Author of the publication

Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments.

, , , and . CECC, page 3:1-3:6. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces., , , , , , , , and . Discov. Internet Things, 3 (1): 16 (December 2023)Security in Process: Detecting Attacks in Industrial Process Data., , , and . CECC, page 5:1-5:6. ACM, (2019)Security in Process: Visually Supported Triage Analysis in Industrial Process Data., , , , and . CoRR, (2019)Deep Down the Rabbit Hole: On References in Networks of Decoy Elements., , , , and . CoRR, (2021)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)Deterministic Planning for Flexible Intralogistics., , , and . ICAC, page 1-6. IEEE, (2021)ARENA: A Data-Driven Radio Access Networks Analysis of Football Events., , , , , and . IEEE Trans. Netw. Serv. Manag., 17 (4): 2634-2647 (2020)Neural Network-Based Channel Prediction and Its Performance in Multi-Antenna Systems., and . VTC Fall, page 1-6. IEEE, (2018)Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction., , , and . CCNC, page 1-6. IEEE, (2023)