Prof. Dr. Dieter Hutter

  • Address (Bremen)
    Mehrzweckhochhaus (MZH)
    Bibliothekstraße 5
    D-28359 Bremen


Rhea Rinaldo, Dieter Hutter

In: Sokratis K. Katsikas , Frederic Cuppens (editor). ESORICS 2020 workshops CyberICPS, SECPRE, ADIoT. International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS-2020) located at ESORICS 2020 September 14-18 online United Kingdom Lecture Notes in Computer Science (LNCS) 12501 Springer 11/2020.

To the publication
Victor Ferman, Dieter Hutter, Raul Monroy

In: Grigori Sidorov , Ulises Cortés (editor). Computación y Sistemas 21 1 Pages 101-114 Instituto Politécnico Nacional, Mexico Mexico City 4/2017.

To the publication
Tim Schwartz, Michael Feld, Christian Bürckert, Svilen Dimitrov, Joachim Folz, Peter Hevesi, Dieter Hutter, Bernd Kiefer, Hans-Ulrich Krieger, Christoph Lüth, Dennis Mronga, Gerald Pirkl, Torsten Spieldenner, Malte Wirkus, Ingo Zinnikus, Sirko Straube

In: Proceedings of the 12th International Conference on Intelligent Environments. International Conference on Intelligent Environments (IE-16) 12th September 12-13 London United Kingdom IEEE 9/2016.

To the publication


Dieter Hutter is vice director of the Cyber-Physical Systems department at the German Research Center for Artificial Intelligence (DFKI) and Honorary Professor at the Bremen University. He received the Diploma and Dr. rer. nat. degrees in computer science from the University of Karlsruhe, Germany, in 1983 and 1991, respectively. He works in the areas of security, formal methods and change management.

Dieter Hutter has been and still is a member of the Program Committees of numerous conferences and workshops and member of the editorial board of the Journal of Applied Logics, and co-initiator of the DFG Priority Programme 1496 on Reliabably Secure Software Systems.


Combination of Symbolic and Subsymbolic Methods

Deep learning methods are used in many application areas and work very

efficiently after a training phase. However, in general no reliable

statement can be made about their correctness. In contrast,…



Timely Validation of Safey and Security Requirements in Autonomous Vehicles

The aim of the project is to develop techniques to elicit requirements for systems to control autonomous vehicles, and validate them in a timely fashion, such that the necessary safety and security…



Safe Execution of Foreign Application in an Enterprise Infrastructure

The project aims at the development and implementation of appropriate security policies and mechanisms that allow one to incrementally integrate foreign software packages into an existing corporate…


Modelling and Refinement of Security Requirements on Data and Processes 2

MORES2 aims at the development of appropriate refinement techniques for workflow specifications. In particular, the notion of refinement to be developed has to support the refinement of the various…


Software Engineering for Spreadsheet Interaction

Spreadsheets have become very popular to analyze and visualize business and science data, so their complexity and impact increased dramatically over the years. As active documents they are situated…

German Research Center for Artificial Intelligence
Deutsches Forschungszentrum für Künstliche Intelligenz