Ausgewählte Veröffentlichungen


Pink, M.; T. Pietsch, Koenig, H.: Towards a seamless mobility Solution for the real World: Handover Decision.
In: Proc. of the 9th International Symposium on Wireless Communication Systems (ISWCS) , Paris, France, August 28-31, 2012.

Kaliappan, P.S., König, H.:  On the Formalization of UML Activities for Component-Based Protocol Design Specification.
In: 38th Intl. Conf. on Current Trends in Theory and Practice of Computer Science, Czech Republic, LNCS 7147, Springer, pp. 479 - 491, 2012.

Carle, G.; Debar, H.; Dressler, F.; König, H.: Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061).
Dagstuhl Reports 2 (2):1 - 20 (2012).

Gäbler, J., Klauck, R., Kopsch, R.; Liu, F., Pink, M., Schöpke, S., König, H. (2011): Mobile kollaborative Apps.
In: Linnhoff-Popien, C., Verclas, S. (eds.): Smart Mobile Apps. Sprin­ger , S. 447 - 463, 2011.

Vogel, M.; Schmerl, S.; König, H.: Efficient Distributed Signature Analysis.
In: Proc. of the International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2011), Nancy, France, LNCS 6734, Springer, pp. 13 - 25, 2011.

Liu, F.; Koenig, H.: Cryptanalysis of a SIP Authentication Scheme.
12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, October 19th - 21st, 2011, Ghent, Belgium.

Schmerl, S.; Vogel, M.; Rietz, R.; König, H.: Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development.
Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, Oakland, CA, USA, May 20, 2010. IEEE Computer Society, pp. 109 - 118, 2010.

Liu, F.; Koenig, H.: Security Considerations on Pervasive Real-time Collaboration.
In: Proc. of the IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09), October 12 - 14, 2009, Macau SAR, P.R.China, pp. 722 - 727.

Schmerl, S.; Vogel, M; Koenig, H.: Identifying Modeling Errors in Signatures by Model Checking.
In: Proceedings of the 16th International SPIN Workshop on Model Checking of Software (SPIN 2009), Grenoble, France, LNCS 5578, Springer, pp. 205 - 222, June 2009.

Opitz, A.; König, H.: Predicting Free Computing Capacities on Individual Machines.
In: Ab­den­­­nadher, N; Petcu, D. (eds.): Advances in Grid and Pervasive Computing. LNCS 5529, Springer, 2009, pp. 153 - 164.

Vogel, M.; Schmerl, S., König, H.: Analyseverlagerung in IDS-Overlaynetzen.
K. G. Saur Verlag München, Praxis der Informationsverarbeitung und Kommunikation, PIK 32 (2009) 3, S. 188 - 200.

S. Schmerl, H. Koenig, U. Flegel, M. Meier, R. Rietz: Systematic Signature Engineering by Reuse of Snort Signatures.
In: Proc. of the Annual Computer Security Applications Conference (ACSAC), Anaheim, California, USA, 2008, pp.23-32.

Carle, G.; Dressler, F.; Kemmerer, R.A.; Koenig, H.; Kruegel,C.; Laskov, P.: Network Attack Detection and Defense.
Manifesto of the Dagstuhl Perspective Workshop, March 2nd – 6th, 2008, 

Schmerl, S.; Rietz, R.; König, H.: Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort.
In: Proceedings der 4. GI-Konferenz "Sicherheit - Schutz und Zuverlässigkeit", Saarbrücken, April 2008.

König, H.; Rakel, D,; Liu, F,; Kirsche, M.: P2P-Videokonferenzen für geschlossene Gruppen.
K. G. Saur Verlag München, Praxis der Informationsverarbeitung und Kommunikation, PIK 30 (2007) 4, S. 219 - 226.

Schmerl. S.; Koenig, H.: Towards Systematic Signature Testing.
In: Proceedings of the 19th IFIP International Conference Testing of Communicating Systems, TestCom 2007, Tallinn, Estonia, June 26-29, 2007, LNCS 4581, Springer, 2007, pp. 276 - 291.

Schmerl, S.; Koenig, H.; Flegel, U.; Meier, M.: Simplification of Signature Deri­vation by Reuse.
In: Müller, G. (ed.): Proceedings of the International Confe­rence on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg, Germany, June 2006, LNCS  3995,  Springer,  pp. 436 - 450, 2006.

Liu, F.; Koenig, H.: Secure and Efficient Key Distribution for Collaborative Applications.
In: Proc. IEEE Conference on Collaborative Applications. San Jose, Californian, Dec. 2005.

Liu, F.; Koenig, H.: A Secure P2P Video Conference System for Enterprise Environments.
IFIP  NPC 2005, Beijing, China, Springer LNCS 3779, pp. 88 - 96, 2005.

Liu, F.; Koenig, H.: A Token Based Key Distribution Protocol for Closed Group Meetings.
In: Proc. IFIP WG 6.2 Conference NETCON’05, Lannion, France, November 2005. Network Control and Engineering for QoS, Security and Mobility IV. IFIP Vol. 229/2007, Springer Boston, 2007, pp. 29 - 43.

König, H.: Peer-to-Peer Intrusion Detection Systeme für den Schutz sensibler IT-Infrastrukturen.
In: Cremers, A. B. et al. (Hrg.): Informatik 2005. Lecture Notes in Informatics, S. 638 - 642, 2005.

Liu, F.; Koenig, H.: Puzzle - A Novel Video Encryption Algorithm.
In: Proceedings IFIP TC-6 conference on Communications & Security, Salzburg, Austria, September 2005, LNCS 3677, Springer, pp. 88 - 97.

Meier M.; Schmerl S.; König H.: Improving the Efficiency of Misuse Detection.
In: Pro­ceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, LNCS 3548, Springer, 2005, pp. 188 - 205.

Opitz A.; König H.: Optimizing the Access to Read-Only Data in Grid Computing.
In: Proceedings of Distributed Applications and Interoperable Systems, 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, LNCS 3543, Springer, 2005, pp. 206 - 219.

Liu, F.; Koenig, H.: A Novel Encryption Algorithm for High Resolution Video.
In: Feng, W.; Mayer-Patel, K. (eds.): Proceedings of the 15th ACM International Workshop on Net­work and Operating Systems Support for Digital Audio and Video (NOSSDAV 2005), Ste­phenson, WA, USA, June 2005, ACM Press, New York, 2005, pp. 69 - 74.

Zuehlke, M.; Koenig, H.: A Signalling Protocol for Small Closed Dynamic Multi-Peer Groups.
In: Proceedings of High Speed Networks and Multimedia Communications, 7th IEEE International Conference (HSNMC 2004), Toulouse, France, LNCS 3079, Springer, 2004, pp. 973 - 984.

Popovici, E.; Zuehlke, M.; Mahlo, R.; Koenig, H.: Consistency Support for a Decentrali­zed Management in Closed Multiparty Conferences Using SIP.
In: Proceedings IEEE ICON’03 (International Conference on Networks), Sydney, Australia, IEEE Press, 2003, pp. 295 - 300.

Popovici, E.; Zuehlke, M.; Mahlo, R.; König, H.: BRAVIS - Ein Ansatz für geschlossene Videokonferenzen im Internet.
In: Irmscher, K.; Fähnrich, K.-P. (Hrsg.): KIVS 2003. VDE-Verlag, Düsseldorf, 2003. (in German)
Zuehlke, M.; Koenig, H.: Voting Based Bandwidth Management in Multiparty Video Con­ferences. In: Boavida, F. et al. (eds.): Protocols and Systems for Interactive Distributed Multimedia. LNCS 2515, Springer, 2002, pp. 202 - 215.

Holz, T.; Meier, M.; König, H.: High-Efficient Intrusion Detection Infrastructure.
Estoril, Portugal, NATO Symposium "Real Time Intrusion Detection", 2002.

Zuehlke, M.;  Koenig, H.: GCP - A Group Communication Protocol for Supporting Closed Groups in the Internet.
In: Martikainen, O.; Raatikainen, K.; Hyvärinen, J. (eds): Smart Networks. Kluwer Academic Publishers, Boston, 2002.

Opitz, A; Mielke, T. Koenig, H.: Virtual Private Components - An Approach for Leasing Components.
In: Martikainen, O.; Raatikainen, K.; Hyvärinen, J. (eds): Smart Networks. Kluwer Academic Publishers, Boston, 2002

Twarok, S.; Langendoerfer, P.; Koenig, H.: Automated Derivation of ILP Implementations from SDL Specifications.
In: Kim, M.; Chin, B.; Kang, S.; Lee, D. (eds.): Formal Techniques for Networked and Distributed Systems (FORTE 2001). Kluwer Academic Publishers, 2001, ISBN: 0-7923-7470-3, 3 - 18.

Langendörfer, P.; Krüger, Th.; König, H.: Leistungsbewertung von SDL-Spezifikationen: Ein Werkzeug zur Evaluierung von Implementierungsalternativen.
In: Grabowski, J.; Heymer, S.: Formale Beschreibungstechniken für verteilte Systeme, Shaker-Verlag, 2000, 143 - 152.

Langendoerfer, P.; Koenig, H.: Evaluation of well-known Implementation Techniques for Application in mobile Networks.
In: Graham, P.; Maheswaran, M (eds.): Proceedings of the International Conference on Internet Computing, CSREA Press, 2000, 451 - 459.

Koenig, H.; Langendoerfer, P.: Automated Derivation of Efficient Implementations from Formal Protocol Specifications.
In: Fantechi, A. (ed.): FORTE/PSTV 2000 Tutorial Notes, Pisa, 2000.

Beier, I.; Koenig, H.: Distributed QoS Management for a Multiparty Videoconference System.
In: Yongchareon, T.; Aagesen, F. A.; Wuwongse, V. (eds.): Intelligence in Networks. IFIP TC6 WG6.7 5th International Conference SMARTNET?99, Pathumthani, Thailand, Kluwer Academic Publishers, 1999, 335 - 348.

Chanson, S.; Hui, A.; Siu, E.; Beier, I.; Koenig, H. Zuehlke, M.: OCTOPUS - A Global Scalable Multiparty Video Conferencing System.
Proc. 8th IEEE International Conference on Computer Communications and Networks (IC3N`99), Boston, IEEE Press, 1999, pp. 97 - 102.

Langendoerfer, P.; König, H.: Automated Protocol Implementation Based on Activity Threads.
Proc. IEEE ICNP?99 (International Conference on Network Protocols), Toronto, IEEE Press, 1999, pp. 3 - 10.

Langendoerfer, P.; Koenig, H.: Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering.
In: Wu, J.; Chanson, S.T.; Gao, Q. (eds.): Formal Methods for Protocol Engineering and Distributed Systems. Kluwer Academic Publishers, 1999, pp. 169 - 184.

Langendoerfer, P.; Koenig, H.: COCOS - A configurable SDL compiler for generating efficient protocol implementations.
In: Dssouli, R.; Bochmann, G. v.; Lahav, Y. (eds.): SDL?99. The next Millennium. Proc. of the 9th SDL Forum, Montréal, Québec, Canada, Elsevier, 1999, 259 - 274.

Ulrich, A.; Koenig, H.: Architecures for Testing Distributed Systems.
In: Csopaki, G.; Dibuz, S.; Tarnay, K. (eds.): TESTING OF COMMUNICATING SYSTEMS Methods and Applications. Kluwer Academic Publishers, 1999, pp. 93 - 108.

Preuß, T.; Syrbe, J.-H.; König, H.: Permanent Customer - Provider Relationships for Elec-tronic Service Marktes.
In: Steinmetz, R.(Hrsg.): Kommunikation in verteilten Systemen, Springer-Verlag,1999, S. 326 - 337.

Beier, I.; Koenig, H.: GCSVA - A Multiparty Video Conferencing System with DistributedGroup and QoS Management.
Proc. 7th IEEE International Conference on Computer Communications and Networks (IC3N`98), Lafayette, IEEE Press, 1998, pp. 213 - 222.

Preuß, T.; Koenig, H.: Service Supplier Chains for the Outsourcing of Information Processing Services.
In Proc.IEEE Enterprise Networking and Computing Conference, Atlanta, IEEE Press, 1998, pp. 9 - 21.

Beier, I.; Fiedler, J. König, H.: A Multimedia Conferencing System with Distributed Group and QoS Management.
Proc. 4th Int. Symposium on Communications ISCOM?97, Hsinchu (Republik China), 1997, pp. 134 - 138.

Beier, I.; König, H.: A Protocol Supporting Distributed Group and QoS Management.
Proc. IEEE Conference on Protocols for Multimedia Systems - Multimedia Networking PROMS-MmNet?97,Santiago de Chile, IEEE Press, 1997, pp. 213 - 222.

Preuß, T.; Syrbe, J.-H.; Koenig, H,: Virtual Private Resources - An Approach for the Long-term Binding of Services.
Proc. of the1st International Enterprise Distributed Object Computing Workshop (EDOC), Brisbane, IEEE CS Press,1997, pp. 216 - 226.

Henke, R.; Mitschele-Thiel, A.; Koenig, H.: On the Influence of Semantic Constraints on the Code Generation from Estelle Specifications.
In Mizuno, T. et al. (eds.): Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII?97), Chapman & Hall, 1997, pp. 399 - 414.

Ulrich, A.; König, H.: Specification-based Testing of Concurrent Systems.
In: Mizuno, T. et al. (eds.): Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII?97),Chapman & Hall,1997, pp. 7 - 22.

Henke, R.; König, H.; Mitschele-Thiel, A.: Derivation of Efficient Implementations from SDL Specifications Employing Data Referencing, Integrated Packet Framing and Activity Threads.
In: Cavalli, A.; Sarma, A. (eds.): SDL?97 Time for Testing. Elsevier,1997, pp. 397 - 414.

König, H.; Ulrich, A.; Heiner, M.: Design for Testability: A Step-wise Test Procedure.
In: Kim, M.; Kang, S.; Hong, K. (eds.): Testing of Communication Systems, Vol. 10. Chapman & Hall, 1997, pp. 125 - 140.

Langendörfer, P.; König, H.: Improving the Efficiency of Automatically Generated Code by Using Implementation-specific Annotations.
Proc. HIPPARCH?97 Workshop, Uppsala, 1997.

Richter, B.; Sobirey, M.; König, H.: Host-orientiertes Netz-Audit.
In: Zitterbart M. (Hrsg.): Kommunikation in Verteilten Systemen. Informatik aktuell. Springer-Verlag,1997, S. 48 - 61.

Guerrouat, A.; König, H.: Automation of Test Case Derivation and Test Verdict Assignment in Respect to Test Purposes.
In: Baumgarten, B.; Burkhardt, H.-J.; Giessler, A. (eds.): Testing of Communicating Systems. Chapman & Hall, 1996, pp. 207 - 222.

Sobirey, M.; Richter, B.; König, H.: The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis.
In: Horster, P. (ed.): Communications and Multimedia Security II. Chapman & Hall, 1996, 278 - 290.

Guerrouat, A.; Koenig, H.; Ulrich, A.: SELEXPERT - a knowledge-based tool for test case selection.
Proc. FORTE?95 (IFIP Conference on Formal Description Techniques), Montreal, 1995, 313 - 328, also published in Bochmann G.v. et al. (eds.): Formal Description Techniques VIII, Chapman & Hall,1996, pp. 313 - 328.

Henniger, O.; Ulrich, A.; Koenig, H.: Transformation of Estelle Modules aiming at Test Case Generation.
Proc. IWPTS95 (IFIP International Workshop on Protocol Test Systems), Paris, 1995, 45 - 60.

Plato, R.; Held, Th.; König, H.: PARES - A Portable Parallel Estelle Compiler.
Proc. PSTV95, Warsaw, 1995, 383 - 400; also published in Dembinski, P. (ed.): Protocol Specification, Testing and Verification XV. Chapman & Hall, 1995, 383 - 399.

Held, Th.; Koenig, H.: Increasing the Efficiency of Computer-Aided Protocol Implementations.
Proc. PSTV94 (IFIP Conference on Protocol Specification, Testing and Verification), Vancouver, 1994, 363 - 371; also published in Vuong, S.; Chanson, S. (eds.): Protocol Specification, Testing and Verification XIV, Chapman & Hall, 1995, 387 - 394.

Ulrich, A.; Koenig, H: Test Derivation from LOTOS Using Structure Information.
In: O. Rafiq (ed.): Proc. IWPTS?93 (IFIP International Workshop on Protocol Test Systems) Pau (Frankreich), North Holland, 1994, 283 - 297.

Petrenko, A.; Dssouli, R.; Koenig, H.: On Evaluation of Testability of Protocol Structures.
In: O. Rafiq (ed.): Proc. IWPTS?93 (IFIP International Workshop on Protocol Test Systems) Pau (Frankreich), North Holland, 1994, 115 - 127.

König, H.; Neumann, P.: Formale Beschreibungstechniken für Kommunikationsprotokolle: Probleme ihrer praktischen Anwendung.
Tagungsband KIVS 93, GI Informatik aktuell, Springer-Verlag, Heidelberg, 1993, S. 545 - 559.

Held, Th.; Koenig, H.: Deriving Parallel Structures from Estelle Specifications.
Proc. ICPADS92 (International Conference on Parallel and Disributed Systems), Hsin chu (Republik China), 1992, pp. 394 - 401.

Hofmann, B.; Effelsberg, W.; Held, T.; Koenig, H.: On the Parallel Implementation of OSI Protocols.
Proc. IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems (HPCS 92), Tucson, Arizona, February 1992.

König, H.; Neumann, P.: Formale Beschreibung der PROFIBUS-Norm.
In: Tagungsberichte für STAK92, VDI-Berichte 937, Düsseldorf, 1992, S. 77 - 91.

Foedisch, R.; Held, T.; Koenig, H.: A Protocol Engineering Environment Based on ESTELLE.
Proc. INDC-92, Helsinki, 1992, pp. 32-52, ebenfalls enthalten in Tienari, M.; Khakhar, D.(eds): Information, Network and Data Communication, IV, North Holland, Amsterdam, 1992, pp. 121 - 141.

Födisch, R.; König, H.: Rapid Prototyping von Estelle-Spezifikationen. Rapid Prototyping von Estelle-Spezifikationen.
In: Hogrefe, D. (Hrsg.): Formale Beschreibungstechniken für verteilte Systeme. GI Informatik aktuell, Springer-Verlag, Heidelberg, S. 110 - 124.

König, H.: Experience in Computer-aided Protocol Implementation.
In: Csaba, L.; Tarnay, K.; Szentivanyi, T.: COMPUTER NETWORKING. North Holland Comp., Amsterdam, 1990, pp. 385 - 394.


Liu, F; Koenig, H.: Puzzle - an efficient, compression independent video encryption algorithm.
Multimedia Tools and Applications, 10.1007/s11042-012-1185-y, 2012.

Schmerl, S.; Vogel, M.; König, H.: Using model checking to identify errors in intrusion detection signatures.
International Journal on Software Tools for Technology Transfer (STTT) 13 (2011) 1: 89 - 106.

F. Liu and H. Koenig: A Survey of Video Encryption Algorithms.
Computer & Security  29 (2010) 1, 3 - 15.

Carle, G.; Dressler, F.; Kemmerer, R.A.; Koenig, H.; Kruegel, C.; Laskov, P.: Network attack detection and defense.
Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008. Computer Science – Research&Development (CSRD) 23 (2008): 15 - 25.

