Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Daniel Fraunholz"'
Publikováno v:
Foundations and Practice of Security ISBN: 9783031301216
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::176bca2e660ccdc678ae703035ae74b5
https://doi.org/10.1007/978-3-031-30122-3_12
https://doi.org/10.1007/978-3-031-30122-3_12
Publikováno v:
2022 IEEE 11th International Conference on Cloud Networking (CloudNet).
Publikováno v:
2022 IEEE Conference on Dependable and Secure Computing (DSC).
Autor:
Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti
Publikováno v:
Secure IT Systems ISBN: 9783031222948
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0ae4ae2e060b36b8047251feda3a25f4
https://doi.org/10.1007/978-3-031-22295-5_5
https://doi.org/10.1007/978-3-031-22295-5_5
Autor:
Daniel Fraunholz, Richard Schorghofer-Vrinssen, Hartmut Konig, Wolfgang Muhlbauer, Richard Zahoranksy
Publikováno v:
2021 IEEE Cloud Summit (Cloud Summit).
Autor:
Daniel Schneider, Daniel Krohmer, Daniel Fraunholz, Simon Duque Anton, Hans D. Schotten, Daniel Reti
Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0ad606c10057d6edbbd164b7e4bfc422
Deception technology has proven to be a sound approach against threats to information systems. Aside from well-established honeypots, decoy elements, also known as honeytokens, are an excellent method to address various types of threats. Decoy elemen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::54477abca65652b58b253f8f39a80e31
Autor:
Christoph Fischer, Dennis Krummacker, Maximilian Berndt, Daniel Fraunholz, Janis Zemitis, Hans D. Schotten
Publikováno v:
2020 International Young Engineers Forum (YEF-ECE).
Networks of industrial plants are engineered manually as of today. This covers the configuration of a network as well as the cabling and the design of the network topology itself. Hereby, usually multiple subnetworks using different transmission tech
Autor:
Krishna Sudhakar, Simon Duque Anton, Tobias Koch, Daniel Fraunholz, Daniel Krohmer, Marcell Marosvölgyi, Morten Larsen, Cédric Bassem, Hans D. Schotten, Franklin Selgert, Daniel Reti, Till Witt
Publikováno v:
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops ISBN: 9783030555825
SAFECOMP Workshops
SAFECOMP Workshops
DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction resul
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f5183c66637e0c81e839bf492b29587
https://doi.org/10.1007/978-3-030-55583-2_20
https://doi.org/10.1007/978-3-030-55583-2_20
Publikováno v:
International Journal on Cyber Situational Awareness. 2:31-48