Jens Tölle

According to our database1, Jens Tölle authored at least 23 papers between 1997 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
ARMing the Trusted Platform Module pro-active system integrity monitoring focussing on peer system notification.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Message from the program chairs.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

2012
Cybercrime and Privacy Issues - Introduction to the Special Theme.
ERCIM News, 2012

2009
Validating GrADAR - an Approach for graph-based automated DoS attack response.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

The 5th LCN Workshop on Security in Communications Networks (SICK 2009).
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
08102 Working Group -- Early Warning Systems.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Methodologies and frameworks for testing ids in adhoc networks.
Proceedings of the Q2SWinet'07, 2007

Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
Simultaneous Support of Multiple Security Protocols in a Group Communication Gateway.
Proceedings of the LCN 2006, 2006

Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Zuverlässige Intrusion Detection für dynamische Koalitionsumgebungen.
Prax. Inf.verarb. Kommun., 2005

Meta IDS Environments: An Event Message Anomaly Detection Approach.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

2004
Human Mobility in MANET Disaster Area Simulation - A Realistic Approach.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Integration of 3G Protocols into the Linux Kernel to Enable the Use of Generic Bearers.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Würmer: Gefahr im Internet?
Proceedings of the Integration und Datensicherheit, 2004

Komponenten für kooperative Intrusion-Detection in dynamischen Koalitionsumgebungen.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2002
Intrusion Detection durch strukturbasierte Erkennung von Anomalien im Netzwerkverkehr.
PhD thesis, 2002

2001
Visualization of traffic structures.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Security of Routing Cache Updates in Cellular IP.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
Praktische Erfahrungen mit der Implementierung eines DNS-Protokoll-Intrusion-Detection-Systems.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

1997
Tolerant Synchronization for Distributed Simulations of Interconnected Computer Networks.
Proceedings of the Eleventh Workshop on Parallel and Distributed Simulation, 1997


  Loading...