Publications

An SDN-based Approach to Ward of LAN Attacks

Author(s)
Rietz, René, Cwalinski, Radoslaw, König, Hartmut, Brinner, Andreas
Type
Scientific Article ref.
Year of publication
2018
Source
Journal Computer Networks and Communications
Volume
2018
DOI
https://doi.org/10.1155/2018/4127487

Das SICIA-Verfahren: Messung & Bewertung der IT-Sicherheit – mit oder ohne ISMS

Author(s)
Schuster, Franka, Mehner, Stefan
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr Münche
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 98 - 99
ISBN
978-3-943207-33-0
978-3-943207-34-7

INDI – Intelligente Intrusion-Detection-Systeme für Industrienetze

Author(s)
Rieck, Konrad, Wressnegger, Christian, König, Hartmut, Paul, Andreas, Schuster, Franka, Kanisch, Heiko, Moder, Christoph
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 19
ISBN
978-3-943207-33-0
978-3-943207-34-7

Prozessnahe Kommunikation als besondere Herausforderung

Author(s)
Rieck, Konrad, Wressnegger, Christian, König, Hartmut, Paul, Andreas, Schuster, Franka, Kanisch, Heiko, Moder, Christoph
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 57
ISBN
978-3-943207-33-0
978-3-943207-34-7

Informationstechnik in der Energieversorgung – Besonderheiten und Regularien

Author(s)
Kanisch, Heiko, Schuster, Franka, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 67 - 68
ISBN
978-3-943207-33-0
978-3-943207-34-7

Catching Intrusions: Classifier Performances for Detecting Network-specific Anomalies in Energy Systems

Author(s)
Schuster, Franka, Paul, Andreas, Kopp, Fabian Malte, König, Hartmut
Type
conference publication
Year of publication
2018
Publisher name
Piscataway, NJ : IEEE
Source
2018 International Conference on Smart Energy Systems and Technologies (SEST), Seville, Spain, September 2018
ISBN
978-1-5386-5326-5
DOI
https://doi.org/10.1109/SEST.2018.8495702

SDN-based Attack Detection in Wireless Local Area Networks

Author(s)
Cwalinski, Radoslaw, König, Hartmut
Type
conference publication
Year of publication
2018
Publisher name
Piscataway, NJ : IEEE
Source
4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, 2018, S. 207 - 211
ISBN
978-1-5386-4633-5
DOI
https://doi.org/10.1109/NETSOFT.2018.8460121

Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning

Author(s)
Schuster, Franka, Kopp, Fabian Malte, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2018
Publisher name
Piscataway, NJ : IEEE
Source
IEEE 16th International Conference on Industrial Informatics (INDIN), Porto, Portugal, 18-20 July 2018, S. 433 - 438
ISBN
978-1-5386-4829-2
DOI
https://doi.org/10.1109/INDIN.2018.8472054

Unifying Radio-in-the-Loop Channel Emulation and Network Protocol Simulation to Improve Wireless Sensor Network Evaluation

Author(s)
Böhm, Sebastian, Kirsche, Michael
Editor(s)
Baum, Marcus, Brenner, Gunther, Grabowski, Jens, Hanschke, Thomas, Hartmann, Stefan, Schöbel, Anita
Type
conference publication
Year of publication
2018
Publisher name
Cham : Springer International Publishing
Hardware-in-the-Loop; Simulation; Emulation; Wireless Sensor Network; Co-Simulation
Source
Simulation Science, First International Workshop, SimScience 2017, Göttingen, Germany, April 27–28, 2017, S. 219 - 238
ISBN
978-3-319-96271-9
DOI
https://doi.org/10.1007/978-3-319-96271-9_14

Identifying Malicious Traffic in Software-Defined Wireless Local Area Networks

Author(s)
Cwalinski, Radoslaw, König, Hartmut
Type
conference publication
Year of publication
2018
Publisher name
IEEE
Communication system security; Hardware; IEEE 802.11 Standard; Security; Wireless LAN; Wireless networks
Source
2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 2018, S. 195 - 199
ISBN
978-1-5386-3652-7
URL
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8390307&isnumber=8390234
DOI
https://doi.org/10.1109/ICCNC.2018.8390307

Werkzeuge und Veröffentlichungen

Author(s)
Rieck, Konrad, Wressnegger, Christian, König, Hartmut, Paul, Andreas, Schuster, Franka, Kanisch, Heiko, Moder, Christoph
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 85
ISBN
978-3-943207-33-0
978-3-943207-34-7

Implementierung und Umsetzung

Author(s)
Rieck, Konrad, Wressnegger, Christian, König, Hartmut, Paul, Andreas, Schuster, Franka, Kanisch, Heiko, Moder, Christoph
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 122 - 124
ISBN
978-3-943207-33-0
978-3-943207-34-7

SICIA – IT-Sicherheit in kritischen Netzen messen und systematisch verbessern

Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 27 - 28
ISBN
978-3-943207-33-0
978-3-943207-34-7

Anwendung des SICIA-Verfahrens in der Praxis – am Beispiel eines ISMS

Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 139 - 144
ISBN
978-3-943207-33-0
978-3-943207-34-7

Network Topology Exploration for Industrial Networks

Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2017
Publisher name
Cham : Springer International Publishing
Source
2nd EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), October 31 - November 1, 2016, Leicester, Great Britain, S. 63 - 76
ISBN
978-3-319-52568-6
URL
http://www.springer.com/de/book/9783319525686
DOI
https://doi.org/10.1007/978-3-319-52569-3

Messung der technischen IT-Sicherheit in Energieversorgungsanlagen zur Erfüllung des IT-Sicherheitsgesetzes

Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
Scientific Article ref.
Year of publication
2017
Source
International Journal for Electricy and Heat Generation, VGB Powertech, S. 76 - 82
Volume
97
Issue/Journal number
3
ISSN
1435-3199

Proceedings of the 4th OMNeT++ Community Summit, University of Bremen - Germany, September 7-8, 2017

Editor(s)
Förster, Anna, Udugama, Asanga, Könsgen, Andreas, Virdis, Antonio, Kirsche, Michael
Type
book (editor)
Year of publication
2017
Publisher name
arXiv
URL
https://arxiv.org/html/1709.03745

Moversight: a group communication protocol for mobile scenarios

Author(s)
Gäbler, Jan, König, Hartmut
Type
Scientific Article ref.
Year of publication
2016
Mobile group communication, Mobility support, Mobile collaborative applications, Closed groups, Group communication system, Virtual synchrony
Source
Telecommunication systems : modeling, analysis, design and managementversion, S. 695 - 716
Volume
61
Issue/Journal number
4
ISSN
1572-9451
1018-4864
URL
http://link.springer.com/article/10.1007%2Fs11235-015-0062-1
DOI
https://doi.org/10.1007/s11235-015-0062-1

Cleaning up Web 2.0's Security Mess - at Least Partly

Author(s)
Stritter, Benjamin, Freiling, Felix, König, Hartmut, Rietz, René, Ullrich, Steffen, Gernler, Alexander von, Erlacher, Felix
Type
Scientific Article ref.
Year of publication
2016
Source
IEEE Security & Privacy, S. 48 - 71
Volume
14
Issue/Journal number
2
ISSN
1540-7993
URL
http://online.qmags.com/SNP0316?pg=92&mode=2#pg92&mode2

RADIator - An approach for controllable wireless networks

Author(s)
Cwalinski, Radoslaw, König, Hartmut
Type
conference publication
Year of publication
2016
Publisher name
Piscataway, NJ : IEEE
Source
IEEE NetSoft Conference and workshops, 6-10 June 2016, Seoul, South Corea, S. 260 - 268
ISBN
978-1-4673-9486-4
URL
http://ieeexplore.ieee.org/document/7502421/
DOI
https://doi.org/10.1109/NETSOFT.2016.7502421

Firewalls for the Web 2.0

Author(s)
Rietz, René, König, Hartmut, Ullrich, Steffen, Stritter, Benjamin
Type
conference publication
Year of publication
2016
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS), 1-3 Aug. 2016, S. 242 - 253
ISBN
978-1-5090-4127-5
978-1-5090-4128-2
URL
http://ieeexplore.ieee.org/document/7589804/
DOI
https://doi.org/10.1109/QRS.2016.36

Network Attack Detection and Defense – SecurityChallenges and Opportunities of Software-DefinedNetworking

Author(s)
Dacier, Marc C., Dietrich, Sven, Kargl, Frank, König, Hartmut
Type
conference publication
Year of publication
2016
Publisher name
Wadern : Schloss Dagstuhl
Source
Network Attack Detection and Defense, Dagstuhl Seminar 16361, S. 1 - 28
URL
http://drops.dagstuhl.de/opus/volltexte/2017/6912/
URN
urn:nbn:de:0030-drops-69122
DOI
https://doi.org/10.4230/DagRep.6.9.1
Dagstuhl reports ; Volume 6, Issue 9

Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications

Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2016
Publisher name
Piscataway, NJ : IEEE
Source
IEEE 41st Conference on Local Computer Networks (LCN), 7-10 Nov. 2016, S. 271 - 279
ISBN
978-1-5090-2054-6
978-1-5090-2055-3
URL
http://ieeexplore.ieee.org/document/7796799/
DOI
https://doi.org/10.1109/LCN.2016.55

Proceedings of the 3rd International OMNeT++ Community Summit (OMNeT 2016), Brno University of Technology, Czech Republic, September 15-16, 2016

Editor(s)
Förster, Anna, Veselý, Vladimír, Virdis, Antonio, Kirsche, Michael
Type
book (editor)
Year of publication
2016
Publisher name
Brno : Brno University of Technology, Czech Republic
URL
https://arxiv.org/html/1609.07629

Looking into Hardware-in-the-Loop Coupling of OMNeT++ and RoSeNet

Author(s)
Böhm, Sebastian, Kirsche, Michael
Type
conference publication
Year of publication
2015
Source
Proceedings of the 2nd International OMNeT++ Community Summit (OMNeT 2015), Zurich, Switzerland, September, 2015, CoRR
URL
http://arxiv.org/abs/1509.03558

Potentials of Using One-class SVM for Detecting Protocol-specific Anomalies in Industrial Networks

Author(s)
Schuster, Franka, Paul, Andreas, Rietz, René, König, Hartmut
Type
conference publication
Year of publication
2015
Publisher name
New York : IEEE Press
Source
Proceedings of the 2015 IEEE Symposium on Computational Intelligence in Cyber Security (IEEE CICS 2015), S. 83 - 90
DOI
https://doi.org/10.1109/SSCI.2015.22

Distributed latency estimation using global knowledge for mobile collaborative applications

Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2015
Publisher name
IEEE
Source
International Wireless Communications and Mobile Computing Conference (IWCMC) 2015, Dubrovnik, Croatia, 24-28 Aug. 2015, S. 474 - 479
DOI
https://doi.org/10.1109/IWCMC.2015.7289130

uIP Support for the Network Simulation Cradle

Author(s)
Kirsche, Michael, Kremmer, Roman
Type
conference publication
Year of publication
2015
Source
Proceedings of the 2nd International OMNeT++ Community Summit (OMNeT 2015)
URL
http://arxiv.org/abs/1509.03101

Proceedings of the 2nd International OMNeT++ Community Summit (OMNeT 2015), Zurich, Switzerland on September 3-4, 2015

Editor(s)
Förster, Anna, Minkenberg, Cyriel, Herrera, German Rodriguez, Kirsche, Michael
Type
book (editor)
Year of publication
2015
URL
http://arxiv.org/abs/1509.03284

A new IEEE 802.15.4 Simulation Model for OMNeT++ / INET

Author(s)
Kirsche, Michael, Schnurbusch, Matti
Type
conference publication
Year of publication
2014
Source
Proceedings of the 1st International OMNeT++ Community Summit (OMNeT 2014)
URL
http://arxiv.org/abs/1409.1177

Insights on the Security and Dependability of Industrial Control Systems

Author(s)
Kargl, Frank, Heijden, Rens W. van der, König, Hartmut, Valdes, Alfonso, Dacier, Marc C.
Type
Scientific Article ref.
Year of publication
2014
Computer security;Industrial control;Industrial power systems;Industrial safety;Management;DCS;ICS;cyber-physical systems;distributed control systems;industrial control systems;security;security management
Source
IEEE Security & Privacy, S. 75 - 78
Volume
12
Issue/Journal number
6
ISSN
1540-7993
DOI
https://doi.org/10.1109/MSP.2014.120

