default search action
Hartmut König
Person information
- affiliation: Brandenburg University of Technology, Cottbus, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Sebastian Boehm, Hartmut König:
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study. Comput. Commun. 218: 157-165 (2024) - [c95]Franka Schuster, Hartmut König:
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge. RAID 2024: 278-297 - 2023
- [j29]Sebastian Boehm, Hartmut König:
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation. Comput. Commun. 209: 273-282 (2023) - [c94]Andreas Paul, Franka Schuster, Hartmut König:
Whitelisting for Characterizing and Monitoring Process Control Communication. NSS 2023: 23-45 - [c93]Sebastian Boehm, Hartmut König:
Radio-in-the-Loop Simulation Modeling for Energy-Efficient and Cognitive IoT in Smart Cities: A Cross-Layer Optimization Case Study. WONS 2023: 126-133 - [i7]Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, Artur Hermann:
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). Dagstuhl Reports 13(10): 90-129 (2023) - 2022
- [c92]Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Daniel Reti:
Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the Potential Vulnerabilities. CloudNet 2022: 101-108 - [c91]Michael Vogel, Franka Schuster, Fabian Malte Kopp, Hartmut König:
Data Volume Reduction for Deep Packet Inspection by Multi-layer Application Determination. CSR 2022: 44-49 - [c90]Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky:
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks. DSC 2022: 1-8 - [c89]Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski, Hartmut König:
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks. FPS 2022: 192-207 - [c88]Sebastian Boehm, Hartmut König:
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation. MSWiM 2022: 47-54 - 2021
- [c87]Sebastian Boehm, Hartmut König:
Split-Protocol-Stack Wireless Network Emulation: Enabling PHY Modeling Diversity with Software-Radio-in-the-Loop. Q2SWinet 2021: 33-40
2010 – 2019
- 2019
- [c86]Stefan Mehner, Hartmut König:
No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. DIMVA 2019: 396-414 - [c85]Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König:
An SDN-based Approach to Protect Communication Between Virtual Machines. LCN 2019: 262-265 - [c84]Sebastian Boehm, Hartmut König:
SEmulate: Seamless Network Protocol Simulation and Radio Channel Emulation for Wireless Sensor Networks. WONS 2019: 111-118 - 2018
- [j28]René Rietz, Radoslaw Cwalinski, Hartmut König, Andreas Brinner:
An SDN-Based Approach to Ward Off LAN Attacks. J. Comput. Networks Commun. 2018: 4127487:1-4127487:12 (2018) - [c83]Radoslaw Cwalinski, Hartmut König:
Identifying Malicious Traffic in Software-Defined Wireless Local Area Networks. ICNC 2018: 195-199 - [c82]Franka Schuster, Fabian Malte Kopp, Andreas Paul, Hartmut König:
Attack and Fault Detection in Process Control Communication Using Unsupervised Machine Learning. INDIN 2018: 433-438 - [c81]Radoslaw Cwalinski, Hartmut König:
SDN-based Attack Detection in Wireless Local Area Networks. NetSoft 2018: 207-211 - 2017
- [j27]Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich:
Security Challenges and Opportunities of Software-Defined Networking. IEEE Secur. Priv. 15(2): 96-100 (2017) - 2016
- [j26]Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler:
Cleaning up Web 2.0's Security Mess-at Least Partly. IEEE Secur. Priv. 14(2): 48-57 (2016) - [j25]Jan Gäbler, Hartmut König:
Moversight: a group communication protocol for mobile scenarios. Telecommun. Syst. 61(4): 695-716 (2016) - [c80]Andreas Paul, Franka Schuster, Hartmut König:
Network Topology Exploration for Industrial Networks. INISCOM 2016: 62-76 - [c79]Jan Gäbler, Hartmut König:
Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications. LCN 2016: 271-279 - [c78]Radoslaw Cwalinski, Hartmut König:
RADIator - An approach for controllable wireless networks. NetSoft 2016: 260-268 - [c77]René Rietz, Hartmut König, Steffen Ullrich, Benjamin Stritter:
Firewalls for the Web 2.0. QRS 2016: 242-253 - [i6]Marc Dacier, Sven Dietrich, Frank Kargl, Hartmut König:
Network Attack Detection and Defense (Dagstuhl Seminar 16361). Dagstuhl Reports 6(9): 1-28 (2016) - 2015
- [c76]Jan Gäbler, Hartmut König:
Distributed latency estimation using global knowledge for mobile collaborative applications. IWCMC 2015: 474-479 - [c75]Franka Schuster, Andreas Paul, René Rietz, Hartmut König:
Potentials of Using One-Class SVM for Detecting Protocol-Specific Anomalies in Industrial Networks. SSCI 2015: 83-90 - 2014
- [j24]Frank Kargl, Rens W. van der Heijden, Hartmut König, Alfonso Valdes, Marc Dacier:
Insights on the Security and Dependability of Industrial Control Systems. IEEE Secur. Priv. 12(6): 75-78 (2014) - [j23]Fuwen Liu, Hartmut König:
Puzzle - an efficient, compression independent video encryption algorithm. Multim. Tools Appl. 73(2): 715-735 (2014) - [c74]René Rietz, Michael Vogel, Franka Schuster, Hartmut König:
Parallelization of Network Intrusion Detection Systems under Attack Conditions. DIMVA 2014: 172-191 - [c73]Stefanie Judith Opitz, Nicole Todtenberg, Hartmut König:
Mobile bandwidth prediction in the context of emergency medical service. PETRA 2014: 49:1-49:7 - [i5]Marc Dacier, Frank Kargl, Hartmut König, Alfonso Valdes:
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). Dagstuhl Reports 4(7): 62-79 (2014) - 2013
- [j22]Hartmut König, Jan Gäbler, Ronny Klauck, Mario Pink, Michael Sprejz:
uBeeMe - A Platform for Mobile Collaborative Applications. Prax. Inf.verarb. Kommun. 36(1): 43 (2013) - [c72]Franka Schuster, Andreas Paul, Hartmut König:
Towards Learning Normality for Anomaly Detection in Industrial Control Networks. AIMS 2013: 61-72 - [c71]Jan Gäbler, Ronny Klauck, Mario Pink, Hartmut König:
uBeeMe - A platform to enable mobile collaborative applications. CollaborateCom 2013: 188-196 - [c70]Andreas Paul, Franka Schuster, Hartmut König:
Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. DIMVA 2013: 160-176 - [c69]Jan Gäbler, Hartmut König:
Enhancing group communication systems with mobility support. ICON 2013: 1-6 - [c68]Mario Pink, Michael Sprejz, Hartmut König:
A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks. MOBILWARE 2013: 130-137 - [c67]Jan Gäbler, Hartmut König:
Moversight: A group communication protocol for mobile collaborative applications. WMNC 2013: 1-8 - [c66]Stefan Mehner, Ronny Klauck, Hartmut König:
Location-independent fall detection with smartphone. PETRA 2013: 11:1-11:8 - [c65]Jan Gäbler, Hartmut König:
Moversight: An approach to support mobility in collaborative applications. WONS 2013: 110-112 - 2012
- [b3]Hartmut König:
Protocol Engineering. Springer 2012, ISBN 978-3-642-29144-9, pp. I-XV, 1-525 - [j21]Hartmut König:
Network Attack Detection and Defense. Prax. Inf.verarb. Kommun. 35(1): 1 (2012) - [c64]Mario Pink, Thomas Pietsch, Hartmut König:
Towards a seamless mobility solution for the real world: Handover decision. ISWCS 2012: 651-655 - [c63]Mario Pink, Thomas Pietsch, Hartmut König:
An Adaptive Handover Decision Algorithm for Heterogenous Wireless Networks. MOBILWARE 2012: 136-149 - [c62]Prabhu Shankar Kaliappan, Hartmut König:
On the Formalization of UML Activities for Component-Based Protocol Design Specifications. SOFSEM 2012: 479-491 - [i4]Georg Carle, Hervé Debar, Falko Dressler, Hartmut König:
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). Dagstuhl Reports 2(2): 1-20 (2012) - 2011
- [j20]Michael Kirsche, Matthias Dreissig, Ralf Kopsch, Jan Gäbler, Ronny Klauck, Mario Pink, Fuwen Liu, Hartmut König:
uBeeMe - Eine Plattform zur Unterstützung mobiler kollaborativer Anwendungen. Prax. Inf.verarb. Kommun. 34(1): 11-22 (2011) - [j19]Linda Ariani Gunawan, Michael Vogel, Frank Alexander Kraemer, Sebastian Schmerl, Vidar Slåtten, Peter Herrmann, Hartmut König:
Modeling a distributed intrusion detection system using collaborative building blocks. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - [j18]Sebastian Schmerl, Michael Vogel, Hartmut König:
Using model checking to identify errors in intrusion detection signatures. Int. J. Softw. Tools Technol. Transf. 13(1): 89-106 (2011) - [c61]Michael Vogel, Sebastian Schmerl, Hartmut König:
Efficient Distributed Signature Analysis. AIMS 2011: 13-25 - [c60]Fuwen Liu, Hartmut König:
Cryptanalysis of a SIP Authentication Scheme. Communications and Multimedia Security 2011: 134-143 - [c59]Prabhu Shankar Kaliappan, Hartmut König:
An Approach to Synchronize UML-Based Design Components for Model-Driven Protocol Development. SEW 2011: 27-35 - [c58]Fuwen Liu, Hartmut König:
A Simple Balanced Password-Authenticated Key Agreement Protocol. TrustCom 2011: 403-408 - 2010
- [j17]Fuwen Liu, Hartmut König:
A survey of video encryption algorithms. Comput. Secur. 29(1): 3-15 (2010) - [c57]Prabhu Shankar Kaliappan, Hartmut König, Sebastian Schmerl:
Model-Driven Protocol Design Based on Component Oriented Modeling. ICFEM 2010: 613-629 - [c56]Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König:
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. SADFE 2010: 109-118 - [c55]René Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König:
Iterative präzisionsbewertende Signaturgenerierung. Sicherheit 2010: 141-152
2000 – 2009
- 2009
- [j16]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Comput. Sci. Res. Dev. 23(1): 15-25 (2009) - [j15]Michael Vogel, Sebastian Schmerl, Hartmut König:
Analyseverlagerung in IDS-Overlaynetzen. Prax. Inf.verarb. Kommun. 32(3): 188-200 (2009) - [c54]Alek Opitz, Hartmut König:
Predicting Free Computing Capacities on Individual Machines. GPC 2009: 153-164 - [c53]Fuwen Liu, Hartmut König:
Security Considerations on Pervasive Real-time Collaboration. MASS 2009: 722-727 - [c52]Sebastian Schmerl, Michael Vogel, Hartmut König:
Identifying Modeling Errors in Signatures by Model Checking. SPIN 2009: 205-222 - 2008
- [j14]Alek Opitz, Hartmut König, Sebastian Szamlewska:
What Does Grid Computing Cost? J. Grid Comput. 6(4): 385-397 (2008) - [j13]Prabhu Shankar Kaliappan, Hartmut König:
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker. J. Softw. Eng. Appl. 1(1): 13-19 (2008) - [c51]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32 - [c50]Prabhu Shankar Kaliappan, Hartmut König, Vishnu Kumar Kaliappan:
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker. CSSE (2) 2008: 227-230 - [c49]Fuwen Liu, Hartmut König:
Security Policy Management for Peer Group Meetings. SECURWARE 2008: 68-73 - [c48]Sebastian Schmerl, René Rietz, Hartmut König:
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort. Sicherheit 2008: 367-379 - [e7]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i2]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i1]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j12]Hartmut König, Daniel Rakel, Fuwen Liu, Michael Kirsche:
P2P-Videokonferenzen für geschlossene Gruppen. Prax. Inf.verarb. Kommun. 30(4): 219-226 (2007) - [c47]Sebastian Schmerl, Hartmut König:
Towards Systematic Signature Testing. TestCom/FATES 2007: 276-291 - 2006
- [c46]Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier:
Simplifying Signature Engineering by Reuse. ETRICS 2006: 436-450 - 2005
- [c45]Fuwen Liu, Hartmut König:
Puzzle - A Novel Video Encryption Algorithm. Communications and Multimedia Security 2005: 88-97 - [c44]Fuwen Liu, Hartmut König:
Efficient Key Distribution for Closed Meetings in the Internet. Communications and Multimedia Security 2005: 271-272 - [c43]Fuwen Liu, Hartmut König:
Secure and efficient key distribution for collaborative applications. CollaborateCom 2005 - [c42]Alek Opitz, Hartmut König:
Optimizing the Access to Read-Only Data in Grid Computing. DAIS 2005: 206-219 - [c41]Michael Meier, Sebastian Schmerl, Hartmut König:
Improving the Efficiency of Misuse Detection. DIMVA 2005: 188-205 - [c40]Hartmut König:
Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen. GI Jahrestagung (2) 2005: 638-642 - [c39]Fuwen Liu, Hartmut König:
A Token Based Key Distribution Protocol for Closed Group Meetings. Net-Con 2005: 29-43 - [c38]Daniel Rakel, Hartmut König:
Effiziente Medienstromverteilung in geschlossenen Peer-to-Peer-Videokonferenzsystemen. KiVS Kurzbeiträge und Workshop 2005: 159-162 - [c37]Fuwen Liu, Hartmut König:
Ein Ansatz für eine effiziente Schlüsselverteilung für kleine geschlossene Peer-Gruppen. KiVS Kurzbeiträge und Workshop 2005: 163-167 - [c36]Fuwen Liu, Hartmut König:
A novel encryption algorithm for high resolution video. NOSSDAV 2005: 69-74 - [c35]Fuwen Liu, Hartmut König:
A Secure P2P Video Conference System for Enterprise Environments. NPC 2005: 88-96 - 2004
- [j11]Michael Meier, Ulrich Flegel, Hartmut König:
Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. Prax. Inf.verarb. Kommun. 27(4): 186-187 (2004) - [c34]Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König:
Verteilte Mehrteilnehmer-Videokonferenzen im Internet. DFN-Arbeitstagung über Kommunikationsnetze 2004: 167-179 - [c33]Mario Zühlke, Hartmut König:
A Signaling Protocol for Small Closed Dynamic Multi-peer Groups. HSNMC 2004: 973-984 - 2003
- [b2]Hartmut König:
Protocol Engineering - Prinzip, Beschreibung und Entwicklung von Kommunikationsprotokollen. Leitfäden der Informatik, Teubner 2003, ISBN 978-3-519-00454-7, pp. I-XIII, 1-496 - [c32]Thomas Holz, Michael Meier, Hartmut König:
High-Efficient Intrusion Detection Infrastructure. DFN-Arbeitstagung über Kommunikationsnetze 2003: 217-232 - [c31]Eduard Popovici, Ralf Mahlo, Mario Zühlke, Hartmut König:
Consistency support for a decentralized management in close multiparty conferences using SIP. ICON 2003: 295-300 - [c30]Eduard Popovici, Mario Zühlke, Ralf Mahlo, Hartmut König:
BRAVIS - Ein Konzept für geschlossene Mehrteilnehmer-Videokonferenzen über IP. KiVS Kurzbeiträge 2003: 167-180 - [e6]Hartmut König, Monika Heiner, Adam Wolisz:
Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29 - October 2, 2003, Proceedings. Lecture Notes in Computer Science 2767, Springer 2003, ISBN 3-540-20175-0 [contents] - 2002
- [j10]Thomas Holz, Michael Meier, Hartmut König:
Bausteine für effiziente Intrusion-Detection-Systeme. Prax. Inf.verarb. Kommun. 25(3): 144-157 (2002) - [c29]Mario Zühlke, Hartmut König:
Voting Based Bandwidth Management in Multiparty Video Conferences. IDMS/PROMS 2002: 202-215 - [c28]Alek Opitz, Torsten Mielke, Hartmut König:
Virtual Private Components - An Approach for Leasing Components. SMARTNET 2002: 95-112 - [c27]Mario Zühlke, Hartmut König:
GCP - A Group Communication Protocol for Supporting Closed Groups in the Internet. SMARTNET 2002 - [e5]Ina Schieferdecker, Hartmut König, Adam Wolisz:
Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems - TestCom 2002, Berlin, Germany, March 19-22, 2002. IFIP Conference Proceedings 210, Kluwer 2002, ISBN 0-7923-7695-1 [contents] - 2001
- [j9]Peter Langendörfer, Rolf Kraemer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. J. Supercomput. 20(2): 161-173 (2001) - [c26]Sven Twarok, Peter Langendörfer, Hartmut König:
Automated Derivation of ILP Implementations from SDL Specifications. FORTE 2001: 3-18 - 2000
- [j8]Hartmut König, Peter Langendörfer, Heiko Krumm:
Improving the efficiency of automated protocol implementations using a configurable FDT compiler. Comput. Commun. 23(12): 1179-1195 (2000) - [j7]Samuel T. Chanson, Albert K. T. Hui, Hartmut König, Mario Zühlke:
Das OCTOPUS-Videokonferenzsystem. Prax. Inf.verarb. Kommun. 23(4) (2000) - [c25]Peter Langendörfer, Thomas Krüger, Hartmut König:
Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. FBT 2000: 143-152 - [c24]Peter Langendörfer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. International Conference on Internet Computing 2000: 451-458
1990 – 1999
- 1999
- [j6]Peter Langendörfer, Hartmut König:
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering. Prax. Inf.verarb. Kommun. 22(4): 197-203 (1999) - [c23]Peter Langendörfer, Hartmut König:
Automatische Generierung effizienter Protokollimplementierungen. FBT 1999: 135-144 - [c22]Peter Langendörfer, Hartmut König:
Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. FORTE 1999: 169-184 - [c21]Samuel T. Chanson, Albert K. T. Hui, Eddy Siu, Ines Beier, Hartmut König, Mario Zühlke:
OCTOPUS-a scalable global multiparty video conferencing system. ICCCN 1999: 97-102 - [c20]Peter Langendörfer, Hartmut König:
Automated Protocol Implementations Based on Activity Threads. ICNP 1999: 3-10 - [c19]Thomas Preuß, Jens-Hagen Syrbe, Hartmut König:
Permanent Customer-Provider Relationships for Electric Service Markets. Kommunikation in Verteilten Systemen 1999: 326-337 - [c18]Andreas Ulrich, Hartmut König:
Architectures for Testing Distributed Systems. IWTCS 1999: 93-108 - [c17]Peter Langendörfer, Hartmut König:
COCOS - A configurable SDL compiler for generating efficient protocol implementations. SDL Forum 1999: 259-274 - [c16]Ines Beier, Hartmut König:
Distributed QoS Management for A Multiparty Video Conferencing System. SMARTNET 1999: 335-348 - [e4]Lea Kutvonen, Hartmut König, Martti Tienari:
Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28 - July 1, 1999, Helsinki, Finland. IFIP Conference Proceedings 143, Kluwer 1999, ISBN 0-7923-8527-6 [contents] - 1998
- [j5]Ralf Henke, Hartmut König, Andreas Mitschele-Thiel:
Automatische Protokollimplementierung unter Verwendung der Activity Threads. Prax. Inf.verarb. Kommun. 21(1): 11-18 (1998) - [c15]Ines Beier, Hartmut König:
GCSVA - A Multiparty Videoconferencing System with Distributed Group and QoS Management. ICCCN 1998: 594-598 - [c14]Ralf Henke, Andreas Mitschele-Thiel, Hartmut König:
Conjunct Application of Model-based and Code-based Optimization to Derive Efficient Parallel Implementations from SDL. PDSE 1998: 230-237 - [e3]Hartmut König, Peter Langendörfer:
Formale Beschreibungstechniken für verteilte Systeme, 8. GI/ITG-Fachgespräch, Cottbus, 4. und 5. Juni 1998. Verlag Shaker 1998, ISBN 3-8265-3807-2 [contents] - 1997
- [c13]Thomas Preuß, Jens-Hagen Syrbe, Hartmut König:
Virtual Private Resources. EDOC 1997: 216-226 - [c12]Andreas Ulrich, Hartmut König:
Specification-based Testing of Concurrent Systems. FORTE 1997: 7-22 - [c11]Ralf Henke, Andreas Mitschele-Thiel, Hartmut König:
On the Influence of Semantic Constraints on the Code Generation from Estelle Specifications. FORTE 1997: 399-414 - [c10]Birk Richter, Michael Sobirey, Hartmut König:
Host-orientiertes Netz-Audit. Kommunikation in Verteilten Systemen 1997: 48-61 - [c9]Ralf Henke, Hartmut König, Andreas Mitschele-Thiel:
Derivation of efficient implementations from SDL specifications employing data referencing, integrated packet framing and activity threads. SDL Forum 1997: 397-414 - [e2]Hartmut König, Kurt Geihs, Thomas Preuß:
Distributed Applications and Interoperable Systems, Proceedings IFIP TC 6.1 Working Conference DAIS'97, Cottbus, Germany, September 30 - October 2, 1997. Chapman & Hall 1997 [contents] - 1996
- [j4]Reinhard Gotzhein, Jan Bredereke, Wolfgang Effelsberg, Stephan Fischer, Thomas Held, Hartmut König:
Improving the efficiency of automated protocol implementation using Estelle. Comput. Commun. 19(14): 1226-1235 (1996) - [j3]Hartmut König, Heiko Krumm:
Implementierung von Kommunikationsprotokollen. Inform. Spektrum 19(6): 316-325 (1996) - [j2]Birk Richter, Michael Sobirey, Hartmut König:
Auditbasierte Netzüberwachung. Prax. Inf.verarb. Kommun. 19(1): 24-32 (1996) - [c8]Michael Sobirey, Birk Richter, Hartmut König:
The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis. Communications and Multimedia Security 1996: 278-290 - 1995
- [c7]Abdelaziz Guerrouat, Hartmut König, Andreas Ulrich:
SELEXPERT - A Knowledge-based Tool for Test Case Selection. FORTE 1995: 313-328 - [c6]Ralf Plato, Thomas Held, Hartmut König:
PARES - a portable parallel Estelle compiler. PSTV 1995: 403-418 - 1994
- [c5]Thomas Held, Hartmut König:
Increasing the efficiency of computer-aided protocol implementations. PSTV 1994: 387-394 - 1993
- [j1]Hartmut König, Wolfgang Effelsberg, Reinhard Gotzhein:
Ableitung parallel ausführbarer Protokollimplementierungen. Prax. Inf.verarb. Kommun. 16(4): 193-202 (1993) - [c4]Hartmut König, Peter Neumann:
Formale Beschreibungstechniken für Kommunikationsprotokolle: Problemem ihrer praktischen Anwendung. Kommunikation in Verteilten Systemen 1993: 545-559 - [c3]Alexandre Petrenko, Rachida Dssouli, Hartmut König:
On Evaluation of Testability of Protocol Structures. Protocol Test Systems 1993: 111-124 - [c2]Andreas Ulrich, Hartmut König:
Test Derivation from LOTOS Using Structure Information. Protocol Test Systems 1993: 279-293 - [e1]Hartmut König:
Formale Methoden für verteilte Systeme, GI/ITG-Fachgespräch, Magdeburg, 10.-11. Juni 1992. K. G. Saur Verlag 1993, ISBN 3-598-22409-5 [contents] - 1992
- [c1]R. Födisch, Thomas Held, Hartmut König:
A Protocol Development Environment Based on Estelle. INDC 1992: 121-141
1980 – 1989
- 1987
- [b1]Hartmut König:
Kommunikationsprotokolle - Prinzip und Entwicklung. Dresden University of Technology, Germany, 1987
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint