default search action
Hartmut König
Person information
- affiliation: Brandenburg University of Technology, Cottbus, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j30]Sebastian Boehm, Hartmut König:
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study. Comput. Commun. 218: 157-165 (2024) - [c95]Franka Schuster, Hartmut König:
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge. RAID 2024: 278-297 - 2023
- [j29]Sebastian Boehm, Hartmut König:
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation. Comput. Commun. 209: 273-282 (2023) - [c94]Andreas Paul, Franka Schuster, Hartmut König:
Whitelisting for Characterizing and Monitoring Process Control Communication. NSS 2023: 23-45 - [c93]Sebastian Boehm, Hartmut König:
Radio-in-the-Loop Simulation Modeling for Energy-Efficient and Cognitive IoT in Smart Cities: A Cross-Layer Optimization Case Study. WONS 2023: 126-133 - [i7]Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, Artur Hermann:
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). Dagstuhl Reports 13(10): 90-129 (2023) - 2022
- [c92]Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Daniel Reti:
Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities. CloudNet 2022: 101-108 - [c91]Michael Vogel, Franka Schuster, Fabian Malte Kopp, Hartmut König:
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination. CSR 2022: 44-49 - [c90]Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky:
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks. DSC 2022: 1-8 - [c89]Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski, Hartmut König:
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks. FPS 2022: 192-207 - [c88]Sebastian Boehm, Hartmut König:
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation. MSWiM 2022: 47-54 - 2021
- [c87]Sebastian Boehm, Hartmut König:
Split-Protocol-Stack Wireless Network Emulation: Enabling PHY Modeling Diversity with Software-Radio-in-the-Loop. Q2SWinet 2021: 33-40
2010 – 2019
- 2019
- [c86]Stefan Mehner, Hartmut König:
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. DIMVA 2019: 396-414 - [c85]Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König:
An SDN-based Approach to Protect Communication Between Virtual Machines. LCN 2019: 262-265 - [c84]Sebastian Boehm, Hartmut König:
SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks. WONS 2019: 111-118 - 2018
- [j28]René Rietz, Radoslaw Cwalinski, Hartmut König, Andreas Brinner:
An SDN-Based Approach to Ward Off LAN Attacks. J. Comput. Networks Commun. 2018: 4127487:1-4127487:12 (2018) - [c83]Radoslaw Cwalinski, Hartmut König:
Identifying Malicious Traffic in Software-Defined Wireless Local Area Networks. ICNC 2018: 195-199 - [c82]Franka Schuster, Fabian Malte Kopp, Andreas Paul, Hartmut König:
Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning. INDIN 2018: 433-438 - [c81]Radoslaw Cwalinski, Hartmut König:
SDN-based Attack Detection in Wireless Local Area Networks. NetSoft 2018: 207-211 - 2017
- [j27]Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich:
Security Challenges and Opportunities of Software-Defined Networking. IEEE Secur. Priv. 15(2): 96-100 (2017) - 2016
- [j26]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j25]Jan Gäbler, Hartmut König:
Moversight: a group communication protocol for mobile scenarios. Telecommun. Syst. 61(4): 695-716 (2016) - [c80]Andreas Paul, Franka Schuster, Hartmut König:
Network Topology Exploration for Industrial Networks. INISCOM 2016: 62-76 - [c79]Jan Gäbler, Hartmut König:
Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications. LCN 2016: 271-279 - [c78]Radoslaw Cwalinski, Hartmut König:
RADIator - An approach for controllable wireless networks. NetSoft 2016: 260-268 - [c77]René Rietz, Hartmut König, Steffen Ullrich, Benjamin Stritter:
Firewalls for the Web 2.0. QRS 2016: 242-253 - [i6]Marc Dacier, Sven Dietrich, Frank Kargl, Hartmut König:
Network Attack Detection and Defense (Dagstuhl Seminar 16361). Dagstuhl Reports 6(9): 1-28 (2016) - 2015
- [c76]Jan Gäbler, Hartmut König:
Distributed latency estimation using global knowledge for mobile collaborative applications. IWCMC 2015: 474-479 - [c75]Franka Schuster, Andreas Paul, René Rietz, Hartmut König:
Potentials of Using One-Class SVM for Detecting Protocol-Specific Anomalies in Industrial Networks. SSCI 2015: 83-90 - 2014
- [j24]Frank Kargl, Rens W. van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier:
Insights on the Security and Dependability of Industrial Control Systems. IEEE Secur. Priv. 12(6): 75-78 (2014) - [j23]Fuwen Liu, Hartmut König:
Puzzle - an efficient, compression independent video encryption algorithm. Multim. Tools Appl. 73(2): 715-735 (2014) - [c74]René Rietz, Michael Vogel, Franka Schuster, Hartmut König:
Parallelization of Network Intrusion Detection Systems under Attack Conditions. DIMVA 2014: 172-191 - [c73]Stefanie Judith Opitz, Nicole Todtenberg, Hartmut König:
Mobile bandwidth prediction in the context of emergency medical service. PETRA 2014: 49:1-49:7 - [i5]Marc Dacier, Frank Kargl, Hartmut König, Alfonso Valdes:
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports 4(7): 62-79 (2014) - 2013
- [j22]Hartmut König, Jan Gäbler, Ronny Klauck, Mario Pink, Michael Sprejz:
uBeeMe - A Platform for Mobile Collaborative Applications. Prax. Inf.verarb. Kommun. 36(1): 43 (2013) - [c72]Franka Schuster, Andreas Paul, Hartmut König:
Towards Learning Normality for Anomaly Detection in Industrial Control Networks. AIMS 2013: 61-72 - [c71]Jan Gäbler, Ronny Klauck, Mario Pink, Hartmut König:
uBeeMe - A platform to enable mobile collaborative applications. CollaborateCom 2013: 188-196 - [c70]Andreas Paul, Franka Schuster, Hartmut König:
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. DIMVA 2013: 160-176 - [c69]Jan Gäbler, Hartmut König:
Enhancing group communication systems with mobility support. ICON 2013: 1-6 - [c68]Mario Pink, Michael Sprejz, Hartmut König:
A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks. MOBILWARE 2013: 130-137 - [c67]Jan Gäbler, Hartmut König:
Moversight: A group communication protocol for mobile collaborative applications. WMNC 2013: 1-8 - [c66]Stefan Mehner, Ronny Klauck, Hartmut König:
Location-independent fall detection with smartphone. PETRA 2013: 11:1-11:8 - [c65]Jan Gäbler, Hartmut König:
Moversight: An approach to support mobility in collaborative applications. WONS 2013: 110-112 - 2012
- [b3]Hartmut König:
Protocol Engineering. Springer 2012, ISBN 978-3-642-29144-9, pp. I-XV, 1-525 - [j21]Hartmut König:
Network Attack Detection and Defense. Prax. Inf.verarb. Kommun. 35(1): 1 (2012) - [c64]Mario Pink, Thomas Pietsch, Hartmut König:
Towards a seamless mobility solution for the real world: Handover decision. ISWCS 2012: 651-655 - [c63]Mario Pink, Thomas Pietsch, Hartmut König:
An Adaptive Handover Decision Algorithm for Heterogenous Wireless Networks. MOBILWARE 2012: 136-149 - [c62]Prabhu Shankar Kaliappan, Hartmut König:
On the Formalization of UML Activities for Component-Based Protocol Design Specifications. SOFSEM 2012: 479-491 - [i4]Georg Carle, Hervé Debar, Falko Dressler, Hartmut König:
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). Dagstuhl Reports 2(2): 1-20 (2012) - 2011
- [j20]Michael Kirsche, Matthias Dreissig, Ralf Kopsch, Jan Gäbler, Ronny Klauck, Mario Pink, Fuwen Liu, Hartmut König:
uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen. Prax. Inf.verarb. Kommun. 34(1): 11-22 (2011) - [j19]Linda Ariani Gunawan, Michael Vogel, Frank Alexander Kraemer, Sebastian Schmerl, Vidar Slåtten, Peter Herrmann, Hartmut König:
Modeling a distributed intrusion detection system using collaborative building blocks. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - [j18]Sebastian Schmerl, Michael Vogel, Hartmut König:
Using model checking to identify errors in intrusion detection signatures. Int. J. Softw. Tools Technol. Transf. 13(1): 89-106 (2011) - [c61]Michael Vogel, Sebastian Schmerl, Hartmut König:
Efficient Distributed Signature Analysis. AIMS 2011: 13-25 - [c60]Fuwen Liu, Hartmut König:
Cryptanalysis of a SIP Authentication Scheme. Communications and Multimedia Security 2011: 134-143 - [c59]Prabhu Shankar Kaliappan, Hartmut König:
An Approach to Synchronize UML-Based Design Components for Model-Driven Protocol Development. SEW 2011: 27-35 - [c58]Fuwen Liu, Hartmut König:
A Simple Balanced Password-Authenticated Key Agreement Protocol. TrustCom 2011: 403-408 - 2010
- [j17]Fuwen Liu, Hartmut König:
A survey of video encryption algorithms. Comput. Secur. 29(1): 3-15 (2010) - [c57]Prabhu Shankar Kaliappan, Hartmut König, Sebastian Schmerl:
Model-Driven Protocol Design Based on Component Oriented Modeling. ICFEM 2010: 613-629 - [c56]Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König:
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. SADFE 2010: 109-118 - [c55]René Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König:
Iterative präzisionsbewertende Signaturgenerierung. Sicherheit 2010: 141-152
2000 – 2009
- 2009
- [j16]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Comput. Sci. Res. Dev. 23(1): 15-25 (2009) - [j15]Michael Vogel, Sebastian Schmerl, Hartmut König:
Analyseverlagerung in IDS-Overlaynetzen. Prax. Inf.verarb. Kommun. 32(3): 188-200 (2009) - [c54]Alek Opitz, Hartmut König:
Predicting Free Computing Capacities on Individual Machines. GPC 2009: 153-164 - [c53]Fuwen Liu, Hartmut König:
Security Considerations on Pervasive Real-time Collaboration. MASS 2009: 722-727 - [c52]Sebastian Schmerl, Michael Vogel, Hartmut König:
Identifying Modeling Errors in Signatures by Model Checking. SPIN 2009: 205-222 - 2008
- [j14]Alek Opitz, Hartmut König, Sebastian Szamlewska:
What Does Grid Computing Cost? J. Grid Comput. 6(4): 385-397 (2008) - [j13]Prabhu Shankar Kaliappan, Hartmut König:
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker. J. Softw. Eng. Appl. 1(1): 13-19 (2008) - [c51]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32 - [c50]Prabhu Shankar Kaliappan, Hartmut König, Vishnu Kumar Kaliappan:
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker. CSSE (2) 2008: 227-230 - [c49]Fuwen Liu, Hartmut König:
Security Policy Management for Peer Group Meetings. SECURWARE 2008: 68-73 - [c48]Sebastian Schmerl, René Rietz, Hartmut König:
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort. Sicherheit 2008: 367-379 - [e7]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i2]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i1]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j12]Hartmut König, Daniel Rakel, Fuwen Liu, Michael Kirsche:
P2P-Videokonferenzen für geschlossene Gruppen. Prax. Inf.verarb. Kommun. 30(4): 219-226 (2007) - [c47]Sebastian Schmerl, Hartmut König:
Towards Systematic Signature Testing. TestCom/FATES 2007: 276-291 - 2006
- [c46]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier:
Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450 - 2005
- [c45]Fuwen Liu, Hartmut König:
Puzzle - A Novel Video Encryption Algorithm. Communications and Multimedia Security 2005: 88-97 - [c44]Fuwen Liu, Hartmut König:
Efficient Key Distribution for Closed Meetings in the Internet. Communications and Multimedia Security 2005: 271-272 - [c43]Fuwen Liu, Hartmut König:
Secure and efficient key distribution for collaborative applications. CollaborateCom 2005 - [c42]Alek Opitz, Hartmut König:
Optimizing the Access to Read-Only Data in Grid Computing. DAIS 2005: 206-219 - [c41]Michael Meier, Sebastian Schmerl, Hartmut König:
Improving the Efficiency of Misuse Detection. DIMVA 2005: 188-205 - [c40]Hartmut König:
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen. GI Jahrestagung (2) 2005: 638-642 - [c39]Fuwen Liu, Hartmut König:
A Token Based Key Distribution Protocol for Closed Group Meetings. Net-Con 2005: 29-43 - [c38]Daniel Rakel, Hartmut König:
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen. KiVS Kurzbeiträge und Workshop 2005: 159-162 - [c37]Fuwen Liu, Hartmut König:
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen. KiVS Kurzbeiträge und Workshop 2005: 163-167 - [c36]Fuwen Liu, Hartmut König:
A novel encryption algorithm for high resolution video. NOSSDAV 2005: 69-74 - [c35]Fuwen Liu, Hartmut König:
A Secure P2P Video Conference System for Enterprise Environments. NPC 2005: 88-96 - 2004
- [j11]Michael Meier, Ulrich Flegel, Hartmut König:
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Prax. Inf.verarb. Kommun. 27(4): 186-187 (2004) - [c34]Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König:
Verteilte Mehrteilnehmer-Videokonferenzen im Internet. DFN-Arbeitstagung über Kommunikationsnetze 2004: 167-179 - [c33]Mario Zühlke, Hartmut König:
A Signaling Protocol for Small Closed Dynamic Multi-peer Groups. HSNMC 2004: 973-984 - 2003
- [b2]Hartmut König:
Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen. Leitfäden der Informatik, Teubner 2003, ISBN 978-3-519-00454-7, pp. I-XIII, 1-496 - [c32]Thomas Holz, Michael Meier, Hartmut König:
High-Efficient Intrusion Detection Infrastructure. DFN-Arbeitstagung über Kommunikationsnetze 2003: 217-232 - [c31]Eduard Popovici, Ralf Mahlo, Mario Zühlke, Hartmut König:
Consistency support for a decentralized management in close multiparty conferences using SIP. ICON 2003: 295-300 - [c30]Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König:
BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP. KiVS Kurzbeiträge 2003: 167-180 - [e6]Hartmut König, Monika Heiner, Adam Wolisz:
Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29 - October 2, 2003, Proceedings. Lecture Notes in Computer Science 2767, Springer 2003, ISBN 3-540-20175-0 [contents] - 2002
- [j10]Thomas Holz, Michael Meier, Hartmut König:
Bausteine für effiziente Intrusion-Detection-Systeme. Prax. Inf.verarb. Kommun. 25(3): 144-157 (2002) - [c29]Mario Zühlke, Hartmut König:
Voting Based Bandwidth Management in Multiparty Video Conferences. IDMS/PROMS 2002: 202-215 - [c28]Alek Opitz, Torsten Mielke, Hartmut König:
Virtual Private Components - An Approach for Leasing Components. SMARTNET 2002: 95-112 - [c27]Mario Zühlke, Hartmut König:
GCP - A Group Communication Protocol for Supporting Closed Groups in the Internet. SMARTNET 2002 - [e5]Ina Schieferdecker, Hartmut König, Adam Wolisz:
Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems - TestCom 2002, Berlin, Germany, March 19-22, 2002. IFIP Conference Proceedings 210, Kluwer 2002, ISBN 0-7923-7695-1 [contents] - 2001
- [j9]Peter Langendörfer, Rolf Kraemer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. J. Supercomput. 20(2): 161-173 (2001) - [c26]Sven Twarok, Peter Langendörfer, Hartmut König:
Automated Derivation of ILP Implementations from SDL Specifications. FORTE 2001: 3-18 - 2000
- [j8]Hartmut König, Peter Langendörfer, Heiko Krumm:
Improving the efficiency of automated protocol implementations using a configurable FDT compiler. Comput. Commun. 23(12): 1179-1195 (2000) - [j7]Samuel T. Chanson, Albert K. T. Hui, Hartmut König, Mario Zühlke:
Das OCTOPUS-Videokonferenzsystem. Prax. Inf.verarb. Kommun. 23(4) (2000) - [c25]Peter Langendörfer, Thomas Krüger, Hartmut König:
Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. FBT 2000: 143-152 - [c24]Peter Langendörfer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. International Conference on Internet Computing 2000: 451-458
1990 – 1999
- 1999
- [j6]Peter Langendörfer, Hartmut König:
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering. Prax. Inf.verarb. Kommun. 22(4): 197-203 (1999) - [c23]Peter Langendörfer, Hartmut König:
Automatische Generierung effizienter Protokollimplementierungen. FBT 1999: 135-144 - [c22]Peter Langendörfer, Hartmut König:
Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. FORTE 1999: 169-184 - [c21]Samuel T. Chanson, Albert K. T. Hui, Eddy Siu, Ines Beier, Hartmut König, Mario Zühlke:
OCTOPUS-a scalable global multiparty video conferencing system. ICCCN 1999: 97-102 - [c20]Peter Langendörfer, Hartmut König:
Automated Protocol Implementations Based on Activity Threads. ICNP 1999: 3-10 - [c19]Thomas Preuß, Jens-Hagen Syrbe, Hartmut König:
Permanent Customer-Provider Relationships for Electric Service Markets. Kommunikation in Verteilten Systemen 1999: 326-337 - [c18]Andreas Ulrich, Hartmut König:
Architectures for Testing Distributed Systems. IWTCS 1999: 93-108 - [c17]Peter Langendörfer, Hartmut König:
COCOS - A configurable SDL compiler for generating efficient protocol implementations. SDL Forum 1999: 259-274 - [c16]Ines Beier, Hartmut König:
Distributed QoS Management for A Multiparty Video Conferencing System. SMARTNET 1999: 335-348 - [e4]