Skip to main content Skip to main navigation

Publications

Page 1 of 1.

  1. Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models

    In: AACD '24: Proceedings of the 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. ACM Workshop on Adaptive and Autonomous Cyber Defense (AACD-24), located at ACM Conference on Computer and Communications Security (CCS '24), October 14, Salt Lake City, USA, ISBN 979-8-4007-1231-9, Association for Computing Machinery, New York, NY, USA, 12/2024.

  2. False Flavor Honeypot: Deceiving Vulnerability Scanning Tools

    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE European Symposium on Security and Privacy Workshops (EuroSPW-2024), 3rd Workshop on Active Defense and Deception (AD&D), July 8-12, Vienna, Austria, IEEE, 7/2024.

  3. Merijn van Tooren; Daniel Reti; Daniel Schneider; Cédric Bassem; Raúl Santos de la Cámara; Hans Dieter Schotten

    Research Questions in the Acceptance of Cybersecurity by SMEs in the EU

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2022), located at SAFECOMP, September 6-9, Garching b. München, Germany, Pages 247-255, ISBN 978-3-031-14862-0, Springer International Publishing, 2022.

  4. Simon D. Duque Anton; Daniel Schneider; Hans D. Schotten

    On Explainability in AI-Solutions: A Cross-Domain Survey

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. International Workshop on Underpinnings for Safe Distributed AI (USDAI-2022), located at SAFECOMP, September 6-9, Garching b. München, Germany, Pages 235-246, ISBN 978-3-031-14862-0, Springer International Publishing, 2022.

  5. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    In: Proceedings of the 9th ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security (CCS), Los Angeles, MTD'22, ISBN 9781450398787, Association for Computing Machinery, 2022.

  6. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Daniel Schneider; Hans Dieter Schotten

    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    In: IEEE Internet of Things Journal (IoT), Vol. Early Access, Pages 1-1, IEEE, 2021.

  7. Simon Duque Antón; Daniel Fraunholz; Daniel Schneider

    Investigating the Ecosystem of Offensive Information Security Tools

    In: Hans Dieter Schotten; Bin Han (Hrsg.). Proceedings of the 1st Workshop on Next Generation Networks and Applications. Workshop on Next Generation Networks and Applications (NGNA-2020), December 14-18, Kaiserslautern, Germany, self-published, 2020.

  8. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). International Conference on Cyber Security and Protection of Digital Services (Cyber Security-2020), June 15-17, Online, Ireland, ISBN 978-1-7281-6429-8, Institute of Electrical and Electronics Engineers (IEEE), 2020.

  9. Daniel Schneider; Daniel Fraunholz; Daniel Krohmer

    A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

    In: 2020 1st Workshop on Next Generation Networks and Applications (NGNA). Workshop on Next Generation Networks and Applications (NGNA-2020), Kaiserslautern, Germany, Technische Universität Kaiserslautern, Kaiserslautern, 2020.

  10. Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments

    In: Proceedings of the 2nd Central European Cybersecurity Conference. Central European Cybersecurity Conference (CECC-2018), November 15-16, Ljubljana, Slovenia, ACM, 11/2018.