direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Christian Horn


Research Areas

  • Security of Industrial Control Systems and Communication Channels(IT Security for Industrial Applications)
  • Anomaly Detection, Pattern Recognition, Data Mining
  • Process-Automation
  • Interfaces inside Industrial Control Systems
  • Virtualization and Cloud-based Control
  • 3D Shape Matching (Counterfeit Detection)




  • Christian Horn and Jörg Krüger, . A Retrofitting Concept for Integration of Machinery with Legacy Interfaces into Cloud Manufacturing Architectures. 2016 16th International Conference on Control, Automation and Systems (ICCAS 2016) Oct. 16–19, 2016 in HICO, Gyeongju, Korea.
  • Christian Horn and Jörg Krüger, . Feasibility of Connecting Machinery and Robots to Industrial Control Services in the Cloud. Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on



  • Christian Horn and Jörg Krüger, . Neuartige IT-Sicherheits-Werkzeuge für Industrie 4.0. Tagungsband zum Kongress Innosecure 2015. Apprimus Verlag, Aachen, 2015. p. 173-181.
  • VICK, A., HORN, C., RUDORFER, M. and KRUGER, J.. Control of robots and machine tools with an extended factory cloud. IEEE World Conference on Factory Communication Systems (WFCS), 2015.p. 1-4.



  • Christian Horn, Leon Hempel, Moritz Chemnitz, Patrick Stewin and Jörg Krüger. STEUERUNG: ADVANCED INFORMATION SECURITY FOR CRITICAL INFRASTRUCTURES. Proceedings of the 9th Future Security SECURITY RESEARCH CONFERENCE. Pages 116-124. ISBN 978-3-8396-0778-7. Link
  • Christian Horn and Jörg Krüger, PRoCeeD: Process State Prediction for CRITIS using Process Inherent Causal Data and Discrete Event Models. Springer LNCS: Critical Information Infrastructure Security, 9th International Workshop, CRITIS 2014, Limassol, Cyprus


  • Horn, C. and Krüger, J. (2013).  STEUERUNG – SicherheiT kritischer infrastrukturEn in UnsichERer UmgebuNG. Futur 3/2013: Rethinking Prototyping - Research and Development at the Production Technology Center Berlin, 22-23. PDF
  • Christian Horn and Joerg Krueger (2013): "Enhanced Infrastructure Security through Inter-Level Anomaly Detection",  32nd IEEE International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 2013 ISBN 978-1-4799-3213-9 PDF
  • Christian Horn, Matthias Blankenburg, Jorg Kruger (2013) "PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS", International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol 2(1), 88-102, 2013 PDF
  • Horn, C., Blankenburg, M. und Krüger, J. (2013), "INHERENT ID: A NOVEL APPROACH TO DETECT COUNTERFEIT CONSUMER GOODS USING PRODUCT INHERENT FEATURES", Proceedings of the Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), 221-230, Kuala Lumpur, Malaysia, 2013 PDF
  • Horn, C., Blankenburg, M. und Krüger, J. (2013), „Automated Detection of Counterfeit Consumer Goods using Product Inherent Features“, Proceedings of the 7th Workshop Interdisciplinaire sur la Sécurité Globale of the Agence Nationale de la Recerche, Troyes, France 2013. PDF
  • Blankenburg, M., Horn, C. und Krüger, J. (2013), „Secure Products Using Inherent Features“, in “The Secure Information Society“, 149 – 162, Springer Verlag Heidelberg Link



  • Horn, C. and Krüger J. (2012). "Inherent ID - reliable recognition of counterfeit products". Forum Secure Identity at 8th Euro ID 2012.
  • Blankenburg, M., Horn, C. und Krüger, J. (2012), „Projekt Inherent-ID“, Fraunhofer IPK Jahresbericht 2011/12 „Aus unserer Forschung“



  • Blankenburg, M., Horn, C. und Krüger, J. (2011), „Inherent-ID - Produktschutz ohne künstliche Sicherheitsmerkmale“, 3. internationaler Kongress Sichere Identität



  • Horn, C. (2009). "Understanding IP Prefix Hijacking and its Detection." PDF. 2009


  • since 12/2015:
    RetroNet -coordination of workpackage security concept and architecture, as well as providing support to develop connector, platform and overall architecture
  • 10/2013- 12/2016:
    pICASSO - providing support to conception and coordination in the use case robot control
  • 07/2013 - 06/2015
    STEUERUNG - Overall project coordination; concept, research and coordination in the field Process Security
    In the field Process Security we develop methods for automatic detection of anomalies in an industrial or Critical Infrastructure process. This is done by researching a monitoring system on process level that is able to detect anomalies which integrates also the research innovations of the other core research areas into this process-wide monitoring system. The boundaries of the classical automation hierarchy between the supervision-, control, and sensor-level should not limit a well designed monitoring system in the detection of malfunction, misuse or attacks.
  • 04/2013 - 06/2013:
    RODIN - Concept and Implementation of a Robot Safety-Controller to monitor and simulate control parameters for physical interaction between Human, Robot and Environment
  • 03/2010 - 09/2012:
    Inherent ID - Research and Development of mobile, model-based 3D Shape Matching methods for Conterfeit Detection (Product Security)

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Auxiliary Functions


Christian Horn, M.Sc.
+49 (0)30 314 21546
Room PTZ 436