Follow
Daniel Fraunholz
Daniel Fraunholz
Unknown affiliation
Verified email at rhrk.uni-kl.de
Title
Cited by
Cited by
Year
Two decades of SCADA exploitation: A brief history
SD Anton, D Fraunholz, C Lipps, F Pohl, M Zimmermann, HD Schotten
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
942017
Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set
SD Anton, S Kanoor, D Fraunholz, HD Schotten
Proceedings of the 13th international conference on availability …, 2018
902018
Demystifying deception technology: A survey
D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ...
arXiv preprint arXiv:1804.06196, 2018
702018
An adaptive honeypot configuration, deployment and maintenance strategy
D Fraunholz, M Zimmermann, HD Schotten
2017 19th International Conference on Advanced Communication Technology …, 2017
632017
Time is of the essence: Machine learning-based intrusion detection in industrial time series data
SD Anton, L Ahrens, D Fraunholz, HD Schotten
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 1-6, 2018
462018
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
D Fraunholz, D Krohmer, SD Anton, HD Schotten
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
422017
YAAS-On the Attribution of Honeypot Data.
D Fraunholz, D Krohmer, SD Anton, HD Schotten
Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017
292017
Defending web servers with feints, distraction and obfuscation
D Fraunholz, HD Schotten
2018 International Conference on Computing, Networking and Communications …, 2018
282018
Data mining in long-term honeypot data
D Fraunholz, M Zimmermann, A Hafner, HD Schotten
2017 IEEE International Conference on Data Mining Workshops (ICDMW), 649-656, 2017
272017
Distributed and highly-scalable wan network attack sensing and sophisticated analysing framework based on honeypot technology
D Fraunholz, M Zimmermann, SD Anton, J Schneider, HD Schotten
2017 7th International Conference on Cloud Computing, Data Science …, 2017
252017
Highly scalable and flexible model for effective aggregation of context-based data in generic IIoT scenarios
SD Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten
arXiv preprint arXiv:1906.03064, 2019
242019
Introducing gamfis: A generic attacker model for information security
D Fraunholz, SD Anton, HD Schotten
2017 25th International Conference on Software, Telecommunications and …, 2017
232017
Cloxy: A context-aware deception-as-a-service reverse proxy for web services
D Fraunholz, D Reti, S Duque Anton, HD Schotten
Proceedings of the 5th ACM workshop on moving target defense, 40-47, 2018
202018
Implementing scada scenarios and introducing attacks to obtain training data for intrusion detection methods
SD Anton, M Gundall, D Fraunholz, HD Schotten
ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019
182019
Towards basic design principles for high-and medium-interaction honeypots
D Fraunholz, F Pohl, HD Schotten
Proceedings of 16th European Conference on Cyber Warfare and Security, 120, 2017
182017
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework
D Fraunholz, D Krohmer, F Pohl, HD Schotten
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
142018
Towards deployment strategies for deception systems
D Fraunholz, M Zimmermann, HD Schotten
Advances in Science, Technology and Engineering Systems Journal 2 (3), 1272-1279, 2017
142017
Using temporal and topological features for intrusion detection in operational networks
SDD Anton, D Fraunholz, HD Schotten
Proceedings of the 14th International Conference on Availability …, 2019
122019
A question of context: Enhancing intrusion detection by providing context information
SD Anton, D Fraunholz, HD Schotten, S Teuber
2017 Internet of Things Business Models, Users, and Networks, 1-8, 2017
122017
Strategic defense and attack in deception based network security
D Fraunholz, HD Schotten
2018 International Conference on Information Networking (ICOIN), 156-161, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20