Zobrazeno 1 - 10
of 5 770
pro vyhledávání: '"Wehrle A"'
Autor:
Dahlmanns, Markus, Heidenreich, Felix, Lohmöller, Johannes, Pennekamp, Jan, Wehrle, Klaus, Henze, Martin
Publikováno v:
In Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea
Internet-wide studies provide extremely valuable insight into how operators manage their Internet of Things (IoT) deployments in reality and often reveal grievances, e.g., significant security issues. However, while IoT devices often use IPv6, past s
Externí odkaz:
http://arxiv.org/abs/2411.13799
Autor:
Bombaerts, Gunter, Hannes, Tom, Adam, Martin, Aloisi, Alessandra, Anderson, Joel, Berger, Lawrence, Bettera, Stefano Davide, Campo, Enrico, Candiotto, Laura, Panizza, Silvia Caprioglio, Citton, Yves, DâAngelo, Diego, Dennis, Matthew, Depraz, Nathalie, Doran, Peter, Drechsler, Wolfgang, Duane, Bill, Edelglass, William, Eisenberger, Iris, McGuire, Beverley Foulks, Fredriksson, Antony, Gill, Karamjit S., Hershock, Peter D., Hongladarom, Soraj, Jacobs, Beth, Karsai, Gábor, Lennerfors, Thomas, Lim, Jeanne, Lin, Chien-Te, Losoncz, Mark, Loy, David, Marin, Lavinia, Marosán, Bence Péter, Mascarello, Chiara, McMahan, David, Park, Jin Y., Petek, Nina, Puzio, Anna, Schaubroek, Katrien, Schlieter, Jens, Schroeder, Brian, Shakya, Shobhit, Shi, Juewei, Solomonova, Elizaveta, Tormen, Francesco, Uttam, Jitendra, Van Vugt, Marieke, Vörös, Sebastjan, Wehrle, Maren, Wellner, Galit, Wirth, Jason M., Witkowski, Olaf, Wongkitrungrueng, Apiradee, Wright, Dale S., Zheng, Yutong
As the signatories of this manifesto, we denounce the attention economy as inhumane and a threat to our sociopolitical and ecological well-being. We endorse policymakers' efforts to address the negative consequences of the attention economy's technol
Externí odkaz:
http://arxiv.org/abs/2410.17421
Blazars are characterized by largely aperiodic variability on timescales ranging from minutes to decades across the electromagnetic spectrum. The TESS (Transiting Exoplanet Survey Satellite) mission provides continuous sampling of blazar variability
Externí odkaz:
http://arxiv.org/abs/2403.14744
With the escalating threats posed by cyberattacks on Industrial Control Systems (ICSs), the development of customized Industrial Intrusion Detection Systems (IIDSs) received significant attention in research. While existing literature proposes effect
Externí odkaz:
http://arxiv.org/abs/2403.01809
Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of multi
Externí odkaz:
http://arxiv.org/abs/2312.09660
Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While recent work
Externí odkaz:
http://arxiv.org/abs/2312.09650
Autor:
Lamberts, Olav, Wolsing, Konrad, Wagner, Eric, Pennekamp, Jan, Bauer, Jan, Wehrle, Klaus, Henze, Martin
Publikováno v:
Journal of Systems Research (JSys) Volume 3(1) 2023
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its critica
Externí odkaz:
http://arxiv.org/abs/2311.02929
Autor:
Bader, Lennart, Pennekamp, Jan, Thevaraj, Emildeon, Spiß, Maria, Kanhere, Salil S., Wehrle, Klaus
Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are no
Externí odkaz:
http://arxiv.org/abs/2311.01060
Autor:
Ciccotelli, Alessia, Appleby, Robert B., Cerutti, Francesco, Buffet, Kevin, Butin, Francois, Corti, Gloria, Esposito, Luigi Salvatore, Alia, Ruben Garcia, Karacson, Matthias, Lerner, Giuseppe, Prelipcean, Daniel, Wehrle, Maud
The Upgrade II of the LHCb experiment is proposed to be installed during the CERN Long Shutdown 4, aiming to operate LHCb at 1.5x$10^{34}cm^{-2}s^{-1}$ that is 75 times its design luminosity and reaching an integrated luminosity of about $400 fb^{-1}
Externí odkaz:
http://arxiv.org/abs/2310.08281
Encrypted QUIC traffic complicates network management as traditional transport layer semantics can no longer be used for RTT or packet loss measurements. Addressing this challenge, QUIC includes an optional, carefully designed mechanism: the spin bit
Externí odkaz:
http://arxiv.org/abs/2310.02599