Daniel Fraunholz
Orcid: 0000-0002-9201-261X
  According to our database1,
  Daniel Fraunholz
  authored at least 37 papers
  between 2017 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2024
    Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
    
  
  2023
    Proceedings of the IEEE Conference on Communications and Network Security, 2023
    
  
  2022
    Proceedings of the Secure IT Systems, 2022
    
  
    Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
    
  
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.
    
  
    Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
    
  
Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
    
  
    Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
    
  
    Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
    
  
  2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
    
  
    IEEE Internet Things J., 2021
    
  
  2020
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
    
  
    Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020
    
  
    Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
    
  
  2019
The Deceptive Angle: Threat Intelligence and Resiliency for Industrial Information Assurance.
    
  
    PhD thesis, 2019
    
  
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods.
    
  
    CoRR, 2019
    
  
A Question of Context: Enhancing Intrusion Detection by Providing Context Information.
    
  
    CoRR, 2019
    
  
Using Temporal and Topological Features for Intrusion Detection in Operational Networks.
    
  
    Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
    
  
  2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
    
  
    Int. J. Cyber Situational Aware., 2018
    
  
On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework.
    
  
    Proceedings of the 9th IFIP International Conference on New Technologies, 2018
    
  
    Proceedings of the 2018 International Conference on Information Networking, 2018
    
  
Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data.
    
  
    Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
    
  
    Proceedings of the 2018 International Conference on Computing, 2018
    
  
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications.
    
  
    Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
    
  
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments.
    
  
    Proceedings of the Central European Cybersecurity Conference 2018, 2018
    
  
    Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
    
  
    Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
    
  
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set.
    
  
    Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
    
  
  2017
    CoRR, 2017
    
  
Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios.
    
  
    Proceedings of the 9th Central European Workshop on Services and their Composition (ZEUS 2017), 2017
    
  
    Proceedings of the 25th International Conference on Software, 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
    
  
Deception in Information Security: Legal Considerations in the Context of German and European Law.
    
  
    Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
    
  
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot.
    
  
    Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017