Publications

Year:  
All :: 2010, ... , 2018, 2019, 2020, ... , 2022
Author:  
All :: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, Ö, P, Q, R, S, T, U, V, W, X, Y, Z 
All :: Wagner, Wählisch, Wang, Wehrle, ... , Wrzodek 

2022

17.
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)
October 2022
accepted
16.
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
47th IEEE Conference on Local Computer Networks (LCN)
Edmonton, Canada, September 26-29, 2022
Publisher: IEEE,
September 2022
accepted
15.
Can Industrial Intrusion Detection Be SIMPLE?
27th European Symposium on Research in Computer Security (ESORICS)
Copenhagen, Denmark, September 26-30, 2022
September 2022
accepted
14.
Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze and Martin Serror
Cyber Security Experimentation and Test Workshop (CSET 2022)
Virtual, August 8, 2022
Publisher: ACM, New York, NY, USA
August 2022
ISBN: 978-1-4503-9684-4/22/08
accepted
13.
Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan, page 73-84.
Publisher: ACM,
May 2022
ISBN: 978-1-4503-9176-4/22/05
12.
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 201-206.
Publisher: ACM,
May 2022
ISBN: 978-1-4503-9216-7/22/05
11.
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22), page 207-221.
Publisher: ACM,
May 2022
ISBN: 978-1-4503-9216-7/22/05
10.
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Publisher: IEEE,
May 2022
ISBN: 978-1-6654-9538-7/22

2021

9.
Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Publisher: ACSA,
December 2021
ISBN: 978-1-891562-81-5

2020

8.
Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle and Martin Henze
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event, page 31-44.
Publisher: HomomorphicEncryption.org,
December 2020
ISBN: 978-3-00-067798-4
7.
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Publisher: ACM, New York, NY, USA
November 2020
6.
Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France
Publisher: IFIP,
June 2020
ISBN: 978-3-903176-28-7

2019

5.
IEEE International Conference on Blockchain and Cryptocurrency 2019 (ICBC 2019)
Publisher: IEEE,
May 2019

2018

4.
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Publisher: IEEE,
October 2018
ISBN: 978-1-5386-4413-3

2011

3.
Kai Jakobs, Thomas Wagner and Kai Reimers
Int. J. on IT Standards & Standardisation Research, 9(1)
January 2011
ISSN: 1539-3062

2010

2.
Kai Jakobs, Thomas Wagner and Kai Reimers
In Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson, editor,Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany, page 62-66.
Publisher: IADIS, International Association for Development of the Information Society,
2010
ISBN: 978-972-8939-24-3
1.
Kai Jakobs, Thomas Wagner and Kai Reimers
In L. Legardeur; K. North, editor,Towards new challenges for innovative management practices Volume 3, page 108-116.
Publisher: ERIMA, Bidart, FR
2010
Export as:
BibTeX, XML
- Impressum | Datenschutz -