Florian Tegeler

Learn More
Bots are the root cause of many security problems on the Internet, as they send spam, steal information from infected machines, and perform distributed denial-of-service attacks. Many approaches to bot detection have been proposed, but they either rely on end-host installations, or, if they operate on network traffic, require deep packet inspection for(More)
Social networking platforms such as Facebook, MySpace, and Twitter have seen a significant increase in user population and user provided information. However, users are increasingly concerned about identity and data privacy since information is controlled by single companies. To address this issue researchers investigated alternative solutions, where the(More)
pH is an important parameter in condensed-phase systems, because it determines the protonation state of titratable groups and thus influences the structure, dynamics, and function of molecules in solution. In most force field simulation protocols, however, the protonation state of a system (rather than its pH) is kept fixed and cannot adapt to changes of(More)
In decentralized dynamic networks such as peer-to-peer networks, it is difficult to authorize identities without a centralized authority, since a node interacts with nodes previously unknown to itself. To optimize the quality of experience and exclude malicious nodes from such networks, various trust and reputation systems (TRS) have been proposed.(More)
Bots are the root cause of many security problems on the Internet – they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not surprising that a large number of techniques have been proposed that aim to detect and mitigate bots, both network-based and host-based(More)
Properties of biomolecules are often investigated using Molecular Dynamics (MD) simulations whereby atoms and molecules interact for a period of time, thus revealing the time dependent behavior of the system. Whereas the atom positions of the starting structures for such MD runs are usually derived from X-ray crystallography or NMR experiments, properties(More)
which replaces eq 33. We note that in our implementation of the constant pH protocol, the expressions for the forces due to V(λ1,λ2) and V(λ1,λ2) were implemented correctly; thus the trajetories are unaffected. The above corrected expressions are required only to compute the total energy of the system (i.e., the real and λ particles together) during the(More)
The IDKE protocol is a mechanism aiming to provide authentication and session-key establishment for mobile nodes after an inter domain handover. Credentials are forwarded from a previous access router to the new access router whereas initially no trust relationship exists. The IDKE protocol utilizes an IP based infrastructure to transfer a session-key due(More)
  • 1