BibTeX records: Robert Koch 0002

download as .bib file

@inproceedings{DBLP:conf/cycon/LillyGRK23,
  author       = {Bilyana Lilly and
                  Kenneth Geers and
                  Greg Rattray and
                  Robert Koch},
  editor       = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and
                  D. Giovannelli and
                  Karlis Podins and
                  I. Winther},
  title        = {Business@War: The {IT} Companies Helping to Defend Ukraine},
  booktitle    = {15th International Conference on Cyber Conflict: Meeting Reality,
                  CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023},
  pages        = {71--83},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/CyCon58705.2023.10181980},
  doi          = {10.23919/CYCON58705.2023.10181980},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/LillyGRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/KlickKB21,
  author       = {Johannes Klick and
                  Robert Koch and
                  Thomas Brandstetter},
  editor       = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and
                  Lauri Lindstr{\"{o}}m and
                  G{\'{a}}bor Visky and
                  Philippe Zotz},
  title        = {Epidemic? The Attack Surface of German Hospitals during the {COVID-19}
                  Pandemic},
  booktitle    = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn,
                  Estonia, May 25-28, 2021},
  pages        = {73--94},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/CyCon51939.2021.9468304},
  doi          = {10.23919/CYCON51939.2021.9468304},
  timestamp    = {Fri, 23 Jul 2021 17:04:05 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/KlickKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-07912,
  author       = {Johannes Klick and
                  Robert Koch and
                  Thomas Brandstetter},
  title        = {Epidemic? The Attack Surface of German Hospitals during the {COVID-19}
                  Pandemic},
  journal      = {CoRR},
  volume       = {abs/2101.07912},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.07912},
  eprinttype    = {arXiv},
  eprint       = {2101.07912},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-07912.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-09340,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Volker Eiseler and
                  Lars Stiemert and
                  Andres Rekker},
  title        = {On the Evaluation of Military Simulations: Towards {A} Taxonomy of
                  Assessment Criteria},
  journal      = {CoRR},
  volume       = {abs/2004.09340},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.09340},
  eprinttype    = {arXiv},
  eprint       = {2004.09340},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-09340.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03292,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Rick Hofstede and
                  Frank Tietze},
  title        = {{YANG2UML:} Bijective Transformation and Simplification of {YANG}
                  to {UML}},
  journal      = {CoRR},
  volume       = {abs/2005.03292},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03292},
  eprinttype    = {arXiv},
  eprint       = {2005.03292},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002G19,
  author       = {Robert Koch and
                  Mario Golling},
  editor       = {Tom{\'{a}}s Min{\'{a}}rik and
                  Siim Alatalu and
                  S. Biondi and
                  M. Signoretti and
                  I. Tolga and
                  G. Visky},
  title        = {Silent Battles: Towards Unmasking Hidden Cyber Attack},
  booktitle    = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn,
                  Estonia, May 28-31, 2019},
  pages        = {1--20},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/CYCON.2019.8757146},
  doi          = {10.23919/CYCON.2019.8757146},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/BadonnelKDPESST18,
  author       = {Remi Badonnel and
                  Robert Koch and
                  Martin Drasar and
                  Aiko Pras and
                  Volker Eiseler and
                  Lars Stiemert and
                  Sebastian Seeber and
                  Daphn{\'{e}} Tuncer and
                  Marinos Charalambides and
                  Gabi Dreo Rodosek},
  title        = {Report on the 10th International Conference on Autonomous Infrastructure,
                  Management, and Security {(AIMS} 2016) - Management and Security in
                  the Age of Hyperconnectivity},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {1101--1109},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10922-018-9460-5},
  doi          = {10.1007/S10922-018-9460-5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/BadonnelKDPESST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002G18,
  author       = {Robert Koch and
                  Mario Golling},
  editor       = {Tom{\'{a}}s Min{\'{a}}rik and
                  Raik Jakschis and
                  Lauri Lindstr{\"{o}}m},
  title        = {The cyber decade: Cyber defence at a X-ing point},
  booktitle    = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn,
                  Estonia, May 29 - June 1, 2018},
  pages        = {159--186},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/CYCON.2018.8405016},
  doi          = {10.23919/CYCON.2018.8405016},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002G18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002K17,
  author       = {Robert Koch and
                  Teo Kuhn},
  title        = {Defending the grid: Backfitting non-expandable control systems},
  booktitle    = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn,
                  Estonia, May 30 - June 2, 2017},
  pages        = {1--17},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/CYCON.2017.8240335},
  doi          = {10.23919/CYCON.2017.8240335},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002K17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0R17,
  author       = {Mario Golling and
                  Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {On the Perception of Risk Assessment in Intrusion Detection Systems},
  booktitle    = {10. DFN-Forum - Kommunikationstechnologien, 30.-31. Mai 2017, Berlin,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-271}},
  pages        = {21--30},
  publisher    = {{GI}},
  year         = {2017},
  url          = {https://dl.gi.de/handle/20.500.12116/475},
  timestamp    = {Tue, 04 Jul 2023 17:44:37 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aims/2017,
  editor       = {Daphn{\'{e}} Tuncer and
                  Robert Koch and
                  R{\'{e}}mi Badonnel and
                  Burkhard Stiller},
  title        = {Security of Networks and Services in an All-Connected World - 11th
                  {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure,
                  Management, and Security, {AIMS} 2017, Zurich, Switzerland, July 10-13,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60774-0},
  doi          = {10.1007/978-3-319-60774-0},
  isbn         = {978-3-319-60773-3},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/0002GR16,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {How Anonymous Is the Tor Network? {A} Long-Term Black-Box Investigation},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {42--49},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.73},
  doi          = {10.1109/MC.2016.73},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/0002GR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/KochGSR16,
  author       = {Robert Koch and
                  Mario Golling and
                  Lars Stiemert and
                  Gabi Dreo Rodosek},
  title        = {Using Geolocation for the Strategic Preincident Preparation of an
                  {IT} Forensics Analysis},
  journal      = {{IEEE} Syst. J.},
  volume       = {10},
  number       = {4},
  pages        = {1338--1349},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSYST.2015.2389518},
  doi          = {10.1109/JSYST.2015.2389518},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/KochGSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002G16,
  author       = {Robert Koch and
                  Mario Golling},
  editor       = {Nikolaos Pissanidis and
                  Henry Roigas and
                  Matthijs Veenendaal},
  title        = {Weapons systems and cyber security - a challenging union},
  booktitle    = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn,
                  Estonia, May 31 - June 3, 2016},
  pages        = {191--203},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCON.2016.7529435},
  doi          = {10.1109/CYCON.2016.7529435},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002G16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0R16,
  author       = {Mario Golling and
                  Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {Privacy-aware intrusion detection in high-speed backbone networks
                  - design and prototypical implementation of a multi-layered {NIDS}},
  booktitle    = {9. DFN-Forum - Kommunikationstechnologien, 30. Mai - 1. Juni 2016,
                  Rostock, Germany},
  series       = {{LNI}},
  volume       = {{P-257}},
  pages        = {77--86},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/896},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/0002KOR16,
  author       = {Robert Koch and
                  Teo Kuhn and
                  Marcel Odenwald and
                  Gabi Dreo Rodosek},
  title        = {Dr. WATTson: Lightweight current-based Intrusion Detection {(CBID)}},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {170--177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906923},
  doi          = {10.1109/PST.2016.7906923},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/0002KOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aims/2016,
  editor       = {R{\'{e}}mi Badonnel and
                  Robert Koch and
                  Aiko Pras and
                  Martin Drasar and
                  Burkhard Stiller},
  title        = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP}
                  {WG} 6.6 International Conference on Autonomous Infrastructure, Management,
                  and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9701},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39814-3},
  doi          = {10.1007/978-3-319-39814-3},
  isbn         = {978-3-319-39813-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aims/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002G15,
  author       = {Robert Koch and
                  Mario Golling},
  editor       = {Markus Maybaum and
                  Anna{-}Maria Osula and
                  Lauri Lindstr{\"{o}}m},
  title        = {Blackout and now? Network Centric Warfare in an anti-access area-denial
                  theatre},
  booktitle    = {7th International Conference on Cyber Conflict: Architectures in Cyberspace,
                  CyCon 2015, Tallinn, Estonia, May 26-29, 2015},
  pages        = {169--184},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CYCON.2015.7158476},
  doi          = {10.1109/CYCON.2015.7158476},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002G15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0THKR15,
  author       = {Mario Golling and
                  Robert Koch and
                  Frank Tietze and
                  Sandy{-}Dorotea Hein and
                  Michael Kretzschmar and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {An agent-based framework for decentralized reconstruction of attack
                  paths},
  booktitle    = {8. DFN-Forum Kommunikationstechnologien, 6.-9. Juni 2015, L{\"{u}}beck,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-243}},
  pages        = {37--46},
  publisher    = {{GI}},
  year         = {2015},
  url          = {https://dl.gi.de/handle/20.500.12116/2360},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0THKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/0002GSETR15,
  author       = {Robert Koch and
                  Mario Golling and
                  Lars Stiemert and
                  Volker Eiseler and
                  Frank Tietze and
                  Gabi Dreo Rodosek},
  title        = {A Decentralized Framework for Geolocation-Based Pre-Incident Network
                  Forensics},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1210--1218},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.233},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.233},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/0002GSETR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcis/Golling0HESR15,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Volker Eiseler and
                  Lars Stiemert and
                  Andres Rekker},
  title        = {On the evaluation of military simulations: towards a taxonomy of assessment
                  criteria},
