Lawful Interception (LI) is a legal obligation of Communication Service
...
In the field of network security, with the ongoing arms race between
att...
Operational Technology (OT)-networks and -devices, i.e. all components u...
Since honeypots first appeared as an advanced network security concept t...
Deception technology has proven to be a sound approach against threats t...
Honeypots are a well-studied defensive measure in network security. This...
The internet landscape is growing and at the same time becoming more
het...
DevOps describes a method to reorganize the way different disciplines in...
Until two decades ago, industrial networks were deemed secure due to phy...
The development in the area of wireless communication, mobile and embedd...
In the context of the Industrial Internet of Things, communication
techn...
Advances in industrial control lead to increasing incorporation of
inter...
Interconnectivity of production machines is a key feature of the Industr...
Due to the fourth industrial revolution, and the resulting increase in
i...
There are hardly any data sets publicly available that can be used to
ev...
Since the early 1960, industrial process control has been applied by ele...
The Industrial Internet of Things drastically increases connectivity of
...
Deception boosts security for systems and components by denial, deceit,
...