Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2020Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I.
Journal Article
2020ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection
Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2020SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
Conference Paper
2019Smart Recommendation for Anomaly Detection in IoT
Ramesh, Supradha
: Ben Hmida, Helmi (1. Gutachten); Kuijper, Arjan (2. Gutachten)
Master Thesis
2018User-centered anomaly detection in network data
Kannanayikkal, Clindo Devassy
: Ulmer, Alex (Advisor); Kuijper, Arjan (Supervisor)
Master Thesis
2017Network and topology models to support IDS event processing
Kippe, Jörg; Pfrang, Steffen
Conference Paper
2017On the detection of replay attacks in industrial automation networks operated with profinet IO
Pfrang, Steffen; Meier, David
Conference Paper
2016Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures
Krauß, D.; Thomalla, Christoph
Conference Paper
2016Uncovering periodic network signals of cyber attacks
Huynh, Ngoc Anh; Ng, Wee Keong; Ulmer, Alex; Kohlhammer, Jörn
Conference Paper
2012Central misbehavior evaluation for VANETs based on mobility data plausibility
Bißmeyer, Norbert; Njeukam, Joël; Petit, Jonathan; Bayarou, Kpatcha
Conference Paper
2010Künstliche Immunsysteme in der IT
Euting, T.
Journal Article
2009Angriffserkennung und -prävention in mobilen Ad-hoc-Netzen basierend auf einem transparenten Routing-Proxy
Gey, Fatih
: Ebinger, Peter (Betreuer)
Thesis
2009Efficient state estimation and byzantine behavior identification in tactical MANETs
Ebinger, Peter; Wolthusen, Stephen
Conference Paper
2009TEREC: Trust evaluation and reputation exchange for cooperative intrusion detection in MANETs
Ebinger, Peter; Bißmeyer, Norbert
Conference Paper
2008Distributed data collection and analysis for attack detection in mobile ad hoc networks
Bißmeyer, Norbert
: Ebinger, Peter (Betreuer)
Master Thesis
2008Entfernungsschätzungen basierend auf Funksignalstärkemessungen für die Angriffserkennung in MANETs
Appel, Stefan; Ebinger, Peter
Conference Paper
2008Evaluation and extension of a detection system for attacks on manet routing
Saez de Arregui, Javier
: Ebinger, Peter (Betreuer)
Thesis
2008Konzeption und Implementierung von Angreifermodellen und verbesserten Methoden für die Angriffserkennung in mobilen Ad-hoc-Netzen
Endler, Stefan
: Ebinger, Peter (Betreuer)
Master Thesis
2008MITE - MANET intrusion detection for tactical environments
Jahnke, Marko; Wenzel, Alexander; Klein, Gabriel; Ebinger, Peter; Aschenbruck, Nils; Gerhards-Padilla, Elmar; Karsch, Stefan
Report
2008Using localization information for attack detection in mobile Ad hoc networks
Ebinger, Peter; Sommer, Martin
Conference Paper
2007Auswertung von Positionsdaten, Funkcharakteristika und des Verbindungsgraphen für die Angriffserkennung in mobilen Ad-hoc-Netzen
Sommer, Martin
: Ebinger, Peter (Betreuer)
Thesis
2007Automated extraction of behavioural profiles from document usage
Wolthusen, Stephen
Journal Article
2007IT early warning systems - State-of-the-art and promising approaches to increase resilience of critical infrastructures
Brunner, M.
Report
2007Signaturbasierte Erkennung von Angriffen in mobilen Ad-hoc-Netzen
Combé, Tobias
: Ebinger, Peter (Betreuer)
Thesis
2006Fourth IEEE International Workshop on Information Assurance 2006. Proceedings
: Cole, J.L.; Wolthusen, S.
Conference Proceedings
2006Security in mobile ad hoc networks
Ibarzabal Atutxa, E.
: Ebinger, P. (Prüfer)
Thesis
2005Molehunt: Near-line semantic activity tracing
Wolthusen, S.
Conference Paper
2003Embedding policy-controlled ID sensors within host operation system security enforcement components for real time monitoring
Wolthusen, S.
Conference Paper
2002Distributed intrusion detection for policy. Controlled heterogeneous environments
Wolthusen, S.
Conference Paper