Robert Koch

Affiliations:
  • Bundeswehr University Munich, Computer Science Department


According to our database1, Robert Koch authored at least 38 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

2019
Silent Battles: Towards Unmasking Hidden Cyber Attack.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.
J. Netw. Syst. Manag., 2018

The cyber decade: Cyber defence at a X-ing point.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
On the Perception of Risk Assessment in Intrusion Detection Systems.
Proceedings of the 10. DFN-Forum, 2017

Defending the grid: Backfitting non-expandable control systems.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

2016
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis.
IEEE Syst. J., 2016

How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation.
Computer, 2016

Dr. WATTson: Lightweight current-based Intrusion Detection (CBID).
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS.
Proceedings of the 9. DFN-Forum - Kommunikationstechnologien, 30. Mai, 2016

Weapons systems and cyber security - a challenging union.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
Disequilibrium: Tor's Exit Node Selection under the Stereoscope.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On the evaluation of military simulations: towards a taxonomy of assessment criteria.
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015

A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An agent-based framework for decentralized reconstruction of attack paths.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

Blackout and now? Network Centric Warfare in an anti-access area-denial theatre.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

2014
Behavior-based intrusion detection in encrypted environments.
IEEE Commun. Mag., 2014

A Revised Attack Taxonomy for a New Generation of Smart Attacks.
Comput. Inf. Sci., 2014

Experimental multi-FPGA GNSS receiver platform.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen.
Proceedings of the 7. DFN-Forum, 2014

Smart defence: an architecture for new challenges to cyber security.
Proceedings of the 7. DFN-Forum, 2014

Towards multi-layered intrusion detection in high-speed networks.
Proceedings of the 6th International Conference on Cyber Conflict, 2014

YANG2UML: Bijective transformation and simplification of YANG to UML.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen.
Proceedings of the 6. DFN-Forum Kommunikationstechnologien, 2013

Architecture for evaluating and correlating NIDS in real - World networks.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Attracting sophisticated attacks to secure systems: A new honeypot architecture.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An architecture for supervising COTS products.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Attack trends in present computer networks.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

The role of COTS products for high security systems.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Systemarchitektur zur Ein- und Ausbruchserkennung in verschlüsselten Umgebungen.
PhD thesis, 2011

Data control in social networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards next-generation Intrusion Detection.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011

2010
Security System for Encrypted Environments (S2E2).
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Command Evaluation in Encrypted Remote Sessions.
Proceedings of the Fourth International Conference on Network and System Security, 2010

User identification in encrypted network communications.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Changing Network Behavior.
Proceedings of the Third International Conference on Network and System Security, 2009

Fast Learning Neural Network Intrusion Detection System.
Proceedings of the Scalability of Networks and Services, 2009


  Loading...