Publications

Literatursammlung2

Wübbeling, Matthias and Meier, Michael. Improved Calculation of AS Resilience Against IP Prefix. In Proceedings of IEEE 41st Conference on Local Computer Networks Workshops, November 2016.

Wendzel, Steffen and Kasem-Madani, Saffija. IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). September 2016.

Duessel, Patrick and Gehl, Christian and Flegel, Ulrich and Dietrich, Sven and Meier, Michael. Detecting Zero-Day Attacks Using Context-Aware Anomaly Detection At Application-Layer. International Journal of Information Security, July 2016.

Thomas, Georg and Duessel, Patrick and Meier, Michael. Ethical Issues of User Behavioral Analysis Through Machine Learning. In Proceedings of the European Security Conference 2016, June 2016. Best Paper Award.

Kasem-Madani, Saffija. A Framework Design for Privacy-Preserving Computation on Shared Data, March 2016.

Kasem-Madani, Saffija. A Framework for Privacy-Preservig Computation on Shared Data, March 2016.

Kasem-Madani, Saffija. A Mechanism Design for Privacy-Preserving Computation on Shared Data. In GI Edition Proceedings, editor, Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, number 256, 2016.

Wendzel, Steffen. How to increase the security of smart buildings? Communications of the ACM (CACM), 59(5):47–49, 2016.

Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 9(8):781–790, 2016.

Pohl, Christoph and Zugenmaier, Alf and Meier, Michael and Hof, Hans-Joachim. B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. In ICT Systems Security and Privacy Protection, volume 455 of IFIP AICT, pages 267–280. Springer, 2016.

Meier, Michael and Reinhardt, Delphine and Wendzel, Steffen (editors), editor. Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), volume P-256 of GI, Bonn, 5.-7. April 2016. LNI.

Kaur, Jaspreet; Wendzel, Steffen and Eissa, Omar and Tonejc, Jernej and Meier, Michael. Covert Channel-internal Control Protocols: Attacks and Defense. Security and Communication Networks (SCN). Wiley, 9(15):2986–2997, 2016.

Wendzel, Steffen and Mazurczyk, Wojciech. POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pages 1739–1741, New York, NY, USA, 2016. ACM.

Wendzel, Steffen and Keller, Jörg (Eds.). Special Issue on Security, Privacy and Reliability of Smart Buildings. Journal of Universal Computer Science (J.UCS), 22(9):1201–1202, Oktober 2016.

Wendzel, Steffen and Mazurczyk, Wojciech and Zander, Sebastian. A Unified Description Method for Network Information Hiding Methods. Journal of Universal Computer Science (J.UCS), 22(11):1456–1486, Dezember 2016.

Mazurczyk, Wojciech and Amann, Philipp Caviglione, Luca and Wendzel, Steffen. CUIng: Criminal Use of Information Hiding Initiative. European CIIP Newsletter, 10(3):31–32, 2016.

Wübbeling, Matthias. Linux Policy Routing zum sicheren Teilen von OpenVPN-Zugängen. IT-Administrator, 2015, October 2015.

Wübbeling, Matthias and Wendzel, Steffen. IT-Sicherheitsmonitoring. Sicherheitstechnischer Report – Cyber Security Report 2015, (1):19–21, October 2015.

Anhaus, Eva Marian and Wendzel, Steffen. BACtag - Data Leakage Protection für Gebäude. In Proc. D-A-CH Security 2015, pages 417–428. syssec, September 2015.

Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate - A Linux Kernel Module for High Interaction Honeypots. In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), pages 133–138. IARIA, August 2015.

Sykosch, Arnold and Wübbeling, Matthias. STIX 2 IDS. In Coordinating Attack Response at Internet Scale (CARIS) Workshop. June 2015.

Wübbeling, Matthias and Sykosch, Arnold and Meier, Michael. MonIKA: Cooperative IT Security Monitoring for Competing Participants. In Risiken kennen, Herausforderungen annehmen, Lösungen gestalten (Tagungsband zum 14. Deutschen IT-Sicherheitskongress), pages 427–438, Bonn, May 2015.

Christin, Delphine and Bub, Daniel M. and Moerov, Andrey and Kasem-Madani, Saffija. A Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Application. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2015.

Caviglione, Luca and Lalande, Jean-Francois and Mazurczyk, Wojciech and Wendzel, Steffen. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, volume 9190 of LNCS, pages 165–177. Springer, 2015.

Kaur, Jaspreet and Herdin, Christian and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael and Szlósarczyk, Sebastian. Novel Approaches for Security in Building Automation Systems. In 14. Sicherheitskongress des BSI, pages 145–158, 2015.

