Hartmut König
Orcid: 0000-0003-2607-1993Affiliations:
- Brandenburg University of Technology, Cottbus, Germany
According to our database1,
Hartmut König
authored at least 134 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
5
10
1
2
1
1
3
3
1
2
3
1
2
2
1
1
1
1
2
1
1
3
1
1
2
4
1
3
3
4
2
2
8
3
4
3
3
7
1
1
11
2
3
3
1
2
8
2
5
1
2
1
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study.
Comput. Commun., 2024
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
2023
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation.
Comput. Commun., September, 2023
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431).
Dagstuhl Reports, 2023
Radio-in-the-Loop Simulation Modeling for Energy-Efficient and Cognitive IoT in Smart Cities: A Cross-Layer Optimization Case Study.
Proceedings of the 18th Wireless On-Demand Network Systems and Services Conference, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022
2021
Split-Protocol-Stack Wireless Network Emulation: Enabling PHY Modeling Diversity with Software-Radio-in-the-Loop.
Proceedings of the Q2SWinet 2021: Proceedings of the 17th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2021
2019
SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks.
Proceedings of the 15th IEEE/IFIP Wireless On-demand Network systems and Services Conference , 2019
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018
Proceedings of the 2018 International Conference on Computing, 2018
2017
IEEE Secur. Priv., 2017
2016
Telecommun. Syst., 2016
Dagstuhl Reports, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
2015
Potentials of Using One-Class SVM for Detecting Protocol-Specific Anomalies in Industrial Networks.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Distributed latency estimation using global knowledge for mobile collaborative applications.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Multim. Tools Appl., 2014
IEEE Secur. Priv., 2014
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).
Dagstuhl Reports, 2014
Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
2013
Prax. Inf.verarb. Kommun., 2013
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks.
Proceedings of the 2013 International Conference on MOBILe Wireless MiddleWARE, 2013
Proceedings of the 19th IEEE International Conference on Networks, 2013
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013
2012
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports, 2012
On the Formalization of UML Activities for Component-Based Protocol Design Specifications.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2012
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012
2011
Int. J. Softw. Tools Technol. Transf., 2011
Modeling a distributed intrusion detection system using collaborative building blocks.
ACM SIGSOFT Softw. Eng. Notes, 2011
Prax. Inf.verarb. Kommun., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
An Approach to Synchronize UML-Based Design Components for Model-Driven Protocol Development.
Proceedings of the 34th Annual IEEE Software Engineering Workshop, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Managing the Dynamics of Networks and Services, 2011
2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the Formal Methods and Software Engineering, 2010
2009
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009
Proceedings of the Model Checking Software, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009
2008
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker.
J. Softw. Eng. Appl., 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Testing of Software and Communicating Systems, 2007
2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005
Proceedings of the Network Control and Engineering for QoS, 2005
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Proceedings of the Distributed Applications and Interoperable Systems, 2005
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
2004
Prax. Inf.verarb. Kommun., 2004
Proceedings of the High Speed Networks and Multimedia Communications, 2004
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004
2003
BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003
Consistency support for a decentralized management in close multiparty conferences using SIP.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen.
Leitfäden der Informatik, Teubner, ISBN: 978-3-519-00454-7, 2003
2002
Prax. Inf.verarb. Kommun., 2002
Proceedings of the Smart Networks, 2002
Proceedings of the Smart Networks, 2002
Proceedings of the Protocols and Systems for Interactive Distributed Multimedia, 2002
2001
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks.
J. Supercomput., 2001
Automated Derivation of ILP Implementations from SDL Specifications.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001
2000
Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
Comput. Commun., 2000
Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks.
Proceedings of the International Conference on Internet Computing, 2000
Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 2000
1999
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering.
Prax. Inf.verarb. Kommun., 1999
Proceedings of the Intelligence in Networks, 1999
COCOS - A configurable SDL compiler for generating efficient protocol implementations.
Proceedings of the SDL '99 The Next Millennium, 1999
Architectures for Testing Distributed Systems.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999
Proceedings of the Kommunikation in Verteilten Systemen, 1999
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999
Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999
Automatische Generierung effizienter Protokollimplementierungen.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1999
1998
Prax. Inf.verarb. Kommun., 1998
Conjunct Application of Model-based and Code-based Optimization to Derive Efficient Parallel Implementations from SDL.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998
GCSVA - A Multiparty Videoconferencing System with Distributed Group and QoS Management.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
Derivation of efficient implementations from SDL specifications employing data referencing, integrated packet framing and activity threads.
Proceedings of the SDL '97 Time for Testing, 1997
Proceedings of the Kommunikation in Verteilten Systemen, 1997
Specification-based Testing of Concurrent Systems.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997
On the Influence of Semantic Constraints on the Code Generation from Estelle Specifications.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997
1996
Comput. Commun., 1996
The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis.
Proceedings of the Communications and Multimedia Security II, 1996
1995
PARES - a portable parallel Estelle compiler.
Proceedings of the Protocol Specification, 1995
SELEXPERT - A Knowledge-based Tool for Test Case Selection.
Proceedings of the Formal Description Techniques VIII, 1995
1994
Increasing the efficiency of computer-aided protocol implementations.
Proceedings of the Protocol Specification, 1994
1993
Prax. Inf.verarb. Kommun., 1993
Test Derivation from LOTOS Using Structure Information.
Proceedings of the Protocol Test Systems, 1993
On Evaluation of Testability of Protocol Structures.
Proceedings of the Protocol Test Systems, 1993
Formale Beschreibungstechniken für Kommunikationsprotokolle: Problemem ihrer praktischen Anwendung.
Proceedings of the Kommunikation in Verteilten Systemen, 1993
1992
A Protocol Development Environment Based on Estelle.
Proceedings of the Information Network and Data Communication, 1992
1987