Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research
Anonymous communication on the Internet is about hiding the relationship between communicating parties. At NDSS ‘16, we presented …
Jan Pennekamp
,
Martin Henze
,
Andreas Zinnen
,
Fabian Lanze
,
Klaus Wehrle
,
Andriy Panchenko
PDF
Cite
DOI
Code
acsac.org
Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control
René Glebke
,
Jan Scheiper
,
Stefan Lenz
,
Mirko Stoffers
,
Klaus Wehrle
PDF
Cite
DOI
Poster: Ensemble Learning for Industrial Intrusion Detection
Industrial intrusion detection promises to protect networked industrial control systems by monitoring them and raising an alarm in case …
Dominik Kus
,
Konrad Wolsing
,
Jan Pennekamp
,
Eric Wagner
,
Martin Henze
,
Klaus Wehrle
PDF
Cite
DOI
Evolving the End-to-End Transport Layer in Times of Emerging Computing In The Network (COIN)
Ike Kunze
,
Dirk Trossen
,
Klaus Wehrle
PDF
Cite
DOI
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring
Martin Serror
,
Lennart Bader
,
Martin Henze
,
Arne Schwarze
,
Kai Nürnberger
PDF
Cite
DOI
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
Merlin Von Rechenberg
,
Nina Rößler
,
Mari Schmidt
,
Konrad Wolsing
,
Florian Motz
,
Michael Bergmann
,
Elmar Padilla
,
Jan Bauer
PDF
Cite
DOI
zenodo.org
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks …
Konrad Wolsing
,
Eric Wagner
,
Antoine Saillard
,
Martin Henze
PDF
Cite
DOI
Can Industrial Intrusion Detection Be SIMPLE?
Cyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion …
Konrad Wolsing
,
Lea Thiemt
,
Christian van Sloun
,
Eric Wagner
,
Klaus Wehrle
,
Martin Henze
PDF
Cite
DOI
On the Need for Strong Sovereignty in Data Ecosystems
Data ecosystems are the foundation of emerging data-driven business models as they (i) enable an automated exchange between their …
Johannes Lohmöller
,
Jan Pennekamp
,
Roman Matzutt
,
Klaus Wehrle
PDF
Cite
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming
The kidney exchange problem (KEP) seeks to determine a constellation of exchanges that maximizes the number of possible transplants …
Malte Breuer
,
Pascal Hein
,
Leonardo Pompe
,
Ben Temme
,
Ulrike Meyer
,
Susanne Wetzel
Cite
DOI
1
...
7
8
9
...
48
Cite
×