Kaur, Jaspreet and Tonejc, Jernej and Wendzel, Steffen and Meier, Michael. Securing Bacnets Pitfalls. In 30th International Information Security and Privacy Conference (IFIP SEC), volume 455 of IFIP AICT, pages 616–629. Springer, 2015.

Szczypiorski, Krzysztof and Janicki, Artur and Wendzel, Steffen. The Good, The Bad And The Ugly: Evaluation of Wi-Fi Steganography. Journal of Communications (JCM), 10(10):747–752, 2015.

Tonejc, Jernej and Kaur, Jaspreet and Wendzel, Steffen. Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. In 3rd Int. Conf. Human Aspects of Information Security, Privacy and Trust (HAS), HCI International, Los Angeles, volume 9190 of LNCS, pages 693–704. Springer, 2015.

Wojciech Mazurczyk, Wojciech and Wendzel, Steffen and Zander, Sebastian and Houmansadr, Amir and Szczypierski, Krzysztopf. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications. IEEE Series on Information and Communication Networks Security. Wiley, 2015.

Szczypierski, Krzysztopf and Janicki, Artur and Wendzel, Steffen. The Good, the bad, and the ugly: Evaluation of Wi-Fi Steganography. Journal of Communications, 10(10):747–752, 2015.

Pohl, Christoph and Meier, Michael and Hof, Hans-Joachim. Apate A Linux Kernel Module for High Interaction Honeypots . In Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2015), pages 133–138, 2015.

Wendzel, Steffen and Zander, Sebastian and Fechner, Bernhard and Herdin, Christian. Pattern-Based Survey and Categorization of Network Covert Channel Techniques. ACM Computing Surveys, 47(3):501–5026, 2015.

Kaur, Jaspreet and Wendzel, Steffen and Meier, Michael. Countermeasures for Covert Channel-internal Control Protocols. 4th Int. Workshop on Cyber Crime (IWCC) held together with the 10th ARES. pages 422–428. IEEE, 2015. Best Paper Award.

Wendzel, Steffen and Palmer, Carolin. Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research. Journal of Universal Computer Science, 21(12):1684–1705, 2015.

Naumann, Matthias and Wendzel, Steffen and Mazurczyk, Wojciech and Keller, Jörg. Micro protocol engineerin for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions. Security and Communication Networks (SCN), 2015.

Zwanger, Viviane and Gerhards-Padilla, Elmar and Meier, Michael. Codescanner: Detecting (Hidden) x86/64 Code in Arbitrary Files. In MALWARE 2014, pages 118–127, October 2014.

Wübbeling, Matthias and Meier, Michael. Utilization of Traceroutes to Improve Cooperative Detection of Internet Routing Anomalies. In Proceedings of 9th Future Security - Security Research Conference, Berlin, September 2014.

Wendzel, Steffen and Herdin, Christian and Wirth, Roman and Masoodian, Masood and Luz, Santonio and Kaur, Jaspreet. Mosaic-chart based Visualization in Building Automation Systems. In Proc. Future Security 2014, pages 687–690,. Fraunhofer Verlag, September 2014.

Wübbeling, Matthias and Elsner, Till and Meier, Michael. Inter-AS Routing Anomalies: Improved Detection and Classification. In P. Brangetto, M. Maybaum, and J. Stinissen, editors, Proceedings of 6th International Conference on Cyber Conflict, Tallin, June 2014.

Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Proceedings of the Seventh GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, volume 228 of Lecture Notes in Informatics, pages 319–329. GI, 2014.

Wendzel, Steffen and Mazurczyk, Wojciech and Caviglione, Luca and Meier, Michael. Hidden and Uncontrolled - On the Emergence of Network Steganography. In Information Security Solutions Europe ISSE14, pages 123–133, 2014.

Kiesling, Tobias and Motsch, Nils and Kaufmann, Helmut and Wübbeling, Matthias and Elsner, Till and Meier, Michael. Collaborative Security Monitoring based on the MonIKA Framework for Privacy-Preserving Information Sharing. In Klaus Thoma, Ivo Häring, and Tobias Leismann, editors, Proceedings of 9th Future Security - Security Research Conference, 2014.

Wübbeling, Matthias. Improved Routing Anomaly Detection to Protect End Users. In Proceedings of the Ninth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), volume SR-2014-0 of Technical Report, 2014.

Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purpose, CSCUB, 2014.

Mazurczyk, Wojciech and Wendzel, Steffen and Azagra Villares, Ignacio and Szczypiorski, Krzysztof. On Importance of Steganographic Cost For Network Steganography. Security and Communication Networks (SCN), 2014.

