Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring
Martin Serror
,
Lennart Bader
,
Martin Henze
,
Arne Schwarze
,
Kai Nürnberger
PDF
Cite
DOI
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
Merlin Von Rechenberg
,
Nina Rößler
,
Mari Schmidt
,
Konrad Wolsing
,
Florian Motz
,
Michael Bergmann
,
Elmar Padilla
,
Jan Bauer
PDF
Cite
DOI
zenodo.org
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks …
Konrad Wolsing
,
Eric Wagner
,
Antoine Saillard
,
Martin Henze
PDF
Cite
DOI
Can Industrial Intrusion Detection Be SIMPLE?
Cyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion …
Konrad Wolsing
,
Lea Thiemt
,
Christian van Sloun
,
Eric Wagner
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
On the Need for Strong Sovereignty in Data Ecosystems
Data ecosystems are the foundation of emerging data-driven business models as they (i) enable an automated exchange between their …
Johannes Lohmöller
,
Jan Pennekamp
,
Roman Matzutt
,
Klaus Wehrle
PDF
Cite
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming
The kidney exchange problem (KEP) seeks to determine a constellation of exchanges that maximizes the number of possible transplants …
Malte Breuer
,
Pascal Hein
,
Leonardo Pompe
,
Ben Temme
,
Ulrike Meyer
,
Susanne Wetzel
Cite
DOI
A Deterministic Memory Allocator for Dynamic Symbolic Execution
Daniel Schemmel
,
Julian Büning
,
Frank Busse
,
Martin Nowack
,
Cristian Cadar
PDF
Cite
DOI
Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance
Constantin Sander
,
Ike Kunze
,
Klaus Wehrle
PDF
Cite
GitHub
GitHub
tma.ifip.org
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system …
Dominik Kus
,
Eric Wagner
,
Jan Pennekamp
,
Konrad Wolsing
,
Ina Berenice Fink
,
Markus Dahlmanns
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
GitHub
arXiv
A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content
Blockchains gained tremendous attention for their capability to provide immutable and decentralized event ledgers that can facilitate …
Roman Matzutt
,
Vincent Ahlrichs
,
Jan Pennekamp
,
Roman Karwacik
,
Klaus Wehrle
PDF
Cite
DOI
GitHub
1
...
7
8
9
...
48
Cite
×