Остановите войну!
for scientists:
default search action
Robert Koch 0002
- > Home > Persons > Robert Koch 0002
Publications
- 2020
- [i2]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria. CoRR abs/2004.09340 (2020) - [i1]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective Transformation and Simplification of YANG to UML. CoRR abs/2005.03292 (2020) - 2019
- [c31]Robert Koch, Mario Golling:
Silent Battles: Towards Unmasking Hidden Cyber Attack. CyCon 2019: 1-20 - 2018
- [j5]Remi Badonnel, Robert Koch, Martin Drasar, Aiko Pras, Volker Eiseler, Lars Stiemert, Sebastian Seeber, Daphné Tuncer, Marinos Charalambides, Gabi Dreo Rodosek:
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. J. Netw. Syst. Manag. 26(4): 1101-1109 (2018) - [c30]Robert Koch, Mario Golling:
The cyber decade: Cyber defence at a X-ing point. CyCon 2018: 159-186 - 2017
- [c29]Robert Koch, Teo Kuhn:
Defending the grid: Backfitting non-expandable control systems. CyCon 2017: 1-17 - [c28]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
On the Perception of Risk Assessment in Intrusion Detection Systems. DFN-Forum Kommunikationstechnologien 2017: 21-30 - [e2]Daphné Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller:
Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings. Lecture Notes in Computer Science 10356, Springer 2017, ISBN 978-3-319-60773-3 [contents] - 2016
- [j4]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. Computer 49(3): 42-49 (2016) - [j3]Robert Koch, Mario Golling, Lars Stiemert, Gabi Dreo Rodosek:
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis. IEEE Syst. J. 10(4): 1338-1349 (2016) - [c27]Robert Koch, Mario Golling:
Weapons systems and cyber security - a challenging union. CyCon 2016: 191-203 - [c26]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS. DFN-Forum Kommunikationstechnologien 2016: 77-86 - [c25]Robert Koch, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek:
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). PST 2016: 170-177 - [e1]Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drasar, Burkhard Stiller:
Management and Security in the Age of Hyperconnectivity - 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings. Lecture Notes in Computer Science 9701, Springer 2016, ISBN 978-3-319-39813-6 [contents] - 2015
- [c24]Robert Koch, Mario Golling:
Blackout and now? Network Centric Warfare in an anti-access area-denial theatre. CyCon 2015: 169-184 - [c23]Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorotea Hein, Michael Kretzschmar, Gabi Dreo Rodosek:
An agent-based framework for decentralized reconstruction of attack paths. DFN-Forum Kommunikationstechnologien 2015: 37-46 - [c22]Robert Koch, Mario Golling, Lars Stiemert, Volker Eiseler, Frank Tietze, Gabi Dreo Rodosek:
A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics. HPCC/CSS/ICESS 2015: 1210-1218 - [c21]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the evaluation of military simulations: towards a taxonomy of assessment criteria. MilCIS 2015: 1-7 - [c20]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Disequilibrium: Tor's Exit Node Selection under the Stereoscope. TrustCom/BigDataSE/ISPA (1) 2015: 942-949 - 2014
- [j2]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
A Revised Attack Taxonomy for a New Generation of Smart Attacks. Comput. Inf. Sci. 7(3): 18-30 (2014) - [j1]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Behavior-based intrusion detection in encrypted environments. IEEE Commun. Mag. 52(7): 124-131 (2014) - [c19]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective transformation and simplification of YANG to UML. CNSM 2014: 300-303 - [c18]Mario Golling, Rick Hofstede, Robert Koch:
Towards multi-layered intrusion detection in high-speed networks. CyCon 2014: 191-206 - [c17]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Smart defence: an architecture for new challenges to cyber security. DFN-Forum Kommunikationstechnologien 2014: 99-108 - [c16]Mario Golling, Robert Koch, Lars Stiemert:
Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen. DFN-Forum Kommunikationstechnologien 2014: 131-140 - 2013
- [c14]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
An architecture for supervising COTS products. CNS 2013: 403-404 - [c13]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Attracting sophisticated attacks to secure systems: A new honeypot architecture. CNS 2013: 409-410 - [c12]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. CSS 2013: 151-170 - [c11]Robert Koch, Mario Golling:
Architecture for evaluating and correlating NIDS in real - World networks. CyCon 2013: 1-20 - [c10]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen. DFN-Forum Kommunikationstechnologien 2013: 87-96 - 2012
- [c9]Robert Koch, Gabi Dreo Rodosek:
The role of COTS products for high security systems. CyCon 2012: 1-14 - [c8]Robert Koch, Björn Stelte, Mario Golling:
Attack trends in present computer networks. CyCon 2012: 1-12 - 2011
- [c6]Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek:
Data control in social networks. NSS 2011: 274-279 - 2010
- [c5]Robert Koch, Gabi Dreo Rodosek:
User identification in encrypted network communications. CNSM 2010: 246-249 - [c4]Robert Koch, Gabi Dreo Rodosek:
Command Evaluation in Encrypted Remote Sessions. NSS 2010: 299-305 - [c3]Robert Koch, Gabi Dreo Rodosek:
Security System for Encrypted Environments (S2E2). RAID 2010: 505-507 - 2009
- [c2]Robert Koch, Gabi Dreo:
Fast Learning Neural Network Intrusion Detection System. AIMS 2009: 187-190
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint