How to exchange security events? overview and evaluation of formats and protocols J Steinberger, A Sperotto, M Golling, H Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 70 | 2015 |
Towards comparability of intrusion detection systems: New data sets R Koch, M Golling, GD Rodosek TERENA Networking Conference 7, 2014 | 45 | 2014 |
Requirements for a future EWS-Cyber Defence in the internet of the future M Golling, B Stelte 2011 3rd International Conference on Cyber Conflict, 1-16, 2011 | 43 | 2011 |
Attack trends in present computer networks R Koch, B Stelte, M Golling 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012 | 38 | 2012 |
Behavior-based intrusion detection in encrypted environments R Koch, M Golling, GD Rodosek IEEE Communications Magazine 52 (7), 124-131, 2014 | 35 | 2014 |
Towards multi-layered intrusion detection in high-speed networks M Golling, R Hofstede, R Koch 2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014 | 27 | 2014 |
ICEMAN: An architecture for secure federated inter-cloud identity management G Dreo, M Golling, W Hommel, F Tietze 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013 | 27 | 2013 |
Security management areas in the inter-cloud M Kretzschmar, M Golling, S Hanigk 2011 IEEE 4th International Conference on Cloud Computing, 762-763, 2011 | 23 | 2011 |
Using geolocation for the strategic preincident preparation of an it forensics analysis R Koch, M Golling, L Stiemert, GD Rodosek IEEE Systems Journal 10 (4), 1338-1349, 2015 | 22 | 2015 |
How anonymous is the tor network? A long-term black-box investigation R Koch, M Golling, GD Rodosek Computer 49 (3), 42-49, 2016 | 20 | 2016 |
Weapons systems and cyber security-a challenging union R Koch, M Golling 2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016 | 16 | 2016 |
Evaluation of state of the art ids message exchange protocols R Koch, M Golling, G Dreo International Journal of Computer and Systems Engineering 7 (8), 1017-1026, 2013 | 15 | 2013 |
Advanced geolocation of IP addresses R Koch, M Golling, GD Rodosek International Journal of Electrical and Computer Engineering 7 (8), 1007-1016, 2013 | 15 | 2013 |
Geolocation and verification of IP-addresses with specific focus on IPv6 R Koch, M Golling, GD Rodosek Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 15 | 2013 |
Security management spectrum in future multi-provider Inter-Cloud environments—Method to highlight necessary further development M Kretzschmar, M Golling 2011 5th International DMTF Academic Alliance Workshop on Systems and …, 2011 | 15 | 2011 |
Architecture for evaluating and correlating NIDS in real-World networks R Koch, M Golling 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013 | 11 | 2013 |
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre R Koch, M Golling 2015 7th International Conference on Cyber Conflict: Architectures in …, 2015 | 10 | 2015 |
Silent battles: Towards unmasking hidden cyber attack R Koch, M Golling 2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-20, 2019 | 8 | 2019 |
A revised attack taxonomy for a new generation of smart attacks R Koch, M Golling, GD Rodosek Computer and Information Science 7 (3), 18, 2014 | 8 | 2014 |
Attracting sophisticated attacks to secure systems: A new honeypot architecture R Koch, M Golling, G Dreo 2013 IEEE Conference on Communications and Network Security (CNS), 409-410, 2013 | 8 | 2013 |