Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cornelius Diekmann
@article{DBLP:journals/afp/DiekmannH20, author = {Cornelius Diekmann and Lars Hupel}, title = {Hello World}, journal = {Arch. Formal Proofs}, volume = {2020}, year = {2020}, url = {https://www.isa-afp.org/entries/Hello\_World.html}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/DiekmannH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DiekmannNKC19, author = {Cornelius Diekmann and Johannes Naab and Andreas Korsten and Georg Carle}, title = {Agile Network Access Control in the Container Age}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {16}, number = {1}, pages = {41--55}, year = {2019}, url = {https://doi.org/10.1109/TNSM.2018.2889009}, doi = {10.1109/TNSM.2018.2889009}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/DiekmannNKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-00720, author = {Cornelius Diekmann and Johannes Naab and Andreas Korsten and Georg Carle}, title = {Agile Network Access Control in the Container Age}, journal = {CoRR}, volume = {abs/1903.00720}, year = {2019}, url = {http://arxiv.org/abs/1903.00720}, eprinttype = {arXiv}, eprint = {1903.00720}, timestamp = {Sat, 30 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-00720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/DiekmannHMHC18, author = {Cornelius Diekmann and Lars Hupel and Julius Michaelis and Max W. Haslbeck and Georg Carle}, title = {Verified iptables Firewall Analysis and Verification}, journal = {J. Autom. Reason.}, volume = {61}, number = {1-4}, pages = {191--242}, year = {2018}, url = {https://doi.org/10.1007/s10817-017-9445-1}, doi = {10.1007/S10817-017-9445-1}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/DiekmannHMHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Diekmann17, author = {Cornelius Diekmann}, title = {Provably Secure Networks: Methodology and Toolset for Configuration Management}, school = {Technical University Munich, Germany}, year = {2017}, url = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20170727-1350756-1-7}, urn = {urn:nbn:de:bvb:91-diss-20170727-1350756-1-7}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Diekmann17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/MaltitzDC17, author = {Marcel von Maltitz and Cornelius Diekmann and Georg Carle}, editor = {Ahmed Bouajjani and Alexandra Silva}, title = {Privacy Assessment Using Static Taint Analysis (Tool Paper)}, booktitle = {Formal Techniques for Distributed Objects, Components, and Systems - 37th {IFIP} {WG} 6.1 International Conference, {FORTE} 2017, Held as Part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuch{\^{a}}tel, Switzerland, June 19-22, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10321}, pages = {225--235}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60225-7\_16}, doi = {10.1007/978-3-319-60225-7\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forte/MaltitzDC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08228, author = {Cornelius Diekmann}, title = {Provably Secure Networks: Methodology and Toolset for Configuration Management}, journal = {CoRR}, volume = {abs/1708.08228}, year = {2017}, url = {http://arxiv.org/abs/1708.08228}, eprinttype = {arXiv}, eprint = {1708.08228}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08228.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/DiekmannH16, author = {Cornelius Diekmann and Lars Hupel}, title = {Iptables{\_}Semantics}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/Iptables\_Semantics.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/DiekmannH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/DiekmannMH16, author = {Cornelius Diekmann and Julius Michaelis and Lars Hupel}, title = {{IP} Addresses}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/IP\_Addresses.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/DiekmannMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/DiekmannMH16a, author = {Cornelius Diekmann and Julius Michaelis and Max W. Haslbeck}, title = {Simple Firewall}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/Simple\_Firewall.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/DiekmannMH16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/MichaelisD16, author = {Julius Michaelis and Cornelius Diekmann}, title = {Routing}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/Routing.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/MichaelisD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/MichaelisD16a, author = {Julius Michaelis and Cornelius Diekmann}, title = {{LOFT} - Verified Migration of Linux Firewalls to {SDN}}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/LOFT.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/MichaelisD16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/DiekmannMHC16, author = {Cornelius Diekmann and Julius Michaelis and Max W. Haslbeck and Georg Carle}, title = {Verified iptables firewall analysis}, booktitle = {2016 {IFIP} Networking Conference, Networking 2016 and Workshops, Vienna, Austria, May 17-19, 2016}, pages = {252--260}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IFIPNetworking.2016.7497196}, doi = {10.1109/IFIPNETWORKING.2016.7497196}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/DiekmannMHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DiekmannSC16, author = {Cornelius Diekmann and Lukas Schwaighofer and Georg Carle}, title = {Certifying Spoofing-Protection of Firewalls}, journal = {CoRR}, volume = {abs/1603.07538}, year = {2016}, url = {http://arxiv.org/abs/1603.07538}, eprinttype = {arXiv}, eprint = {1603.07538}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DiekmannSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DiekmannPNKHC16, author = {Cornelius Diekmann and Stephan{-}Alexander Posselt and Heiko Niedermayer and Holger Kinkelin and Oliver Hanka and Georg Carle}, title = {Verifying Security Policies using Host Attributes}, journal = {CoRR}, volume = {abs/1604.00204}, year = {2016}, url = {http://arxiv.org/abs/1604.00204}, eprinttype = {arXiv}, eprint = {1604.00204}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DiekmannPNKHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DiekmannHC16, author = {Cornelius Diekmann and Lars Hupel and Georg Carle}, title = {Semantics-Preserving Simplification of Real-World Firewall Rule Sets}, journal = {CoRR}, volume = {abs/1604.00206}, year = {2016}, url = {http://arxiv.org/abs/1604.00206}, eprinttype = {arXiv}, eprint = {1604.00206}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DiekmannHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DiekmannKC16, author = {Cornelius Diekmann and Andreas Korsten and Georg Carle}, title = {Demonstrating topoS: Theorem-Prover-Based Synthesis of Secure Network Configurations}, journal = {CoRR}, volume = {abs/1604.00273}, year = {2016}, url = {http://arxiv.org/abs/1604.00273}, eprinttype = {arXiv}, eprint = {1604.00273}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DiekmannKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BraunDKC16, author = {Lothar Braun and Cornelius Diekmann and Nils Kammenhuber and Georg Carle}, title = {Adaptive Load-Aware Sampling for Network Monitoring on Multicore Commodity Hardware}, journal = {CoRR}, volume = {abs/1604.02322}, year = {2016}, url = {http://arxiv.org/abs/1604.02322}, eprinttype = {arXiv}, eprint = {1604.02322}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BraunDKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MaltitzDC16, author = {Marcel von Maltitz and Cornelius Diekmann and Georg Carle}, title = {Taint Analysis for System-Wide Privacy Audits: {A} Framework and Real-World Case Studies}, journal = {CoRR}, volume = {abs/1608.04671}, year = {2016}, url = {http://arxiv.org/abs/1608.04671}, eprinttype = {arXiv}, eprint = {1608.04671}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MaltitzDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/DiekmannSC15, author = {Cornelius Diekmann and Lukas Schwaighofer and Georg Carle}, editor = {Mauro Tortonesi and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and Edmundo Roberto Mauro Madeira and Corinna Schmitt and Joan Serrat}, title = {Certifying spoofing-protection of firewalls}, booktitle = {11th International Conference on Network and Service Management, {CNSM} 2015, Barcelona, Spain, November 9-13, 2015}, pages = {168--172}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CNSM.2015.7367354}, doi = {10.1109/CNSM.2015.7367354}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/DiekmannSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/DiekmannKC15, author = {Cornelius Diekmann and Andreas Korsten and Georg Carle}, editor = {Mauro Tortonesi and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and Edmundo Roberto Mauro Madeira and Corinna Schmitt and Joan Serrat}, title = {Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations}, booktitle = {11th International Conference on Network and Service Management, {CNSM} 2015, Barcelona, Spain, November 9-13, 2015}, pages = {366--371}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CNSM.2015.7367384}, doi = {10.1109/CNSM.2015.7367384}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/DiekmannKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/DiekmannHC15, author = {Cornelius Diekmann and Lars Hupel and Georg Carle}, editor = {Nikolaj S. Bj{\o}rner and Frank S. de Boer}, title = {Semantics-Preserving Simplification of Real-World Firewall Rule Sets}, booktitle = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9109}, pages = {195--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19249-9\_13}, doi = {10.1007/978-3-319-19249-9\_13}, timestamp = {Thu, 14 Apr 2022 20:26:16 +0200}, biburl = {https://dblp.org/rec/conf/fm/DiekmannHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/Diekmann14, author = {Cornelius Diekmann}, title = {Network Security Policy Verification}, journal = {Arch. Formal Proofs}, volume = {2014}, year = {2014}, url = {https://www.isa-afp.org/entries/Network\_Security\_Policy\_Verification.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/Diekmann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/DiekmannPNKHC14, author = {Cornelius Diekmann and Stephan{-}Alexander Posselt and Heiko Niedermayer and Holger Kinkelin and Oliver Hanka and Georg Carle}, editor = {Erika {\'{A}}brah{\'{a}}m and Catuscia Palamidessi}, title = {Verifying Security Policies Using Host Attributes}, booktitle = {Formal Techniques for Distributed Objects, Components, and Systems - 34th {IFIP} {WG} 6.1 International Conference, {FORTE} 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8461}, pages = {133--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43613-4\_9}, doi = {10.1007/978-3-662-43613-4\_9}, timestamp = {Fri, 09 Apr 2021 18:40:15 +0200}, biburl = {https://dblp.org/rec/conf/forte/DiekmannPNKHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/DiekmannHC14, author = {Cornelius Diekmann and Lars Hupel and Georg Carle}, editor = {Jun Pang and Yang Liu}, title = {Directed Security Policies: {A} Stateful Network Implementation}, booktitle = {Proceedings Third International Workshop on Engineering Safety and Security Systems, {ESSS} 2014, Singapore, Singapore, 13 May 2014}, series = {{EPTCS}}, volume = {150}, pages = {20--34}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.150.3}, doi = {10.4204/EPTCS.150.3}, timestamp = {Mon, 23 Dec 2019 09:19:12 +0100}, biburl = {https://dblp.org/rec/journals/corr/DiekmannHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/BraunDKC13, author = {Lothar Braun and Cornelius Diekmann and Nils Kammenhuber and Georg Carle}, title = {Adaptive load-aware sampling for network monitoring on multicore commodity hardware}, booktitle = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24 May, 2013}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6663536/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/BraunDKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.