Towards next-generation intrusion detection R Koch Cyber Conflict (ICCC), 2011 3rd International Conference on, 1-18, 2011 | 72 | 2011 |
Towards comparability of intrusion detection systems: New data sets R Koch, M Golling, GD Rodosek TERENA Networking Conference 7, 2014 | 45 | 2014 |
Attack trends in present computer networks R Koch, B Stelte, M Golling 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012 | 38 | 2012 |
Behavior-based intrusion detection in encrypted environments R Koch, M Golling, GD Rodosek IEEE Communications Magazine 52 (7), 124-131, 2014 | 35 | 2014 |
Towards multi-layered intrusion detection in high-speed networks M Golling, R Hofstede, R Koch 2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014 | 27 | 2014 |
Towards multi-layered intrusion detection in high-speed networks M Golling, R Hofstede, R Koch 2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014 | 27 | 2014 |
Hidden in the Shadow: The Dark Web-A Growing Risk for Military Operations? R Koch 2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-24, 2019 | 23 | 2019 |
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis R Koch, M Golling, L Stiemert, GD Rodosek IEEE Systems Journal 10 (4), 1338-1349, 2015 | 22 | 2015 |
Command evaluation in encrypted remote sessions R Koch, GD Rodosek 2010 Fourth International Conference on Network and System Security, 299-305, 2010 | 22 | 2010 |
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation R Koch, M Golling, GD Rodosek Computer 49 (3), 42-49, 2016 | 20 | 2016 |
Weapons systems and cyber security-a challenging union R Koch, M Golling 2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016 | 16 | 2016 |
The role of COTS products for high security systems R Koch, GD Rodosek 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-14, 2012 | 16 | 2012 |
Geolocation and verification of IP-addresses with specific focus on IPv6 R Koch, M Golling, GD Rodosek International Symposium on Cyberspace Safety and Security, 151-170, 2013 | 15 | 2013 |
Advanced Geolocation of IP Addresses R Koch, M Golling, GD Rodosek International Conference on Communication and Network Security (ICCNS), 1-10, 2013 | 15 | 2013 |
Evaluation of State of the Art IDS Message Exchange Protocols R Koch, M Golling, G Dreo International Conference on Communication and Network Security (CNS 2013), 2013 | 15 | 2013 |
Towards integrity measurement in virtualized environments—A hypervisor based sensory integrity measurement architecture (SIMA) B Stelte, R Koch, M Ullmann 2010 IEEE International Conference on Technologies for Homeland Security …, 2010 | 13 | 2010 |
2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS … R Koch, M Golling, L Stiemert, V Eiseler, F Tietze, GD Rodosek | 13* | |
Architecture for evaluating and correlating NIDS in real-World networks R Koch, M Golling 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013 | 11 | 2013 |
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre R Koch, M Golling 2015 7th International Conference on Cyber Conflict: Architectures in …, 2015 | 10 | 2015 |
Systemarchitektur zur Ein-und Ausbruchserkennung in verschlüsselten Umgebungen R Koch BoD–Books on Demand, 2011 | 10 | 2011 |