Daniel Krohmer

According to our database1, Daniel Krohmer authored at least 12 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber Perspective.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Adapting Static Taint Analyzers to Software Marketplaces: A Leverage Point for Mass Vulnerability Detection?
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
IEEE Internet Things J., 2021

A Qualitative Empirical Analysis of Human Post-Exploitation Behavior.
CoRR, 2021

2020
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

Decentralized Identifier Distribution for Moving Target Defense and Beyond.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2018
Demystifying Deception Technology: A Survey.
CoRR, 2018

On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Catch Me If You Can: Dynamic Concealment of Network Entities.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

2017
YAAS - On the Attribution of Honeypot Data.
Int. J. Cyber Situational Aware., 2017

Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017


  Loading...