Daniel Fraunholz

According to our database1, Daniel Fraunholz authored at least 36 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
P3LI5: Practical and confidEntial Lawful Interception on the 5G core.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
IMSI Probing: Possibilities and Limitations.
Proceedings of the Secure IT Systems, 2022

Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

Evaluating Deception and Moving Target Defense with Network Attack Simulation.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
IEEE Internet Things J., 2021

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy.
CoRR, 2021

A Qualitative Empirical Analysis of Human Post-Exploitation Behavior.
CoRR, 2021

2020
Investigating the Ecosystem of Offensive Information Security Tools.
CoRR, 2020

Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

Deep Down the Rabbit Hole: On References in Networks of Decoy Elements.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
The Deceptive Angle: Threat Intelligence and Resiliency for Industrial Information Assurance.
PhD thesis, 2019

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods.
CoRR, 2019

The Dos and Don'ts of Industrial Network Simulation: A Field Report.
CoRR, 2019

A Question of Context: Enhancing Intrusion Detection by Providing Context Information.
CoRR, 2019

Two Decades of SCADA Exploitation: A Brief History.
CoRR, 2019

Using Temporal and Topological Features for Intrusion Detection in Operational Networks.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware., 2018

Demystifying Deception Technology: A Survey.
CoRR, 2018

On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Strategic defense and attack in deception based network security.
Proceedings of the 2018 International Conference on Information Networking, 2018

Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Defending Web Servers with Feints, Distraction and Obfuscation.
Proceedings of the 2018 International Conference on Computing, 2018

Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Catch Me If You Can: Dynamic Concealment of Network Entities.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
YAAS - On the Attribution of Honeypot Data.
Int. J. Cyber Situational Aware., 2017

Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO.
CoRR, 2017

Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios.
Proceedings of the 9th Central European Workshop on Services and their Composition (ZEUS 2017), 2017

Introducing GAMfIS: A generic attacker model for information security.
Proceedings of the 25th International Conference on Software, 2017

Data Mining in Long-Term Honeypot Data.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Deception in Information Security: Legal Considerations in the Context of German and European Law.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017


  Loading...