Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Between Promise and Practice: Challenges and Misperceptions of Applying Privacy Enhancing Technologies in Business Contexts
Applying privacy-enhancing technologies (PETs), such as homomorphic encryption or differential privacy, promises to improve …
Johannes Lohmöller
,
Hajeong Jeon
,
Jael Hentschel
,
Klaus Wehrle
,
Jan Pennekamp
Cite
P4Ward: Fine-Grained Behavioral Policy Enforcement for Industrial Networks
Ina Berenice Fink
,
William Köhler
,
Martin Serror
,
Klaus Wehrle
PDF
Cite
GitHub
MAC Aggregation over Lossy Channels in DTLS 1.3
Aggregating Message Authentication Codes (MACs) promises to save valuable bandwidth in resource-constrained environments. The idea is …
Eric Wagner
,
David Heye
,
Jan Bauer
,
Klaus Wehrle
,
Martin Serror
PDF
Cite
Forschungsorientierte Lehre in der Informatik: Das Konzept der Research Focus Class
Die Förderung wissenschaftlicher Kompetenzen ist ein zentrales Ziel kompetenzorientierter Hochschullehre. Forschendes Lernen gilt als …
Birte Heinemann
,
Matthias Ehlenz
,
Jan Pennekamp
,
Johannes Lohmöller
,
Ulrik Schroeder
PDF
Cite
DOI
GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection
Protecting industrial control systems against cyberattacks is crucial to counter escalating threats to critical infrastructure. To this …
Konrad Wolsing
,
Eric Wagner
,
Luisa Lux
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
Cascades of Nested Acknowledgments in Multi-Hop MASQUE
Kathrin Elmenhorst
,
Mirja Kühlewind
,
Ike Kunze
,
Constantin Sander
,
Klaus Wehrle
PDF
Cite
DOI
Using Explicit (Host-to-Network) Flow Measurements for Network Tomography
Ike Kunze
,
Constantin Sander
,
Alexander Ruhrmann
,
Niklas Rieken
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
Practical Insights from Implementing Event-Based NILM Systems
Improving residential energy efficiency is essential for sustainability, and Non-Intrusive Load Monitoring (NILM) is a promising …
Justus Breyer
,
Jonas Koerhuis
,
Muhammad Hamad Alizai
,
Klaus Wehrle
PDF
Cite
DOI
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks
Physically distributed components and legacy protocols make the protection of power grids against increasing cyberattack threats …
Eric Wagner
,
Lennart Bader
,
Konrad Wolsing
,
Martin Serror
PDF
Cite
DOI
CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping
Eric Wagner
,
Frederik Basels
,
Jan Bauer
,
Till Zimmermann
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
1
2
3
4
5
...
47
Cite
×