Puzzle - an efficient, compression independent video encryption algorithm

Author(s)
Liu, Fuwen, König, Hartmut
Type
Scientific Article ref.
Year of publication
2014
Source
Multimedia tools and applications, S. 715 - 735
Volume
73
Issue/Journal number
2
ISSN
1573-7721
DOI
https://doi.org/10.1007/s11042-012-1185-y

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures

Author(s)
Dacier, Marc C., Kargl, Frank, König, Hartmut, Valdes, Alfonso
Type
conference publication
Year of publication
2014
Publisher name
Schloss Dagstuhl, Wadern : Dagstuhl Publishing
Security, Intrusion Detection, Critical Infrastructures, Industrial Control Systems, SCADA, Vulnerability Analysis, Malware Assessment, Attack Response and Countermeasures
Source
Report from Dagstuhl Seminar 14292, 13. – 16. Juli 2014,, S. 62 - 79
URL
http://www.dagstuhl.de/14292
DOI
https://doi.org/10.4230/DagRep.4.7.62
Dagstuhl reports ; vol. 4, issue 7

Global-scale Federated Access to Smart Objects Using XMPP

Author(s)
Schuster, Daniel, Grubitzsch, Philipp, Renzel, Dominik, Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2014
Publisher name
Piscataway, NJ : IEEE
Source
2014 IEEE International Conference on Internet of Things (iThings 2014), and IEEE green computing and communications (GreenCom 2014) and IEEE cyber, physical and social computing (CPSCom 2014), Taipei, Taiwan, 1 - 3 September 2014, S. 185 - 192
ISBN
978-1-4799-5967-9
URL
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7059660

Enhancing Group Communication Systems with Mobility Support

Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2014
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 19th IEEE International Conference on Networks (ICON 2013), Singapore, December 2013, S. 342 - 347
ISBN
978-1-4799-2085-3

Mobile bandwidth prediction in the context of emergency medical service

Author(s)
Opitz, Stefanie Judith, Todtenberg, Nicole, König, Hartmut
Type
conference publication
Year of publication
2014
Publisher name
New York, NY : ACM
Source
Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments (PETRA '14)
ISBN
978-1-4503-2746-6
URL
http://doi.acm.org/10.1145/2674396.2674411
DOI
https://doi.org/10.1145/2674396.2674411

Parallelization of Network Intrusion Detection Systems under Attack Conditions

Author(s)
Rietz, René, Vogel, Michael, Schuster, Franka, König, Hartmut
Editor(s)
Dietrich, Sven
Type
conference publication
Year of publication
2014
Publisher name
Cham : Springer International Publishing
Source
Detection of Intrusions and Malware, and Vulnerability Assessment, 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, S. 172 - 191
ISBN
978-3-319-08508-1
Lecture Notes in Computer Science ; 8550

uBeeMe - A Platform for Mobile Collaborative Applications

Author(s)
König, Hartmut, Gäbler, Jan, Klauck, Ronny, Pink, Mario, Sprejz, Michael
Type
Scientific Article ref.
Year of publication
2013
Source
PIK - Praxis der Informationsverarbeitung und Kommunikation, S. 43
Volume
36
Issue/Journal number
1
ISSN
0930-5157
DOI
https://doi.org/10.1515/pik-2012-0058

Combining Mobile XMPP Entities and Cloud Services for Collaborative Post-Disaster Management in Hybrid Network Environments

Author(s)
Klauck, Ronny, Kirsche, Michael
Type
Scientific Article ref.
Year of publication
2013
Source
Mobile Networks and Applications : the journal of special issues on mobility of systems, users, data and computing, S. 253 - 270
Volume
18
Issue/Journal number
2
ISSN
1383-469X
1572-8153
URL
http://link.springer.com/article/10.1007%2Fs11036-012-0391-1
DOI
https://doi.org/10.1007/s11036-012-0391-1

A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks

Author(s)
Pink, Mario, Sprejz, Michael, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Piscataway, NJ : IEEE
Source
2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, Bologna, Italy, November 11-13, 2013, S. 130 - 137
DOI
https://doi.org/10.1109/Mobilware.2013.20

Location-independent fall detection with smartphone

Author(s)
Mehner, Stefan, Klauck, Ronny, König, Hartmut
Editor(s)
Makedon, Fillia, Betke, Margrit, Seif El-Nasr, Magy, Maglogiannis, Ilias
Type
conference publication
Year of publication
2013
Publisher name
New York, NY : ACM
Source
The 6th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA '13, Island of Rhodes, Greece, May 29-31, 2013
ISBN
978-1-4503-1973-7
DOI
https://doi.org/10.1145/2504335.2504346

uBeeMe - a Platform to Enable Mobile Collaborative Applications

Author(s)
Gäbler, Jan, Klauck, Ronny, Pink, Mario, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), Austin, Texas, USA, October, 2013, S. 188 - 196

Enhanced DNS Message Compression - Optimizing mDNS/DNS-SD for the Use in 6LoWPANs

Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2013
Publisher name
IEEE
Source
Proceedings,9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 2013 (PerSeNS 2013), co-located with the 11th IEEE Conference on Pervasive Computing and Communication (PerCom 2013), San Diego, Calif., USA, 2013, S. 596 - 601
ISBN
978-1-4673-5075-4
978-1-4673-5076-1
DOI
https://doi.org/10.1109/PerComW.2013.6529565

Moversight: A Group Communication Protocol for Mobile Collaborative Applications

Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013), Dubai, United Arab Emirates, 23 - 25th April 2013, S. 72 - 79
ISBN
978-1-4673-5615-2
978-1-4673-5614-5

Towards Learning Normality for Anomaly Detection in Industrial Control Networks

Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Heidleberg
Source
Proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013), Barcelona, Spain, June 25-28, 2013, S. 61 - 72
ISBN
978-3-642-38997-9
Lecture Notes in Computer Science ; 7943

Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO

Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Springer
Source
Detection of Intrusions and Malware, and Vulnerability Assessment, 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, proceedings, S. 160 - 176
ISBN
978-3-642-39234-4
Lecture notes in computer science ; 7967

