关注
Robert Koch
标题
引用次数
引用次数
年份
Towards next-generation intrusion detection
R Koch
Cyber Conflict (ICCC), 2011 3rd International Conference on, 1-18, 2011
722011
Towards comparability of intrusion detection systems: New data sets
R Koch, M Golling, GD Rodosek
TERENA Networking Conference 7, 2014
452014
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
382012
Behavior-based intrusion detection in encrypted environments
R Koch, M Golling, GD Rodosek
IEEE Communications Magazine 52 (7), 124-131, 2014
352014
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Hidden in the Shadow: The Dark Web-A Growing Risk for Military Operations?
R Koch
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-24, 2019
232019
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis
R Koch, M Golling, L Stiemert, GD Rodosek
IEEE Systems Journal 10 (4), 1338-1349, 2015
222015
Command evaluation in encrypted remote sessions
R Koch, GD Rodosek
2010 Fourth International Conference on Network and System Security, 299-305, 2010
222010
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation
R Koch, M Golling, GD Rodosek
Computer 49 (3), 42-49, 2016
202016
Weapons systems and cyber security-a challenging union
R Koch, M Golling
2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016
162016
The role of COTS products for high security systems
R Koch, GD Rodosek
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-14, 2012
162012
Geolocation and verification of IP-addresses with specific focus on IPv6
R Koch, M Golling, GD Rodosek
International Symposium on Cyberspace Safety and Security, 151-170, 2013
152013
Advanced Geolocation of IP Addresses
R Koch, M Golling, GD Rodosek
International Conference on Communication and Network Security (ICCNS), 1-10, 2013
152013
Evaluation of State of the Art IDS Message Exchange Protocols
R Koch, M Golling, G Dreo
International Conference on Communication and Network Security (CNS 2013), 2013
152013
Towards integrity measurement in virtualized environments—A hypervisor based sensory integrity measurement architecture (SIMA)
B Stelte, R Koch, M Ullmann
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
132010
2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS …
R Koch, M Golling, L Stiemert, V Eiseler, F Tietze, GD Rodosek
13*
Architecture for evaluating and correlating NIDS in real-World networks
R Koch, M Golling
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013
112013
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre
R Koch, M Golling
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
102015
Systemarchitektur zur Ein-und Ausbruchserkennung in verschlüsselten Umgebungen
R Koch
BoD–Books on Demand, 2011
102011
系统目前无法执行此操作,请稍后再试。
文章 1–20