Duque Anton, A Hafner, HD Schotten
In 2019 IEEE Security and Privacy Workshops, 2019
15*2019
A question of context: Enhancing intrusion detection by providing context information
S Duque Anton, D Fraunholz, HD Schotten, S Teuber
Internet of Things Business Models, Users, and Networks, 2017, 1-8, 2017
152017
Using Temporal and Topological Features for Intrusion Detection in Operational Networks
SD Duque Anton, D Fraunholz, HD Schotten
arXiv preprint arXiv:1907.04098, 2019
12*2019
Enabling Trust in IIoT: An Physec Based Approach
C Lipps, S Duque Anton, HD Schotten
International Conference on Cyber Warfare and Security, 663-XII, 2019
112019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20