Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 85
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 122 - 124
ISBN
978-3-943207-33-0
978-3-943207-34-7
Das SICIA-Verfahren: Messung & Bewertung der IT-Sicherheit – mit oder ohne ISMS
Author(s)
Schuster, Franka, Mehner, Stefan
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr Münche
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 98 - 99
ISBN
978-3-943207-33-0
978-3-943207-34-7
Informationstechnik in der Energieversorgung – Besonderheiten und Regularien
Author(s)
Kanisch, Heiko, Schuster, Franka, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 67 - 68
ISBN
978-3-943207-33-0
978-3-943207-34-7
Prozessnahe Kommunikation als besondere Herausforderung
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 57
ISBN
978-3-943207-33-0
978-3-943207-34-7
INDI – Intelligente Intrusion-Detection-Systeme für Industrienetze
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 19
ISBN
978-3-943207-33-0
978-3-943207-34-7
SICIA – IT-Sicherheit in kritischen Netzen messen und systematisch verbessern
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 27 - 28
ISBN
978-3-943207-33-0
978-3-943207-34-7
Anwendung des SICIA-Verfahrens in der Praxis – am Beispiel eines ISMS
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 139 - 144
ISBN
978-3-943207-33-0
978-3-943207-34-7
Proceedings of the 4th OMNeT++ Community Summit, University of Bremen - Germany, September 7-8, 2017
Editor(s)
Förster, Anna, Udugama, Asanga, Könsgen, Andreas, Virdis, Antonio, Kirsche, Michael
Network Topology Exploration for Industrial Networks
Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2017
Publisher name
Cham : Springer International Publishing
Source
2nd EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), October 31 - November 1, 2016, Leicester, Great Britain, S. 63 - 76
Detection of Intrusions and Malware, and Vulnerability Assessment, 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, S. 172 - 191
ISBN
978-3-319-08508-1
Lecture Notes in Computer Science ; 8550
Insights on the Security and Dependability of Industrial Control Systems
Author(s)
Kargl, Frank, Heijden, Rens W. van der, König, Hartmut, Valdes, Alfonso, Dacier, Marc C.
Type
Scientific Article ref.
Year of publication
2014
Computer security;Industrial control;Industrial power systems;Industrial safety;Management;DCS;ICS;cyber-physical systems;distributed control systems;industrial control systems;security;security management
Global-scale Federated Access to Smart Objects Using XMPP
Author(s)
Schuster, Daniel, Grubitzsch, Philipp, Renzel, Dominik, Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2014
Publisher name
Piscataway, NJ : IEEE
Source
2014 IEEE International Conference on Internet of Things (iThings 2014), and IEEE green computing and communications (GreenCom 2014) and IEEE cyber, physical and social computing (CPSCom 2014), Taipei, Taiwan, 1 - 3 September 2014, S. 185 - 192
Enhanced DNS Message Compression - Optimizing mDNS/DNS-SD for the Use in 6LoWPANs
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2013
Publisher name
IEEE
Source
Proceedings,9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 2013 (PerSeNS 2013), co-located with the 11th IEEE Conference on Pervasive Computing and Communication (PerCom 2013), San Diego, Calif., USA, 2013, S. 596 - 601
Proceedings of the 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), Austin, Texas, USA, October, 2013, S. 188 - 196
Moversight: A Group Communication Protocol for Mobile Collaborative Applications
Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013), Dubai, United Arab Emirates, 23 - 25th April 2013, S. 72 - 79
ISBN
978-1-4673-5615-2
978-1-4673-5614-5
Towards Learning Normality for Anomaly Detection in Industrial Control Networks
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Heidleberg
Source
Proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013), Barcelona, Spain, June 25-28, 2013, S. 61 - 72
ISBN
978-3-642-38997-9
Lecture Notes in Computer Science ; 7943
uBeeMe - A Platform for Mobile Collaborative Applications
Author(s)
König, Hartmut, Gäbler, Jan, Klauck, Ronny, Pink, Mario, Sprejz, Michael
Type
Scientific Article ref.
