Highly scalable and flexible model for effective aggregation of context-based data in generic iiot scenarios SD Anton, D Fraunholz, J Zemitis, F Pohl, HD Schotten arXiv preprint arXiv:1906.03064, 2019 | 25 | 2019 |
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments D Fraunholz, D Schneider, J Zemitis, HD Schotten Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018 | 7 | 2018 |
Industrial Network Topology Generation with Genetic Algorithms C Fischer, M Berndt, D Krummacker, J Zemitis, D Fraunholz, HD Schotten 2020 International Young Engineers Forum (YEF-ECE), 25-32, 2020 | 3 | 2020 |
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements D Reti, D Fraunholz, J Zemitis, D Schneider, HD Schotten 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 3 | 2020 |
D7. 3 Report and Functional Testing of the SELFNET Framework AH Celdrán, MG Pérez, GM Perez, M Zago, FJG Clemente, M Ulbricht, ... SELFNET Consortium, 2018 | 2 | 2018 |
D7. 4 Report and Functional Demonstration of the Use Cases R Pedro, P Neves, N Henriques, G Gaspar, M Fernandes, MG Pérez, ... SELFNET Consortium, 2018 | | 2018 |
YEF-ECE 2020 Author Index A Mora, A Abreu, A Martins, B Capitão, C Garcia, C Romero-Saiz, ... | | |
The second Central European Cybersecurity Conference–CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central … S Wendzel, D Eller, W Mazurczyk, T Bajtoš, P Sokol, T Mézešová, ... | | |