default search action
Karl Waedt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Romarick Yatagha, Betelhem Nebebe, Karl Waedt, Christoph Ruland:
Towards a Zero-Day Anomaly Detector in Cyber Physical Systems Using a Hybrid VAE-LSTM-OCSVM Model. CIKM 2024: 5038-5045 - [c39]Natasha Edeh, Romarick Yatagha, Oumayma Mejri, Karl Waedt:
Understanding stegomalware in ICS: Attacks and Prevention. INFORMATIK 2024: 1893-1904 - [c38]Betelhem Nebebe, Pavlina Kröckel, Romarick Yatagha, Natasha Edeh, Karl Waedt:
AI Defenders: Machine learning driven anomaly detection in critical infrastructures. INFORMATIK 2024: 1917-1927 - [c37]Oumayma Mejri, Karl Waedt, Romarick Yatagha, Natasha Edeh, Claudia Lemos Sebastiao:
Ensuring trustworthy AI for sensitive infrastructure using Knowledge Representation. INFORMATIK 2024: 1929-1938 - [c36]Ndeye Gagnessiry Ndiaye, Erkin Kirdan, Karl Waedt:
Cybersecurity Testing for Industry 4.0: Enhancing Deployments in operational I&C systems Through Adversarial Testing and Explainable AI. INFORMATIK 2024: 1947-1962 - [c35]Hnin Yee Shun, Loui Al Sardy, Karl Waedt, Gabriel Le Berre:
Scalable Modeling of Preventive and Detective Security Controls for Cyber-Physical Systems. INFORMATIK 2024: 1963-1976 - 2023
- [c34]Erkin Kirdan, Josef Schindler, Karl Waedt:
Optimizing OPC UA Deployments on Node.js through Advanced Logging Techniques. GI-Jahrestagung 2023: 1995-2001 - [c33]Natasha Edeh, Robert Altschaffel, Karl Waedt:
Generation of Plausible Synthetic Data for Stego-Malware Detection for Inter-zone IACS Protocols. GI-Jahrestagung 2023: 2041-2050 - [c32]Romarick Yatagha, Karl Waedt, Josef Schindler, Erkin Kirdan:
Security challenges and best practices for resilient IIoT Networks: Network Segmentation. GI-Jahrestagung 2023: 2051-2070 - 2022
- [c31]Mahmoud Khalaf, Ludger Peters, Karl Waedt:
Modeling Security Controls and System Assets As Autonomous Planning Tasks. GI-Jahrestagung 2022: 1531-1538 - [c30]Ludger Peters, Mahmoud Khalaf, Karl Waedt, Josef Schindler, Siwar Belaidi:
Model-based Integrity Monitoring of Industrial Automation And Control Systems. GI-Jahrestagung 2022: 1539-1550 - [c29]Josef Schindler, Siwar Belaidi, Erkin Kirdan, Karl Waedt:
Securing javascript runtime of OPC UA deployments. GI-Jahrestagung 2022: 1551-1556 - [c28]Edin Kreho, Roger Djeukoua, Timothée Guiraud, Karl Waedt:
Scalable backend representation of security posture of IIoT systems. GI-Jahrestagung 2022: 1557-1564 - [c27]Louis Roger Tchuegoue Djeukoua, Edin Kreho, Siwar Belaidi, Karl Waedt:
Interactive graphical modeling of security artefacts for abstracted Industry 4.0 automation systems. GI-Jahrestagung 2022: 1571-1582 - 2021
- [c26]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
Presentation of the Programme of the 6th GI/ACM Standardization Workshop on Industrial Automation and Control Systems. GI-Jahrestagung 2021: 1745-1752 - [c25]Josef Schindler, Erkin Kirdan, Karl Waedt:
Secure OPC UA Server configuration for smart charging stations. GI-Jahrestagung 2021: 1753-1757 - [c24]Robert Altschaffel, Ivo Hempel, Oliver Keil, Josef Schindler, Martin Szemkus, Jana Dittmann, Matthias Lange, Karl Waedt, Yongjian Ding:
Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling. GI-Jahrestagung 2021: 1759-1769 - [c23]Asmaa Tellabi, Abdelbast Sabri, Christoph Ruland, Karl Waedt:
Security aspects of FPGA and virtualization case studies. GI-Jahrestagung 2021: 1771-1780 - [c22]Christele Larissa Moussi Djeukoua, Timothée Guiraud, Edita Bajramovic, Josef Schindler, Karl Waedt:
Secure Unidirectional Security Gateways for Industrie 4.0. GI-Jahrestagung 2021: 1781-1788 - 2020
- [c21]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
The 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS. GI-Jahrestagung 2020: 283-287 - [c20]Mithil Parekh, Karl Waedt, Asmaa Tellabi:
