Das SICIA-Verfahren: Messung & Bewertung der IT-Sicherheit – mit oder ohne ISMS
Author(s)
Schuster, Franka, Mehner, Stefan
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr Münche
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 98 - 99
ISBN
978-3-943207-33-0
978-3-943207-34-7
INDI – Intelligente Intrusion-Detection-Systeme für Industrienetze
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 19
ISBN
978-3-943207-33-0
978-3-943207-34-7
Prozessnahe Kommunikation als besondere Herausforderung
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 57
ISBN
978-3-943207-33-0
978-3-943207-34-7
Informationstechnik in der Energieversorgung – Besonderheiten und Regularien
Author(s)
Kanisch, Heiko, Schuster, Franka, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 67 - 68
ISBN
978-3-943207-33-0
978-3-943207-34-7
Catching Intrusions: Classifier Performances for Detecting Network-specific Anomalies in Energy Systems
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 85
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 122 - 124
ISBN
978-3-943207-33-0
978-3-943207-34-7
SICIA – IT-Sicherheit in kritischen Netzen messen und systematisch verbessern
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 27 - 28
ISBN
978-3-943207-33-0
978-3-943207-34-7
Anwendung des SICIA-Verfahrens in der Praxis – am Beispiel eines ISMS
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Editor(s)
Rudel, Steffi, Lechner, Ulrike
Type
part of book (chapter)
Year of publication
2018
Publisher name
Neubiberg : Professur für Wirtschaftsinformatik, Universität der Bundeswehr München
Source
IT-Sicherheit für Kritische Infrastrukturen - State of the Art : Ergebnisse des Förderschwerpunkts IT-Sicherheit für Kritische Infrastrukturen ITS/KRITIS des BMBF, S. 139 - 144
ISBN
978-3-943207-33-0
978-3-943207-34-7
Network Topology Exploration for Industrial Networks
Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2017
Publisher name
Cham : Springer International Publishing
Source
2nd EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2016), October 31 - November 1, 2016, Leicester, Great Britain, S. 63 - 76
Insights on the Security and Dependability of Industrial Control Systems
Author(s)
Kargl, Frank, Heijden, Rens W. van der, König, Hartmut, Valdes, Alfonso, Dacier, Marc C.
Type
Scientific Article ref.
Year of publication
2014
Computer security;Industrial control;Industrial power systems;Industrial safety;Management;DCS;ICS;cyber-physical systems;distributed control systems;industrial control systems;security;security management
Global-scale Federated Access to Smart Objects Using XMPP
Author(s)
Schuster, Daniel, Grubitzsch, Philipp, Renzel, Dominik, Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2014
Publisher name
Piscataway, NJ : IEEE
Source
2014 IEEE International Conference on Internet of Things (iThings 2014), and IEEE green computing and communications (GreenCom 2014) and IEEE cyber, physical and social computing (CPSCom 2014), Taipei, Taiwan, 1 - 3 September 2014, S. 185 - 192
Detection of Intrusions and Malware, and Vulnerability Assessment, 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, S. 172 - 191
ISBN
978-3-319-08508-1
Lecture Notes in Computer Science ; 8550
uBeeMe - A Platform for Mobile Collaborative Applications
Author(s)
König, Hartmut, Gäbler, Jan, Klauck, Ronny, Pink, Mario, Sprejz, Michael
Type
Scientific Article ref.
Year of publication
2013
Source
PIK - Praxis der Informationsverarbeitung und Kommunikation, S. 43
Proceedings of the 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), Austin, Texas, USA, October, 2013, S. 188 - 196
Enhanced DNS Message Compression - Optimizing mDNS/DNS-SD for the Use in 6LoWPANs
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2013
Publisher name
IEEE
Source
Proceedings,9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 2013 (PerSeNS 2013), co-located with the 11th IEEE Conference on Pervasive Computing and Communication (PerCom 2013), San Diego, Calif., USA, 2013, S. 596 - 601
Moversight: A Group Communication Protocol for Mobile Collaborative Applications
Author(s)
Gäbler, Jan, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Piscataway, NJ : IEEE
Source
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013), Dubai, United Arab Emirates, 23 - 25th April 2013, S. 72 - 79
ISBN
978-1-4673-5615-2
978-1-4673-5614-5
Towards Learning Normality for Anomaly Detection in Industrial Control Networks
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Heidleberg
Source
Proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013), Barcelona, Spain, June 25-28, 2013, S. 61 - 72
ISBN
978-3-642-38997-9
Lecture Notes in Computer Science ; 7943
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO
Author(s)
Paul, Andreas, Schuster, Franka, König, Hartmut
Type
conference publication
Year of publication
2013
Publisher name
Berlin [u.a.] : Springer
Source
Detection of Intrusions and Malware, and Vulnerability Assessment, 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, proceedings, S. 160 - 176
ISBN
978-3-642-39234-4
Lecture notes in computer science ; 7967
Moversight: An Approach to Support Mobility in Collaborative Applications
An adaptive Handover decision algorithm for heterogeneous wireless networks
Author(s)
Pink, Mario, Pietsch, Thomas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
Berlin : Springer
Source
Mobile Wireless Middleware, Operating Systems, and Applications, 5th International Conference, Mobilware 2012, Berlin, Germany, November 13-14, 2012, S. 136 - 149
ISBN
978-3-642-36659-8
Intrusion Detection for Automation Technology
Author(s)
Schuster, Franka
Editor(s)
Mulliner, Collin, Stewin, Patrick
Type
conference publication
Year of publication
2012
Publisher name
Berlin : GI FG SIDAR
Source
Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING)
On the Formalization of UML Activities for Component-Based Protocol Design Specifications
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Editor(s)
Katzenbeisser, Stefan
Type
conference publication
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
Source
Theory and practice of computer science, SOFSEM 2012, 38th Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 21 - 27, 2012, S. 479 - 491
XMPP to the Rescue: Enhancing Post Disaster Management and Joint Task Force Work
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
Piscataway, NJ : IEEE
Source
2012 IEEE International Conference on Pervasive Computing and Communications (PerCom 2012), Lugano, Switzerland, 19 - 23 March 2012, S. 752 - 757
ISBN
978-1-467-30256-2
Bonjour Contiki: A Case Study of a DNS-Based Discovery Service for the Internet of Things
Author(s)
Klauck, Ronny, Kirsche, Michael
Editor(s)
Li, Xiang-Yang, Papavassiliou, Symeon, Ruehrup, Stefan
Type
conference publication
Year of publication
2012
Publisher name
Berlin [u.a.] : Springer
Source
Ad-hoc, mobile, and wireless networks, 11th international conference, ADHOC-NOW 2012, Belgrade, Serbia, July 9 - 11, 2012, proceedings, S. 317 - 330
ISBN
978-3-642-31637-1
978-3-642-31638-8
Lecture notes in computer science ; 7363
Chatty Things - Making the Internet of Things Readily Usable for the Masses with XMPP
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012), Pittsburgh, Pennsylvania, USA, October, 2012, S. 60 - 69
ISBN
978-1-4673-2740-4
Dualisierung graphischer Benutzeroberflächen: Portierung einer GUI vom Desktop auf Smartphone
Author(s)
Koall, Sebastian, Klauck, Ronny
Type
book
Year of publication
2012
Publisher name
Berlin : Akademieverlag
ISBN
978-3-639-39126-8
A Distributed Intrusion Detection System for Industrial Automation Networks
Author(s)
Schuster, Franka, Paul, Andreas, König, Hartmut
Type
conference publication
Year of publication
2012
Publisher name
IEEE
Source
Proceedings of the 17th International Conference on Emerging Technologies & Factory Automation, Krakau, Polen, September 2012, S. 1 - 4
A Simple Balanced Password-Authenticated Key Agreement Protocol
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, ICESS 2011, FCST 2011, Conferences, Symposiums and Workshops, 16-18 November 2011, Changsha, Hunan Province, China, S. 403 - 408
ISBN
978-0-7695-4600-1
uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen
An Approach to Synchronize UML-basedDesign Components for Model-Driven Protocol Development
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut
Type
conference publication
Year of publication
2011
Publisher name
Los Alamitos, Calif. : IEEE
Source
Proceedings, 2011 34th IEEE Software Engineering Workshop, 20-21 June 2011, Limerick, Ireland, S. 27 - 35
ISBN
978-1-4673-0245-6
Uncertainty, Protocol Behavior Prediction Through Chaos Theory?