Moversight: An Approach to Support Mobility in Collaborative Applications

Author(s)
Gäbler, Jan, König, Hartmut
Type
image
Year of publication
2013
Publisher name
IEEE
ISBN
978-1-4799-0747-2
URL
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6578331
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6573245

A 6LoWPAN Model for OMNeT++

Author(s)
Kirsche, Michael, Hartwig, Jonas
Type
image
Year of publication
2013
ISBN
978-1-4503-2464-9
URL
http://dl.acm.org/citation.cfm?id=2512781

Network Attack Detection and Defense

Author(s)
König, Hartmut
Type
Scientific Article ref.
Year of publication
2012
Source
Praxis der Informationsverarbeitung und Kommunikation : (PIK)
Volume
35
Issue/Journal number
1
ISSN
0930-5157
DOI
https://doi.org/10.1515/pik-2012-0001

Towards a seamless mobility solution for the real world: Handover decision

Author(s)
Pink, Mario, Pietsch, Thomas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Hand-over decision, International Symposium on Wireless Communication Systems 2012, August 2012, Paris, France, S. 651 - 655
ISBN
978-1-4673-0761-1
DOI
https://doi.org/10.1109/ISWCS.2012.6328448

An adaptive Handover decision algorithm for heterogeneous wireless networks

Author(s)
Pink, Mario, Pietsch, Thomas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
Berlin : Springer
Source
Mobile Wireless Middleware, Operating Systems, and Applications, 5th International Conference, Mobilware 2012, Berlin, Germany, November 13-14, 2012, S. 136 - 149
ISBN
978-3-642-36659-8

Intrusion Detection for Automation Technology

Author(s)
Schuster, Franka
Editor(s)
Mulliner, Collin, Stewin, Patrick
Type
conference publication
Year of publication
2012
Publisher name
Berlin : GI FG SIDAR
Source
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING)
URL
http://www.sec.t-labs.tu-berlin.de/spring/Program.html

Automated Generation of Precise Signatures

Author(s)
Vogel, Michael, Rietz, René, Schmerl, Sebastian
Type
Scientific Article ref.
Year of publication
2012
Source
Praxis der Informationsverarbeitung und Kommunikation : (PIK), S. 40 - 45
Volume
35
Issue/Journal number
1
ISSN
0930-5157
DOI
https://doi.org/10.1515/pik-2012-0007

On the Formalization of UML Activities for Component-Based Protocol Design Specifications

Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Editor(s)
Katzenbeisser, Stefan
Type
conference publication
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
Source
Theory and practice of computer science, SOFSEM 2012, 38th Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 21 - 27, 2012, S. 479 - 491
ISBN
978-3-642-27659-0
URL
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-27659-0
Lecture notes in computer science ; 7147

XMPP to the Rescue: Enhancing Post Disaster Management and Joint Task Force Work

Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
Piscataway, NJ : IEEE
Source
2012 IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Lugano, Switzerland, 19 - 23 March 2012, S. 752 - 757
ISBN
978-1-467-30256-2

Bonjour Contiki: A Case Study of a DNS-Based Discovery Service for the Internet of Things

Author(s)
Klauck, Ronny, Kirsche, Michael
Editor(s)
Li, Xiang-Yang, Papavassiliou, Symeon, Ruehrup, Stefan
Type
conference publication
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
Source
Ad-hoc, mobile, and wireless networks, 11th international conference, ADHOC-NOW 2012, Belgrade, Serbia, July 9 - 11, 2012, proceedings, S. 317 - 330
ISBN
978-3-642-31637-1
978-3-642-31638-8
Lecture notes in computer science ; 7363

Chatty Things - Making the Internet of Things Readily Usable for the Masses with XMPP

Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012), Pittsburgh, Pennsylvania, USA, October, 2012, S. 60 - 69
ISBN
978-1-4673-2740-4

Dualisierung graphischer Benutzeroberflächen: Portierung einer GUI vom Desktop auf Smartphone

Author(s)
Koall, Sebastian, Klauck, Ronny
Type
book
Year of publication
2012
Publisher name
Berlin : Akademieverlag
ISBN
978-3-639-39126-8

A Distributed Intrusion Detection System for Industrial Automation Networks

Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Proceedings of the 17th International Conference on Emerging Technologies & Factory Automation, Krakau, Polen, September 2012, S. 1 - 4
ISBN
978-1-4673-4736-5
DOI
https://doi.org/10.1109/ETFA.2012.6489703

Verwundbarkeitsanalyse des Industrial-Ethernet Protokolls Profinet IO

Author(s)
Paul, Andreas
Editor(s)
Stewin, Patrick, Mulliner, Collin
Type
conference publication
Year of publication
2012
Publisher name
Berlin : GI FG SIDAR
Source
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING)
URL
http://www.sec.t-labs.tu-berlin.de/spring/Program.html

Unify to Bridge Gaps: Bringing XMPP into the Internet of Things

Author(s)
Kirsche, Michael, Klauck, Ronny
Type
conference publication
Year of publication
2012
Publisher name
Piscataway, NJ : Institute of Electrical and Electronics Engineers (IEEE )
Source
2012 IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Lugano, Switzerland, 19 - 23 March 2012, S. 455 - 458
ISBN
978-1-467-30256-2

Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives

Editor(s)
Carle, Georg, Debar, Hervé, Dressler, Falko, König, Hartmut
Type
book (editor)
Year of publication
2012
Publisher name
Schloss Dagstuhl : DROPS
URL
http://drops.dagstuhl.de/opus/volltexte/2012/3476/
URN
urn:nbn:de:0030-drops-34761
DOI
https://doi.org/10.4230/DagRep.2.2.1

Protocol Engineering

Author(s)
König, Hartmut
Type
book
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
ISBN
978-3-642-29144-9

A Simple Balanced Password-Authenticated Key Agreement Protocol

Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, ICESS 2011, FCST 2011, Conferences, Symposiums and Workshops, 16-18 November 2011, Changsha, Hunan Province, China, S. 403 - 408
ISBN
978-0-7695-4600-1

uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen

Author(s)
Kirsche, Michael, Dreissig, Matthias, Kopsch, Ralf, Gäbler, Jan, Klauck, Ronny, Pink, Mario, Liu, Fuwen, König, Hartmut
Type
Scientific Article ref.
Year of publication
2011
Source
Praxis der Informationsverarbeitung und Kommunikation : (PIK), S. 11 - 22
Volume
34
Issue/Journal number
1
ISSN
0930-5157
DOI
https://doi.org/10.1515/PIKO.2011.003

Cryptanalysis of a SIP Authentication Scheme

Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Decker, Bart De, Lapon, Jorn, Naessens, Vincent, Uhl, Andreas
Type
conference publication
Year of publication
2011
Publisher name
Heidelberg [u.a.] : Springer
Source
Lecture notes in computer science ; 7025
Source
Communications and multimedia security, 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, S. 134 - 143
ISBN
978-3-642-24711-8

Lemon Tree - Flexible Deichüberwachung mit XMPP und Cloud-Diensten

Author(s)
Gäbler, Jan, Klauck, Ronny, Schöpke, Sebastian, König, Hartmut, Werner, Martin, Roth, Jörg
Type
Scientific Article not ref.
Year of publication
2011
Publisher name
Berlin : Logos-Verlag
Source
8. GI/ITG KuVS-Fachgespräch Ortsbezogene Anwendungen und Dienst, S. 137 - 148
ISBN
978-3-8325-3041-9

Security for Practical CoAP Applications: Issues and Solution Approaches

Author(s)
Brachmann, Martina, Garcia-Morchon, Oscar, Kirsche, Michael
Editor(s)
Frey, Hannes
Type
conference publication
Year of publication
2011
Source
10. Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme, 15. ‐ 16. September2011, S. 69 - 72
URL
http://www-old.cs.uni-paderborn.de/fileadmin/Informatik/AG-Karl/Events/fgsn2011/fgsn2011.pdf

An Approach to Synchronize UML-basedDesign Components for Model-Driven Protocol Development

Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE
Source
Proceedings, 2011 34th IEEE Software Engineering Workshop, 20-21 June 2011, Limerick, Ireland, S. 27 - 35
ISBN
978-1-4673-0245-6

Uncertainty, Protocol Behavior Prediction Through Chaos Theory?

Author(s)
Kaliappan, Prabhu Shankar
Type
conference publication
Year of publication
2011
Publisher name
IEEE
Source
2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, Bali, Indonesia 4-7 August 2011, Vol. 1, S. 20 - 24
ISBN
978-1-4244-9985-4

Integration von P2PSIP in eine kollaborative Anwendung: Am Beispiel des P2P-Videokonferenzsystems BRAVIS

Author(s)
Klauck, Ronny
Type
book
Year of publication
2011
Publisher name
Saarbrücken : VDM Verl. Dr. Müller
ISBN
978-3-639-36714-0

Mobile XMPP and Cloud Service Collaboration: An Alliance for Flexible Disaster Management

Author(s)
Klauck, Ronny, Kirsche, Matthias, Gäbler, Jan, Schöpke, Sebastian
Type
Scientific Article not ref.
Year of publication
2011
Publisher name
Piscataway, NJ : IEEE
Source
7th International Conference on Collaborative Computing, Networking, Applications and Worksharing (CollaborateCom 2011), Orlando, Florida, USA, 15 - 18 October 2011, S. 201 - 211
ISBN
978-1-467-30683-6

Model-Driven Protocol Design Based on Component Oriented Modeling

Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut, Schmerl, Sebastian, Dong, Jin Song, Zhu, Huibiao
Type
conference publication
Year of publication
2010
Publisher name
Berlin [u.a.] : Springer
Source
Formal methods and software engineering, proceedings 12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, November 17 - 19, 2010, S. 613 - 629
ISBN
978-3-642-16900-7
URL
www.springer.com/lncs
Lecture notes in computer science ; 6447

A Survey of Video Encryption Algorithms

Author(s)
Liu, Fuwen, König, Hartmut
Type
Scientific Article ref.
Year of publication
2010
Source
Computers & security 29(2010)1, S. 3-15, 0167-4048

Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development

Author(s)
Schmerl, Sebastian, Vogel, Michael, Rietz, René, König, Hartmut
Type
conference publication
Year of publication
2010
Publisher name
Piscataway, NJ : IEEE
Source
2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, California, USA, 20 May 2010, S. 109 - 118
ISBN
978-1-424-47220-8

IEEE 802.15.4 Performance Analysis

Author(s)
Kirsche, Michael
Editor(s)
Wehrle, Klaus
Type
conference publication
Year of publication
2010
Source
Modeling and tools for network simulation, S. 317 - 325
ISBN
978-3-642-12330-6

Security Considerations on Pervasive Real-time Collaboration

Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2009
Publisher name
Piscataway, NJ : IEEE
Source
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009, MASS '09, 12 - 15 Oct. 2009, Macau, China, S. 722 - 727
ISBN
978-1-424-45114-2

Prognose freier Rechenkapazitäten zur besseren Nutzung von Grid-Ressourcen

Author(s)
Opitz, Alek
Type
doctoralthesis
Year of publication
2009
Grid Computing; Ressourcenallokation; Künstliche Intelligenz
URN
urn:nbn:de:kobv:co1-opus-9527

Predicting Free Computing Capacities on Individual Machines

Author(s)
Opitz, Alek, König, Hartmut
Type
conference publication
Year of publication
2009
Source
Abdennadher, Nabil (Hrsg.): Advances in Grid and Pervasive Computing. 4th International Conference, GPC 2009, Geneva, Switzerland, May 2009. - Berlin : Springer, 2009, S. 153 - 164, 978-3-642-01670-7 (Lecture notes in computer science ; 5529)

Analyseverlagerung in P2P-Overlaynetzen

Author(s)
Vogel, Michael, Schmerl, Sebastian, König, Hartmut
Type
Scientific Article ref.
Year of publication
2009
Source
PIK - Praxis der Informationsverarbeitung und Kommunikation 32 (2009) 3, S. 188 -200, 0930-5157, 1865-8342 (Online)

Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop

Author(s)
Carle, Georg, Dressler, Falko, Kemmerer, Richard A., König, Hartmut, Kruegel, Christopher, Laskov, Pavel
Type
Scientific Article ref.
Year of publication
2009
Source
Computer science research & development 23(2009)1, S. 15-25, 1865-2034, 1865-2042 (Online)

Cooperating Intrusion Detection Overlay Structures

Author(s)
Schmerl, Sebastian, Vogel, Michael, König, Hartmut
Type
conference publication
Year of publication
2009
Source
4th GI/ITG KuVS Workshop on Future Internet and 2nd Workshop on Economic Traffic Management (ETM), Zürich, Switzerland, 9 - 10. November 2009

Identifying Modeling Errors in Signatures by Model Checking.

Author(s)
Schmerl, Sebastian, Vogel, Michael, König, Hartmut
Type
conference publication
Year of publication
2009
Source
Model checking software : 16th International SPIN Workshop, Grenoble, France, June 26-28, 2009 ; proceedings. - Berlin[u.a.] : Springer, 2009, S. 205-222, 978-3-642-02651-5 (Lecture Notes in Computer Science ; 5578)

Integrating P2PSIP into Collaborative P2P Applications: A Case Study with the P2P Videoconferencing System BRAVIS

Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2009
Source
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom, 11 - 14 November 2009, Crystal City, Washington D.C., USA
ISBN
978-963-979976-9

Efficient Analysis Distribution for Intrusion Detection

Author(s)
Schmerl, Sebastian, Vogel, Michael
Type
conference publication
Year of publication
2008
Source
Proceedings of the NATO RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, 2008, Ljubljana, Slovenia

Systematic Signature Engineering by Re-use of Snort Signatures

Author(s)
Schmerl, Sebastian, König, Hartmut, Flegel, Ulrich, Meier, Michael, Rietz, René
Type
conference publication
Year of publication
2008
Source
Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, California, USA, December 2008, S. 23 - 32
URL
http://www.acsac.org/openconf2008/modules/request.php?module=oc_proceedings&action=proceedings.php&a=Accept

Perspectives Workshop: Network Attack Detection and Defense

Editor(s)
Carle, Georg, Dressler, Falko, Kemmerer, Richard A., König, Hartmut, Kruegel, Christopher, Laskov, Pavel
Type
conference publication
Year of publication
2008
Source
Dagstuhl Seminar 08102, 02.03. - 06.03.2008
URL
http://drops.dagstuhl.de/opus/portals/index.php?semnr=08102

Designing and Verifying Communication Protocols using Model Driven Architecture and Spin Model Checker

Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut, Kaliappan, V. K.
Type
conference publication
Year of publication
2008
Source
Proceedings of the IEEE International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, Dec. 2008. - Piscataway, NJ : IEEE, 2008, S. 227 - 230, 978-0-7695-3336-0

Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort

Author(s)
Schmerl, Sebastian, Rietz, René, König, Hartmut
Editor(s)
Alkassar, Ammar
Type
conference publication
Year of publication
2008
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2008, Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.(GI), 2. - 4. April 2008 im Saarbrücker Schloss, S. 367 - 379
ISBN
978-3-88579-222-2
GI-Edition : Proceedings ; 128

P2P-basierte Analyseverteilung für Intrusion Detection Systeme.

Author(s)
Vogel, Michael
Editor(s)
Flegel, Ulrich, Holz, Thorsten
Type
conference publication
Year of publication
2008
Source
Proceedings of the 3rd GI Graduate Workshop on Reactive Security (SPRING), Mannheim, August 2008, SIDAR-Report SR-2008-01
URL
http://docplayer.org/3686739-3-gi-fg-sidar-graduierten-workshop-ueber-reaktive-sicherheit-spring-ulrich-flegel-thorsten-holz-hrsg-08-august-2008-mannheim.html
SIDAR-Report ; SR-2008-01

Verifikation von Signaturen - Spezifikationsfehlern auf der Spur

Author(s)
Schmerl, Sebastian
Editor(s)
Flegel, Ulrich, Holz, Thorsten
Type
conference publication
Year of publication
2008
Source
Proceedings of the 3rd GI Graduate Workshop on Reactive Security (SPRING), S. 15
URL
http://docplayer.org/3686739-3-gi-fg-sidar-graduierten-workshop-ueber-reaktive-sicherheit-spring-ulrich-flegel-thorsten-holz-hrsg-08-august-2008-mannheim.html
SIDAR-Report ; SR-2008-01

What Does Grid Computing Cost?

Author(s)
Opitz, Alek, König, Hartmut, Szamlewska, Sebastian
Type
article
Year of publication
2008
Source
Journal of Grid Computing 6 (2008) 4, S. 385 - 397, 1570-7873, 1572-9814 (Online)

Designing a Security Architecture for a P2P Video Conference System

Author(s)
Liu, Fuwen, König, Hartmut, Wang, W.
Type
article
Year of publication
2008
Source
China Communications 5(2008)2, S. 49 - 58

Designing Security Architecture for a P2P Video Conference System

Author(s)
Liu, F., König, Hartmut
Type
conference publication
Year of publication
2007
Source
Proceedings (CD) of the 2007 IEEE Second International Conference in Communications and Networking in China (ChinaCom 2007), August 22 - 24, Shanghai, China. - Piscataway, N.J. : IEEE, 2007, 1-4244-1009-6

Towards Systematic Signature Testing

Author(s)
Schmerl, Sebastian, König, Hartmut
Editor(s)
Petrenko, Alexandre
Type
conference publication
Year of publication
2007
Publisher name
Berlin [u.a.] : Springer
Source
19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallin, Estonia, June 26-29, 2007, Proceedings, S. 276 - 291
ISBN
3-540-73065-6
978-3-540-73065-1
Lecture Notes in Computer Science ; 4581

Efficiency Issues of Rete-based, Expert Systems for Misuse Detection

Author(s)
Meier, Michael, Flegel, Ulrich, Schmerl, Sebastian
Type
Scientific Article not ref.
Year of publication
2007
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, 10 - 14 December 2007, Miami Beach, Florida, S. 151 - 160
ISBN
978-0-7695-3060-4

Simplifying Signature Engineering by Reuse

Author(s)
Schmerl, Sebastian, Meier, Michael, König, Hartmut, Flegel, Ulrich
Editor(s)
Müller, Günter
Type
conference publication
Year of publication
2006
Publisher name
Berlin [u.a.] : Springer
Source
Emerging trends in information and communication security, ETRICS 2006, Freiburg, Germany, June 6 - 9, 2006 Conference, Freiburg, Germany, June 2006, S. 436 - 450
ISBN
3-540-34640-6
Lecture notes in computer science ; 3995

Validierung von Signaturen - Testmethoden zur Feststellung von Korrektheit und Präzision

Author(s)
Schmerl, Sebastian
Editor(s)
Flegel, Ulrich
Type
conference publication
Year of publication
2006
Source
Flegel U. (Hrsg.): Proceedings of the First GI Graduate Workshop on Reactive Security (SPRING) : Technical Report SR-2006-01, Berlin, July 2006
URL
https://eldorado.uni-dortmund.de/handle/2003/22609

Vereinfachung der Signaturentwicklung durch Wiederverwendung

Author(s)
Schmerl, Sebastian, Flegel, Ulrich, Meier, Michael
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2006
Source
Dittmann, J. (Hrsg.): Proceedings of the Third GI Conference on "Sicherheit - Schutz und Zuverlässigkeit": Magdeburg, Germany, February 20 - 23, 2006 - Bonn : Ges. für Informatik, 2006, S. 201-212, 3-88579-171-4 (Lecture Notes in informatics ; 77)

A security architecture for a peer-to-peer video conference system

Author(s)
Liu, Fuwen
Type
doctoralthesis
Year of publication
2006
Peer-to-Peer-Netz; Videokonferenz; Computersicherheit; Sicherheitsarchitektur; Gruppenschlüsselverwaltung; Videoverschlüsselung
URL
http://opus.kobv.de/btu/volltexte/2007/44/
URN
urn:nbn:de:kobv:co1-opus-445

Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen

Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Müller, Paul (Hrsg.): Kommunikation in Verteilten Systemen : KiVS 2005 ; Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005. - Bonn : Ges. für Informatik, 2005, S. 163-167, 3-88579-390-3

Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen

Author(s)
Rakel, Daniel, König, Hartmut, Schmitt, Jens B.
Editor(s)
Müller, Paul
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Kommunikation in verteilten Systemen, Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern, S. 159 - 162
ISBN
3-88579-390-3
GI-Edition : Proceedings ; 61

Secure and Efficient Key Distribution for Collaborative Applications

Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Publisher name
Piscataway, NJ : IEEE Operations Center
Source
2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 19 - 22 December 2005, San Jose, CA, S. 120 - 130
ISBN
1-424-40030-9

Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen

Author(s)
König, Hartmut
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! : Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S.638-643, 3-88579-397-0

Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten

Author(s)
Schmerl, Sebastian
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! ; Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S. 648-652, 3-88579-397-0

A Novel Encryption Algorithm for High Resolution Video

Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Proceedings of the 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, Stevenson, USA, 2005, S. 69-74, 1-58113-987-X

Optimizing the Access to Read-Only Data in Grid Computing

Author(s)
Opitz, Alek, König, Hartmut
Editor(s)
Kutvonen, Lea
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Distributed applications and interoperable systems, 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, proceedings, S. 206 - 219
ISBN
3-540-26262-8
URL
www.springer.com/lncs
Lecture notes in computer science ; 3543

Effiziente Analyseverfahren für Intrusion-Detection Systeme

Author(s)
Meier, Michael, Schmerl, Sebastian
Editor(s)
Federrath, Hannes
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2005, Sicherheit, Schutz und Zuverlässigkei, 5. - 8. April 2005 in Regensburg, 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., S. 209 - 220
ISBN
3-88579-391-1

Efficient Key Distribution for ClosedMeetings in the Internet

Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005, S. 271 - 272
ISBN
3-540-28791-4
Lecture notes in computer science ; 3677

Puzzle - A Novel Video Encryption Algorithm

Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana, Katzenbeisser, Stefan, Uhl, Andreas
Type
conference publication
Year of publication
2005
Source
9th IFIP TC-6-11 International Conference, CMS 2005, Salzburg, Austria, September 2005, S. 88 - 97, 3-540-28791-4 (Lecture notes in computer science ; 3677 )
ISBN
3-540-28791-4
URL
http://www.springer.com/lncs

Improving the efficiency of misuse detection

Author(s)
Meier, Michael, Schmerl, Sebastian, König, Hartmut
Editor(s)
Julisch, Klaus
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Detection of intrusions and malware, and vulnerability assessment, second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, proceedings
ISBN
3-540-26613-5
Lecture notes in computer science ; 3548

Verteilt organisierte Mehrteilnehmer - Videokonferenzen für geschlossene Gruppen im Internet

Author(s)
Zühlke, Mario
Type
doctoralthesis
Year of publication
2004
Mehrteilnehmer-Videokonferenzen; QoS; Peer-To-Perr; Gruppenkommunikation; geschlossene Gruppen
URL
http://opus.kobv.de/btu/volltexte/2007/102/
URN
urn:nbn:de:kobv:co1-000000540

Verteilte Mehrteilnehmer-Videokonferenzen im Internet

Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
part of book (chapter)
Year of publication
2004
Source
Knop, Jan von (Hrsg.) : E-Science und Grid, Ad-hoc-Netze, Medienintegration : 18. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf, Bonn : Ges. für Informatik, 2004, S. 167 - 179, 3-88579-384-9 (GI-Edition : Proceedings ; 55)

Detection of intrusions and malware & vulnerability assessment : GI Special Interest SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004 ; proceedings

Editor(s)
Flegel, Ulrich, Meier, Michael
Type
book
Year of publication
2004
Publisher name
Bonn : Ges. für Informatik
ISBN
3-88579-375-X

A model for the semantics of attack signatures in misuse detection systems

Author(s)
Meier, Michael
Type
conference publication
Year of publication
2004
Source
Zhang, Kan (Hrsg.): 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings, Berlin [u.a.] : Springer, 2004, S. 158 - 169, 3-540-23208-7 (Lecture notes in computer science ; 3225)
ISBN
3-540-23208-7
URL
http://www.springer.com/lncs

Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment

Author(s)
Meier, Michael, Flegel, Ulrich, König, Hartmut
Type
Scientific Article not ref.
Year of publication
2004
Source
Praxis der Informationsverarbeitung und Kommunikation, S. 186 - 187
Volume
27
Issue/Journal number
4

Zur Entwicklung der Module "Grundlagen der Rechnernetze" und "High Performance Communication - Multimedia"

Author(s)
König, Hartmut
Type
part of book (chapter)
Year of publication
2004
Source
Fellbaum, Klaus (Hrsg.): eLearning an der Hochschule, Aachen : Shaker, 2004, S. 59 - 68, 3-8322-2531-5

A Signalling Protocol for Small Closed Dynamic Multi-peer Groups

Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Mammeri, Zoubir
Type
conference publication
Year of publication
2004
Publisher name
Berlin [u.a.] : Springer
Source
High speed networks and multimedia communications, 7th IEEE international conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, proceedings, S. 973 - 984
ISBN
3-540-22262-6
Lecture notes in computer science ; 3079

Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 : 4 - 8 October 2004, Berlin, Germany

Author(s)
La Porta, Tom, Ramjee, Ram, König, Hartmut
Type
book
Year of publication
2004
Publisher name
Los Alamitos, Calif. [u.a.] : IEEE Computer Society
ISBN
0-7695-2161-4

High-efficient intrusion detection infrastructure

Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2003
Publisher name
Neuilly-sur-Seine : NATO Research and Technology Organisation
Source
Real time intrusion detection, papers presented at the RTO Information Systems Technology Panel (IST) Symposium, held in Estoril, Portugal, 27 - 28 May 2002, S. 141 - 1412
ISBN
92-837-0032-5
Meeting proceedings / Research and Technology Organisation ; 101

High-Efficient Intrusion Detection Infrastructure

Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
part of book (chapter)
Year of publication
2003
Source
Knop, Jan von (Hrsg.): Security, E-Learning, E-Services : 17. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Düsseldorf, Bonn : Ges. für Informatik, 2003, S. 217 - 232, 3-88579-373-3 (GI-Edition : Proceedings ; 44)

BRAVIS - Ein Ansatz für geschlossene Mehrteilnehmer-Videokonferenzen im Internet

Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
conference publication
Year of publication
2003
Source
Irmscher, Klaus (Hrsg.): Kurzbeiträge, Praxisberichte und Workshop E-Learning / KiVS 2003, 13. ITG /GI-Fachtagung Kommunikation in Verteilten Systemen : 25. - 28. Februar 2003 in Leipzig, Berlin [u.a.] : VDE-Verl., 2003, S. 167 - 180, 3-8007-2753-6

Protocol Engineering : Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen

Author(s)
König, Hartmut
Type
book
Year of publication
2003
Publisher name
Stuttgart [u.a.] : Teubner
ISBN
3-519-00454-2

Consistency Support for a Decentralized Management in Closed Multiparty Conferences Using SIP

Author(s)
Popovici, Eduard, Mahlo, Ralf, Zühlke, Mario, König, Hartmut
Type
conference publication
Year of publication
2003
Source
ICON 2003 : The 11th IEEE International Conference on Networks, Sydney, Australia, September 28 - October 1, 2003, Piscataway, NJ : IEEE Operations Center, 2003, S. 295 - 300, 0-7803-7788-5

Formal techniques for networked and distribution systems - FORTE 2003

Editor(s)
König, Hartmut, Heiner, Monika, Wolisz, Adam
Type
book (editor)
Year of publication
2003
Publisher name
Berlin [u.a.] : Springer
ISBN
3-540-20175-0
Lecture notes in computer science ; 2767

Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services

Author(s)
König, Hartmut
Type
conference publication
Year of publication
2002
Source
Schieferdecker, I.; König, H.; Wolisz, A. (eds.): Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services. Kluwer Academic Publishers, 2002, ISBN: 0-7923-7695-1

Voting Based Bandwidth Management in Multiparty Video Conferences

Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Boavida, Fernando
Type
conference publication
Year of publication
2002
Publisher name
Berlin [u.a.] : Springer
Multiparty video conferences; closed groups; bandwidth management; QoS; voting procedures
Source
Protocols and systems for interactive distributed multimedia, proceedings, Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS PROMS 2002, Coimbra, Portugal, November 26 - 29, 2002
ISBN
3-540-00169-7
Lecture notes in computer science ; Vol. 2515

An Efficient Intrusion Detection System Design

Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa

Bausteine für effiziente Intrusion-Detection-Syteme

Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
article
Year of publication
2002
Source
Praxis der Informationsverarbeitung und Kommunikation : PIK, 25(2002)3, S. 144-157, ISSN 0930-5157

SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures

Author(s)
Meier, Michael, Bischof, Niels, Holz, Thomas
Type
conference publication
Year of publication
2002
Publisher name
Boston [u.a.] : Kluwer
Source
Security in the information society, IFIP TC11 17th, International Conference on Information Security (SEC2002) May, 7 - 9, 2002, Cairo, Egypt, S. 559 - 571
ISBN
1-402-07030-6

Virtual Private Components

Author(s)
Opitz, Alek, Mielke, Torsten, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Martikainen, Olli [Hrsg.]: Smart Networks : IFIP TC6 WG6.7 Seventh International Conference on Intelligence in Networks (SMARTNET 2002), April 8-10, 2002, Saariselkä, Lapland, Finland, S. 95 - 112, 1-4020-7008-X

Automated Derivation of ILP Implementations from SDL Specifications

Author(s)
Twarok, Sven, Langendörfer, Peter, König, Hartmut
Editor(s)
Kim, Myungchul
Type
conference publication
Year of publication
2001
Publisher name
Boston [u.a.] : Kluwer
Source
Formal techniques for networked and distributed systems, FORTE 2001, IFIP TC6/WG6.1 - 21st International Conference on Formal Techniques for Networked and Distributed Systems, August 28 - 31, 2001, Cheju Island, Korea, S. 3 - 18
ISBN
0-7923-7470-3

Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen

Author(s)
Langendörfer, Peter
Type
doctoralthesis
Year of publication
2001
Publisher name
Aachen : Shaker
ISBN
3-8265-8539-9
Berichte aus der Informatik

Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks

Author(s)
Langendörfer, Peter, Kraemer, Rolf, König, Hartmut
Type
article
Year of publication
2001
Source
The Journal of Supercomputing, S. 161 - 173
Volume
20
Issue/Journal number
2
ISSN
0920-8542