Aligning with cybersecurity framework by modelling OT security. GI-Jahrestagung 2020: 311-319 - [c19]Venesa Watson, Christoph Ruland, Karl Waedt:
MAC-layer Security for Time-Sensitive Switched Ethernet Networks. GI-Jahrestagung 2020: 339-350 - [c18]Josef Schindler, Asmaa Tellabi, Karl Waedt:
Gossip protocol approach for a decentralized energy market with OPC UA client-server communication. GI-Jahrestagung 2020: 351-365 - [c17]Nikolas Mühlbauer, Erkin Kirdan, Marc-Oliver Pahl, Karl Waedt:
Feature-based Comparison of Open Source OPC-UA Implementations. GI-Jahrestagung 2020: 367-377 - [c16]Deeksha Gupta, Yongjian Ding, Dharini Govindaraj, Mathias Lange, Martin Szemkus, Karl Waedt:
Simulation Model for Threat and Impact Analysis on Modern Electrical Power Systems. GI-Jahrestagung 2020: 379-389
2010 – 2019
- 2019
- [c15]Jan de Meer, Karl Waedt, Axel Rennoch, Hans-Joachim Hof:
4th GI/ACMWorkshop on Standardization of I4.0 Automation and Control Systems. GI-Jahrestagung (Workshops) 2019: 241-242 - [c14]Edita Bajramovic, Deeksha Gupta, Yun Guo, Karl Waedt, Anis Bajramovic:
Security Challenges and Best Practices for IIoT. GI-Jahrestagung (Workshops) 2019: 243-254 - [c13]Ines Ben Zid, Mithil Parekh, Karl Waedt, Xinxin Lou:
The application of Articial Intelligence for Cyber Security in Industry 4.0. GI-Jahrestagung (Workshops) 2019: 255-260 - [c12]Xinxin Lou, Yun Guo, Yuan Gao, Karl Waedt, Mithil Parekh:
An idea of using Digital Twin to perform the functional safety and cybersecurity analysis. GI-Jahrestagung (Workshops) 2019: 283-294 - [c11]Josef Schindler, Venesa Watson, Karl Waedt:
Interoperability of fast charging station with battery booster. GI-Jahrestagung (Workshops) 2019: 295-307 - [c10]Venesa Watson, Jochen Sassmannshausen, Karl Waedt:
Secure Granular Interoperability with OPC UA. GI-Jahrestagung (Workshops) 2019: 309-320 - [c9]Xinxin Lou, Karl Waedt, Tim Schürmann, Hauke Kaufhold, Venesa Watson, Deeksha Gupta:
Cybersecurity Analysis of Industrial Control System Functionality. ICPS 2019: 73-80 - 2018
- [c8]Xinxin Lou, Karl Waedt, Yuan Gao, Ines Ben Zid, Venesa Watson:
Combining Artificial Intelligence planning advantages to assist preliminary formal analysis on Industrial Control System cybersecurity vulnerabilities. ECAI 2018: 1-8 - 2017
- [j1]Karl Christoph Ruland, Jochen Sassmannshausen, Karl Waedt, Natasa Zivic:
Smart grid security - an overview of standards and guidelines. Elektrotech. Informationstechnik 134(1): 19-25 (2017) - [c7]Edita Bajramovic, Karl Waedt, Yuan Gao, Mithil Parekh:
Shared responsibility for forensic readiness-related security controls: Prerequisite for critical infrastructure maintenance and supplier relationships. EUROCON 2017: 364-369 - [c6]Jan de Meer, Karl Waedt, Axel Rennoch:
INFORMATIK 2017 WS#13. GI-Jahrestagung 2017: 957-959 - 2016
- [c5]Jan de Meer, Karl Waedt:
Workshop on new security standards for IACS/SCADA industrial systems. GI-Jahrestagung 2016: 531-535 - [c4]Jan de Meer, Karl Waedt:
New security standards for industrial automation and control systems, based on IEC 62443-4-2 (IACS/SCADA) - extended abstract. GI-Jahrestagung 2016: 537-541 - [c3]Simon Seibt, Karl Waedt, Hans Delfs, Simon Odorfer:
3D modeling of selected assets, security zones and conduits. GI-Jahrestagung 2016: 571-580 - [c2]Edita Bajramovic, Karl Waedt, Antonio Ciriello, Deeksha Gupta:
Forensic readiness of smart buildings: Preconditions for subsequent cybersecurity tests. ISC2 2016: 1-6 - [c1]Karl Waedt, Antonio Ciriello, Mithil Parekh, Edita Bajramovic:
Automatic assets identification for smart cities: Prerequisites for cybersecurity risk assessments. ISC2 2016: 1-6
1990 – 1999
- 1994
- [b1]Karl Waedt:
Fehlervermeidende Codegenerierung für verteilte, responsive Systeme. University of Erlangen-Nuremberg, Germany, 1994
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint