| 001 | 856331 | ||
| 005 | 20251103085612.0 | ||
| 024 | 7 | _ | |2 datacite_doi |a 10.18154/RWTH-2022-10809 |
| 037 | _ | _ | |a RWTH-2022-10809 |
| 041 | _ | _ | |a English |
| 100 | 1 | _ | |0 P:(DE-82)IDM05525 |a Kus, Dominik Adam |b 0 |e Corresponding author |u rwth |
| 111 | 2 | _ | |a 38. Annual Computer Security Applications Conference |c Austin, TX |d 2022-12-05 - 2022-12-09 |g ACSAC ’22 |w USA |
| 245 | _ | _ | |a Poster: Ensemble Learning for Industrial Intrusion Detection |h online |
| 260 | _ | _ | |c 2022 |
| 300 | _ | _ | |a 2 Seiten |
| 336 | 7 | _ | |0 33 |2 EndNote |a Conference Paper |
| 336 | 7 | _ | |0 PUB:(DE-HGF)6 |2 PUB:(DE-HGF) |a Conference Presentation |b conf |m conf |
| 336 | 7 | _ | |2 BibTeX |a INPROCEEDINGS |
| 336 | 7 | _ | |2 DRIVER |a conferenceObject |
| 336 | 7 | _ | |2 DataCite |a Other |
| 336 | 7 | _ | |2 ORCID |a LECTURE_SPEECH |
| 500 | _ | _ | |a Veröffentlicht auf dem Publikationsserver der RWTH Aachen University |
| 591 | _ | _ | |a Germany |
| 700 | 1 | _ | |0 P:(DE-82)753874 |a Wolsing, Konrad |b 1 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)IDM03205 |a Pennekamp, Jan |b 2 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)755499 |a Wagner, Eric |b 3 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)IDM00507 |a Henze, Martin |b 4 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)IDM00064 |a Wehrle, Klaus |b 5 |e Corresponding author |u rwth |
| 856 | 4 | _ | |u https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-ensemble-poster.pdf |y Fulltext |
| 856 | 4 | _ | |u https://publications.rwth-aachen.de/record/856331/files/856331.pdf |y OpenAccess |
| 856 | 4 | _ | |u https://publications.rwth-aachen.de/record/856331/files/856331_AV.pdf |y Restricted |
| 909 | C | O | |o oai:publications.rwth-aachen.de:856331 |p openaire |p open_access |p VDB |p driver |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM05525 |a RWTH Aachen |b 0 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)753874 |a RWTH Aachen |b 1 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM03205 |a RWTH Aachen |b 2 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)755499 |a RWTH Aachen |b 3 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM00507 |a RWTH Aachen |b 4 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM00064 |a RWTH Aachen |b 5 |k RWTH |
| 914 | 1 | _ | |y 2022 |
| 915 | 1 | _ | |0 StatID:(DE-HGF)0031 |2 StatID |a Peer reviewed article |x 0 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0510 |2 StatID |a OpenAccess |
| 920 | 1 | _ | |0 I:(DE-82)121710_20140620 |k 121710 |l Lehrstuhl für Informatik 4 (Kommunikation und verteilte Systeme) |x 0 |
| 920 | 1 | _ | |0 I:(DE-82)125430_20211001 |k 125430 |l Juniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation |x 1 |
| 920 | 1 | _ | |0 I:(DE-82)120000_20140620 |k 120000 |l Fachgruppe Informatik |x 2 |
| 980 | 1 | _ | |a FullTexts |
| 980 | _ | _ | |a I:(DE-82)120000_20140620 |
| 980 | _ | _ | |a I:(DE-82)121710_20140620 |
| 980 | _ | _ | |a I:(DE-82)125430_20211001 |
| 980 | _ | _ | |a UNRESTRICTED |
| 980 | _ | _ | |a VDB |
| 980 | _ | _ | |a conf |
| Library | Collection | CLSMajor | CLSMinor | Language | Author |
|---|