Marko Jahnke

According to our database1, Marko Jahnke authored at least 15 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Model-based Cyber Defense Situational Awareness.
Prax. Inf.verarb. Kommun., 2012

Automatic generation of extended dependency graphs for network security.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Modeling availability in tactical mobile ad hoc networks for situational awareness.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

2009
Graph-based automated denial-of-service attack response.
PhD thesis, 2009

Validating GrADAR - an Approach for graph-based automated DoS attack response.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
Comparison and Improvement of Metrics for Selecting Intrusion Response Measures against DoS Attacks.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Methodologies and frameworks for testing ids in adhoc networks.
Proceedings of the Q2SWinet'07, 2007

Graph based Metrics for Intrusion Response Measures in Computer Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Zuverlässige Intrusion Detection für dynamische Koalitionsumgebungen.
Prax. Inf.verarb. Kommun., 2005

Meta IDS Environments: An Event Message Anomaly Detection Approach.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Data Hiding in Journaling File Systems.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

2004
Komponenten für kooperative Intrusion-Detection in dynamischen Koalitionsumgebungen.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004


  Loading...