Skip to main content

Showing 1–5 of 5 results for author: Sauer, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.01262  [pdf, other

    cs.NI cs.LG

    Reinforcement Learning for Admission Control in Wireless Virtual Network Embedding

    Authors: Haitham Afifi, Fabian Sauer, Holger Karl

    Abstract: Using Service Function Chaining (SFC) in wireless networks became popular in many domains like networking and multimedia. It relies on allocating network resources to incoming SFCs requests, via a Virtual Network Embedding (VNE) algorithm, so that it optimizes the performance of the SFC. When the load of incoming requests -- competing for the limited network resources - increases, it becomes chall… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  2. LICSTER -- A Low-cost ICS Security Testbed for Education and Research

    Authors: Felix Sauer, Matthias Niedermaier, Susanne Kießling, Dominik Merli

    Abstract: Unnoticed by most people, Industrial Control Systems (ICSs) control entire productions and critical infrastructures such as water distribution, smart grid and automotive manufacturing. Due to the ongoing digitalization, these systems are becoming more and more connected in order to enable remote control and monitoring. However, this shift bears significant risks, namely a larger attack surface, wh… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019)

  3. arXiv:1908.03964  [pdf, other

    cs.CR

    Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices

    Authors: Matthias Niedermaier, Martin Striegel, Felix Sauer, Dominik Merli, Georg Sigl

    Abstract: Communication between sensors, actors and Programmable Logic Controllers (PLCs) in industrial systems moves from two-wire field buses to IP-based protocols such as Modbus/TCP. This increases the attack surface because the IP-based network is often reachable from everywhere within the company. Thus, centralized defenses, e.g. at the perimeter of the network do not offer sufficient protection. Rathe… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

  4. arXiv:1903.12349  [pdf, other

    cs.HC

    A User-centered Design Study in Scientific Visualization Targeting Domain Experts

    Authors: Yucong, Ye, Franz Sauer, Kwan-Liu Ma, Konduri Aditya, Jacqueline Chen

    Abstract: The development and design of visualization solutions that are truly usable is essential for ensuring both their adoption and effectiveness. User-centered design principles, which focus on involving users throughout the entire development process, are well suited for visualization and have been shown to be effective in numerous information visualization endeavors. In this paper, we report a two ye… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

  5. arXiv:1903.12294  [pdf, other

    cs.CV

    Multifaceted 4D Feature Segmentation and Extraction in Point and Field-based Datasets

    Authors: Franz Sauer, Kwan-Liu Ma

    Abstract: The use of large-scale multifaceted data is common in a wide variety of scientific applications. In many cases, this multifaceted data takes the form of a field-based (Eulerian) and point/trajectory-based (Lagrangian) representation as each has a unique set of advantages in characterizing a system of study. Furthermore, studying the increasing scale and complexity of these multifaceted datasets is… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.