Search Results for author: Klaus Wehrle

Found 6 papers, 4 papers with code

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

1 code implementation18 May 2022 Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze

Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations. As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%.

BIG-bench Machine Learning Intrusion Detection

A novel receiver design for energy packet-based dispatching

no code implementations1 Nov 2020 Friedrich Wiegel, Edoardo De Din, Antonello Monti, Klaus Wehrle, Marc Hiller, Martina Zitterbart, Veit Hagenmeyer

By means of a DC grid example, simulation results show the performance and applicability of the proposed novel receiver for packet-based energy dispatching.

Symbolic Partial-Order Execution for Testing Multi-Threaded Programs

1 code implementation14 May 2020 Daniel Schemmel, Julian Büning, César Rodríguez, David Laprell, Klaus Wehrle

It represents program executions using partial orders and finds the next execution using an underlying unfolding semantics.

Programming Languages Software Engineering

How to Securely Prune Bitcoin's Blockchain

1 code implementation15 Apr 2020 Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day.

Cryptography and Security Networking and Internet Architecture

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services

1 code implementation14 Apr 2020 Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle

Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties.

Cryptography and Security Networking and Internet Architecture

DeePCCI: Deep Learning-based Passive Congestion Control Identification

no code implementations4 Jul 2019 Constantin Sander, Jan Rüth, Oliver Hohlfeld, Klaus Wehrle

We present DeePCCI, a passive, deep learning-based congestion control identification approach which does not need any domain knowledge other than training traffic of a congestion control variant.

Cannot find the paper you are looking for? You can Submit a new open access paper.