000856331 001__ 856331 000856331 005__ 20251103085612.0 000856331 0247_ $$2datacite_doi$$a10.18154/RWTH-2022-10809 000856331 037__ $$aRWTH-2022-10809 000856331 041__ $$aEnglish 000856331 1001_ $$0P:(DE-82)IDM05525$$aKus, Dominik Adam$$b0$$eCorresponding author$$urwth 000856331 1112_ $$a38. Annual Computer Security Applications Conference$$cAustin, TX$$d2022-12-05 - 2022-12-09$$gACSAC ’22$$wUSA 000856331 245__ $$aPoster: Ensemble Learning for Industrial Intrusion Detection$$honline 000856331 260__ $$c2022 000856331 300__ $$a2 Seiten 000856331 3367_ $$033$$2EndNote$$aConference Paper 000856331 3367_ $$0PUB:(DE-HGF)6$$2PUB:(DE-HGF)$$aConference Presentation$$bconf$$mconf 000856331 3367_ $$2BibTeX$$aINPROCEEDINGS 000856331 3367_ $$2DRIVER$$aconferenceObject 000856331 3367_ $$2DataCite$$aOther 000856331 3367_ $$2ORCID$$aLECTURE_SPEECH 000856331 500__ $$aVeröffentlicht auf dem Publikationsserver der RWTH Aachen University 000856331 591__ $$aGermany 000856331 7001_ $$0P:(DE-82)753874$$aWolsing, Konrad$$b1$$eCorresponding author$$urwth 000856331 7001_ $$0P:(DE-82)IDM03205$$aPennekamp, Jan$$b2$$eCorresponding author$$urwth 000856331 7001_ $$0P:(DE-82)755499$$aWagner, Eric$$b3$$eCorresponding author$$urwth 000856331 7001_ $$0P:(DE-82)IDM00507$$aHenze, Martin$$b4$$eCorresponding author$$urwth 000856331 7001_ $$0P:(DE-82)IDM00064$$aWehrle, Klaus$$b5$$eCorresponding author$$urwth 000856331 8564_ $$uhttps://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-ensemble-poster.pdf$$yFulltext 000856331 8564_ $$uhttps://publications.rwth-aachen.de/record/856331/files/856331.pdf$$yOpenAccess 000856331 8564_ $$uhttps://publications.rwth-aachen.de/record/856331/files/856331_AV.pdf$$yRestricted 000856331 909CO $$ooai:publications.rwth-aachen.de:856331$$pdriver$$pVDB$$popen_access$$popenaire 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05525$$aRWTH Aachen$$b0$$kRWTH 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)753874$$aRWTH Aachen$$b1$$kRWTH 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03205$$aRWTH Aachen$$b2$$kRWTH 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)755499$$aRWTH Aachen$$b3$$kRWTH 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00507$$aRWTH Aachen$$b4$$kRWTH 000856331 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00064$$aRWTH Aachen$$b5$$kRWTH 000856331 9141_ $$y2022 000856331 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0 000856331 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess 000856331 9201_ $$0I:(DE-82)121710_20140620$$k121710$$lLehrstuhl für Informatik 4 (Kommunikation und verteilte Systeme)$$x0 000856331 9201_ $$0I:(DE-82)125430_20211001$$k125430$$lJuniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation$$x1 000856331 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x2 000856331 961__ $$c2022-11-29T11:48:23.209744$$x2022-11-29T11:48:23.209744$$z2022-12-02 000856331 9801_ $$aFullTexts 000856331 980__ $$aI:(DE-82)120000_20140620 000856331 980__ $$aI:(DE-82)121710_20140620 000856331 980__ $$aI:(DE-82)125430_20211001 000856331 980__ $$aUNRESTRICTED 000856331 980__ $$aVDB 000856331 980__ $$aconf