Daniel Reti

According to our database1, Daniel Reti authored at least 14 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Honey Infiltrator: Injecting Honeytoken Using Netfilter.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Research Questions in the Acceptance of Cybersecurity by SMEs in the EU.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops, 2022

IMSI Probing: Possibilities and Limitations.
Proceedings of the Secure IT Systems, 2022

Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

Evaluating Deception and Moving Target Defense with Network Attack Simulation.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World.
IEEE Internet Things J., 2021

Escape the Fake: Introducing Simulated Container-Escapes for Honeypots.
CoRR, 2021

Secure (S)Hell: Introducing an SSH Deception Proxy Framework.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

Deep Down the Rabbit Hole: On References in Networks of Decoy Elements.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2018
Demystifying Deception Technology: A Survey.
CoRR, 2018

Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018


  Loading...