Author(s)
Kaliappan, Prabhu Shankar
Type
conference publication
Year of publication
2011
Publisher name
IEEE
Source
2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, Bali, Indonesia 4-7 August 2011, Vol. 1, S. 20 - 24
ISBN
978-1-4244-9985-4
Integration von P2PSIP in eine kollaborative Anwendung: Am Beispiel des P2P-Videokonferenzsystems BRAVIS
Author(s)
Klauck, Ronny
Type
book
Year of publication
2011
Publisher name
Saarbrücken : VDM Verl. Dr. Müller
ISBN
978-3-639-36714-0
Mobile XMPP and Cloud Service Collaboration: An Alliance for Flexible Disaster Management
Author(s)
Klauck, Ronny, Kirsche, Matthias, Gäbler, Jan, Schöpke, Sebastian
Type
Scientific Article not ref.
Year of publication
2011
Publisher name
Piscataway, NJ : IEEE
Source
7th International Conference on Collaborative Computing, Networking, Applications and Worksharing (CollaborateCom 2011), Orlando, Florida, USA, 15 - 18 October 2011, S. 201 - 211
ISBN
978-1-467-30683-6
Model-Driven Protocol Design Based on Component Oriented Modeling
2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, California, USA, 20 May 2010, S. 109 - 118
ISBN
978-1-424-47220-8
IEEE 802.15.4 Performance Analysis
Author(s)
Kirsche, Michael
Editor(s)
Wehrle, Klaus
Type
conference publication
Year of publication
2010
Source
Modeling and tools for network simulation, S. 317 - 325
ISBN
978-3-642-12330-6
Security Considerations on Pervasive Real-time Collaboration
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2009
Publisher name
Piscataway, NJ : IEEE
Source
IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009, MASS '09, 12 - 15 Oct. 2009, Macau, China, S. 722 - 727
ISBN
978-1-424-45114-2
Prognose freier Rechenkapazitäten zur besseren Nutzung von Grid-Ressourcen
Predicting Free Computing Capacities on Individual Machines
Author(s)
Opitz, Alek, König, Hartmut
Type
conference publication
Year of publication
2009
Source
Abdennadher, Nabil (Hrsg.): Advances in Grid and Pervasive Computing. 4th International Conference, GPC 2009, Geneva, Switzerland, May 2009. - Berlin : Springer, 2009, S. 153 - 164, 978-3-642-01670-7 (Lecture notes in computer science ; 5529)
Model checking software : 16th International SPIN Workshop, Grenoble, France, June 26-28, 2009 ; proceedings. - Berlin[u.a.] : Springer, 2009, S. 205-222, 978-3-642-02651-5 (Lecture Notes in Computer Science ; 5578)
Integrating P2PSIP into Collaborative P2P Applications: A Case Study with the P2P Videoconferencing System BRAVIS
Author(s)
Klauck, Ronny, Kirsche, Michael
Type
conference publication
Year of publication
2009
Source
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom, 11 - 14 November 2009, Crystal City, Washington D.C., USA
ISBN
978-963-979976-9
Efficient Analysis Distribution for Intrusion Detection
Author(s)
Schmerl, Sebastian, Vogel, Michael
Type
conference publication
Year of publication
2008
Source
Proceedings of the NATO RTO Information Systems and Technology Panel (IST) Symposium on Information Assurance for Emerging and Future Military Systems, 2008, Ljubljana, Slovenia
Systematic Signature Engineering by Re-use of Snort Signatures
Author(s)
Schmerl, Sebastian, König, Hartmut, Flegel, Ulrich, Meier, Michael, Rietz, René
Type
conference publication
Year of publication
2008
Source
Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, California, USA, December 2008, S. 23 - 32
Designing and Verifying Communication Protocols using Model Driven Architecture and Spin Model Checker
Author(s)
Kaliappan, Prabhu Shankar, König, Hartmut, Kaliappan, V. K.
Type
conference publication
Year of publication
2008
Source
Proceedings of the IEEE International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, Dec. 2008. - Piscataway, NJ : IEEE, 2008, S. 227 - 230, 978-0-7695-3336-0
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort
Author(s)
Schmerl, Sebastian, Rietz, René, König, Hartmut
Editor(s)
Alkassar, Ammar
Type
conference publication
Year of publication
2008
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2008, Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.(GI), 2. - 4. April 2008 im Saarbrücker Schloss, S. 367 - 379
ISBN
978-3-88579-222-2
GI-Edition : Proceedings ; 128
P2P-basierte Analyseverteilung für Intrusion Detection Systeme.
Author(s)
Vogel, Michael
Editor(s)
Flegel, Ulrich, Holz, Thorsten
Type
conference publication
Year of publication
2008
Source
Proceedings of the 3rd GI Graduate Workshop on Reactive Security (SPRING), Mannheim, August 2008, SIDAR-Report SR-2008-01
Opitz, Alek, König, Hartmut, Szamlewska, Sebastian
Type
article
Year of publication
2008
Source
Journal of Grid Computing 6 (2008) 4, S. 385 - 397, 1570-7873, 1572-9814 (Online)
Designing a Security Architecture for a P2P Video Conference System
Author(s)
Liu, Fuwen, König, Hartmut, Wang, W.
Type
article
Year of publication
2008
Source
China Communications 5(2008)2, S. 49 - 58
Designing Security Architecture for a P2P Video Conference System
Author(s)
Liu, F., König, Hartmut
Type
conference publication
Year of publication
2007
Source
Proceedings (CD) of the 2007 IEEE Second International Conference in Communications and Networking in China (ChinaCom 2007), August 22 - 24, Shanghai, China. - Piscataway, N.J. : IEEE, 2007, 1-4244-1009-6
Towards Systematic Signature Testing
Author(s)
Schmerl, Sebastian, König, Hartmut
Editor(s)
Petrenko, Alexandre
Type
conference publication
Year of publication
2007
Publisher name
Berlin [u.a.] : Springer
Source
19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallin, Estonia, June 26-29, 2007, Proceedings, S. 276 - 291
ISBN
3-540-73065-6
978-3-540-73065-1
Lecture Notes in Computer Science ; 4581
Efficiency Issues of Rete-based, Expert Systems for Misuse Detection
Author(s)
Meier, Michael, Flegel, Ulrich, Schmerl, Sebastian
Type
Scientific Article not ref.
Year of publication
2007
Publisher name
Los Alamitos, Calif. : IEEE Computer Society
Source
Proceedings, Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, 10 - 14 December 2007, Miami Beach, Florida, S. 151 - 160
Emerging trends in information and communication security, ETRICS 2006, Freiburg, Germany, June 6 - 9, 2006 Conference, Freiburg, Germany, June 2006, S. 436 - 450
ISBN
3-540-34640-6
Lecture notes in computer science ; 3995
Validierung von Signaturen - Testmethoden zur Feststellung von Korrektheit und Präzision
Author(s)
Schmerl, Sebastian
Editor(s)
Flegel, Ulrich
Type
conference publication
Year of publication
2006
Source
Flegel U. (Hrsg.): Proceedings of the First GI Graduate Workshop on Reactive Security (SPRING) : Technical Report SR-2006-01, Berlin, July 2006
Vereinfachung der Signaturentwicklung durch Wiederverwendung
Author(s)
Schmerl, Sebastian, Flegel, Ulrich, Meier, Michael
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2006
Source
Dittmann, J. (Hrsg.): Proceedings of the Third GI Conference on "Sicherheit - Schutz und Zuverlässigkeit": Magdeburg, Germany, February 20 - 23, 2006 - Bonn : Ges. für Informatik, 2006, S. 201-212, 3-88579-171-4 (Lecture Notes in informatics ; 77)
A security architecture for a peer-to-peer video conference system
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Müller, Paul (Hrsg.): Kommunikation in Verteilten Systemen : KiVS 2005 ; Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005. - Bonn : Ges. für Informatik, 2005, S. 163-167, 3-88579-390-3
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen
Author(s)
Rakel, Daniel, König, Hartmut, Schmitt, Jens B.
Editor(s)
Müller, Paul
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Kommunikation in verteilten Systemen, Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern, S. 159 - 162
ISBN
3-88579-390-3
GI-Edition : Proceedings ; 61
Secure and Efficient Key Distribution for Collaborative Applications
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Publisher name
Piscataway, NJ : IEEE Operations Center
Source
2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 19 - 22 December 2005, San Jose, CA, S. 120 - 130
ISBN
1-424-40030-9
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen
Author(s)
König, Hartmut
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! : Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S.638-643, 3-88579-397-0
Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten
Author(s)
Schmerl, Sebastian
Type
conference publication
Year of publication
2005
Source
Cremers, Armin B. (Hrsg.): Informatik 2005 : Informatik live! ; Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 19. bis 22. September in Bonn. Bd. 2. - Bonn : Ges. für Informatik, 2005, S. 648-652, 3-88579-397-0
A Novel Encryption Algorithm for High Resolution Video
Author(s)
Liu, Fuwen, König, Hartmut
Type
conference publication
Year of publication
2005
Source
Proceedings of the 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, Stevenson, USA, 2005, S. 69-74, 1-58113-987-X
Optimizing the Access to Read-Only Data in Grid Computing
Author(s)
Opitz, Alek, König, Hartmut
Editor(s)
Kutvonen, Lea
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Distributed applications and interoperable systems, 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, proceedings, S. 206 - 219
Effiziente Analyseverfahren für Intrusion-Detection Systeme
Author(s)
Meier, Michael, Schmerl, Sebastian
Editor(s)
Federrath, Hannes
Type
conference publication
Year of publication
2005
Publisher name
Bonn : Ges. für Informatik
Source
Sicherheit 2005, Sicherheit, Schutz und Zuverlässigkei, 5. - 8. April 2005 in Regensburg, 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., S. 209 - 220
ISBN
3-88579-391-1
Efficient Key Distribution for ClosedMeetings in the Internet
Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana
Type
conference publication
Year of publication
2005
Publisher name
Berlin [u.a.] : Springer
Source
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005, S. 271 - 272
ISBN
3-540-28791-4
Lecture notes in computer science ; 3677
Puzzle - A Novel Video Encryption Algorithm
Author(s)
Liu, Fuwen, König, Hartmut
Editor(s)
Dittmann, Jana, Katzenbeisser, Stefan, Uhl, Andreas
Type
conference publication
Year of publication
2005
Source
9th IFIP TC-6-11 International Conference, CMS 2005, Salzburg, Austria, September 2005, S. 88 - 97, 3-540-28791-4 (Lecture notes in computer science ; 3677 )
Detection of intrusions and malware, and vulnerability assessment, second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, proceedings
ISBN
3-540-26613-5
Lecture notes in computer science ; 3548
Verteilt organisierte Mehrteilnehmer - Videokonferenzen für geschlossene Gruppen im Internet
Author(s)
Zühlke, Mario
Type
doctoralthesis
Year of publication
2004
Mehrteilnehmer-Videokonferenzen; QoS; Peer-To-Perr; Gruppenkommunikation; geschlossene Gruppen
Verteilte Mehrteilnehmer-Videokonferenzen im Internet
Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
part of book (chapter)
Year of publication
2004
Source
Knop, Jan von (Hrsg.) : E-Science und Grid, Ad-hoc-Netze, Medienintegration : 18. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf, Bonn : Ges. für Informatik, 2004, S. 167 - 179, 3-88579-384-9 (GI-Edition : Proceedings ; 55)
Detection of intrusions and malware & vulnerability assessment : GI Special Interest SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004 ; proceedings
Editor(s)
Flegel, Ulrich, Meier, Michael
Type
book
Year of publication
2004
Publisher name
Bonn : Ges. für Informatik
ISBN
3-88579-375-X
A model for the semantics of attack signatures in misuse detection systems
Author(s)
Meier, Michael
Type
conference publication
Year of publication
2004
Source
Zhang, Kan (Hrsg.): 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings, Berlin [u.a.] : Springer, 2004, S. 158 - 169, 3-540-23208-7 (Lecture notes in computer science ; 3225)
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment
Author(s)
Meier, Michael, Flegel, Ulrich, König, Hartmut
Type
Scientific Article not ref.
Year of publication
2004
Source
Praxis der Informationsverarbeitung und Kommunikation, S. 186 - 187
Volume
27
Issue/Journal number
4
Zur Entwicklung der Module "Grundlagen der Rechnernetze" und "High Performance Communication - Multimedia"
Author(s)
König, Hartmut
Type
part of book (chapter)
Year of publication
2004
Source
Fellbaum, Klaus (Hrsg.): eLearning an der Hochschule, Aachen : Shaker, 2004, S. 59 - 68, 3-8322-2531-5
A Signalling Protocol for Small Closed Dynamic Multi-peer Groups
Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Mammeri, Zoubir
Type
conference publication
Year of publication
2004
Publisher name
Berlin [u.a.] : Springer
Source
High speed networks and multimedia communications, 7th IEEE international conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, proceedings, S. 973 - 984
ISBN
3-540-22262-6
Lecture notes in computer science ; 3079
Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 : 4 - 8 October 2004, Berlin, Germany
Author(s)
La Porta, Tom, Ramjee, Ram, König, Hartmut
Type
book
Year of publication
2004
Publisher name
Los Alamitos, Calif. [u.a.] : IEEE Computer Society
ISBN
0-7695-2161-4
High-efficient intrusion detection infrastructure
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2003
Publisher name
Neuilly-sur-Seine : NATO Research and Technology Organisation
Source
Real time intrusion detection, papers presented at the RTO Information Systems Technology Panel (IST) Symposium, held in Estoril, Portugal, 27 - 28 May 2002, S. 141 - 1412
ISBN
92-837-0032-5
Meeting proceedings / Research and Technology Organisation ; 101
High-Efficient Intrusion Detection Infrastructure
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
part of book (chapter)
Year of publication
2003
Source
Knop, Jan von (Hrsg.): Security, E-Learning, E-Services : 17. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Düsseldorf, Bonn : Ges. für Informatik, 2003, S. 217 - 232, 3-88579-373-3 (GI-Edition : Proceedings ; 44)
BRAVIS - Ein Ansatz für geschlossene Mehrteilnehmer-Videokonferenzen im Internet
Author(s)
Popovici, Eduard, Zühlke, Mario, Mahlo, Ralf
Type
conference publication
Year of publication
2003
Source
