Author of the publication

Honey Infiltrator: Injecting Honeytoken Using Netfilter.

, , and . EuroS&P Workshops, page 465-469. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Deception and Moving Target Defense with Network Attack Simulation., , , , and . MTD@CCS, page 45-53. ACM, (2022)Deep Down the Rabbit Hole: On References in Networks of Decoy Elements., , , , and . CoRR, (2021)Secure (S)Hell: Introducing an SSH Deception Proxy Framework., , , and . CyberSA, page 1-6. IEEE, (2021)Evaluating Deception and Moving Target Defense with Network Attack Simulation., , , , and . CoRR, (2023)Escape the Fake: Introducing Simulated Container-Escapes for Honeypots., and . CoRR, (2021)The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World., , , , , and . CoRR, (2021)Creating It from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-Enabled Software Development Environment., , , , , , , , , and 2 other author(s). SAFECOMP Workshops, volume 12235 of Lecture Notes in Computer Science, page 266-281. Springer, (2020)SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation., , and . ICISSP, page 485-492. SciTePress, (2023)Research Questions in the Acceptance of Cybersecurity by SMEs in the EU., , , , , and . SAFECOMP Workshops, volume 13415 of Lecture Notes in Computer Science, page 247-255. Springer, (2022)Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities., , , and . CloudNet, page 101-108. IEEE, (2022)