Follow
Robert Koch
Title
Cited by
Cited by
Year
Towards next-generation intrusion detection
R Koch
Cyber Conflict (ICCC), 2011 3rd International Conference on, 1-18, 2011
732011
Towards comparability of intrusion detection systems: New data sets
R Koch, M Golling, GD Rodosek
TERENA Networking Conference 7, 2014
442014
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
382012
Behavior-based intrusion detection in encrypted environments
R Koch, M Golling, GD Rodosek
IEEE Communications Magazine 52 (7), 124-131, 2014
352014
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Command evaluation in encrypted remote sessions
R Koch, GD Rodosek
2010 Fourth International Conference on Network and System Security, 299-305, 2010
222010
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis
R Koch, M Golling, L Stiemert, GD Rodosek
IEEE Systems Journal 10 (4), 1338-1349, 2015
212015
Hidden in the Shadow: The Dark Web-A Growing Risk for Military Operations?
R Koch
2019 11th International Conference on Cyber Conflict (CyCon) 900, 1-24, 2019
202019
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation
R Koch, M Golling, GD Rodosek
Computer 49 (3), 42-49, 2016
172016
The role of COTS products for high security systems
R Koch, GD Rodosek
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-14, 2012
162012
Geolocation and verification of IP-addresses with specific focus on IPv6
R Koch, M Golling, GD Rodosek
International Symposium on Cyberspace Safety and Security, 151-170, 2013
152013
Advanced Geolocation of IP Addresses
R Koch, M Golling, GD Rodosek
International Conference on Communication and Network Security (ICCNS), 1-10, 2013
152013
Evaluation of State of the Art IDS Message Exchange Protocols
R Koch, M Golling, G Dreo
International Conference on Communication and Network Security (CNS 2013), 2013
152013
Weapons systems and cyber security-a challenging union
R Koch, M Golling
2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016
132016
Towards integrity measurement in virtualized environments—A hypervisor based sensory integrity measurement architecture (SIMA)
B Stelte, R Koch, M Ullmann
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
132010
Architecture for evaluating and correlating NIDS in real-World networks
R Koch, M Golling
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013
112013
2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS …
R Koch, M Golling, L Stiemert, V Eiseler, F Tietze, GD Rodosek
11*
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre
R Koch, M Golling
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
102015
Systemarchitektur zur Ein-und Ausbruchserkennung in verschlüsselten Umgebungen
R Koch
BoD–Books on Demand, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20