Opitz, A.; König, H.; Szamlewska, S.: What Does Grid Computing Cost?
Journal of Grid Computing 6 (2008) 4: 385 - 397, Springer.

Liu, F.W; Koenig, H.; Wang, W.: Designing a Security Architecture for a P2P Video Conference System.
China Communications Journal 5 (2008) 2:49 - 58.

Holz, T.; Meier, M.; König, H.: Bausteine für effiziente Intrusion Detection Systeme.
PIK 25 (2002) 3, S. 144-157.

Langendörfer, P.; Kraemer, R.; König, H.: Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks.
The Journal of Supercomputing, 20, 161 - 173, Kluwer Academic Publishers, 2001.

Koenig, H.; Langendoerfer, P.; Krumm, H.: Improving the Efficiency of Automated Protocol Implementations Using a Configurable FDT Compiler.
Computer Communications 23 (2000) 12, 1179 - 1195.

Chanson, S.T.; Hui, A.; König, H.; Zühlke, M.: Das OCTOPUS-Videokonferenzsystem.
PIK 23 (2000) 4, 189 - 198.

Langendörfer, P.; König, H.: Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering.
PIK 22 (1999) 4, 197 - 203.

Henke, R.; König, H.; Mitschele-Thiel, A.: Generierung effizienter Implementationen aus formal spezifizierten Protokollarchitekturen.
PIK 1/98, S. 11 - 18.

König, H.; Krumm, H.: Implementierung von Kommunikationsprotokollen.
Informatik Spektrum 19 (1996) 6, 316 - 325.

Richter, B.; Sobirey, M.; König, H.: Auditbasierte Netzüberwachung.
PIK 1/96, 24 - 32.

Gotzhein, R.; Bredereke, J.; Effelsberg, W.; Fischer, S.; Koenig, H.; Held, Th.: Improving the Efficiency of Automated Protocol Implementation Using Estelle.
Computer Communications 19 (1996) 1226 - 1235.

Held, Th.; Koenig, H.: On the Efficiency of Computer-Aided Protocol Implementations.
Electronic Journal on Networks and Distributed Processing, (1995) 2, 37 - 55.

König, H.; Effelsberg, W.; Gotzhein, R.: Ableitung parallel ausführbarer Protokollimplementierungen auf der Grundlage von Estelle-Spezifikationen.
PIK 4/93, S. 193 - 202.


König, H.: Protocol Engineering.
Springer (525 pages), 2012,

König, H.: Protocol Engineering.
B. G. Teubner, Stuttgart, Leipzig, Wiesbaden, 2003, (496 Seiten),

König, H.: Kommunikationsprotokolle.
Akademie-Verlag, Berlin, 1990.


König, H.: Network Attack Detection and Defense.
Praxis der Informationsverarbeitung und Kommunikation (PIK) 35 (1):1 (2012).

Koenig, H.; Heiner, M.; Wolisz, A. (eds.): Formal Techniques for Networked and Distributed Systems.
LNCS 2767, Springer, 2003.

Schieferdecker, I.; König, H.; Wolisz, A. (eds.): Testing of Communicating Systems XIV: Application to Internet Technologies and Services.
Kluwer Academic Publishers, 2002.

Kutvonen, L.; König, H.; Tienari, M. (eds.): Distributed Applications and Interoperable Systems II.
Kluwer Academic Publishers, 1999.

König, H.; Langendörfer, P. (Hrsg.): Formale Beschreibungstechniken für Verteilte Systeme.
Shaker Verlag, Aachen, 1998.

König, H.; Geihs, K.; Preuss, T. (eds): Distributed Applications and Interoperable Systems.
Proceedings IFIP TC 6.1 Working Conference DAIS?97, Cottbus, Sept. 1997, Chapman & Hall,1997.

König, H. (Hrsg.): Formale Methoden für Verteilte Systeme.
K-G Saur Verlag, München, Reihe Fokus,1993.