Hartmut König

Orcid: 0000-0002-8785-6383

Affiliations:
  • Brandenburg University of Technology, Cottbus, Germany


According to our database1, Hartmut König authored at least 132 papers between 1987 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation.
Comput. Commun., September, 2023

Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023

Radio-in-the-Loop Simulation Modeling for Energy-Efficient and Cognitive IoT in Smart Cities: A Cross-Layer Optimization Case Study.
Proceedings of the 18th Wireless On-Demand Network Systems and Services Conference, 2023

Whitelisting for Characterizing and Monitoring Process Control Communication.
Proceedings of the Network and System Security - 17th International Conference, 2023

2022
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

2021
Split-Protocol-Stack Wireless Network Emulation: Enabling PHY Modeling Diversity with Software-Radio-in-the-Loop.
Proceedings of the Q2SWinet 2021: Proceedings of the 17th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2021

2019
SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks.
Proceedings of the 15th IEEE/IFIP Wireless On-demand Network systems and Services Conference , 2019

An SDN-based Approach to Protect Communication Between Virtual Machines.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
An SDN-Based Approach to Ward Off LAN Attacks.
J. Comput. Networks Commun., 2018

SDN-based Attack Detection in Wireless Local Area Networks.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

Identifying Malicious Traffic in Software-Defined Wireless Local Area Networks.
Proceedings of the 2018 International Conference on Computing, 2018

2017
Security Challenges and Opportunities of Software-Defined Networking.
IEEE Secur. Priv., 2017

2016
Moversight: a group communication protocol for mobile scenarios.
Telecommun. Syst., 2016

Cleaning up Web 2.0's Security Mess-at Least Partly.
IEEE Secur. Priv., 2016

Network Attack Detection and Defense (Dagstuhl Seminar 16361).
Dagstuhl Reports, 2016

Firewalls for the Web 2.0.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

RADIator - An approach for controllable wireless networks.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Network Topology Exploration for Industrial Networks.
Proceedings of the Industrial Networks and Intelligent Systems, 2016

2015
Potentials of Using One-Class SVM for Detecting Protocol-Specific Anomalies in Industrial Networks.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Distributed latency estimation using global knowledge for mobile collaborative applications.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Puzzle - an efficient, compression independent video encryption algorithm.
Multim. Tools Appl., 2014

Insights on the Security and Dependability of Industrial Control Systems.
IEEE Secur. Priv., 2014

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014

Mobile bandwidth prediction in the context of emergency medical service.
Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, 2014

Parallelization of Network Intrusion Detection Systems under Attack Conditions.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
uBeeMe - A Platform for Mobile Collaborative Applications.
Prax. Inf.verarb. Kommun., 2013

Moversight: An approach to support mobility in collaborative applications.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

Location-independent fall detection with smartphone.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Moversight: A group communication protocol for mobile collaborative applications.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks.
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013

Enhancing group communication systems with mobility support.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

uBeeMe - A platform to enable mobile collaborative applications.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Towards Learning Normality for Anomaly Detection in Industrial Control Networks.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Network Attack Detection and Defense.
Prax. Inf.verarb. Kommun., 2012

Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012

On the Formalization of UML Activities for Component-Based Protocol Design Specifications.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

An Adaptive Handover Decision Algorithm for Heterogenous Wireless Networks.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2012

Towards a seamless mobility solution for the real world: Handover decision.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

Protocol Engineering.
Springer, ISBN: 978-3-642-29144-9, 2012

2011
Using model checking to identify errors in intrusion detection signatures.
Int. J. Softw. Tools Technol. Transf., 2011

Modeling a distributed intrusion detection system using collaborative building blocks.
ACM SIGSOFT Softw. Eng. Notes, 2011

uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen.
Prax. Inf.verarb. Kommun., 2011

A Simple Balanced Password-Authenticated Key Agreement Protocol.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Approach to Synchronize UML-Based Design Components for Model-Driven Protocol Development.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011

Cryptanalysis of a SIP Authentication Scheme.
Proceedings of the Communications and Multimedia Security, 2011

Efficient Distributed Signature Analysis.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
A survey of video encryption algorithms.
Comput. Secur., 2010

Iterative präzisionsbewertende Signaturgenerierung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Model-Driven Protocol Design Based on Component Oriented Modeling.
Proceedings of the Formal Methods and Software Engineering, 2010

2009
Analyseverlagerung in IDS-Overlaynetzen.
Prax. Inf.verarb. Kommun., 2009

Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009

Identifying Modeling Errors in Signatures by Model Checking.
Proceedings of the Model Checking Software, 2009

Security Considerations on Pervasive Real-time Collaboration.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Predicting Free Computing Capacities on Individual Machines.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

2008
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker.
J. Softw. Eng. Appl., 2008

What Does Grid Computing Cost?
J. Grid Comput., 2008

Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Security Policy Management for Peer Group Meetings.
Proceedings of the Second International Conference on Emerging Security Information, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Systematic Signature Engineering by Re-use of Snort Signatures.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
P2P-Videokonferenzen für geschlossene Gruppen.
Prax. Inf.verarb. Kommun., 2007

Towards Systematic Signature Testing.
Proceedings of the Testing of Software and Communicating Systems, 2007

2006
Simplifying Signature Engineering by Reuse.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
A Secure P2P Video Conference System for Enterprise Environments.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

A novel encryption algorithm for high resolution video.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

A Token Based Key Distribution Protocol for Closed Group Meetings.
Proceedings of the Network Control and Engineering for QoS, 2005

Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Improving the Efficiency of Misuse Detection.
Proceedings of the Detection of Intrusions and Malware, 2005

Optimizing the Access to Read-Only Data in Grid Computing.
Proceedings of the Distributed Applications and Interoperable Systems, 2005

Secure and efficient key distribution for collaborative applications.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Efficient Key Distribution for Closed Meetings in the Internet.
Proceedings of the Communications and Multimedia Security, 2005

Puzzle - A Novel Video Encryption Algorithm.
Proceedings of the Communications and Multimedia Security, 2005

2004
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment.
Prax. Inf.verarb. Kommun., 2004

A Signaling Protocol for Small Closed Dynamic Multi-peer Groups.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Verteilte Mehrteilnehmer-Videokonferenzen im Internet.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

2003
BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Consistency support for a decentralized management in close multiparty conferences using SIP.
Proceedings of the 11th IEEE International Conference on Networks, 2003

High-Efficient Intrusion Detection Infrastructure.
Proceedings of the Security, 2003

Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen.
Leitfäden der Informatik, Teubner, ISBN: 978-3-519-00454-7, 2003

2002
Bausteine für effiziente Intrusion-Detection-Systeme.
Prax. Inf.verarb. Kommun., 2002

GCP - A Group Communication Protocol for Supporting Closed Groups in the Internet.
Proceedings of the Smart Networks, 2002

Virtual Private Components - An Approach for Leasing Components.
Proceedings of the Smart Networks, 2002

Voting Based Bandwidth Management in Multiparty Video Conferences.
Proceedings of the Protocols and Systems for Interactive Distributed Multimedia, 2002

2001
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks.
J. Supercomput., 2001

Automated Derivation of ILP Implementations from SDL Specifications.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001

2000
Das OCTOPUS-Videokonferenzsystem.
Prax. Inf.verarb. Kommun., 2000

Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
Comput. Commun., 2000

Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks.
Proceedings of the International Conference on Internet Computing, 2000

Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 2000

1999
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering.
Prax. Inf.verarb. Kommun., 1999

Distributed QoS Management for A Multiparty Video Conferencing System.
Proceedings of the Intelligence in Networks, 1999

COCOS - A configurable SDL compiler for generating efficient protocol implementations.
Proceedings of the SDL '99 The Next Millennium, 1999

Architectures for Testing Distributed Systems.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

Permanent Customer-Provider Relationships for Electric Service Markets.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

Automated Protocol Implementations Based on Activity Threads.
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999

OCTOPUS-a scalable global multiparty video conferencing system.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999

Automatische Generierung effizienter Protokollimplementierungen.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1999

1998
Automatische Protokollimplementierung unter Verwendung der Activity Threads.
Prax. Inf.verarb. Kommun., 1998

Conjunct Application of Model-based and Code-based Optimization to Derive Efficient Parallel Implementations from SDL.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

GCSVA - A Multiparty Videoconferencing System with Distributed Group and QoS Management.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Derivation of efficient implementations from SDL specifications employing data referencing, integrated packet framing and activity threads.
Proceedings of the SDL '97 Time for Testing, 1997

Host-orientiertes Netz-Audit.
Proceedings of the Kommunikation in Verteilten Systemen, 1997

Specification-based Testing of Concurrent Systems.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997

On the Influence of Semantic Constraints on the Code Generation from Estelle Specifications.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997

Virtual Private Resources.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997

1996
Auditbasierte Netzüberwachung.
Prax. Inf.verarb. Kommun., 1996

Implementierung von Kommunikationsprotokollen.
Inform. Spektrum, 1996

Improving the efficiency of automated protocol implementation using Estelle.
Comput. Commun., 1996

The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis.
Proceedings of the Communications and Multimedia Security II, 1996

1995
PARES - a portable parallel Estelle compiler.
Proceedings of the Protocol Specification, 1995

SELEXPERT - A Knowledge-based Tool for Test Case Selection.
Proceedings of the Formal Description Techniques VIII, 1995

1994
Increasing the efficiency of computer-aided protocol implementations.
Proceedings of the Protocol Specification, 1994

1993
Ableitung parallel ausführbarer Protokollimplementierungen.
Prax. Inf.verarb. Kommun., 1993

Test Derivation from LOTOS Using Structure Information.
Proceedings of the Protocol Test Systems, 1993

On Evaluation of Testability of Protocol Structures.
Proceedings of the Protocol Test Systems, 1993

Formale Beschreibungstechniken für Kommunikationsprotokolle: Problemem ihrer praktischen Anwendung.
Proceedings of the Kommunikation in Verteilten Systemen, 1993

1992
A Protocol Development Environment Based on Estelle.
Proceedings of the Information Network and Data Communication, 1992

1987
Kommunikationsprotokolle - Prinzip und Entwicklung.
PhD thesis, 1987


  Loading...