Publikationen

Hier finden Sie eine stetig wachsende Wissenssammlung zu den Themen rund um IUNO. Unsere Publikationsseite enthält die Arbeitsergebnisse der IUNO-Partner, Strategiepapiere und weitere Veröffentlichungen auf Konferenzen und sonstigen Veranstaltungen.

  1. Defending Web Servers with Feints, Distraction and Obfuscation

    Fraunholz D. & Schotten H.D. (2018)
    International Conference on Computing, Networking and Communications.

  2. On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework

    Fraunholz D., Krohmer D., Pohl F. & Schotten H.D. (2018)
    In: Proceedings of the 9th IFIP International Conference on New Technologies, Mobility & Security. IFIP International Conference on New Technologies, Mobility & Security (NTMS-2018), 9th, February 26-28, Paris, France, IEEE, 2018.

  3. Strategic Defense and Attack in Deception Based Network Security

    Fraunholz D. & Schotten H.D. (2018)
    32. International Conference on Information Networking (ICOIN-18).

  4. Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of and IPSec Performance

    Fraunholz, D. & Schotten, H. D. (2017)
    European Conference on-Oriented and Cloud Computing (ESOCC-17).

  5. A Question of Context: Enhancing Intrusion Detection by Providing Context Information

    Anton, D.S., Fraunholz, D., Teuber S.  & Schotten, H. D. (2017)
    In: 13th Conference of Telecommunication, Media and Internet Techno-Economics (CTTE). Conference of Telecommunication, Media and Internet Techno-Economics (CTTE-17), 13th, located at Joint CTTE and CMI, November 23-24, Copenhagen, Denmark, IEEE, 2017.

  6. Two Decades of SCADA Exploitation: A Brief History

    Anton, D.S., Fraunholz, D., Lipps C., Pohl F., Zimmermann M. & Schotten, H. D. (2017)
    In: IEEE Conference for Applications, Information and Network Security.

  7. Deception in Information Security: Legal Considerations in the Context of German and European Law

    Fraunholz D., Lipps C., Zimmermann M., Anton S. D. , Martin Mueller J. K. & Schotten H.D. (2017)
    In: 10th International Symposium on Foundations & Practice of Security (FPS-2017)

  8. Introducing GAMfIS: A Generic Attacker Model for Information Security

    Anton, D.S., Fraunholz, D., Teuber S.  & Schotten, H. D. (2017)
    25th International Conference on Software, Telecommunications and Computer Networks.

  9. YAAS - On the Attribution of Honeypot Data

    International Journal on Cyber Situational Awareness (IJCSA)
    Fraunholz, D., Krohmer D., Anton, D.S. & Schotten, H. D. (2017)

  10. On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework

    Fraunholz D., Krohmer D., Pohl F. & Schotten H.D. (2018)
    In: Proceedings of the 9th IFIP International Conference on New Technologies, Mobility & Security. IFIP International Conference on New Technologies, Mobility & Security (NTMS-2018), 9th, February 26-28, Paris, France, IEEE, 2018.

  11. Towards Deployment Strategies for Deception Systems

    Fraunholz D., Zimmermann M. & Schotten H. D. (2017)
    Advances in Science, Technology and Engineering Systems Journal (ASTESJ)

  12. Combined Secure Process and Data Model for IT-Security in Industrie 4.0

    Wang, Y., Fakhry, R., Rohr, S., & Anderl, R. (2017).
    Combined secure process and data model for IT-Security in Industrie 4.0.
    In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 2).

  13. Das Projekt IUNO - Nationales Referenzprojekt zur IT-Sicherheit in Industrie 4.0

    Wolfenstetter, T., Tantik, E., Esslinger, E., Wang, Y. (2017, May). 
    Im Forschungsprojekt „IUNO - Nationales Referenzprojekt zur IT- Sicherheit in Industrie 4.0“ werden Bedrohungen und Risiken für die intelligente Fabrik identifiziert und Schutzmaßnahmen entwickelt sowie exemplarisch umgesetzt.
    15. Deutscher IT-Sicherheitskongress (BSI), 2017. IEEE.

  14. An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

    Fraunholz, D., Zimmermann, M., & Schotten, H. D. (2017, February).
    An adaptive honeypot configuration, deployment and maintenance strategy.
    In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 53-57). IEEE.

  15. Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO

    Anton, S. D., Fraunholz, D., & Schotten, H. D. (2017).
    Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO. 
    arXiv preprint arXiv:1709.09455.

  16. Angriffe à la carte - systematische Bewertung von Angriffsvektoren auf industrielle (Funk-)Netzwerke

    Langfinger, M., Anton, S. D., Lipps, C.,  Weinand, A., & Schotten, H. D. (2017).
    Branchentreff der Mess- und Automatisierungstechnik mit USB-Stick.
     

  17. Deceptive Cyber Defense for IoT

    Fraunholz, D., Schotten, H., D., (2016, October)
    The International Conference on Mobile Computing and Ubiquitous Networking (ICMU-16),
     Kaiserslautern, Germany, Vol. 19, IEEE.

  18. Honeypots for Industrial IoT Applications

    Fraunholz, D., Schneider, J., Anton, D., S., Lipps, C., Schotten, H., D., (2017, February).
    Kleinheubacher Tagung 2016
     

  19. Providing Physical Layer Security for Mission Critical Machine Type Communication

    Weinand, A., Ambekar, A., Karrenbauer, M., & Schotten, H. D. (2016, September).
    Providing Physical Layer Security for Mission Critical Machine Type Communication.
    In Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on (pp. 1-4). IEEE.

  20. Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

    Costin, A., Zarras, A., & Francillon, A. (2016, May).
    Automated dynamic firmware analysis at scale: a case study on embedded web interfaces.
    In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 437-448). ACM.

  21. Logboat – A Simulation Framework Enabling CAN Security Assessments

    Plaga, S., Tatschner, S., & Newe, T. (2016, September).
    Logboat—A simulation framework enabling CAN security assessments.
    In Applied Electronics (AE), 2016 International Conference on (pp. 215-218). IEEE.

  22. Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems

    Obermaier, J., & Hutle, M. (2016, May).
    Analyzing the security and privacy of cloud-based video surveillance systems.
    In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 22-28). ACM.

  23. Gefahren in der Industrie 4.0 und IT-Sicherheitslösungen des Nationalen Referenzprojekts IUNO - eine praktische Vorführung

    Frisch, S.,(2016, Seeheim-Jugenheim, Deutschland).
    Konferenzbeitrag, Siemens PLM Connection Deutschland.
     

  24. Secure Information Model for Data Marketplaces enabling Global Distributed Manufacturing

    Shaabany, G., Grimm, M., & Anderl, R. (2016).
    Secure Information Model for Data Marketplaces Enabling Global Distributed Manufacturing. 
    Procedia CIRP50, 360-365.

  25. Piracy Protection Navigator I4.0 for Industrial Systems

    Shaabany, G., Frisch, S., Pitz, K., Anderl, R., (2016).
    Global Conference on Applied Computing in Science and Engineering. 
    Procedia CIRP50, 360-365.

  26. Comprehensive framework of the Industry 4.0 remote maintenance platform

    Tantik, E., Anderl, R., (2016, Madrid, Spanien)
    International Conference on Healthcare, Applied Science and Engineering,

  27. Industrie 4.0 – Digital Transformation in Product Engineering and Production

    Anderl, R. (2016)
    Industrie 4.0–Digital Transformation in Product Engineering and Production.

  28. Security in industry 4.0: challenges and solutions for the fourth industrial revolution

    Waidner, M., & Kasper, M. (2016, March).
    Security in industrie 4.0: challenges and solutions for the fourth industrial revolution.
    In Proceedings of the 2016 Conference on Design, Automation & Test in Europe (pp. 1303-1308). EDA Consortium.

  29. Absicherungskonzepte für Industrie 4.0

    Wiedermann, N. (2015).
    Absicherungskonzepte für Industrie 4.0. 
    Datenschutz und Datensicherheit-DuD39(10), 652-656.