Szlósarczyk, Sebastian and Wendzel, Steffen and Kaur, Jaspreet and Meier, Michael and Schubert, Frank. Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet. In Sicherheit 2014, volume 228 of LNI, pages 407–418. GI, 2014.

Wendzel, Steffen and Keller, Jörg. Hidden and Under Control: A Survey and Outlook on Covert Channel-internal Control Protocols. Annals of Telecommunications (ANTE), 69(7):417–430, 2014.

Wendzel, Steffen and Keller, Jörg. IT-gestütztes Management und Controlling: Verdeckte Kanäle - eine zunehmende Gefahr für Unternehmensdaten. Controlling (Zeitschrift für erfolgsorientierte Unternehmenssteuerung), 26(14/6):304–308, 2014.

Wendzel, Steffen and Zwanger, Viviane and Meier, Michael and Szlósarczyk, Sebastian. Envisioning Smart Building Botnets. In Sicherheit 2014, volume 228 of LNI, pages 319–329. GI, 2014.

Kaur, Jaspreet and Meier, Michael and Szlósarczyk, Sebastian and Wendzel, Steffen. A Cost-Efficient Building Automation Security Testbed for Educational Purposes, 2014. poster at SECUWARE 2014, Lisbon.

Sykosch, Arnold and Neff, René and Meier, Michael. Policy Driven Pseudonymination. Future Security, 9:442–449, 2014.

Wübbeling, Matthias. Visibility of routing anomalies for end users. In Proceedings of the Eight GI SIGSIDAR Graduate Workshop on Reactive Security (SPRING), volume Technical Report SR-2013-01 of GI FGSIDAR, 2013.

Kahler, B. and Wendzel, Steffen. How to own a Building? Wardriving gegen die Gebäudeautomation. In 20. DFN Workshop Sicherheit in vernetzten Systemen, pages H1–H13. BoD, 2013.

Lalande, Jean-Francois and Wendzel, Steffen. Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In ECTCM Workshop, pages 701–710. IEEE, 2013.

Wendzel, Steffen. Novel Approaches for Network Covert Storage Channels. PhD thesis, University of Hagen, 2013.

Elsner, Till and Sykosch, Arnold and Wübbeling, Matthias. Kooperatives Monitoring zum Schutz kritischer Infrastrukturen. Sonderheft AFCEA 2013, 2013.

Roos, Philipp and Schumacher, Philipp and Elsner, Till and Meier, Michael and Wübbeling, Matthias. Rechtliche Betrachtung von Desinfektionsmaßnahmen zur Botnetzbekämpfung durch Internet-Service-Provider (in German). In Informationssicherheit stärken – Vertrauen in die Zukunft schaffen (Tagungsband zum 13. Deutschen IT-Sicherheitskongress), pages 37–53, Bonn, 2013.

Apel, Martin and Meier, Michael. Generalizing Behavioral Signatures for Detecting Unknown Malware Variants and Early Warning. Praxis der Informationsverarbeitung und Kommunikation, 1(35):17–24, April 2012.

Flegel, Ulrich and Meier, Michael. Modeling and Describing Misuse Scenarios Using Signature-Nets and Event Description Language. it - Information Technology, 2(54):71–81, April 2012.

Backs, Peter and Wendzel, Steffen and Keller, Jörg. Dynamic Routing in Covert Channel Overlays Based on Control Protocols. In Proc. International Workshop on Information Security, Theory and Practice (ISTP-2012), pages 32–39. IEEE, 2012.

Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and André, Elisabeth. Next-Generation Home Automation Systems. In Technik für Menschen im nächsten Jahrzehnt. Beiträge zum Usability Day X, pages 80–87. Pabst Science Publishers, 2012.

Wendzel, Steffen and Kahler, Benjamin and Rist, Thomas. Covert Channels and their Prevention in Building Automation Protocols - A Prototype Exemplified Using BACnet. In Proc. 2nd Workshop on Security of Systems and Software Resiliency, pages 731–736. IEEE, 2012.

Wendzel, Steffen and Keller, Jörg. Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels. In Proc. 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), pages 1–6. IARIA, 2012.

Wendzel, Steffen and Zander, Sebastian. Detecting Protocol Switching Covert Channels. In Proc. 37th IEEE Conference on Local Computer Networks (LCN), pages 280–283. IEEE, 2012.

Wendzel, Steffen and Keller, Jörg. Preventing Protocol Switching Covert Channels. International Journal On Advances in Security, 5(3 and 4):81–93, 2012.

Wendzel, Steffen. The Problem of Traffic Normalization Within a Covert Channels Network Environment Learning Phase. In Proc. Sicherheit12, volume P-195 of LNI, pages 149–161. GI, 2012.

Wendzel, Steffen and Keller, Jörg. Systematic Engineering of Control Protocols for Covert Channels. In Proc. 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS 2012), volume 7394 of LNCS, pages 131–144. Springer, 2012.

Wendzel, Steffen. Tunnel und verdeckte Kanäle im Netz. Springer-Vieweg, 2012.

Aschenbruck, Nils and Martini, Peter and Meier, Michael and Tölle, Jens (editors), editor. Future Security - 7th Security Research Conference, Future Security 2012, volume 318 of Communications in Computer and Information Science. Springer, 4.-6. September 2012.

Meyer, Matthias and Meier, Michael. SEODisc: Analyse SEO vergifteter Suchmaschinenergebnisse. In 12. Deutschen IT-Sicherheitskongress, pages 375–387, 2011.

Rist, Thomas and Wendzel, Steffen and Masoodian, Masood and Monigatti, Paul and André, Elisabeth. Creating Awareness for Efficient Energy Use in Smart Homes. In Intelligent Wohnen. Zusammenfassung der Beiträge zum Usability Day IX, pages 162–168. Pabst Science Publishers, 2011.

Wendzel, Steffen and Keller, Jörg. Low-attention forwarding for mobile network covert channels. In Proc. Communications and Multimedia Security, volume 7025 of LNCS, pages 122–133. Springer, 2011.

Apel, Martin and Meier, Michael. Clustering Malware for Generating Behavioral Signatures. In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), volume SR-2010-01 of SIDAR-Reports. GI SIG SIDAR, 2010.

Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Early Warning System on a National Level - Project AMSEL. In Proceedings of the European Workshop on Internet Early Warning and Network Intelligence (EWNI 2010), 2010.

Apel, Martin and Biskup, Joachim and Flegel, Ulrich and Meier, Michael. Towards Early Warning Systems - Challenges, Technologies and Architecture . In Post-Proceedings of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS2009), volume 6027 of Lecture Notes in Computer Science, pages 151–164. Springer, 2010.

Büscher, Armin and Meier, Michael and Benzmüller, Ralf. Throwing a MonkeyWrench into Web Attackers Plans. In Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2010), volume 6109 of Lecture Notes in Computer Science, pages 28–39. Springer, 2010.

Flegel, Ulrich and Hoffmann, Johannes and Meier, Michael. Cooperation enablement for centralistic early warning systems. In Proceedings of the 25th International ACM Symposium on Applied Computing (SAC 2010), pages 2001–2008. ACM, 2010.

Uellenbeck, Sebastian and Meier, Michael. Verwaltung von Signaturen für Malware-Gruppen. In In Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), volume SR-2010-01 of SIDAR-Reports. GI SIG SIDAR, 2010.

Apel, Martin and Bockermann, Christian and Meier, Michael. Measuring Similarity of Malware Behavior. In Proceedings of the 34th IEEE Conference on Local Computer Networks (LCN): IEEE Computer Society, pages 891–898. IEEE Computer Society, 2009.

Blichmann, Christian and Dullien, Thomas and Meier, Michael. Automatisierte Signaturgenerierung für Malware-Stämme. In Proceedings of D-A-CH Security 2009, pages 361–372, 2009.

Bockermann, Christian and Apel, Martin and Meier, Michael. Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling. In Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA2009), volume 5587 of Lecture Notes in Computer Science, pages 196–205. Springer, 2009.

Büscher, Armin and Meier, Michael and Benzmüller, Ralf. MonkeyWrench - Bösartige Webseiten in die Zange genommen. In Sichere Wege in der vernetzten Welt - Tagungsband zum 11. Deutschen IT-Sicherheitskongress, pages 459–472. SecuMedia Verlag, 2009.

Wendzel, Steffen. Protokollwechsel zur Realisierung von Covert Channels und Header-Strukturveränderungen zur Vermeidung von Covert Channels. PhD thesis, Kempten University of Applied Sciences, January 2009.

Biskup, Joachim and Hämmerli, Bernhard and Meier, Michael and Schmerl, Sebastian and Tölle, Jens and Vogel, Michael. Early Warning Systems. In Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, volume 08102 of Dagstuhl Seminar Proceedings, 2008.

Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael and Rietz, Rene. Systematic Signature Engineering by Re-use of Snort Signatures. In Proceedings of the 24th International Annual Computer Security Applications Conference (ACSAC 2008), pages 23–32. IEEE Computer Society, 2008.

