default search action
Robert Koch 0002
Person information
- affiliation: Bundeswehr University Munich, Computer Science Department
Other persons with the same name
- Robert Koch 0001 — University of Bonn, Institute of Computer Science
- Robert Koch 0003 — Fraunhofer Institute for Integrated Circuits (IIS), Erlangen, Germany
- Robert Koch 0004 — Fraunhofer FKIE, Bonn, Germany
- Robert Koch 0005 — TU Berlin, Germany
- Robert Koch 0006 — Simon Fraser University, BC, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c33]Bilyana Lilly, Kenneth Geers, Greg Rattray, Robert Koch:
Business@War: The IT Companies Helping to Defend Ukraine. CyCon 2023: 71-83 - 2021
- [c32]Johannes Klick, Robert Koch, Thomas Brandstetter:
Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic. CyCon 2021: 73-94 - [i3]Johannes Klick, Robert Koch, Thomas Brandstetter:
Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic. CoRR abs/2101.07912 (2021) - 2020
- [i2]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria. CoRR abs/2004.09340 (2020) - [i1]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective Transformation and Simplification of YANG to UML. CoRR abs/2005.03292 (2020)
2010 – 2019
- 2019
- [c31]Robert Koch, Mario Golling:
Silent Battles: Towards Unmasking Hidden Cyber Attack. CyCon 2019: 1-20 - 2018
- [j5]Remi Badonnel, Robert Koch, Martin Drasar, Aiko Pras, Volker Eiseler, Lars Stiemert, Sebastian Seeber, Daphné Tuncer, Marinos Charalambides, Gabi Dreo Rodosek:
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. J. Netw. Syst. Manag. 26(4): 1101-1109 (2018) - [c30]Robert Koch, Mario Golling:
The cyber decade: Cyber defence at a X-ing point. CyCon 2018: 159-186 - 2017
- [c29]Robert Koch, Teo Kuhn:
Defending the grid: Backfitting non-expandable control systems. CyCon 2017: 1-17 - [c28]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
On the Perception of Risk Assessment in Intrusion Detection Systems. DFN-Forum Kommunikationstechnologien 2017: 21-30 - [e2]Daphné Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller:
Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings. Lecture Notes in Computer Science 10356, Springer 2017, ISBN 978-3-319-60773-3 [contents] - 2016
- [j4]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation. Computer 49(3): 42-49 (2016) - [j3]Robert Koch, Mario Golling, Lars Stiemert, Gabi Dreo Rodosek:
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis. IEEE Syst. J. 10(4): 1338-1349 (2016) - [c27]Robert Koch, Mario Golling:
Weapons systems and cyber security - a challenging union. CyCon 2016: 191-203 - [c26]Mario Golling, Robert Koch, Gabi Dreo Rodosek:
Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS. DFN-Forum Kommunikationstechnologien 2016: 77-86 - [c25]Robert Koch, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek:
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). PST 2016: 170-177 - [e1]Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drasar, Burkhard Stiller:
Management and Security in the Age of Hyperconnectivity - 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings. Lecture Notes in Computer Science 9701, Springer 2016, ISBN 978-3-319-39813-6 [contents] - 2015
- [c24]Robert Koch, Mario Golling:
Blackout and now? Network Centric Warfare in an anti-access area-denial theatre. CyCon 2015: 169-184 - [c23]Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorotea Hein, Michael Kretzschmar, Gabi Dreo Rodosek:
An agent-based framework for decentralized reconstruction of attack paths. DFN-Forum Kommunikationstechnologien 2015: 37-46 - [c22]Robert Koch, Mario Golling, Lars Stiemert, Volker Eiseler, Frank Tietze, Gabi Dreo Rodosek:
A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics. HPCC/CSS/ICESS 2015: 1210-1218 - [c21]Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, Andres Rekker:
On the evaluation of military simulations: towards a taxonomy of assessment criteria. MilCIS 2015: 1-7 - [c20]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Disequilibrium: Tor's Exit Node Selection under the Stereoscope. TrustCom/BigDataSE/ISPA (1) 2015: 942-949 - 2014
- [j2]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
A Revised Attack Taxonomy for a New Generation of Smart Attacks. Comput. Inf. Sci. 7(3): 18-30 (2014) - [j1]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Behavior-based intrusion detection in encrypted environments. IEEE Commun. Mag. 52(7): 124-131 (2014) - [c19]Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, Frank Tietze:
YANG2UML: Bijective transformation and simplification of YANG to UML. CNSM 2014: 300-303 - [c18]Mario Golling, Rick Hofstede, Robert Koch:
Towards multi-layered intrusion detection in high-speed networks. CyCon 2014: 191-206 - [c17]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Smart defence: an architecture for new challenges to cyber security. DFN-Forum Kommunikationstechnologien 2014: 99-108 - [c16]Mario Golling, Robert Koch, Lars Stiemert:
Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen. DFN-Forum Kommunikationstechnologien 2014: 131-140 - [c15]Fabio Garzia, Alexander Rügamer, Robert Koch, Philipp Neumaier, Ekaterina Serezhkina, Matthias Overbeck, Günter Rohmer:
Experimental multi-FPGA GNSS receiver platform. FPL 2014: 1-4 - 2013
- [c14]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
An architecture for supervising COTS products. CNS 2013: 403-404 - [c13]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Attracting sophisticated attacks to secure systems: A new honeypot architecture. CNS 2013: 409-410 - [c12]Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. CSS 2013: 151-170 - [c11]Robert Koch, Mario Golling:
Architecture for evaluating and correlating NIDS in real - World networks. CyCon 2013: 1-20 - [c10]Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek:
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen. DFN-Forum Kommunikationstechnologien 2013: 87-96 - 2012
- [c9]Robert Koch, Gabi Dreo Rodosek:
The role of COTS products for high security systems. CyCon 2012: 1-14 - [c8]Robert Koch, Björn Stelte, Mario Golling:
Attack trends in present computer networks. CyCon 2012: 1-12 - 2011
- [b1]Robert Koch:
Systemarchitektur zur Ein- und Ausbruchserkennung in verschlüsselten Umgebungen. Bundeswehr University Munich, 2011 - [c7]Robert Koch:
Towards next-generation Intrusion Detection. CyCon 2011: 1-18 - [c6]Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek:
Data control in social networks. NSS 2011: 274-279 - 2010
- [c5]Robert Koch, Gabi Dreo Rodosek:
User identification in encrypted network communications. CNSM 2010: 246-249 - [c4]Robert Koch, Gabi Dreo Rodosek:
Command Evaluation in Encrypted Remote Sessions. NSS 2010: 299-305 - [c3]Robert Koch, Gabi Dreo Rodosek:
Security System for Encrypted Environments (S2E2). RAID 2010: 505-507
2000 – 2009
Coauthor Index
aka: Gabi Dreo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint