Skip to main content Skip to main navigation

Prof. Dr. Dieter Hutter

Organizational unit Cyber-Physical Systems
Contact +49 421 218 59831 (Bremen)

http://www.dfki.de/~hutter
Address (Bremen) Mehrzweckhochhaus (MZH)Bibliothekstraße 5D-28359 Bremen

Publications

Rhea Rinaldo; Dieter Hutter

In: Maria Chiara Leva; Edoardo Patelli; Luca Podofillini; Simon Wilson (Hrsg.). 32nd European Safety and Reliability Conference. European Safety and Reliability Conference (ESREL-2022), August 28 - September 1, Dublin, Ireland, Research Publishing, Singapore, 2022.

To the publication

Tobias Brandt; Dieter Hutter; Christian Maeder; Rainer Müller

In: IAME 2021 Conference 'Accelerating Transitions'. Conference of the International Association of Maritime Economists (IAME-2021), November 24-27, Rotterdam, Netherlands, http://arxiv.org/abs/2111.13436, 2021.

To the publication

Rhea Rinaldo; Dieter Hutter

In: Sokratis K. Katsikas; Frederic Cuppens (Hrsg.). ESORICS 2020 workshops CyberICPS, SECPRE, ADIoT. International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS-2020), located at ESORICS 2020, September 14-18, online, United Kingdom, Lecture Notes in Computer Science (LNCS), Vol. 12501, Springer, 11/2020.

To the publication

Profile

Dieter Hutter is vice director of the Cyber-Physical Systems department at the German Research Center for Artificial Intelligence (DFKI) and Honorary Professor at the Bremen University. He received the Diploma and Dr. rer. nat. degrees in computer science from the University of Karlsruhe, Germany, in 1983 and 1991, respectively. He works in the areas of security, formal methods and change management.

Dieter Hutter has been and still is a member of the Program Committees of numerous conferences and workshops and member of the editorial board of the Journal of Applied Logics, and co-initiator of the DFG Priority Programme 1496 on Reliabably Secure Software Systems.

  • Fast&Slow

    Combination of Symbolic and Subsymbolic Methods

    Deep learning methods are used in many application areas and work very efficiently after a training phase. However, in general no reliable

    statement can be made about their correctness. In contrast,…

    Fast&Slow
  • SecProPort

    Scalable Security Architectures for Commercial Workflows in German Harbors

    Modern sea as well as domestic ports are more and more controlled by IT-systems. Each of the players involved in port operations (like terminal operator, shipping companies, forwarder, port…

    SecProPort
  • SATiSFy

    Timely Validation of Safey and Security Requirements in Autonomous Vehicles

    The aim of the project is to develop techniques to elicit requirements for systems to control autonomous vehicles, and validate them in a timely fashion, such that the necessary safety and security…

    SATiSFy
  • SaferApps

    Safe Execution of Foreign Application in an Enterprise Infrastructure

    The project aims at the development and implementation of appropriate security policies and mechanisms that allow one to incrementally integrate foreign software packages into an existing corporate…

  • MORES2

    Modelling and Refinement of Security Requirements on Data and Processes 2

    MORES2 aims at the development of appropriate refinement techniques for workflow specifications. In particular, the notion of refinement to be developed has to support the refinement of the various…

Show all projects