  booktitle    = {2015 Military Communications and Information Systems Conference, MilCIS
                  2015, Canberra, Australia, November 10-12, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MilCIS.2015.7348943},
  doi          = {10.1109/MILCIS.2015.7348943},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcis/Golling0HESR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002GR15,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {Disequilibrium: Tor's Exit Node Selection under the Stereoscope},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {942--949},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.468},
  doi          = {10.1109/TRUSTCOM.2015.468},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002GR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccsecis/KochGR14,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {A Revised Attack Taxonomy for a New Generation of Smart Attacks},
  journal      = {Comput. Inf. Sci.},
  volume       = {7},
  number       = {3},
  pages        = {18--30},
  year         = {2014},
  url          = {https://doi.org/10.5539/cis.v7n3p18},
  doi          = {10.5539/CIS.V7N3P18},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccsecis/KochGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KochGR14,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {Behavior-based intrusion detection in encrypted environments},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {52},
  number       = {7},
  pages        = {124--131},
  year         = {2014},
  url          = {https://doi.org/10.1109/MCOM.2014.6852093},
  doi          = {10.1109/MCOM.2014.6852093},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KochGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/Golling0HHT14,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Rick Hofstede and
                  Frank Tietze},
  editor       = {Danny Raz and
                  Michele Nogueira and
                  Edmundo Roberto Mauro Madeira and
                  Brendan Jennings and
                  Lisandro Zambenedetti Granville and
                  Luciano Paschoal Gaspary},
  title        = {{YANG2UML:} Bijective transformation and simplification of {YANG}
                  to {UML}},
  booktitle    = {10th International Conference on Network and Service Management, {CNSM}
                  2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014},
  pages        = {300--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNSM.2014.7014179},
  doi          = {10.1109/CNSM.2014.7014179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/Golling0HHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/GollingH014,
  author       = {Mario Golling and
                  Rick Hofstede and
                  Robert Koch},
  editor       = {Pascal Brangetto and
                  Markus Maybaum and
                  Jan Stinissen},
  title        = {Towards multi-layered intrusion detection in high-speed networks},
  booktitle    = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn,
                  Estonia, June 3-6, 2014},
  pages        = {191--206},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CYCON.2014.6916403},
  doi          = {10.1109/CYCON.2014.6916403},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/GollingH014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0HR14,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {Smart defence: an architecture for new challenges to cyber security},
  booktitle    = {7. DFN-Forum - Kommunikationstechnologien, 16.-17. Juni 2014, Fulda,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-231}},
  pages        = {99--108},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/2679},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0HR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/Golling0S14,
  author       = {Mario Golling and
                  Robert Koch and
                  Lars Stiemert},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen},
  booktitle    = {7. DFN-Forum - Kommunikationstechnologien, 16.-17. Juni 2014, Fulda,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-231}},
  pages        = {131--140},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/2682},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/Golling0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GarziaRKNSOR14,
  author       = {Fabio Garzia and
                  Alexander R{\"{u}}gamer and
                  Robert Koch and
                  Philipp Neumaier and
                  Ekaterina Serezhkina and
                  Matthias Overbeck and
                  G{\"{u}}nter Rohmer},
  title        = {Experimental multi-FPGA {GNSS} receiver platform},
  booktitle    = {24th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2014, Munich, Germany, 2-4 September, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/FPL.2014.6927399},
  doi          = {10.1109/FPL.2014.6927399},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GarziaRKNSOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0002GR13,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {An architecture for supervising {COTS} products},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {403--404},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682749},
  doi          = {10.1109/CNS.2013.6682749},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0002GR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0002GR13a,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {Attracting sophisticated attacks to secure systems: {A} new honeypot
                  architecture},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {409--410},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682752},
  doi          = {10.1109/CNS.2013.6682752},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0002GR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/KochGR13,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Dengguo Feng and
                  Muttukrishnan Rajarajan},
  title        = {Geolocation and Verification of IP-Addresses with Specific Focus on
                  IPv6},
  booktitle    = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
                  2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8300},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03584-0\_12},
  doi          = {10.1007/978-3-319-03584-0\_12},
  timestamp    = {Fri, 05 Aug 2022 08:50:55 +0200},
  biburl       = {https://dblp.org/rec/conf/css/KochGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002G13,
  author       = {Robert Koch and
                  Mario Golling},
  editor       = {Karlis Podins and
                  Jan Stinissen and
                  Markus Maybaum},
  title        = {Architecture for evaluating and correlating {NIDS} in real - World
                  networks},
  booktitle    = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn,
                  Estonia, June 4-7, 2013},
  pages        = {1--20},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6568386/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002G13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfn/GollingKHR13,
  author       = {Mario Golling and
                  Robert Koch and
                  Peter Hillmann and
                  Gabi Dreo Rodosek},
  editor       = {Paul M{\"{u}}ller and
                  Bernhard Neumair and
                  Helmut Reiser and
                  Gabi Dreo Rodosek},
  title        = {Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer
                  Systeme und Anwendungen},
  booktitle    = {6. DFN-Forum Kommunikationstechnologien, Beitr{\"{a}}ge der Fachtagung,
                  03.-04. Juni 2013, Erlangen},
  series       = {{LNI}},
  volume       = {{P-217}},
  pages        = {87--96},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/17464},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfn/GollingKHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002R12,
  author       = {Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Christian Czosseck and
                  Rain Ottis and
                  Katharina Ziolkowski},
  title        = {The role of {COTS} products for high security systems},
  booktitle    = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn,
                  Estonia, June 5-8, 2012},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6243989/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002R12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/0002SG12,
  author       = {Robert Koch and
                  Bj{\"{o}}rn Stelte and
                  Mario Golling},
  editor       = {Christian Czosseck and
                  Rain Ottis and
                  Katharina Ziolkowski},
  title        = {Attack trends in present computer networks},
  booktitle    = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn,
                  Estonia, June 5-8, 2012},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6243980/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/0002SG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Koch11,
  author       = {Robert Koch},
  title        = {Systemarchitektur zur Ein- und Ausbruchserkennung in verschl{\"{u}}sselten
                  Umgebungen},
  school       = {Bundeswehr University Munich},
  year         = {2011},
  url          = {http://www.unibw.de/unibib/medienserver/node?id=89539},
  urn          = {urn:nbn:de:bvb:706-2642},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Koch11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/000211,
  author       = {Robert Koch},
  editor       = {Christian Czosseck and
                  Enn Tyugu and
                  Thomas C. Wingfield},
  title        = {Towards next-generation Intrusion Detection},
  booktitle    = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn,
                  Estonia, June 7-10, 2011},
  pages        = {1--18},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5954707/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/000211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KochHR11,
  author       = {Robert Koch and
                  Dominik Holzapfel and
                  Gabi Dreo Rodosek},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Data control in social networks},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {274--279},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060014},
  doi          = {10.1109/ICNSS.2011.6060014},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KochHR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/KochR10,
  author       = {Robert Koch and
                  Gabi Dreo Rodosek},
  title        = {User identification in encrypted network communications},
  booktitle    = {Proceedings of the 6th International Conference on Network and Service
                  Management, {CNSM} 2010, Niagara Falls, Canada, October 25-29, 2010},
  pages        = {246--249},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CNSM.2010.5691292},
  doi          = {10.1109/CNSM.2010.5691292},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/KochR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KochR10,
  author       = {Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Command Evaluation in Encrypted Remote Sessions},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {299--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.62},
  doi          = {10.1109/NSS.2010.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/KochR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KochR10,
  author       = {Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Security System for Encrypted Environments {(S2E2)}},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {505--507},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_35},
  doi          = {10.1007/978-3-642-15512-3\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KochR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aims/KochD09,
  author       = {Robert Koch and
                  Gabi Dreo},
  editor       = {Ramin Sadre and
                  Aiko Pras},
  title        = {Fast Learning Neural Network Intrusion Detection System},
  booktitle    = {Scalability of Networks and Services, Third International Conference
                  on Autonomous Infrastructure, Management and Security, {AIMS} 2009,
                  Enschede, The Netherlands, June 30-July 2, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5637},
  pages        = {187--190},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02627-0\_18},
  doi          = {10.1007/978-3-642-02627-0\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aims/KochD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Koch09,
  author       = {Robert Koch},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Changing Network Behavior},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {60--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.55},
  doi          = {10.1109/NSS.2009.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/Koch09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics