Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
Merlin Von Rechenberg
,
Nina Rößler
,
Mari Schmidt
,
Konrad Wolsing
,
Florian Motz
,
Michael Bergmann
,
Elmar Padilla
,
Jan Bauer
PDF
Cite
DOI
zenodo.org
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks …
Konrad Wolsing
,
Eric Wagner
,
Antoine Saillard
,
Martin Henze
PDF
Cite
DOI
Can Industrial Intrusion Detection Be SIMPLE?
Cyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion …
Konrad Wolsing
,
Lea Thiemt
,
Christian van Sloun
,
Eric Wagner
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
On the Need for Strong Sovereignty in Data Ecosystems
Data ecosystems are the foundation of emerging data-driven business models as they (i) enable an automated exchange between their …
Johannes Lohmöller
,
Jan Pennekamp
,
Roman Matzutt
,
Klaus Wehrle
PDF
Cite
A Deterministic Memory Allocator for Dynamic Symbolic Execution
Daniel Schemmel
,
Julian Büning
,
Frank Busse
,
Martin Nowack
,
Cristian Cadar
PDF
Cite
DOI
Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance
Constantin Sander
,
Ike Kunze
,
Klaus Wehrle
PDF
Cite
GitHub
GitHub
tma.ifip.org
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system …
Dominik Kus
,
Eric Wagner
,
Jan Pennekamp
,
Konrad Wolsing
,
Ina Berenice Fink
,
Markus Dahlmanns
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
GitHub
arXiv
A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content
Blockchains gained tremendous attention for their capability to provide immutable and decentralized event ledgers that can facilitate …
Roman Matzutt
,
Vincent Ahlrichs
,
Jan Pennekamp
,
Roman Karwacik
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
BP-MAC: Fast Authentication for Short Messages
Eric Wagner
,
Martin Serror
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in …
Markus Dahlmanns
,
Johannes Lohmöller
,
Jan Pennekamp
,
Jörn Bodenhausen
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
GitHub
arXiv
1
...
6
7
8
...
46
Cite
×