Wendzel, Steffen. Protocol channels as a new design alternative of covert channels. CoRR, abs/0809.1949:1–2, 2008.

Flegel, Ulrich and Meier, Michael. Authorization Architectures for Privacy-respecting Surveillance. In Proceedings of the Fourth European PKI Workshop: Theory and Practice (EuroPKI 2007), volume 4582 of Lecture Notes in Computer Science, pages 1–17. Springer, 2007.

Meier, Michael and Flegel, Ulrich and Schmerl, Sebastian. Efficiency Issues of Rete-based Expert Systems for Misuse Detection. In Proceedings of the 23rd International Annual Computer Security Applications Conference (ACSAC 2007), pages 151–160. IEEE Computer Society, 2007.

Meier, Michael. Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmuster (in German). Springer Verlag, Berlin Heidelberg, 2007.

Flegel, Ulrich and Meier, Michael. Herausforderungen für eine effektive, effiziente und datenschutzgerechte IT-Frühwarnung. In Proceedings of the BSI Workshop on ÏT-Frühwarnsysteme: Bundesamt für Sicherheit in der Informationstechnik, pages 39–42, 2006.

Schmerl, Sebastian and König, Hartmut and Flegel, Ulrich and Meier, Michael. Simplifying Signature Derivation by Reuse. In Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), volume 3995 of Lecture Notes in Computer Science, pages 436–450. Springer, 2006.

Schmerl, Sebastian and Flegel, Ulrich and Meier, Michael. Vereinfachung der Signaturentwicklung durch Wiederverwendung. In Proceedings of the Third GI Conference on Sicherheit - Schutz und Zuverlässigkeit}, volume 77 of Lecture Notes in Informatics (LNI), pages 201–212. GI, 2006.

Flegel, Ulrich and Hansen, Marit and Meier, Michael. Special Issue on Incident Management. Datenschutz und Datensicherheit, 29(7), July 2005.

Meier, Michael and Schmerl, Sebastian. Effiziente Analyseverfahren für Intrusion-Detection-Systeme. In Proceedings of the 2nd GI Conference on Sicherheit - Schutz und Zuverlässigkeit, volume 62 of Lecture Notes in Informatics, pages 209–220. GI, 2005.

Meier, Michael and Schmerl, Sebastian and König, Hartmut. Improving the Efficiency of Misuse Detection. In Proceedings of the Second Conference on Detection of Intrusions & Malware and Vulnerability Assessment (DIMVA2005), volume 3548 of Lecture Notes in Computer Science, pages 188–205. Springer, 2005.

Meier, Michael and Flegel, Ulrich and König, Hartmut. Special Issue on Reactive Security - Intrusion Detection, Honeypots, and Vulnerability Assessment. 27(4):186–187, December 2004.

Flegel, Ulrich and Meier, Michael. Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), volume 46 of Lecture Notes in Informatics (LNI). GI, Dortmund, 2004.

Meier, Michael. A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In Proceedings of the 7th International Information Security Conference (ISC 2004), volume 3225 of Lecture Notes in Computer Science, pages 158–169. Springer, 2004.

Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Security, E-Learning, E-Services. Proceedings of the 17th DFN-Arbeitstagung über Kommunikationsnetze, volume 44 of Lecture Notes in Informatics (LNI), pages 217–232, 2003.

Holz, Thomas and Meier, Michael and König, Hartmut. Bausteine für effiziente Intrusion Detection Systeme. Praxis der Informationsverarbeitung und Kommunikation - PIK, 25(3):144–157, 2002.

Holz, Thomas and Meier, Michael and König, Hartmut. An Efficient Intrusion Detection System Design. In Proceedings of the 2nd Information Security for South Africa Conference, 2002.

Holz, Thomas and Meier, Michael and König, Hartmut. High-Efficient Intrusion Detection Infrastructure. In Proceedings of the NATO Symposium Real Time Intrusion Detection, volume RTO-MP-101 of NATO report, 2002.

Meier, Michael and Bischof, Niels and Holz, Thomas. SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures. In Proceedings of the 17th IFIP TC11 International Conference on Information Security (SEC), volume 214 of IFIP Conference Proceedings, pages 559–571. Kluwer, 2002.

Meier, Michael and Holz, Thomas. Sicheres Schlüsselmanagement für verteilte Intrusion-Detection-Systeme. In Proceedings of Arbeitstagung Systemsicherheit, DuD-Fachbeiträge, pages 275–286. Vieweg, 2000.