default search action
Mario Golling
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i2]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria. CoRR abs/2004.09340 (2020) - [i1]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective Transformation and Simplification of YANG to UML. CoRR abs/2005.03292 (2020)
2010 – 2019
- 2019
- [c29]Robert Koch, Mario Golling:
Silent Battles: Towards Unmasking Hidden Cyber Attack. CyCon 2019: 1-20 - 2018
- [c28]Robert Koch, Mario Golling:
The cyber decade: Cyber defence at a X-ing point. CyCon 2018: 159-186 - 2017
- [c27]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
On the Perception of Risk Assessment in Intrusion Detection Systems. DFN-Forum Kommunikationstechnologien 2017: 21-30 - 2016
- [j4]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. Computer 49(3): 42-49 (2016) - [j3]Robert Koch, Mario Golling, Lars Stiemert, Gabi Dreo Rodosek:
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis. IEEE Syst. J. 10(4): 1338-1349 (2016) - [c26]Robert Koch, Mario Golling:
Weapons systems and cyber security - a challenging union. CyCon 2016: 191-203 - [c25]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS. DFN-Forum Kommunikationstechnologien 2016: 77-86 - 2015
- [c24]Robert Koch, Mario Golling:
Blackout and now? Network Centric Warfare in an anti-access area-denial theatre. CyCon 2015: 169-184 - [c23]Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorotea Hein, Michael Kretzschmar, Gabi Dreo Rodosek:
An agent-based framework for decentralized reconstruction of attack paths. DFN-Forum Kommunikationstechnologien 2015: 37-46 - [c22]Robert Koch, Mario Golling, Lars Stiemert, Volker Eiseler, Frank Tietze, Gabi Dreo Rodosek:
A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics. HPCC/CSS/ICESS 2015: 1210-1218 - [c21]Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier:
How to exchange security events? Overview and evaluation of formats and protocols. IM 2015: 261-269 - [c20]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the evaluation of military simulations: towards a taxonomy of assessment criteria. MilCIS 2015: 1-7 - [c19]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Disequilibrium: Tor's Exit Node Selection under the Stereoscope. TrustCom/BigDataSE/ISPA (1) 2015: 942-949 - 2014
- [j2]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
A Revised Attack Taxonomy for a New Generation of Smart Attacks. Comput. Inf. Sci. 7(3): 18-30 (2014) - [j1]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Behavior-based intrusion detection in encrypted environments. IEEE Commun. Mag. 52(7): 124-131 (2014) - [c18]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective transformation and simplification of YANG to UML. CNSM 2014: 300-303 - [c17]Mario Golling, Rick Hofstede, Robert Koch:
Towards multi-layered intrusion detection in high-speed networks. CyCon 2014: 191-206 - [c16]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Smart defence: an architecture for new challenges to cyber security. DFN-Forum Kommunikationstechnologien 2014: 99-108 - [c15]Mario Golling, Robert Koch, Lars Stiemert:
Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen. DFN-Forum Kommunikationstechnologien 2014: 131-140 - 2013
- [c14]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
An architecture for supervising COTS products. CNS 2013: 403-404 - [c13]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Attracting sophisticated attacks to secure systems: A new honeypot architecture. CNS 2013: 409-410 - [c12]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. CSS 2013: 151-170 - [c11]Robert Koch, Mario Golling:
Architecture for evaluating and correlating NIDS in real - World networks. CyCon 2013: 1-20 - [c10]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen. DFN-Forum Kommunikationstechnologien 2013: 87-96 - [c9]Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel:
MuSIC: An IT security architecture for inter-community clouds. IM 2013: 812-815 - [c8]Gabi Dreo, Mario Golling, Wolfgang Hommel, Frank Tietze:
ICEMAN: An architecture for secure federated inter-cloud identity management. IM 2013: 1207-1210 - 2012
- [c7]Robert Koch, Björn Stelte, Mario Golling:
Attack trends in present computer networks. CyCon 2012: 1-12 - [c6]Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel, Alexander Reinhold:
Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit. DFN-Forum Kommunikationstechnologien 2012: 73-82 - 2011
- [c5]Michael Kretzschmar, Mario Golling, Sebastian Hanigk:
Security Management Areas in the Inter-cloud. IEEE CLOUD 2011: 762-763 - [c4]Michael Kretzschmar, Mario Golling:
Functional components for a Security Manager within future Inter-Cloud environments. CNSM 2011: 1-5 - [c3]Mario Golling, Björn Stelte:
Requirements for a future EWS - Cyber Defence in the internet of the future. CyCon 2011: 1-16 - [c2]Michael Kretzschmar, Mario Golling:
Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler. DFN-Forum Kommunikationstechnologien 2011: 47-56
2000 – 2009
- 2007
- [c1]Gabi Dreo Rodosek, Matthias Gohner, Mario Golling, Michael Kretzschmar:
Towards an Accounting System for Multi-Provider Grid Environments. Integrated Network Management 2007: 60-69
Coauthor Index
aka: Gabi Dreo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint