König, Hartmut
200  results:
Search for persons X
?
2

Whitelisting for Characterizing and Monitoring Process Cont..:

, In: Network and System Security; Lecture Notes in Computer Science,
 
?
6

Show Me Your Attach Request and I'll Tell You Who You Are: ..:

, In: 2022 IEEE Conference on Dependable and Secure Computing (DSC),
 
?
8

Cutting Edge: Privacy Analysis of the ETSI MEC APIs and the..:

, In: 2022 IEEE 11th International Conference on Cloud Networking (CloudNet),
 
?
9

Data Volume Reduction for Deep Packet Inspection by Multi-l..:

, In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR),
 
?
11

Gruppenkommunikation in mobilen Umgebungen 

eine Erweiterung des Gruppenkommunikationsparadigmas um ein... 
Gäbler, Jan , 2019
 
?
12

No Need to Marry to Change Your Name! Attacking Profinet IO..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Mehner, Stefan ; König, Hartmut - p. 396-414 , 2019
 
?
13

An SDN-based Approach to Protect Communication Between Virt..:

, In: 2019 IEEE 44th Conference on Local Computer Networks (LCN),
 
?
15

An SDN-Based Approach to Ward Off LAN Attacks:

Rietz, René ; Cwalinski, Radoslaw ; König, Hartmut.
Journal of Computer Networks and Communications.  2018 (2018)  - p. 1-12 , 2018
 
1-15