Mario Golling

According to our database1, Mario Golling authored at least 33 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Silent Battles: Towards Unmasking Hidden Cyber Attack.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
The cyber decade: Cyber defence at a X-ing point.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
On the Perception of Risk Assessment in Intrusion Detection Systems.
Proceedings of the 10. DFN-Forum, 2017

2016
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis.
IEEE Syst. J., 2016

How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation.
Computer, 2016

Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS.
Proceedings of the 9. DFN-Forum - Kommunikationstechnologien, 30. Mai, 2016

Weapons systems and cyber security - a challenging union.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
Disequilibrium: Tor's Exit Node Selection under the Stereoscope.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On the evaluation of military simulations: towards a taxonomy of assessment criteria.
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015

How to exchange security events? Overview and evaluation of formats and protocols.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An agent-based framework for decentralized reconstruction of attack paths.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

Blackout and now? Network Centric Warfare in an anti-access area-denial theatre.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

2014
Behavior-based intrusion detection in encrypted environments.
IEEE Commun. Mag., 2014

A Revised Attack Taxonomy for a New Generation of Smart Attacks.
Comput. Inf. Sci., 2014

Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen.
Proceedings of the 7. DFN-Forum, 2014

Smart defence: an architecture for new challenges to cyber security.
Proceedings of the 7. DFN-Forum, 2014

Towards multi-layered intrusion detection in high-speed networks.
Proceedings of the 6th International Conference on Cyber Conflict, 2014

YANG2UML: Bijective transformation and simplification of YANG to UML.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
MuSIC: An IT security architecture for inter-community clouds.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

ICEMAN: An architecture for secure federated inter-cloud identity management.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen.
Proceedings of the 6. DFN-Forum Kommunikationstechnologien, 2013

Architecture for evaluating and correlating NIDS in real - World networks.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Attracting sophisticated attacks to secure systems: A new honeypot architecture.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An architecture for supervising COTS products.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit.
Proceedings of the 5. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 2012

Attack trends in present computer networks.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

Requirements for a future EWS - Cyber Defence in the internet of the future.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011

Functional components for a Security Manager within future Inter-Cloud environments.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Security Management Areas in the Inter-cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2007
Towards an Accounting System for Multi-Provider Grid Environments.
Proceedings of the Integrated Network Management, 2007


  Loading...