Skip to main content

Showing 1–29 of 29 results for author: Hillmann, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00064  [pdf, other

    cs.DB cs.IR cs.IT cs.SE

    Constraint based Modeling according to Reference Design

    Authors: Erik Heiland, Peter Hillmann, Andreas Karcher

    Abstract: Reference models in form of best practices are an essential element to ensured knowledge as design for reuse. Popular modeling approaches do not offer mechanisms to embed reference models in a supporting way, let alone a repository of it. Therefore, it is hardly possible to profit from this expertise. The problem is that the reference models are not described formally enough to be helpful in devel… ▽ More

    Submitted 17 June, 2024; originally announced July 2024.

    Journal ref: Conference on Perspectives in Business Informatics Research (BIR 2023)

  2. arXiv:2407.00053  [pdf, other

    cs.DC cs.CL cs.DL cs.IR

    A Document-based Knowledge Discovery with Microservices Architecture

    Authors: Habtom Kahsay Gidey, Mario Kesseler, Patrick Stangl, Peter Hillmann, Andreas Karcher

    Abstract: The first step towards digitalization within organizations lies in digitization - the conversion of analog data into digitally stored data. This basic step is the prerequisite for all following activities like the digitalization of processes or the servitization of products or offerings. However, digitization itself often leads to 'data-rich' but 'knowledge-poor' material. Knowledge discovery and… ▽ More

    Submitted 13 June, 2024; originally announced July 2024.

    Journal ref: International Conference on Intelligent Systems and Pattern Recognition 2022

  3. arXiv:2406.15489  [pdf

    cs.CR cs.DC cs.NI eess.SY

    A Flexible Cryptographic Infrastructure for High-security SDR-based Systems

    Authors: Peter Hillmann, Björn Stelte

    Abstract: Military software defined radio (SDR) systems are a major factor in future network-centric operations due to their flexibility and support for more capable radio communications systems. The inherent nature of software-based systems requires a more complex auxiliary infrastructure and multiple independent levels of security compared with typical systems: Secure booting of the SDR device, cryptograp… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    MSC Class: 94A60 ACM Class: E.3; C.3; H.4

    Journal ref: Military Communications and Information Systems Conference (MilCIS 2013)

  4. arXiv:2311.14845  [pdf, other

    cs.CR cs.CC cs.DS cs.ET

    Lightweight Public Key Encryption in Post-Quantum Computing Era

    Authors: Peter Hillmann

    Abstract: Confidentiality in our digital world is based on the security of cryptographic algorithms. These are usually executed transparently in the background, with people often relying on them without further knowledge. In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened. This particularly affects public-key methods such as… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  5. arXiv:2311.12154  [pdf, other

    cs.HC cs.AI cs.MA

    User-Like Bots for Cognitive Automation: A Survey

    Authors: Habtom Kahsay Gidey, Peter Hillmann, Andreas Karcher, Alois Knoll

    Abstract: Software bots have attracted increasing interest and popularity in both research and society. Their contributions span automation, digital twins, game characters with conscious-like behavior, and social media. However, there is still a lack of intelligent bots that can adapt to web environments' variability and dynamic nature. Unlike human users, they have difficulty understanding and exploiting t… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 3rd Advanced Course & Symposium on Artificial Intelligence & Neuroscience (ACAIN2023) The 9th Annual Conference on Machine Learning, Optimization, and Data Science (LOD2023)

  6. Towards Cognitive Bots: Architectural Research Challenges

    Authors: Habtom Kahsay Gidey, Peter Hillmann, Andreas Karcher, Alois Knoll

    Abstract: Software bots operating in multiple virtual digital platforms must understand the platforms' affordances and behave like human users. Platform affordances or features differ from one application platform to another or through a life cycle, requiring such bots to be adaptable. Moreover, bots in such platforms could cooperate with humans or other software agents for work or to learn specific behavio… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Journal ref: In: Hammer, P., Alirezaie, M., Strannegård, C. (eds) Artificial General Intelligence. AGI 2023. Lecture Notes in Computer Science(), vol 13921

  7. arXiv:2211.11453  [pdf

    cs.SE cs.CV cs.MA eess.SY

    Methodology for Holistic Reference Modeling in Systems Engineering

    Authors: Dominik Ascher, Erik Heiland, Diana Schnell, Peter Hillmann, Andreas Karcher

    Abstract: Models in face of increasing complexity support development of new systems and enterprises. For an efficient procedure, reference models are adapted in order to reach a solution with les overhead which covers all necessary aspects. Here, a key challenge is applying a consistent methodology for the descriptions of such reference designs. This paper presents a holistic approach to describe reference… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  8. arXiv:2211.11444  [pdf

    cs.CR cs.DC eess.SY

    (B)LOCKBOX -- Secure Software Architecture with Blockchain Verification

    Authors: Erik Heiland, Peter Hillmann

    Abstract: According to experts, one third of all IT vulnerabilities today are due to inadequate software verification. Internal program processes are not sufficiently secured against manipulation by attackers, especially if access has been gained. There is a lack of internal control instances that can monitor and control program flows. Especially when a software vulnerability becomes known, quick action is… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  9. arXiv:2211.11369  [pdf

    cs.SE cs.CV cs.DL eess.SY

    Enterprise Model Library for Business-IT-Alignment

    Authors: Peter Hillmann, Diana Schnell, Harald Hagel, Andreas Karcher

    Abstract: The knowledge of the world is passed on through libraries. Accordingly, domain expertise and experiences should also be transferred within an enterprise by a knowledge base. Therefore, models are an established medium to describe good practices for complex systems, processes, and interconnections. However, there is no structured and detailed approach for a design of an enterprise model library. Th… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  10. arXiv:2108.13169  [pdf, other

    cs.DC cs.AI cs.CV cs.PL cs.SE eess.SY

    Enterprise Architecture Model Transformation Engine

    Authors: Erik Heiland, Peter Hillmann, Andreas Karcher

    Abstract: With increasing linkage within value chains, the IT systems of different companies are also being connected with each other. This enables the integration of services within the movement of Industry 4.0 in order to improve the quality and performance of the processes. Enterprise architecture models form the basis for this with a better buisness IT-alignment. However, the heterogeneity of the modeli… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.

    Journal ref: International Conference on Operations Research and Enterprise Systems (ICORES) 2021

  11. arXiv:2108.06701  [pdf, other

    cs.CR cs.CV cs.NI eess.SY

    Reference Service Model for Federated Identity Management

    Authors: Daniela Pöhn, Peter Hillmann

    Abstract: With the pandemic of COVID-19, people around the world increasingly work from home. Each natural person typically has several digital identities with different associated information. During the last years, various identity and access management approaches have gained attraction, hel** for example to access other organization's services within trust boundaries. The resulting heterogeneity create… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.

    Journal ref: EMMSAD 2021

  12. arXiv:2108.06696  [pdf, other

    cs.IR cs.CR cs.NI eess.SY

    Automated Enterprise Architecture Model Mining

    Authors: Peter Hillmann, Erik Heiland, Andreas Karcher

    Abstract: Metadata are like the steam engine of the 21st century, driving businesses and offer multiple enhancements. Nevertheless, many companies are unaware that these data can be used efficiently to improve their own operation. This is where the Enterprise Architecture Framework comes in. It empowers an organisation to get a clear view of their business, application, technical and physical layer. This mo… ▽ More

    Submitted 15 August, 2021; originally announced August 2021.

    Journal ref: NISecurity 2021

  13. arXiv:2101.05538  [pdf, other

    cs.CR cs.CY eess.SY

    Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems

    Authors: Marcus Knüpfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp, Sebastian Seeber, Daniela Pöhn, Peter Hillmann

    Abstract: The lack of guided exercises and practical opportunities to learn about cybersecurity in a practical way makes it difficult for security experts to improve their proficiency. Capture the Flag events and Cyber Ranges are ideal for cybersecurity training. Thereby, the participants usually compete in teams against each other, or have to defend themselves in a specific scenario. As organizers of yearl… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Journal ref: Model-driven Simulation and Training Environments for Cybersecurity (MSTEC 2020)

  14. arXiv:2101.05495  [pdf, other

    cs.CR cs.CY eess.SY

    Selective Deletion in a Blockchain

    Authors: Peter Hillmann, Marcus Knüpfer, Erik Heiland, Andreas Karcher

    Abstract: The constantly growing size of blockchains becomes a challenge with the increasing usage. Especially the storage of unwanted data in a blockchain is an issue, because it cannot be removed naturally. In order to counteract this problem, we present the first concept for the selective deletion of single entries in a blockchain. For this purpose, the general consensus algorithm is extended by the func… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Journal ref: International Workshop on Blockchain and Mobile Applications (BlockApp 2020) during the International Conference on Distributed Computing Systems (ICDCS 2020)

  15. arXiv:2007.07753  [pdf, other

    cs.CY cs.CR cs.DC cs.IR cs.NI

    NERD: Neural Network for Edict of Risky Data Streams

    Authors: Sandro Passarelli, Cem Gündogan, Lars Stiemert, Matthias Schopp, Peter Hillmann

    Abstract: Cyber incidents can have a wide range of cause from a simple connection loss to an insistent attack. Once a potential cyber security incidents and system failures have been identified, deciding how to proceed is often complex. Especially, if the real cause is not directly in detail determinable. Therefore, we developed the concept of a Cyber Incident Handling Support System. The developed system i… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  16. arXiv:2007.04125  [pdf

    cs.CR cs.CY cs.IR cs.NI

    Agile Approach for IT Forensics Management

    Authors: Matthias Schopp, Peter Hillmann

    Abstract: The forensic investigation of cyber attacks and IT incidents is becoming increasingly difficult due to increasing complexity and intensify networking. Especially with Advanced Attacks (AT) like the increasing Advanced Persistent Threats an agile approach is indispensable. Several systems are involved in an attack (multi-host attacks). Current forensic models and procedures show considerable defici… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

    Comments: Journal of Internet Technology and Secured Transactions (JITST) 2019

  17. arXiv:2006.16895  [pdf, other

    cs.NI eess.SP

    Dragoon: Advanced Modelling of IP Geolocation by use of Latency Measurements

    Authors: Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose

    Abstract: IP Geolocation is a key enabler for many areas of application like determination of an attack origin, targeted advertisement, and Content Delivery Networks. Although IP Geolocation is an ongoing field of research for over one decade, it is still a challenging task, whereas good results are only achieved by the use of active latency measurements. Nevertheless, an increased accuracy is needed to imp… ▽ More

    Submitted 28 May, 2020; originally announced June 2020.

    Comments: International Conference for Internet Technology and Secured Transactions 2015. arXiv admin note: substantial text overlap with arXiv:2004.07836, arXiv:2004.01531

  18. arXiv:2006.01598  [pdf, other

    cs.DC cs.CC cs.IT

    A Novel Approach to Solve K-Center Problems with Geographical Placement

    Authors: Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose

    Abstract: The facility location problem is a well-known challenge in logistics that is proven to be NP-hard. In this paper we specifically simulate the geographical placement of facilities to provide adequate service to customers. Determining reasonable center locations is an important challenge for a management since it directly effects future service costs. Generally, the objective is to place the central… ▽ More

    Submitted 28 May, 2020; originally announced June 2020.

    Comments: International Conference on Service Operations and Logistics, and Informatics 2015. arXiv admin note: text overlap with arXiv:2005.13905

  19. arXiv:2006.00917  [pdf, other

    cs.DC cs.AI cs.CC cs.MA cs.NE

    Evaluation of the general applicability of Dragoon for the k-center problem

    Authors: Tobias Uhlig, Peter Hillmann, Oliver Rose

    Abstract: The k-center problem is a fundamental problem we often face when considering complex service systems. Typical challenges include the placement of warehouses in logistics or positioning of servers for content delivery networks. We previously have proposed Dragoon as an effective algorithm to approach the k-center problem. This paper evaluates Dragoon with a focus on potential worst case behavior in… ▽ More

    Submitted 28 May, 2020; originally announced June 2020.

    Journal ref: Winter Simulation Conference 2016

  20. arXiv:2005.13905  [pdf, other

    cs.NI cs.DC eess.SY

    Modeling the Location Selection of Mirror Servers in Content Delivery Networks

    Authors: Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose

    Abstract: For a provider of a Content Delivery Network (CDN), the location selection of mirror servers is a complex optimization problem. Generally, the objective is to place the nodes centralized such that all customers have convenient access to the service according to their demands. It is an instance of the k-center problem, which is proven to be NP-hard. Determining reasonable server locations directly… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: Conference on Services Computing 2016

  21. arXiv:2005.13896  [pdf, other

    cs.NI cs.DC eess.SY

    Simulation and Optimization of Content Delivery Networks considering User Profiles and Preferences of Internet Service Providers

    Authors: Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose

    Abstract: A Content Delivery Network (CDN) is a dynamic and complex service system. It causes a huge amount of traffic on the network infrastructure of Internet Service Providers (ISPs). Oftentimes, CDN providers and ISPs struggle to find an efficient and appropriate way to cooperate for mutual benefits. This challenge is key to push the quality of service (QoS) for the end-user. We model, simulate, and opt… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Journal ref: Winter Simulation Conference 2016

  22. arXiv:2005.08633  [pdf, other

    physics.soc-ph cs.CY cs.MA

    Optimized Travel to Meetings on a Common Location of Geographical Distributed Participants

    Authors: Peter Hillmann, Bastian Kühnel, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose

    Abstract: Members of international organizations often meet in person at a common location for discussions. There is frequently disagreement over the place and time of the meeting due to the different travel efforts of the members. They usually travel by plane and their travel expenses depend on the flight connections. This paper presents an approach to calculate the optimized location and time, where and w… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: International Conference on Service Operations and Logistics, and Informatics, 2017

  23. arXiv:2005.03292  [pdf, other

    cs.SE cs.CL cs.DC cs.NI cs.PL eess.SY

    YANG2UML: Bijective Transformation and Simplification of YANG to UML

    Authors: Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze

    Abstract: Software Defined Networking is currently revolutionizing computer networking by decoupling the network control (control plane) from the forwarding functions (data plane) enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services. Next to the well-known OpenFlow protocol, the XML-based NETCONF protocol is als… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

  24. arXiv:2004.09340  [pdf

    cs.CY cs.MA

    On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria

    Authors: Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker

    Abstract: In the area of military simulations, a multitude of different approaches is available. Close Combat Tactical Trainer, Joint Tactical Combat Training System, Battle Force Tactical Training or Warfighter's Simulation 2000 are just some examples within the history of the large DoD Development Program in Modelling and Simulation, representing just a small piece of the variety of diverse solutions. Ver… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Keywords: Simulation; Military; Classification; Taxonomy

    Journal ref: Military Communications and Information Systems 2015

  25. arXiv:2004.09327  [pdf, other

    cs.NI cs.CR cs.DC cs.IR

    Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis

    Authors: Peter Hillmann, Frank Tietze, Gabi Dreo Rodosek

    Abstract: The identification of the exact path that packets are routed on in the network is quite a challenge. This paper presents a novel, efficient traceback strategy named Tracemax in context of a defense system against distributed denial of service (DDoS) attacks. A single packet can be directly traced over many more hops than the current existing techniques allow. In combination with a defense system i… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Keywords: Computer network management, IP networks, IP packet, Traceback, Packet trace, Denial of Service

    Journal ref: Local Computer Networks 2015

  26. arXiv:2004.09312  [pdf, other

    cs.MA cs.AI cs.CC cs.DC

    A Novel Multi-Agent System for Complex Scheduling Problems

    Authors: Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose

    Abstract: Complex scheduling problems require a large amount computation power and innovative solution methods. The objective of this paper is the conception and implementation of a multi-agent system that is applicable in various problem domains. Independent specialized agents handle small tasks, to reach a superordinate target. Effective coordination is therefore required to achieve productive cooperation… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Journal ref: Winter Simulation Conference 2014

  27. arXiv:2004.07836  [pdf, other

    cs.NI

    Modelling of IP Geolocation by use of Latency Measurements

    Authors: Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose

    Abstract: IP Geolocation is a key enabler for many areas of application like Content Delivery Networks, targeted advertisement and law enforcement. Therefore, an increased accuracy is needed to improve service quality. Although IP Geolocation is an ongoing field of research for over one decade, it is still a challenging task, whereas good results are only achieved by the use of active latency measurements.… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: International Conference on Network and Service Management, 2015. arXiv admin note: text overlap with arXiv:2004.01531

  28. arXiv:2004.01531  [pdf

    cs.NI cs.CR cs.CY cs.DC

    On the Path to High Precise IP Geolocation: A Self-Optimizing Model

    Authors: Peter Hillmann, Lars Stiemert, Gabi Dreo, Oliver Rose

    Abstract: IP Geolocation is a key enabler for the Future Internet to provide geographical location information for application services. For example, this data is used by Content Delivery Networks to assign users to mirror servers, which are close by, hence providing enhanced traffic management. It is still a challenging task to obtain precise and stable location information, whereas proper results are only… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 12 pages, 15 figures

    Journal ref: International Journal of Intelligent Computing Research (IJICR), Volume 7, Issue 1, March 2016

  29. arXiv:2002.10722  [pdf, other

    cs.CR cs.NI eess.SY

    CAKE: An Efficient Group Key Management for Dynamic Groups

    Authors: Peter Hillmann, Marcus Knüpfer, Tobias Guggemos, Klement Streit

    Abstract: With rapid increase of mobile computing and wireless network linkage, the information exchange between connected systems and within groups increases heavily. Exchanging confidential information within groups via unsecured communication channels is a high security threat. In order to prevent third parties from accessing this data, it is essential to encrypt it. For this purpose, the group participa… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.