1 code implementation • 18 May 2022 • Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze
Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations. As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%.
no code implementations • 1 Nov 2020 • Friedrich Wiegel, Edoardo De Din, Antonello Monti, Klaus Wehrle, Marc Hiller, Martina Zitterbart, Veit Hagenmeyer
By means of a DC grid example, simulation results show the performance and applicability of the proposed novel receiver for packet-based energy dispatching.
1 code implementation • 14 May 2020 • Daniel Schemmel, Julian Büning, César Rodríguez, David Laprell, Klaus Wehrle
It represents program executions using partial orders and finds the next execution using an underlying unfolding semantics.
Programming Languages Software Engineering
1 code implementation • 15 Apr 2020 • Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle
Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day.
Cryptography and Security Networking and Internet Architecture
1 code implementation • 14 Apr 2020 • Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties.
Cryptography and Security Networking and Internet Architecture
no code implementations • 4 Jul 2019 • Constantin Sander, Jan Rüth, Oliver Hohlfeld, Klaus Wehrle
We present DeePCCI, a passive, deep learning-based congestion control identification approach which does not need any domain knowledge other than training traffic of a congestion control variant.