Year of publication
2013
Source
PIK - Praxis der Informationsverarbeitung und Kommunikation, S. 43
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO
Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Springer
Source
Detection of Intrusions and Malware, and Vulnerability Assessment, 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, proceedings, S. 160 - 176
ISBN
978-3-642-39234-4
Lecture notes in computer science ; 7967
On the Formalization of UML Activities for Component-Based Protocol Design Specifications
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Editor(s)
Katzenbeisser, Stefan
Type
conference publication
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
Source
Theory and practice of computer science, SOFSEM 2012, 38th Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 21 - 27, 2012, S. 479 - 491
An adaptive Handover decision algorithm for heterogeneous wireless networks
Author(s)
Pink, Mario, Pietsch, Thomas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
Berlin : Springer
Source
Mobile Wireless Middleware, Operating Systems, and Applications, 5th International Conference, Mobilware 2012, Berlin, Germany, November 13-14, 2012, S. 136 - 149
ISBN
978-3-642-36659-8
Network Attack Detection and Defense
Author(s)
König, Hartmut
Type
Scientific Article ref.
Year of publication
2012
Source
Praxis der Informationsverarbeitung und Kommunikation : (PIK)
Chatty Things - Making the Internet of Things Readily Usable for the Masses with XMPP
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012), Pittsburgh, Pennsylvania, USA, October, 2012, S. 60 - 69
ISBN
978-1-4673-2740-4
XMPP to the Rescue: Enhancing Post Disaster Management and Joint Task Force Work
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
Piscataway, NJ : IEEE
Source
2012 IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Lugano, Switzerland, 19 - 23 March 2012, S. 752 - 757
ISBN
978-1-467-30256-2
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives
8. GI/ITG KuVS-Fachgespräch Ortsbezogene Anwendungen und Dienst, S. 137 - 148
ISBN
978-3-8325-3041-9
Mobile XMPP and Cloud Service Collaboration: An Alliance for Flexible Disaster Management
Author(s)
Klauck, Ronny, Kirsche, Matthias, Gäbler, Jan, Schöpke, Sebastian
Type
Scientific Article not ref.
Year of publication
2011
Publisher name
Piscataway, NJ : IEEE
Source
7th International Conference on Collaborative Computing, Networking, Applications and Worksharing (CollaborateCom 2011), Orlando, Florida, USA, 15 - 18 October 2011, S. 201 - 211
ISBN
978-1-467-30683-6
Uncertainty, Protocol Behavior Prediction Through Chaos Theory?
Author(s)
Kaliappan, Prabhu Shankar
Type
conference publication
Year of publication
2011
Publisher name
IEEE
Source
2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, Bali, Indonesia 4-7 August 2011, Vol. 1, S. 20 - 24
ISBN
978-1-4244-9985-4
An Approach to Synchronize UML-basedDesign Components for Model-Driven Protocol Development
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE
Source
Proceedings, 2011 34th IEEE Software Engineering Workshop, 20-21 June 2011, Limerick, Ireland, S. 27 - 35
ISBN
978-1-4673-0245-6
uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen
Integration von P2PSIP in eine kollaborative Anwendung: Am Beispiel des P2P-Videokonferenzsystems BRAVIS
Author(s)
Klauck, Ronny
Type
book
Year of publication
2011
Publisher name
Saarbrücken : VDM Verl. Dr. Müller
ISBN
978-3-639-36714-0
Cryptanalysis of a SIP Authentication Scheme
Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Decker, Bart De, Lapon, Jorn, Naessens, Vincent, Uhl, Andreas
Type
conference publication
Year of publication
2011
Publisher name
Heidelberg [u.a.] : Springer
Source
Lecture notes in computer science ; 7025
Source
Communications and multimedia security, 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, S. 134 - 143
ISBN
978-3-642-24711-8
A Simple Balanced Password-Authenticated Key Agreement Protocol
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, ICESS 2011, FCST 2011, Conferences, Symposiums and Workshops, 16-18 November 2011, Changsha, Hunan Province, China, S. 403 - 408
ISBN
978-0-7695-4600-1
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development
2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, California, USA, 20 May 2010, S. 109 - 118
ISBN
978-1-424-47220-8
Model-Driven Protocol Design Based on Component Oriented Modeling
Modeling and tools for network simulation, S. 317 - 325
ISBN
978-3-642-12330-6
A Survey of Video Encryption Algorithms
Author(s)
Liu, Fuwen, König, Hartmut
Type
Scientific Article ref.
Year of publication
2010
Source
Computers & security 29(2010)1, S. 3-15, 0167-4048
Predicting Free Computing Capacities on Individual Machines
Author(s)
Opitz, Alek, König, Hartmut
Type
conference publication
Year of publication
2009
Source
Abdennadher, Nabil (Hrsg.): Advances in Grid and Pervasive Computing. 4th International Conference, GPC 2009, Geneva, Switzerland, May 2009. - Berlin : Springer, 2009, S. 153 - 164, 978-3-642-01670-7 (Lecture notes in computer science ; 5529)
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop
Author(s)
Carle, Georg, Dressler, Falko, Kemmerer, Richard A., König, Hartmut, Kruegel, Christopher, Laskov, Pavel
Type
Scientific Article ref.
Year of publication
2009
Source
Computer science research & development 23(2009)1, S. 15-25, 1865-2034, 1865-2042 (Online)
Identifying Modeling Errors in Signatures by Model Checking.
Model checking software : 16th International SPIN Workshop, Grenoble, France, June 26-28, 2009 ; proceedings. - Berlin[u.a.] : Springer, 2009, S. 205-222, 978-3-642-02651-5 (Lecture Notes in Computer Science ; 5578)
PIK - Praxis der Informationsverarbeitung und Kommunikation 32 (2009) 3, S. 188 -200, 0930-5157, 1865-8342 (Online)
Integrating P2PSIP into Collaborative P2P Applications: A Case Study with the P2P Videoconferencing System BRAVIS
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2009
Source
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom, 11 - 14 November 2009, Crystal City, Washington D.C., USA
ISBN
978-963-979976-9
Security Considerations on Pervasive Real-time Collaboration
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2009
Publisher name
Piscataway, NJ : IEEE
Source
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009, MASS '09, 12 - 15 Oct. 2009, Macau, China, S. 722 - 727
ISBN
978-1-424-45114-2
Prognose freier Rechenkapazitäten zur besseren Nutzung von Grid-Ressourcen
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort
Author(s)
Schmerl, Sebastian, Rietz, René, König, Hartmut
Editor(s)
Alkassar, Ammar
Type
conference publication
Year of publication
2008
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2008, Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.(GI), 2. - 4. April 2008 im Saarbrücker Schloss, S. 367 - 379
ISBN
978-3-88579-222-2
GI-Edition : Proceedings ; 128
Designing a Security Architecture for a P2P Video Conference System
Author(s)
Liu, Fuwen, König, Hartmut, Wang, W.
Type
article
Year of publication
2008
Source
China Communications 5(2008)2, S. 49 - 58
Designing and Verifying Communication Protocols using Model Driven Architecture and Spin Model Checker
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut, Kaliappan, V. K.
Type
conference publication
Year of publication
2008
Source
Proceedings of the IEEE International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, Dec. 2008. - Piscataway, NJ : IEEE, 2008, S. 227 - 230, 978-0-7695-3336-0
What Does Grid Computing Cost?
Author(s)
Opitz, Alek, König, Hartmut, Szamlewska, Sebastian
Type
article
Year of publication
2008
Source
Journal of Grid Computing 6 (2008) 4, S. 385 - 397, 1570-7873, 1572-9814 (Online)
Verifikation von Signaturen - Spezifikationsfehlern auf der Spur
Author(s)
Schmerl, Sebastian
Editor(s)
Flegel, Ulrich, Holz, Thorsten
Type
conference publication
Year of publication
2008
Source
Proceedings of the 3rd GI Graduate Workshop on Reactive Security (SPRING), S. 15
Systematic Signature Engineering by Re-use of Snort Signatures
Author(s)
Schmerl, Sebastian, König, Hartmut, Flegel, Ulrich, Meier, Michael, Rietz, René
Type
conference publication
Year of publication
2008
Source
Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, California, USA, December 2008, S. 23 - 32
Efficient Analysis Distribution for Intrusion Detection
Author(s)
Schmerl, Sebastian, Vogel, Michael
Type
conference publication
Year of publication
2008
Source
Proceedings of the NATO RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, 2008, Ljubljana, Slovenia
P2P-basierte Analyseverteilung für Intrusion Detection Systeme.
Author(s)
Vogel, Michael
Editor(s)
Flegel, Ulrich, Holz, Thorsten
Type
conference publication
Year of publication
2008
Source
Proceedings of the 3rd GI Graduate Workshop on Reactive Security (SPRING), Mannheim, August 2008, SIDAR-Report SR-2008-01
Efficiency Issues of Rete-based, Expert Systems for Misuse Detection
Author(s)
Meier, Michael, Flegel, Ulrich, Schmerl, Sebastian
Type
Scientific Article not ref.
Year of publication
2007
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, 10 - 14 December 2007, Miami Beach, Florida, S. 151 - 160
ISBN
978-0-7695-3060-4
Designing Security Architecture for a P2P Video Conference System
Author(s)
Liu, F., König, Hartmut
Type
conference publication
Year of publication
2007
Source
Proceedings (CD) of the 2007 IEEE Second International Conference in Communications and Networking in China (ChinaCom 2007), August 22 - 24, Shanghai, China. - Piscataway, N.J. : IEEE, 2007, 1-4244-1009-6
Towards Systematic Signature Testing
Author(s)
Schmerl, Sebastian, König, Hartmut
Editor(s)
Petrenko, Alexandre
Type
conference publication
Year of publication
2007
Publisher name
Berlin [u.a.] : Springer
Source
19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallin, Estonia, June 26-29, 2007, Proceedings, S. 276 - 291
ISBN
3-540-73065-6
978-3-540-73065-1
Lecture Notes in Computer Science ; 4581
Vereinfachung der Signaturentwicklung durch Wiederverwendung
Author(s)
Schmerl, Sebastian, Flegel, Ulrich, Meier, Michael
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2006
Source
Dittmann, J. (Hrsg.): Proceedings of the Third GI Conference on "Sicherheit - Schutz und Zuverlässigkeit": Magdeburg, Germany, February 20 - 23, 2006 - Bonn : Ges. für Informatik, 2006, S. 201-212, 3-88579-171-4 (Lecture Notes in informatics ; 77)
Emerging trends in information and communication security, ETRICS 2006, Freiburg, Germany, June 6 - 9, 2006 Conference, Freiburg, Germany, June 2006, S. 436 - 450
ISBN
3-540-34640-6
Lecture notes in computer science ; 3995
Validierung von Signaturen - Testmethoden zur Feststellung von Korrektheit und Präzision
Author(s)
Schmerl, Sebastian
Editor(s)
Flegel, Ulrich
Type
conference publication
Year of publication
2006
Source
Flegel U. (Hrsg.): Proceedings of the First GI Graduate Workshop on Reactive Security (SPRING) : Technical Report SR-2006-01, Berlin, July 2006
Detection of intrusions and malware, and vulnerability assessment, second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, proceedings
ISBN
3-540-26613-5
Lecture notes in computer science ; 3548
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Müller, Paul (Hrsg.): Kommunikation in Verteilten Systemen : KiVS 2005 ; Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005. - Bonn : Ges. für Informatik, 2005, S. 163-167, 3-88579-390-3
Efficient Key Distribution for ClosedMeetings in the Internet
Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005, S. 271 - 272
ISBN
3-540-28791-4
Lecture notes in computer science ; 3677
Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten
Author(s)
Schmerl, Sebastian
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! ; Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S. 648-652, 3-88579-397-0
Effiziente Analyseverfahren für Intrusion-Detection Systeme
Author(s)
Meier, Michael, Schmerl, Sebastian
Editor(s)
Federrath, Hannes
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2005, Sicherheit, Schutz und Zuverlässigkei, 5. - 8. April 2005 in Regensburg, 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., S. 209 - 220
ISBN
3-88579-391-1
Secure and Efficient Key Distribution for Collaborative Applications
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Publisher name
Piscataway, NJ : IEEE Operations Center
Source
2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 19 - 22 December 2005, San Jose, CA, S. 120 - 130
ISBN
1-424-40030-9
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen
Author(s)
Rakel, Daniel, König, Hartmut, Schmitt, Jens B.
Editor(s)
Müller, Paul
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Kommunikation in verteilten Systemen, Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern, S. 159 - 162
ISBN
3-88579-390-3
GI-Edition : Proceedings ; 61
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen
Author(s)
König, Hartmut
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! : Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S.638-643, 3-88579-397-0
Puzzle - A Novel Video Encryption Algorithm
Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana, Katzenbeisser, Stefan, Uhl, Andreas
Type
conference publication
Year of publication
2005
Source
9th IFIP TC-6-11 International Conference, CMS 2005, Salzburg, Austria, September 2005, S. 88 - 97, 3-540-28791-4 (Lecture notes in computer science ; 3677 )
Optimizing the Access to Read-Only Data in Grid Computing
Author(s)
Opitz, Alek, König, Hartmut
Editor(s)
Kutvonen, Lea
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Distributed applications and interoperable systems, 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, proceedings, S. 206 - 219
A Novel Encryption Algorithm for High Resolution Video
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Proceedings of the 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, Stevenson, USA, 2005, S. 69-74, 1-58113-987-X
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment
Author(s)
Meier, Michael, Flegel, Ulrich, König, Hartmut
Type
Scientific Article not ref.
Year of publication
2004
Source
Praxis der Informationsverarbeitung und Kommunikation, S. 186 - 187
Volume
27
Issue/Journal number
4
Verteilte Mehrteilnehmer-Videokonferenzen im Internet
Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
part of book (chapter)
Year of publication
2004
Source
Knop, Jan von (Hrsg.) : E-Science und Grid, Ad-hoc-Netze, Medienintegration : 18. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf, Bonn : Ges. für Informatik, 2004, S. 167 - 179, 3-88579-384-9 (GI-Edition : Proceedings ; 55)
Zur Entwicklung der Module "Grundlagen der Rechnernetze" und "High Performance Communication - Multimedia"
Author(s)
König, Hartmut
Type
part of book (chapter)
Year of publication
2004
Source
Fellbaum, Klaus (Hrsg.): eLearning an der Hochschule, Aachen : Shaker, 2004, S. 59 - 68, 3-8322-2531-5
Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 : 4 - 8 October 2004, Berlin, Germany
Author(s)
La Porta, Tom, Ramjee, Ram, König, Hartmut
Type
book
Year of publication
2004
Publisher name
Los Alamitos, Calif. [u.a.] : IEEE Computer Society
ISBN
0-7695-2161-4
A model for the semantics of attack signatures in misuse detection systems
Author(s)
Meier, Michael
Type
conference publication
Year of publication
2004
Source
Zhang, Kan (Hrsg.): 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings, Berlin [u.a.] : Springer, 2004, S. 158 - 169, 3-540-23208-7 (Lecture notes in computer science ; 3225)
Detection of intrusions and malware & vulnerability assessment : GI Special Interest SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004 ; proceedings
Editor(s)
Flegel, Ulrich, Meier, Michael
Type
book
Year of publication
2004
Publisher name
Bonn : Ges. für Informatik
ISBN
3-88579-375-X
A Signalling Protocol for Small Closed Dynamic Multi-peer Groups
Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Mammeri, Zoubir
Type
conference publication
Year of publication
2004
Publisher name
Berlin [u.a.] : Springer
Source
High speed networks and multimedia communications, 7th IEEE international conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, proceedings, S. 973 - 984
ISBN
3-540-22262-6
Lecture notes in computer science ; 3079
Verteilt organisierte Mehrteilnehmer - Videokonferenzen für geschlossene Gruppen im Internet
Author(s)
Zühlke, Mario
Type
doctoralthesis
Year of publication
2004
Mehrteilnehmer-Videokonferenzen; QoS; Peer-To-Perr; Gruppenkommunikation; geschlossene Gruppen
Knop, Jan von (Hrsg.): Security, E-Learning, E-Services : 17. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Düsseldorf, Bonn : Ges. für Informatik, 2003, S. 217 - 232, 3-88579-373-3 (GI-Edition : Proceedings ; 44)
High-efficient intrusion detection infrastructure
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2003
Publisher name
Neuilly-sur-Seine : NATO Research and Technology Organisation
Source
Real time intrusion detection, papers presented at the RTO Information Systems Technology Panel (IST) Symposium, held in Estoril, Portugal, 27 - 28 May 2002, S. 141 - 1412
