关注
Mario Golling
标题
引用次数
引用次数
年份
How to exchange security events? overview and evaluation of formats and protocols
J Steinberger, A Sperotto, M Golling, H Baier
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
702015
Towards comparability of intrusion detection systems: New data sets
R Koch, M Golling, GD Rodosek
TERENA Networking Conference 7, 2014
452014
Requirements for a future EWS-Cyber Defence in the internet of the future
M Golling, B Stelte
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
432011
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
382012
Behavior-based intrusion detection in encrypted environments
R Koch, M Golling, GD Rodosek
IEEE Communications Magazine 52 (7), 124-131, 2014
352014
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
ICEMAN: An architecture for secure federated inter-cloud identity management
G Dreo, M Golling, W Hommel, F Tietze
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
272013
Security management areas in the inter-cloud
M Kretzschmar, M Golling, S Hanigk
2011 IEEE 4th International Conference on Cloud Computing, 762-763, 2011
232011
Using geolocation for the strategic preincident preparation of an it forensics analysis
R Koch, M Golling, L Stiemert, GD Rodosek
IEEE Systems Journal 10 (4), 1338-1349, 2015
222015
How anonymous is the tor network? A long-term black-box investigation
R Koch, M Golling, GD Rodosek
Computer 49 (3), 42-49, 2016
202016
Weapons systems and cyber security-a challenging union
R Koch, M Golling
2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016
162016
Evaluation of state of the art ids message exchange protocols
R Koch, M Golling, G Dreo
International Journal of Computer and Systems Engineering 7 (8), 1017-1026, 2013
152013
Advanced geolocation of IP addresses
R Koch, M Golling, GD Rodosek
International Journal of Electrical and Computer Engineering 7 (8), 1007-1016, 2013
152013
Geolocation and verification of IP-addresses with specific focus on IPv6
R Koch, M Golling, GD Rodosek
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
152013
Security management spectrum in future multi-provider Inter-Cloud environments—Method to highlight necessary further development
M Kretzschmar, M Golling
2011 5th International DMTF Academic Alliance Workshop on Systems and …, 2011
152011
Architecture for evaluating and correlating NIDS in real-World networks
R Koch, M Golling
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013
112013
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre
R Koch, M Golling
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
102015
Silent battles: Towards unmasking hidden cyber attack
R Koch, M Golling
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019
82019
A revised attack taxonomy for a new generation of smart attacks
R Koch, M Golling, GD Rodosek
Computer and Information Science 7 (3), 18, 2014
82014
Attracting sophisticated attacks to secure systems: A new honeypot architecture
R Koch, M Golling, G Dreo
2013 IEEE Conference on Communications and Network Security (CNS), 409-410, 2013
82013
系统目前无法执行此操作,请稍后再试。
文章 1–20