Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Robert Koch 0002
@inproceedings{DBLP:conf/cycon/LillyGRK23, author = {Bilyana Lilly and Kenneth Geers and Greg Rattray and Robert Koch}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Business@War: The {IT} Companies Helping to Defend Ukraine}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {71--83}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181980}, doi = {10.23919/CYCON58705.2023.10181980}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LillyGRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KlickKB21, author = {Johannes Klick and Robert Koch and Thomas Brandstetter}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Epidemic? The Attack Surface of German Hospitals during the {COVID-19} Pandemic}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {73--94}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468304}, doi = {10.23919/CYCON51939.2021.9468304}, timestamp = {Fri, 23 Jul 2021 17:04:05 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KlickKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-07912, author = {Johannes Klick and Robert Koch and Thomas Brandstetter}, title = {Epidemic? The Attack Surface of German Hospitals during the {COVID-19} Pandemic}, journal = {CoRR}, volume = {abs/2101.07912}, year = {2021}, url = {https://arxiv.org/abs/2101.07912}, eprinttype = {arXiv}, eprint = {2101.07912}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-07912.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-09340, author = {Mario Golling and Robert Koch and Peter Hillmann and Volker Eiseler and Lars Stiemert and Andres Rekker}, title = {On the Evaluation of Military Simulations: Towards {A} Taxonomy of Assessment Criteria}, journal = {CoRR}, volume = {abs/2004.09340}, year = {2020}, url = {https://arxiv.org/abs/2004.09340}, eprinttype = {arXiv}, eprint = {2004.09340}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-09340.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03292, author = {Mario Golling and Robert Koch and Peter Hillmann and Rick Hofstede and Frank Tietze}, title = {{YANG2UML:} Bijective Transformation and Simplification of {YANG} to {UML}}, journal = {CoRR}, volume = {abs/2005.03292}, year = {2020}, url = {https://arxiv.org/abs/2005.03292}, eprinttype = {arXiv}, eprint = {2005.03292}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G19, author = {Robert Koch and Mario Golling}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Silent Battles: Towards Unmasking Hidden Cyber Attack}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757146}, doi = {10.23919/CYCON.2019.8757146}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/BadonnelKDPESST18, author = {Remi Badonnel and Robert Koch and Martin Drasar and Aiko Pras and Volker Eiseler and Lars Stiemert and Sebastian Seeber and Daphn{\'{e}} Tuncer and Marinos Charalambides and Gabi Dreo Rodosek}, title = {Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security {(AIMS} 2016) - Management and Security in the Age of Hyperconnectivity}, journal = {J. Netw. Syst. Manag.}, volume = {26}, number = {4}, pages = {1101--1109}, year = {2018}, url = {https://doi.org/10.1007/s10922-018-9460-5}, doi = {10.1007/S10922-018-9460-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/BadonnelKDPESST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G18, author = {Robert Koch and Mario Golling}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The cyber decade: Cyber defence at a X-ing point}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {159--186}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405016}, doi = {10.23919/CYCON.2018.8405016}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002K17, author = {Robert Koch and Teo Kuhn}, title = {Defending the grid: Backfitting non-expandable control systems}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--17}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240335}, doi = {10.23919/CYCON.2017.8240335}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0R17, author = {Mario Golling and Robert Koch and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {On the Perception of Risk Assessment in Intrusion Detection Systems}, booktitle = {10. DFN-Forum - Kommunikationstechnologien, 30.-31. Mai 2017, Berlin, Germany}, series = {{LNI}}, volume = {{P-271}}, pages = {21--30}, publisher = {{GI}}, year = {2017}, url = {https://dl.gi.de/handle/20.500.12116/475}, timestamp = {Tue, 04 Jul 2023 17:44:37 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aims/2017, editor = {Daphn{\'{e}} Tuncer and Robert Koch and R{\'{e}}mi Badonnel and Burkhard Stiller}, title = {Security of Networks and Services in an All-Connected World - 11th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60774-0}, doi = {10.1007/978-3-319-60774-0}, isbn = {978-3-319-60773-3}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/0002GR16, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {How Anonymous Is the Tor Network? {A} Long-Term Black-Box Investigation}, journal = {Computer}, volume = {49}, number = {3}, pages = {42--49}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.73}, doi = {10.1109/MC.2016.73}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/0002GR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/KochGSR16, author = {Robert Koch and Mario Golling and Lars Stiemert and Gabi Dreo Rodosek}, title = {Using Geolocation for the Strategic Preincident Preparation of an {IT} Forensics Analysis}, journal = {{IEEE} Syst. J.}, volume = {10}, number = {4}, pages = {1338--1349}, year = {2016}, url = {https://doi.org/10.1109/JSYST.2015.2389518}, doi = {10.1109/JSYST.2015.2389518}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/KochGSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G16, author = {Robert Koch and Mario Golling}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Weapons systems and cyber security - a challenging union}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {191--203}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529435}, doi = {10.1109/CYCON.2016.7529435}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0R16, author = {Mario Golling and Robert Koch and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered {NIDS}}, booktitle = {9. DFN-Forum - Kommunikationstechnologien, 30. Mai - 1. Juni 2016, Rostock, Germany}, series = {{LNI}}, volume = {{P-257}}, pages = {77--86}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/896}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/0002KOR16, author = {Robert Koch and Teo Kuhn and Marcel Odenwald and Gabi Dreo Rodosek}, title = {Dr. WATTson: Lightweight current-based Intrusion Detection {(CBID)}}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {170--177}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906923}, doi = {10.1109/PST.2016.7906923}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/0002KOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aims/2016, editor = {R{\'{e}}mi Badonnel and Robert Koch and Aiko Pras and Martin Drasar and Burkhard Stiller}, title = {Management and Security in the Age of Hyperconnectivity - 10th {IFIP} {WG} 6.6 International Conference on Autonomous Infrastructure, Management, and Security, {AIMS} 2016, Munich, Germany, June 20-23, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9701}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39814-3}, doi = {10.1007/978-3-319-39814-3}, isbn = {978-3-319-39813-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aims/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G15, author = {Robert Koch and Mario Golling}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Blackout and now? Network Centric Warfare in an anti-access area-denial theatre}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {169--184}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158476}, doi = {10.1109/CYCON.2015.7158476}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0THKR15, author = {Mario Golling and Robert Koch and Frank Tietze and Sandy{-}Dorotea Hein and Michael Kretzschmar and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {An agent-based framework for decentralized reconstruction of attack paths}, booktitle = {8. DFN-Forum Kommunikationstechnologien, 6.-9. Juni 2015, L{\"{u}}beck, Germany}, series = {{LNI}}, volume = {{P-243}}, pages = {37--46}, publisher = {{GI}}, year = {2015}, url = {https://dl.gi.de/handle/20.500.12116/2360}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0THKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/0002GSETR15, author = {Robert Koch and Mario Golling and Lars Stiemert and Volker Eiseler and Frank Tietze and Gabi Dreo Rodosek}, title = {A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1210--1218}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.233}, doi = {10.1109/HPCC-CSS-ICESS.2015.233}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/0002GSETR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcis/Golling0HESR15, author = {Mario Golling and Robert Koch and Peter Hillmann and Volker Eiseler and Lars Stiemert and Andres Rekker}, title = {On the evaluation of military simulations: towards a taxonomy of assessment criteria}, booktitle = {2015 Military Communications and Information Systems Conference, MilCIS 2015, Canberra, Australia, November 10-12, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MilCIS.2015.7348943}, doi = {10.1109/MILCIS.2015.7348943}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcis/Golling0HESR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002GR15, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {Disequilibrium: Tor's Exit Node Selection under the Stereoscope}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {942--949}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.468}, doi = {10.1109/TRUSTCOM.2015.468}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002GR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccsecis/KochGR14, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {A Revised Attack Taxonomy for a New Generation of Smart Attacks}, journal = {Comput. Inf. Sci.}, volume = {7}, number = {3}, pages = {18--30}, year = {2014}, url = {https://doi.org/10.5539/cis.v7n3p18}, doi = {10.5539/CIS.V7N3P18}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccsecis/KochGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KochGR14, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {Behavior-based intrusion detection in encrypted environments}, journal = {{IEEE} Commun. Mag.}, volume = {52}, number = {7}, pages = {124--131}, year = {2014}, url = {https://doi.org/10.1109/MCOM.2014.6852093}, doi = {10.1109/MCOM.2014.6852093}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KochGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/Golling0HHT14, author = {Mario Golling and Robert Koch and Peter Hillmann and Rick Hofstede and Frank Tietze}, editor = {Danny Raz and Michele Nogueira and Edmundo Roberto Mauro Madeira and Brendan Jennings and Lisandro Zambenedetti Granville and Luciano Paschoal Gaspary}, title = {{YANG2UML:} Bijective transformation and simplification of {YANG} to {UML}}, booktitle = {10th International Conference on Network and Service Management, {CNSM} 2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014}, pages = {300--303}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CNSM.2014.7014179}, doi = {10.1109/CNSM.2014.7014179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/Golling0HHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GollingH014, author = {Mario Golling and Rick Hofstede and Robert Koch}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Towards multi-layered intrusion detection in high-speed networks}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {191--206}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916403}, doi = {10.1109/CYCON.2014.6916403}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GollingH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0HR14, author = {Mario Golling and Robert Koch and Peter Hillmann and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {Smart defence: an architecture for new challenges to cyber security}, booktitle = {7. DFN-Forum - Kommunikationstechnologien, 16.-17. Juni 2014, Fulda, Germany}, series = {{LNI}}, volume = {{P-231}}, pages = {99--108}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/2679}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0HR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/Golling0S14, author = {Mario Golling and Robert Koch and Lars Stiemert}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen}, booktitle = {7. DFN-Forum - Kommunikationstechnologien, 16.