Skip to main content

Showing 1–2 of 2 results for author: Zemitis, J

Searching in archive cs. Search in all archives.
.
  1. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    Authors: Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider, Hans Dieter Schotten

    Abstract: Deception technology has proven to be a sound approach against threats to information systems. Aside from well-established honeypots, decoy elements, also known as honeytokens, are an excellent method to address various types of threats. Decoy elements are causing distraction and uncertainty to an attacker and help detecting malicious activity. Deception is meant to be complementing firewalls and… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)

  2. arXiv:1906.03064  [pdf, other

    cs.CY cs.IR

    Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios

    Authors: Simon Duque Anton, Daniel Fraunholz, Janis Zemitis, Frederic Pohl, Hans Dieter Schotten

    Abstract: Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There ar… ▽ More

    Submitted 28 May, 2019; originally announced June 2019.