Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Luring SMEs into ICT Standardisation
Cesare Antonio Fabio Riillo
,
Kai Jakobs
Cite
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the …
Eva-Maria Schomakers
,
Chantal Lidynia
,
Dirk Müllmann
,
Roman Matzutt
,
Klaus Wehrle
,
Indra Spiecker Gen. Döhmann
,
Martina Ziefle
PDF
Cite
DOI
dl.gi.de
arXiv
Too Much or Too Little Standardization? - The performance of firms engaged in standardization
Cesare Antonio Fabio Riillo
,
Kai Jakobs
Cite
Privacy-Preserving Production Process Parameter Exchange
Nowadays, collaborations between industrial companies always go hand in hand with trust issues, i.e., exchanging valuable production …
Jan Pennekamp
,
Erik Buchholz
,
Yannik Lockner
,
Markus Dahlmanns
,
Tiandong Xi
,
Marcel Fey
,
Christian Brecher
,
Christian Hopmann
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
Artifacts Functional
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive …
Jan Pennekamp
,
Patrick Sapel
,
Ina Berenice Fink
,
Simon Wagner
,
Sebastian Reuter
,
Christian Hopmann
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
IACR
Expressing FactDAG Provenance with PROV-O
To foster data sharing and reuse across organizational boundaries, provenance tracking is of vital importance for the establishment of …
Lars Gleim
,
Liam Tirpitz
,
Jan Pennekamp
,
Stefan Decker
PDF
Cite
Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
Mitigating cybersecurity threats in power distribution grids requires a testbed for cybersecurity, e.g., to evaluate the (physical) …
Martin Henze
,
Lennart Bader
,
Julian Filter
,
Olav Lamberts
,
Simon Ofner
,
Dennis Van Der Velde
PDF
Cite
DOI
Poster: Facilitating Protocol-independent Industrial Intrusion Detection Systems
Cyber-physical systems are increasingly threatened by sophisticated attackers, also attacking the physical aspect of systems. …
Konrad Wolsing
,
Eric Wagner
,
Martin Henze
PDF
Cite
DOI
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
Jens Hiller
,
Johanna Amann
,
Oliver Hohlfeld
PDF
Cite
DOI
GitHub
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns …
Wladimir De La Cadena
,
Asya Mitseva
,
Jens Hiller
,
Jan Pennekamp
,
Sebastian Reuter
,
Julian Filter
,
Klaus Wehrle
,
Thomas Engel
,
Andriy Panchenko
PDF
Cite
DOI
GitHub
1
...
9
10
11
...
46
Cite
×