Follow
Mario Golling
Title
Cited by
Cited by
Year
How to exchange security events? overview and evaluation of formats and protocols
J Steinberger, A Sperotto, M Golling, H Baier
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
722015
Towards comparability of intrusion detection systems: New data sets
R Koch, M Golling, GD Rodosek
TERENA Networking Conference 7, 2014
482014
Requirements for a future EWS-Cyber Defence in the internet of the future
M Golling, B Stelte
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
432011
Attack trends in present computer networks
R Koch, B Stelte, M Golling
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-12, 2012
382012
Behavior-based intrusion detection in encrypted environments
R Koch, M Golling, GD Rodosek
IEEE Communications Magazine 52 (7), 124-131, 2014
352014
ICEMAN: An architecture for secure federated inter-cloud identity management
G Dreo, M Golling, W Hommel, F Tietze
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
282013
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Security management areas in the inter-cloud
M Kretzschmar, M Golling, S Hanigk
2011 IEEE 4th International Conference on Cloud Computing, 762-763, 2011
252011
Using geolocation for the strategic preincident preparation of an it forensics analysis
R Koch, M Golling, L Stiemert, GD Rodosek
IEEE Systems Journal 10 (4), 1338-1349, 2015
232015
How anonymous is the tor network? A long-term black-box investigation
R Koch, M Golling, GD Rodosek
Computer 49 (3), 42-49, 2016
212016
Geolocation and verification of IP-addresses with specific focus on IPv6
R Koch, M Golling, GD Rodosek
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
162013
Weapons systems and cyber security-a challenging union
R Koch, M Golling
2016 8th International Conference on Cyber Conflict (CyCon), 191-203, 2016
152016
Evaluation of state of the art ids message exchange protocols
R Koch, M Golling, G Dreo
International Journal of Computer and Systems Engineering 7 (8), 1017-1026, 2013
152013
Advanced geolocation of IP addresses
R Koch, M Golling, GD Rodosek
International Journal of Electrical and Computer Engineering 7 (8), 1007-1016, 2013
152013
Security management spectrum in future multi-provider Inter-Cloud environments—Method to highlight necessary further development
M Kretzschmar, M Golling
2011 5th International DMTF Academic Alliance Workshop on Systems and …, 2011
152011
Architecture for evaluating and correlating NIDS in real-World networks
R Koch, M Golling
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-20, 2013
112013
Blackout and now? network centric warfare in an Anti-Access Area-denial theatre
R Koch, M Golling
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
102015
Cyber security: challenges and application areas
GD Rodosek, M Golling
Supply Chain Safety Management: Security and Robustness in Logistics, 179-197, 2013
92013
The cyber decade: cyber defence at a x-ing point
R Koch, M Golling
2018 10th International Conference on Cyber Conflict (CyCon), 159-186, 2018
82018
A revised attack taxonomy for a new generation of smart attacks
R Koch, M Golling, GD Rodosek
Computer and Information Science 7 (3), 18, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20