Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Course Overview
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Emulating and Evaluating Transport Layer Protocols for Resilient Communication in Smart Grids
Ina Berenice Fink
,
Lennart Ferlemann
,
Markus Dahlmanns
,
Christian Thimm
,
Klaus Wehrle
PDF
Cite
GitHub
VGPrio: Visually Guided HTTP/3 Prioritization
HTTP prioritization allows to signal the priority of web resources to aid and speed up the webpage loading process. However, setting …
Constantin Sander
,
Ike Kunze
,
Dario Veltri
,
Klaus Wehrle
PDF
Cite
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps
Technology parameter maps summarize experiences with specific parameters in production processes, e.g., milling, and significantly help …
Jan Pennekamp
,
Joseph Leisten
,
Paul Weiler
,
Markus Dahlmanns
,
Marcel Fey
,
Chrstian Brecher
,
Sandra Geisler
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
Privacy-Aware Supply Chain Ratings: Interdisciplinary Research On Collaborative Supply Chain Management
The establishment, expansion, and operation of reliable value-creation networks present an increasing challenge for manufacturing …
Stefanie Berninger
,
Soo-Yon Kim
,
Joana Piel
,
Martin Perau
,
Sandra Geisler
,
Frank Piller
,
Klaus Wehrle
,
Jan Pennekamp
PDF
Cite
DOI
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach
Ransomware attacks have become one of the most widely feared cyber attacks for businesses and home users. Since attacks are evolving …
Christian van Sloun
,
Vincent Woeste
,
Konrad Wolsing
,
Jan Pennekamp
,
Klaus Wehrle
PDF
Cite
DOI
Zenodo
Artifacts Reproduced
Complementing Organizational Security in Data Ecosystems with Technical Guarantees
Federated data ecosystems continue to emerge to connect previously isolated data silos across organizational boundaries over the …
Johannes Lohmöller
,
Roman Matzutt
,
Joscha Loos
,
Eduard Vlad
,
Jan Pennekamp
,
Klaus Wehrle
PDF
Cite
DOI
scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data
Advances in single-cell RNA sequencing (scRNA-seq) have dramatically enhanced our understanding of cellular functions and disease …
Johannes Lohmöller
,
Jannis Scheiber
,
Rafael Kramann
,
Klaus Wehrle
,
Sikander Hayat
,
Jan Pennekamp
PDF
Cite
DOI
GitHub
A Critical Review of Household Water Datasets
The increasing prevalence of water scarcity has spurred a surge in research efforts globally. To test and validate new concepts and …
Justus Breyer
,
Maximilian Petri
,
Muhammad Hamad Alizai
,
Klaus Wehrle
PDF
Cite
DOI
Investigating Domain Bias in NILM
Enhancing household energy efficiency is crucial, and Non-intrusive Load Monitoring (NILM) offers a valuable solution by giving …
Justus Breyer
,
Sparsh Jauhari
,
René Glebke
,
Muhammad Hamad Alizai
,
Markus Stroot
,
Klaus Wehrle
PDF
Cite
DOI
LUA-IoT: Let's Usably Authenticate the IoT
Following the advent of the Internet of Things (IoT), users and their devices transmit sensitive data over the Internet. For the Web, …
Markus Dahlmanns
,
Jan Pennekamp
,
Robin Decker
,
Klaus Wehrle
Cite
GitHub
1
2
3
4
5
...
46
Cite
×