Skip to main content Skip to main navigation

Publications

Page 1 of 1.

  1. Merijn van Tooren; Daniel Reti; Daniel Schneider; Cédric Bassem; Raúl Santos de la Cámara; Hans Dieter Schotten

    Research Questions in the Acceptance of Cybersecurity by SMEs in the EU

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. …

  2. Simon D. Duque Anton; Daniel Schneider; Hans D. Schotten

    On Explainability in AI-Solutions: A Cross-Domain Survey

    In: Mario Trapp; Erwin Schoitsch; Jérémie Guiochet; Friedemann Bitsch (Hrsg.). Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops. …

  3. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    In: Proceedings of the 9th ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security (CCS), Los Angeles, MTD'22, …

  4. Simon Duque Antón; Daniel Fraunholz; Daniel Krohmer; Daniel Reti; Daniel Schneider; Hans Dieter Schotten

    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    In: IEEE Internet of Things Journal (IoT), Vol. Early Access, Pages 1-1, IEEE, 2021.

  5. Simon Duque Antón; Daniel Fraunholz; Daniel Schneider

    Investigating the Ecosystem of Offensive Information Security Tools

    In: Hans Dieter Schotten; Bin Han (Hrsg.). Proceedings of the 1st Workshop on Next Generation Networks and Applications. Workshop on Next Generation …

  6. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). International Conference on Cyber Security …

  7. Daniel Schneider; Daniel Fraunholz; Daniel Krohmer

    A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

    In: 2020 1st Workshop on Next Generation Networks and Applications (NGNA). Workshop on Next Generation Networks and Applications (NGNA-2020), …

  8. Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments

    In: Proceedings of the 2nd Central European Cybersecurity Conference. Central European Cybersecurity Conference (CECC-2018), November 15-16, …