ISBN
92-837-0032-5
Meeting proceedings / Research and Technology Organisation ; 101
Formal techniques for networked and distribution systems - FORTE 2003
Editor(s)
König, Hartmut, Heiner, Monika, Wolisz, Adam
Type
book (editor)
Year of publication
2003
Publisher name
Berlin [u.a.] : Springer
ISBN
3-540-20175-0
Lecture notes in computer science ; 2767
Protocol Engineering : Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen
Author(s)
König, Hartmut
Type
book
Year of publication
2003
Publisher name
Stuttgart [u.a.] : Teubner
ISBN
3-519-00454-2
BRAVIS - Ein Ansatz für geschlossene Mehrteilnehmer-Videokonferenzen im Internet
Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
conference publication
Year of publication
2003
Source
Irmscher, Klaus (Hrsg.): Kurzbeiträge, Praxisberichte und Workshop E-Learning / KiVS 2003, 13. ITG /GI-Fachtagung Kommunikation in Verteilten Systemen : 25. - 28. Februar 2003 in Leipzig, Berlin [u.a.] : VDE-Verl., 2003, S. 167 - 180, 3-8007-2753-6
Consistency Support for a Decentralized Management in Closed Multiparty Conferences Using SIP
ICON 2003 : The 11th IEEE International Conference on Networks, Sydney, Australia, September 28 - October 1, 2003, Piscataway, NJ : IEEE Operations Center, 2003, S. 295 - 300, 0-7803-7788-5
An Efficient Intrusion Detection System Design
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa
Bausteine für effiziente Intrusion-Detection-Syteme
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
article
Year of publication
2002
Source
Praxis der Informationsverarbeitung und Kommunikation : PIK, 25(2002)3, S. 144-157, ISSN 0930-5157
SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures
Author(s)
Meier, Michael, Bischof, Niels, Holz, Thomas
Type
conference publication
Year of publication
2002
Publisher name
Boston [u.a.] : Kluwer
Source
Security in the information society, IFIP TC11 17th, International Conference on Information Security (SEC2002) May, 7 - 9, 2002, Cairo, Egypt, S. 559 - 571
ISBN
1-402-07030-6
Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services
Author(s)
König, Hartmut
Type
conference publication
Year of publication
2002
Source
Schieferdecker, I.; König, H.; Wolisz, A. (eds.): Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services. Kluwer Academic Publishers, 2002, ISBN: 0-7923-7695-1
Virtual Private Components
Author(s)
Opitz, Alek, Mielke, Torsten, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Martikainen, Olli [Hrsg.]: Smart Networks : IFIP TC6 WG6.7 Seventh International Conference on Intelligence in Networks (SMARTNET 2002), April 8-10, 2002, Saariselkä, Lapland, Finland, S. 95 - 112, 1-4020-7008-X
Voting Based Bandwidth Management in Multiparty Video Conferences
Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Boavida, Fernando
Type
conference publication
Year of publication
2002
Publisher name
Berlin [u.a.] : Springer
Multiparty video conferences; closed groups; bandwidth management; QoS; voting procedures
Source
Protocols and systems for interactive distributed multimedia, proceedings, Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS PROMS 2002, Coimbra, Portugal, November 26 - 29, 2002
ISBN
3-540-00169-7
Lecture notes in computer science ; Vol. 2515
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks
Automated Derivation of ILP Implementations from SDL Specifications
Author(s)
Twarok, Sven, Langendörfer, Peter, König, Hartmut
Editor(s)
Kim, Myungchul
Type
conference publication
Year of publication
2001
Publisher name
Boston [u.a.] : Kluwer
Source
Formal techniques for networked and distributed systems, FORTE 2001, IFIP TC6/WG6.1 - 21st International Conference on Formal Techniques for Networked and Distributed Systems, August 28 - 31, 2001, Cheju Island, Korea, S. 3 - 18
ISBN
0-7923-7470-3
Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen
Author(s)
Langendörfer, Peter
Type
doctoralthesis
Year of publication
2001
Publisher name
Aachen : Shaker
ISBN
3-8265-8539-9
Berichte aus der Informatik
About Cookies
This website uses cookies. There are two types of cookies: The first type supports the basic functionality of our website. The second allows us to improve our content for you by saving and analyzing pseudonymised user data. Since this second type is technically not required to run the website, you can withdraw your consent to those cookies at any time. For more information please visit our pages on data protection.