Peter Hillmann

Orcid: 0000-0003-4346-4510

According to our database1, Peter Hillmann authored at least 35 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Lightweight Public Key Encryption in Post-Quantum Computing Era.
CoRR, 2023

User-Like Bots for Cognitive Automation: A Survey.
Proceedings of the Machine Learning, Optimization, and Data Science, 2023

Constraint based modeling according to reference design.
Proceedings of the Joint Proceedings of the BIR 2023 Workshops and Doctoral Consortium co-located with 22nd International Conference on Perspectives in Business Informatics Research (BIR 2023), 2023

Towards Cognitive Bots: Architectural Research Challenges.
Proceedings of the Artificial General Intelligence - 16th International Conference, 2023

2022
(B)LOCKBOX - Secure Software Architecture with Blockchain Verification.
CoRR, 2022

Enterprise Model Library for Business-IT-Alignment.
CoRR, 2022

Document-Based Knowledge Discovery with Microservices Architecture.
Proceedings of the Intelligent Systems and Pattern Recognition, 2022

Methodology for Holistic Reference Modeling in Systems Engineering.
Proceedings of the Joint Proceedings of the BIR 2022 Workshops and Doctoral Consortium co-located with 21st International Conference on Perspectives in Business Informatics Research (BIR 2022), 2022

2021
Automated Enterprise Architecture Model Mining.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Enterprise Architecture Model Transformation Engine.
Proceedings of the 10th International Conference on Operations Research and Enterprise Systems, 2021

Reference Service Model for Federated Identity Management.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2021

2020
Agile Approach for IT Forensics Management.
CoRR, 2020

On the Path to High Precise IP Geolocation: A Self-Optimizing Model.
CoRR, 2020

CAKE: An Efficient Group Key Management for Dynamic Groups.
CoRR, 2020

Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Selective Deletion in a Blockchain.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
NERD: Neural Network for Edict of Risky Data Streams.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2017
Optimized travel to meetings on a common location of geographical distributed participants.
Proceedings of the 2017 IEEE International Conference on Service Operations and Logistics, 2017

CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren.
Proceedings of the 10. DFN-Forum, 2017

2016
Evaluation of the general applicability of Dragoon for the k-center problem.
Proceedings of the Winter Simulation Conference, 2016

Simulation and optimization of Content Delivery Networks considering user profiles and preferences of Internet Service Providers.
Proceedings of the Winter Simulation Conference, 2016

Modeling the Location Selection of Mirror Servers in Content Delivery Networks.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Strategies for Tracking Individual IP Packets Towards DDoS.
Prax. Inf.verarb. Kommun., 2015

An efficient solution for K-center problems.
Proceedings of the 2015 Winter Simulation Conference, 2015

A novel approach to solve K-center problems with geographical placement.
Proceedings of 10th IEEE International Conference on Service Operations and Logistics, 2015

On the evaluation of military simulations: towards a taxonomy of assessment criteria.
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015

Tracemax: A novel single packet IP traceback strategy for data-flow analysis.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Dragoon: Advanced modelling of IP geolocation by use of latency measurements.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

Modelling of IP geolocation by use of latency measurements.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2014
A novel multi-agent system for complex scheduling problems.
Proceedings of the 2014 Winter Simulation Conference, 2014

Smart defence: an architecture for new challenges to cyber security.
Proceedings of the 7. DFN-Forum, 2014

YANG2UML: Bijective transformation and simplification of YANG to UML.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
A flexible cryptographic infrastructure for high-security SDR-based systems.
Proceedings of the 2013 Military Communications and Information Systems Conference, 2013

Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen.
Proceedings of the 6. DFN-Forum Kommunikationstechnologien, 2013


  Loading...