Follow
Daniel Fraunholz
Daniel Fraunholz
Unknown affiliation
Verified email at rhrk.uni-kl.de
Title
Cited by
Cited by
Year
Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set
SD Anton, S Kanoor, D Fraunholz, HD Schotten
Proceedings of the 13th international conference on availability …, 2018
1022018
Two decades of SCADA exploitation: A brief history
SD Anton, D Fraunholz, C Lipps, F Pohl, M Zimmermann, HD Schotten
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
1022017
Demystifying deception technology: A survey
D Fraunholz, SD Anton, C Lipps, D Reti, D Krohmer, F Pohl, M Tammen, ...
arXiv preprint arXiv:1804.06196, 2018
752018
An adaptive honeypot configuration, deployment and maintenance strategy
D Fraunholz, M Zimmermann, HD Schotten
2017 19th International Conference on Advanced Communication Technology …, 2017
722017
Time is of the essence: Machine learning-based intrusion detection in industrial time series data
SD Anton, L Ahrens, D Fraunholz, HD Schotten
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 1-6, 2018
492018
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
D Fraunholz, D Krohmer, SD Anton, HD Schotten
2017 international conference on cyber security and protection of digital …, 2017
472017
Defending web servers with feints, distraction and obfuscation
D Fraunholz, HD Schotten
2018 International Conference on Computing, Networking and Communications …, 2018
322018
Cloxy: A context-aware deception-as-a-service reverse proxy for web services
D Fraunholz, D Reti, S Duque Anton, HD Schotten
Proceedings of the 5th ACM workshop on moving target defense, 40-47, 2018
302018
Data mining in long-term honeypot data
D Fraunholz, M Zimmermann, A Hafner, HD Schotten
2017 IEEE International Conference on Data Mining Workshops (ICDMW), 649-656, 2017
302017
YAAS-On the Attribution of Honeypot Data.
D Fraunholz, D Krohmer, SD Anton, HD Schotten
Int. J. Cyber Situational Aware. 2 (1), 31-48, 2017
302017
Distributed and highly-scalable wan network attack sensing and sophisticated analysing framework based on honeypot technology
D Fraunholz, M Zimmermann, SD Anton, J Schneider, HD Schotten
2017 7th International Conference on Cloud Computing, Data Science …, 2017
262017
Highly scalable and flexible model for effective aggregation of context-based data in generic IIoT scenarios
SD Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten
arXiv preprint arXiv:1906.03064, 2019
242019
Introducing gamfis: A generic attacker model for information security
D Fraunholz, SD Anton, HD Schotten
2017 25th International Conference on Software, Telecommunications and …, 2017
242017
Implementing scada scenarios and introducing attacks to obtain training data for intrusion detection methods
SD Anton, M Gundall, D Fraunholz, HD Schotten
ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019
212019
Towards basic design principles for high-and medium-interaction honeypots
D Fraunholz, F Pohl, HD Schotten
Proceedings of 16th European Conference on Cyber Warfare and Security, 120, 2017
182017
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world
SDD Anton, D Fraunholz, D Krohmer, D Reti, D Schneider, HD Schotten
IEEE Internet of Things Journal 8 (24), 17525-17540, 2021
172021
On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework
D Fraunholz, D Krohmer, F Pohl, HD Schotten
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
162018
Towards deployment strategies for deception systems
D Fraunholz, M Zimmermann, HD Schotten
Advances in Science, Technology and Engineering Systems Journal 2 (3), 1272-1279, 2017
152017
Using temporal and topological features for intrusion detection in operational networks
SDD Anton, D Fraunholz, HD Schotten
Proceedings of the 14th International Conference on Availability …, 2019
122019
Catch me if you can: Dynamic concealment of network entities
D Fraunholz, D Krohmer, S Duque Anton, HD Schotten
Proceedings of the 5th ACM Workshop on Moving Target Defense, 31-39, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20