Irmscher, Klaus (Hrsg.): Kurzbeiträge, Praxisberichte und Workshop E-Learning / KiVS 2003, 13. ITG /GI-Fachtagung Kommunikation in Verteilten Systemen : 25. - 28. Februar 2003 in Leipzig, Berlin [u.a.] : VDE-Verl., 2003, S. 167 - 180, 3-8007-2753-6
Protocol Engineering : Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen
Author(s)
König, Hartmut
Type
book
Year of publication
2003
Publisher name
Stuttgart [u.a.] : Teubner
ISBN
3-519-00454-2
Consistency Support for a Decentralized Management in Closed Multiparty Conferences Using SIP
ICON 2003 : The 11th IEEE International Conference on Networks, Sydney, Australia, September 28 - October 1, 2003, Piscataway, NJ : IEEE Operations Center, 2003, S. 295 - 300, 0-7803-7788-5
Formal techniques for networked and distribution systems - FORTE 2003
Editor(s)
König, Hartmut, Heiner, Monika, Wolisz, Adam
Type
book (editor)
Year of publication
2003
Publisher name
Berlin [u.a.] : Springer
ISBN
3-540-20175-0
Lecture notes in computer science ; 2767
Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services
Author(s)
König, Hartmut
Type
conference publication
Year of publication
2002
Source
Schieferdecker, I.; König, H.; Wolisz, A. (eds.): Testing of Communicating Systems XIV (TestCom 2002): Application to Internet Technologies and Services. Kluwer Academic Publishers, 2002, ISBN: 0-7923-7695-1
Voting Based Bandwidth Management in Multiparty Video Conferences
Author(s)
Zühlke, Mario, König, Hartmut
Editor(s)
Boavida, Fernando
Type
conference publication
Year of publication
2002
Publisher name
Berlin [u.a.] : Springer
Multiparty video conferences; closed groups; bandwidth management; QoS; voting procedures
Source
Protocols and systems for interactive distributed multimedia, proceedings, Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS PROMS 2002, Coimbra, Portugal, November 26 - 29, 2002
ISBN
3-540-00169-7
Lecture notes in computer science ; Vol. 2515
An Efficient Intrusion Detection System Design
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa
Bausteine für effiziente Intrusion-Detection-Syteme
Author(s)
Holz, Thomas, Meier, Michael, König, Hartmut
Type
article
Year of publication
2002
Source
Praxis der Informationsverarbeitung und Kommunikation : PIK, 25(2002)3, S. 144-157, ISSN 0930-5157
SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures
Author(s)
Meier, Michael, Bischof, Niels, Holz, Thomas
Type
conference publication
Year of publication
2002
Publisher name
Boston [u.a.] : Kluwer
Source
Security in the information society, IFIP TC11 17th, International Conference on Information Security (SEC2002) May, 7 - 9, 2002, Cairo, Egypt, S. 559 - 571
ISBN
1-402-07030-6
Virtual Private Components
Author(s)
Opitz, Alek, Mielke, Torsten, König, Hartmut
Type
conference publication
Year of publication
2002
Source
Martikainen, Olli [Hrsg.]: Smart Networks : IFIP TC6 WG6.7 Seventh International Conference on Intelligence in Networks (SMARTNET 2002), April 8-10, 2002, Saariselkä, Lapland, Finland, S. 95 - 112, 1-4020-7008-X
Automated Derivation of ILP Implementations from SDL Specifications
Author(s)
Twarok, Sven, Langendörfer, Peter, König, Hartmut
Editor(s)
Kim, Myungchul
Type
conference publication
Year of publication
2001
Publisher name
Boston [u.a.] : Kluwer
Source
Formal techniques for networked and distributed systems, FORTE 2001, IFIP TC6/WG6.1 - 21st International Conference on Formal Techniques for Networked and Distributed Systems, August 28 - 31, 2001, Cheju Island, Korea, S. 3 - 18
ISBN
0-7923-7470-3
Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen
Author(s)
Langendörfer, Peter
Type
doctoralthesis
Year of publication
2001
Publisher name
Aachen : Shaker
ISBN
3-8265-8539-9
Berichte aus der Informatik
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks
This website uses cookies. Those have two functions: On the one hand they are providing basic functionality for this website. On the other hand they allow us to improve our content for you by saving and analyzing anonymized user data. You can redraw your consent to using these cookies at any time. Find more information regarding cookies on our Data Protection Declaration and regarding us on the Imprint.