-17. Juni 2014, Fulda, Germany}, series = {{LNI}}, volume = {{P-231}}, pages = {131--140}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/2682}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/Golling0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GarziaRKNSOR14, author = {Fabio Garzia and Alexander R{\"{u}}gamer and Robert Koch and Philipp Neumaier and Ekaterina Serezhkina and Matthias Overbeck and G{\"{u}}nter Rohmer}, title = {Experimental multi-FPGA {GNSS} receiver platform}, booktitle = {24th International Conference on Field Programmable Logic and Applications, {FPL} 2014, Munich, Germany, 2-4 September, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FPL.2014.6927399}, doi = {10.1109/FPL.2014.6927399}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GarziaRKNSOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0002GR13, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {An architecture for supervising {COTS} products}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {403--404}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682749}, doi = {10.1109/CNS.2013.6682749}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0002GR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0002GR13a, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, title = {Attracting sophisticated attacks to secure systems: {A} new honeypot architecture}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {409--410}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682752}, doi = {10.1109/CNS.2013.6682752}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/0002GR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/KochGR13, author = {Robert Koch and Mario Golling and Gabi Dreo Rodosek}, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Geolocation and Verification of IP-Addresses with Specific Focus on IPv6}, booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, pages = {151--170}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0\_12}, doi = {10.1007/978-3-319-03584-0\_12}, timestamp = {Fri, 05 Aug 2022 08:50:55 +0200}, biburl = {https://dblp.org/rec/conf/css/KochGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G13, author = {Robert Koch and Mario Golling}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Architecture for evaluating and correlating {NIDS} in real - World networks}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--20}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568386/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfn/GollingKHR13, author = {Mario Golling and Robert Koch and Peter Hillmann and Gabi Dreo Rodosek}, editor = {Paul M{\"{u}}ller and Bernhard Neumair and Helmut Reiser and Gabi Dreo Rodosek}, title = {Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen}, booktitle = {6. DFN-Forum Kommunikationstechnologien, Beitr{\"{a}}ge der Fachtagung, 03.-04. Juni 2013, Erlangen}, series = {{LNI}}, volume = {{P-217}}, pages = {87--96}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/17464}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfn/GollingKHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002R12, author = {Robert Koch and Gabi Dreo Rodosek}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The role of {COTS} products for high security systems}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--14}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243989/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002R12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002SG12, author = {Robert Koch and Bj{\"{o}}rn Stelte and Mario Golling}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Attack trends in present computer networks}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243980/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002SG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Koch11, author = {Robert Koch}, title = {Systemarchitektur zur Ein- und Ausbruchserkennung in verschl{\"{u}}sselten Umgebungen}, school = {Bundeswehr University Munich}, year = {2011}, url = {http://www.unibw.de/unibib/medienserver/node?id=89539}, urn = {urn:nbn:de:bvb:706-2642}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Koch11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/000211, author = {Robert Koch}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Towards next-generation Intrusion Detection}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--18}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954707/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/000211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KochHR11, author = {Robert Koch and Dominik Holzapfel and Gabi Dreo Rodosek}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Data control in social networks}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {274--279}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060014}, doi = {10.1109/ICNSS.2011.6060014}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/KochHR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/KochR10, author = {Robert Koch and Gabi Dreo Rodosek}, title = {User identification in encrypted network communications}, booktitle = {Proceedings of the 6th International Conference on Network and Service Management, {CNSM} 2010, Niagara Falls, Canada, October 25-29, 2010}, pages = {246--249}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CNSM.2010.5691292}, doi = {10.1109/CNSM.2010.5691292}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/KochR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KochR10, author = {Robert Koch and Gabi Dreo Rodosek}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Command Evaluation in Encrypted Remote Sessions}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {299--305}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.62}, doi = {10.1109/NSS.2010.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/KochR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KochR10, author = {Robert Koch and Gabi Dreo Rodosek}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Security System for Encrypted Environments {(S2E2)}}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {505--507}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_35}, doi = {10.1007/978-3-642-15512-3\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KochR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aims/KochD09, author = {Robert Koch and Gabi Dreo}, editor = {Ramin Sadre and Aiko Pras}, title = {Fast Learning Neural Network Intrusion Detection System}, booktitle = {Scalability of Networks and Services, Third International Conference on Autonomous Infrastructure, Management and Security, {AIMS} 2009, Enschede, The Netherlands, June 30-July 2, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5637}, pages = {187--190}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02627-0\_18}, doi = {10.1007/978-3-642-02627-0\_18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aims/KochD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Koch09, author = {Robert Koch}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Changing Network Behavior}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {60--66}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.55}, doi = {10.1109/NSS.2009.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/Koch09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.