Publikationen

2020

[1] Richard Poschinger, Nils Rodday, Raphael Labaca Castro und Gabi Dreo Rodosek. OpenMTD: A Framework for Efficient Network-Level MTD Evaluation. In ACM SIGSAC Conference on Computer and Communications Security, ACM, November 2020. Zur Veröffentlichung angenommen.
[2] Peter Hillmann, Marcus Knüpfer, Erik Heiland und Andreas Karcher. Selective Deletion in a Blockchain. In 2nd IEEE International Workshop on Blockchain and Mobile Application (BlockApp), IEEE, November 2020. Zur Veröffentlichung angenommen.
[3] Klement Streit und Gabi Dreo Rodosek. CeTUP: Controller-equipped Topology Update Process for Tactical Ad-Hoc Networks. In 17th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, November 2020. Zur Veröffentlichung angenommen.
[4] Cora Perner, Corinna Schmitt und Georg Carle. Dynamic Network Reconfiguration in Safety-Critical Aeronautical Systems. In 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. Zur Veröffentlichung angenommen.
[5] Cora Perner und Corinna Schmitt. Security Concept for Unoccupied Aerial Systems. In 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. Zur Veröffentlichung angenommen.
[6] Nils Mäurer, Thomas Gräupl und Corinna Schmitt. Comparing different Diffie-Hellman Key Exchange Flavors for LDACS. In 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. Zur Veröffentlichung angenommen.
[7] Marcus Knüpfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp, Sebastian Seeber, Daniela Pöhn und Peter Hillmann. Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. In 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), September 2020.
[8] Klement Streit, Corinna Schmitt und Carlo Giannelli. SDN-based regulated flow routing in MANETs. In 6th IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, September 2020. 
[9] Daniela Pöhn und Wolfgang Hommel. IMC: A Classification of Identity Management Approaches. In Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (DETIPS), September 2020.
[10] Daniela Pöhn und Wolfgang Hommel. An overview of limitations and approaches in identity management. In Proc. 15th International Conference on Availability, Reliability and Security (ARES), ACM, August 2020. BibTeX
@inproceedings{pohn2020overview,
  title={An overview of limitations and approaches in identity management},
  author={P{\"o}hn, Daniela and Hommel, Wolfgang},
  booktitle={Proceedings of the 15th International Conference on Availability, Reliability and Security},
  pages={1--10},
  year={2020},
publisher = {Association for Computing Machinery} }
[11] Florian Steuber, Mirco Schoenfeld und Gabi Dreo Rodosek. Topic Modeling of Short Texts Using Anchor Words. In Proc. International Conference on Web Intelligence, Mining and Semantics (WIMS’20), ACM, Juli 2020. BibTeX
@inproceedings{steuber2020topic,
title={Topic Modeling of Short Texts Using Anchor Words},
author={Steuber, Florian and Schoenfeld, Mirco and Dreo Rodosek, Gabi}
year = {2020},
publisher = {Association for Computing Machinery},
booktitle = {Proceedings of the 10th International Conference on Web Intelligence, Mining and Semantics (WIMS’20)}
}
[12] Christian Dietz, Gabi Dreo Rodosek, Anna Sperotto und Aiko Pras. Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. In Proc. Network Operations and Management Symposium (NOMS), IEEE, April 2020. BibTeX
@inproceedings{dietz2020towards,
  title={Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD},
  author={Dietz, Christian and Dreo Rodosek, Gabi and Sperotto, Anna and Pras, Aiko},
  booktitle={NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium},
  pages={1--5},
  year={2020},
  organization={IEEE}
}
[13] Mattijs Jonker und Nils Rodday. Tutorial: Reliable measurements with BGP and RPKI. In Network Operations and Management Symposium (NOMS), IEEE, April 2020.

 

2019

[1] Peter Hillmann, Marcus Knüpfer, Tobias Guggemos und Klement Streit. CAKE: An Efficient Group Key Management for Dynamic Groups. In INFOCOMP Journal of Computer Science, 18(2), INFOCOMP, Dezember 2019. BibTeX
@article{hillmann2019cake,
  title={CAKE: An Efficient Group Key Management for Dynamic Groups},
  author={Hillmann, Peter and Kn{\"u}pfer, Marcus and Guggemos, Tobias and Streit, Klement}
  journal={Journal of Computer Science},
volume={18},
number={2}, pages={1--13}, year={2019},
organization={INFOCOMP} }
[2] Pawani Porambage, An Braeken und Corinna Schmitt. Public Key Based Protocols - EC Crypto. In IoT Security: Advances in Authentication, Wiley Online Library, Dezember 2019. BibTeX
@article{porambage2019public,
title={Public Key Based Protocols--EC Crypto},
author={Porambage, Pawani and Braeken, An and Schmitt, Corinna},
journal={IoT Security: Advances in Authentication},
pages={85--99},
year={2019},
publisher={Wiley Online Library}
}
[3] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. In International Journal on Cyber Situational Awareness, 4(1), Dezember 2019. BibTeX
@article{renners2019concept,
  title={Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  journal={International Journal Cyber Security Awareness},
  volume={4},
  number={1},
  pages={99--127},
  year={2019}
}
[4] Corinna Schmitt, Dominik Bünzli und Burkhard Stiller. WebMaDa 2.1 - A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. In IoT Security: Advances in Authentication, Wiley Online Library, Dezember 2019. BibTeX
@article{schmitt2019webmada,
title={WebMaDa 2.1--A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel},
author={Schmitt, Corinna and B{\"u}nzli, Dominik and Stiller, Burkhard},
journal={IoT Security: Advances in Authentication},
pages={159--184},
year={2019},
publisher={Wiley Online Library}
}
[5] Thomas Gräupl, Nils Mäurer und Corinna Schmitt. FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2. In Proc. 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, November 2019. BibTeX
@inproceedings{graupl2019facts2,
  title={FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2},
  author={Gr{\"a}upl, Thomas and M{\"a}urer, Nils and Schmitt, Corinna},
  booktitle={Proceedings of the 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, \& Ubiquitous Networks},
  pages={63--66},
  year={2019},
publisher = {Association for Computing Machinery} }
[6] Raphael Labaca Castro, Battista Biggio und Gabi Dreo Rodosek. Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. In Proc. ACM SIGSAC Conference on Computer and Communications Security, ACM, November 2019. BibTeX
@inproceedings{labaca2019poster,
  title={Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality},
  author={Labaca Castro, Raphael and Biggio, Battista and Dreo Rodosek, Gabi},
  booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
  pages={2565--2567},
  year={2019},
publisher = {Association for Computing Machinery} }
[7] Nils Mäurer, Thomas Gräupl, C. Schmitt. Demo: FACTS2 - Framework for Aeronautical Communications and Traffic Simulation 2. In 22nd ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM, November 2019.
[8] Nils Rodday, Raphael Labaca Castro, Klement Streit und Gabi Dreo Rodosek. Evaluating TCP Connection Healthiness. In Proc. International Telecommunication Networks and Applications Conference (ITNAC), IEEE, November 2019. BibTeX
@inproceedings{rodday2019evaluating,
  title={Evaluating TCP Connection Healthiness},
  author={Rodday, Nils and Castro, Raphael Labaca and Streit, Klement and Dreo Rodosek, Gabi},
  booktitle={2019 29th International Telecommunication Networks and Applications Conference (ITNAC)},
  pages={1--4},
  year={2019},
  organization={IEEE}
}
[9] Klement Streit, Raphael Labaca Castro, Nils Rodday und Gabi Dreo Rodosek. Topology Update Algorithm for Wireless Networks. In Proc. 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), IEEE, November 2019. BibTeX
@inproceedings{streit2019topology,
  title={Topology Update Algorithm for Wireless Networks},
  author={Streit, Klement and Castro, Raphael Labaca and Rodday, Nils and Dreo Rodosek, Gabi},
  booktitle={2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)},
  pages={184--185},
  year={2019},
  organization={IEEE}
}
[10] Nils Rodday, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt und Matthias Wählisch. Poster: Extending RPKI ROV Measurement Coverage, In Internet Measurement Conference (IMC), ACM, Oktober 2019. BibTeX
@inproceedings{rodday2019poster,
title={Poster: Extending RPKI ROV Measurement Coverage},
author={Rodday, Nils and Bush, Randy and Cunha, Italo and Katz-Bassett, Ethan and Dreo Rodosek, Gabi and Schmidt, Thomas C. and W\"{a}hlisch, Matthias},
booktitle={Internet Measurement Conference 2019},
year={2019}
}
[11] Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt und Gabi Dreo Rodosek. Wireless SDN for highly utilized MANETs. In Proc. International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Oktober 2019. BibTeX
@inproceedings{streit2019wireless,
  title={Wireless SDN for highly utilized MANETs},
  author={Streit, Klement and Rodday, Nils and Steuber, Florian and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)},
  pages={226--234},
  year={2019},
  organization={IEEE}
}
[12] Volker Ahlers, Bastian Hellmann und Gabi Dreo Rodosek. A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies. In Proc. 10th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, September 2019. BibTeX
@inproceedings{ahlers2019user,
  title={A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies},
  author={Ahlers, Volker and Hellmann, Bastian and Dreo Rodosek, Gabi},
  booktitle={2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)},
  volume={2},
  pages={668--673},
  year={2019},
  organization={IEEE}
}
[13] Nils Mäurer, Thomas Gräupl und Corinna Schmitt. Evaluation of the LDACS Cybersecurity Implementation. In Proc. IEEE 38th Digital Avionics Systems Conference (DASC), IEEE, September 2019. BibTeX
@inproceedings{maurer2019evaluation,
title={Evaluation of the LDACS Cybersecurity Implementation},
author={M{\"a}urer, Nils and Gr{\"a}upl, Thomas and Schmitt, Corinna},
booktitle={2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)},
pages={1--10},
year={2019},
organization={IEEE}
}
[14] Robert Müller, Corinna Schmitt, Daniel Kaiser und Marcel Waldvogel. HomeCA: Scalable Secure IoT Network Integration. In INFORMATIK 2019, Gesellschaft für Informatik e.V., September 2019. BibTeX
@article{muller2019homeca,
title={HomeCA: Scalable Secure IoT Network Integration},
author={M{\"u}ller, Robert and Schmitt, Corinna and Kaiser, Daniel and Waldvogel, Marcel},
year={2019},
booktitle={INFORMATIK 2019},
volume = {P-294},
pages = {167-180},
publisher={Gesellschaft f{\"u}r Informatik eV}
}
[15] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. AIMED: Evolving Malware with Genetic Programming to Evade Detection. In Proc. 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, August 2019. BibTeX
@inproceedings{castro2019aimed,
  title={AIMED: Evolving Malware with Genetic Programming to Evade Detection},
  author={Castro, Raphael Labaca and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
  pages={240--247},
  year={2019},
  organization={IEEE}
}
[16] Gabi Dreo Rodosek, Marcus Knüpfer, Daniela Pöhn und Volker Eiseler. Moving Target Defence - A New Paradigm in Cybersecurity. In Military Scientific Research Annual Report 2018, BMVg, Juni 2019. BibTeX
@article{dreo2019moving,
  title={Moving Target Defence - A New Paradigm in Cybersecurity},
  author={Dreo Rodosek, Gabi and Kn\"{u}pfer, Marcus and P\"{o}hn, Daniela and Eiseler, Volker},
  booktitle={Military Scientific Research Annual Report 2018},
  pages={72--73},
  year={2019},
  publisher={Bundesministerium der Verteidigung}
}
[17] Marcus Knüpfer und Gabi Dreo Rodosek. A Training Ground for Cyberspace - Recent Research Activities on the Subject of Cyber Ranges. In Military Scientific Research Annual Report 2018, BMVg, Juni 2019. BibTeX
@article{knuepfer2019training,
  title={A Training Ground for Cyberspace - Recent Research Activities on the Subject of Cyber Ranges},
  author={Kn\"{u}pfer, Marcus and Dreo Rodosek, Gabi},
  booktitle={Military Scientific Research Annual Report 2018},
  pages={68--69},
  year={2019},
  publisher={Bundesministerium der Verteidigung}
}
[18] Nils Rodday, Klement Streit und Gabi Dreo Rodosek. On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6. In Proc. International Symposium on Networks, Computers and Communications (ISNCC), IEEE, Juni 2019. BibTeX
@inproceedings{roddav2019usage,
  title={On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6},
  author={Roddav, Nils and Streit, Klement and Dreo Rodosek, Gabi and Pras, Aiko},
  booktitle={2019 International Symposium on Networks, Computers and Communications (ISNCC)},
  pages={1--6},
  year={2019},
  organization={IEEE}
}
[19] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Adaptive and Intelligible Prioritization for Network Security Incidents. In Proc. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, Juni 2019. BibTeX
@inproceedings{renners2019adaptive,
  title={Adaptive and Intelligible Prioritization for Network Security Incidents},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  booktitle={2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)},
  pages={1--8},
  year={2019},
  organization={IEEE}
}
[20] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Design and Evaluation of an Approach for Feedback-based Adaptation of Incident Prioritization. In Proc. 2nd International Conference on Data Intelligence and Security (ICDIS), IEEE, Juni 2019. BibTeX
@inproceedings{renners2019design,
  title={Design and Evaluation of an Approach for Feedback-based Adaptation of Incident Prioritization},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  booktitle={2019 2nd International Conference on Data Intelligence and Security (ICDIS)},
  pages={28--35},
  year={2019},
  organization={IEEE}
}
[21] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. Poster: Training GANs to Generate Adversarial Examples Against Malware Classification. In 40th IEEE Symposium on Security and Privacy, IEEE, Mai 2019. BibTeX
@inproceedings{labacacastroposter,
  title={Poster: Training GANs to Generate Adversarial Examples Against Malware Classification},
  author={Labaca Castro, Raphael and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={40th IEEE Symposium on Security and Privacy},
  year={2019},
  organization={IEEE}
}
[22] Nils Mäurer und Corinna Schmitt. Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis. In Proc. Integrated Communications, Navigation and Surveillance Conference (ICNS), IEEE, April 2019. BibTeX
@inproceedings{maurer2019towards,
  title={Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis},
  author={M{\"a}urer, Nils and Schmitt, Corinna},
  booktitle={2019 Integrated Communications, Navigation and Surveillance Conference (ICNS)},
  pages={1--13},
  year={2019},
  organization={IEEE}
}
[23] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. ARMED: How Automatic Malware Modifications Can Evade Static Detection? In Proc. 5th International Conference on Information Management (ICIM), IEEE, März 2019. BibTeX
@inproceedings{castro2019armed,
  title={ARMED: How Automatic Malware Modifications Can Evade Static Detection?},
  author={Labaca Castro, Raphael and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 5th International Conference on Information Management (ICIM)},
  pages={20--27},
  year={2019},
  organization={IEEE}
}

2018

[1] Tobias Guggemos, Klement Streit, Marcus Knüpfer, Nils gentschen Felde und Peter Hillmann. No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups. In Proc. International Conference for Internet Technology and Secured Transactions. Dezember 2018. BibTeX
@inproceedings{guggemos2018no,
title={No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups},
author={Guggemos, Tobias and Streit, Klement and Kn{\"u}pfer, Marcus and gentschen Felde, Nils and Hillmann, Peter},
booktitle={13th International Conference for Internet Technology and Secured Transactions},
pages={25--32}
}
[2] Nils Rodday, Klement Streit, Gabi Dreo Rodosek, Aiko Pras. Poster: An Empirical Study of DSCP and ECN Usage by Application in Internet Traffic Traces. In 14th International Conference on emerging Networking Experiments and Technologies (CoNEXT), ACM, Dezember 2018. BibTeX
@inproceedings{rodday2018poster,
title={Poster: An Empirical Study of DSCP and ECN Usage by Application in Internet Traffic Traces},
author={Rodday, Nils and Streit, Klement and Dreo Rodosek, Gabi and Pras, Aiko},
booktitle={14th International Conference on emerging Networking Experiments and Technologies (CoNEXT 2018)},
year={2018}
}
[3] Corinna Schmitt, Yves Steiner, Reinhard Herzog, Nicola Terrenghi und Burkhard Stiller. A 4-step Tool-Chain for IoT Business Model and Sustainability Recommendations. In IEEE Globecom Workshops 2018, IEEE, December 2018. BibTeX
@inproceedings{schmitt20184,
title={A 4-Step Tool-Chain for IoT Business Model and Sustainability Recommendations},
author={Schmitt, Corinna and Steiner, Yves and Herzog, Reinhard and Terrenghi, Nicola and Stiller, Burkhard},
booktitle={2018 IEEE Globecom Workshops (GC Wkshps)},
pages={1--6},
year={2018},
organization={IEEE}
}
[4] Matthias Schopp, Peter Hillmann und Gabi Dreo Rodosek. Agile Sniper Forensics for Advanced Attacks. In Proc. International Conference for Internet Technology and Secured Transactions. Dezember 2018 BibTeX
@inproceedings{schopp2018agile,
title={Agile Sniper Forensics for Advanced Attacks},
author={Schopp, Matthias and Hillmann, Peter and Dreo Rodosek, Gabi},
booktitle={13th International Conference for Internet Technology and Secured Transactions},
pages={161--163}
}
[5] Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary Wilczak, Marcel Antzek, Anna Sperotto und Aiko Pras. IoT-botnet detection and isolation by access routers. In Proc. 9th International Conference on the Network of the Future (NOF), IEEE, November 2018. BibTeX
@inproceedings{dietz2018iot,
title={IoT-botnet detection and isolation by access routers},
author={Dietz, Christian and Labaca Castro, Raphael and Steinberger, Jessica and Wilczak, Cezary and Antzek, Marcel and Sperotto, Anna and Pras, Aiko},
booktitle={2018 9th International Conference on the Network of the Future (NOF)},
pages={88--95},
year={2018},
organization={IEEE}
}
[6] Klement Streit, Nils Rodday, Gabi Dreo Rodosek. AODV-CBR: Capacity-based Path Discovery Algorithm for MANETs with High Utilization. In Proc. Advances in Wireless and Optical Communications (RTUWO), November 2018. BibTeX
@inproceedings{streit2018aodv,
title={Aodv-cbr: Capacity-based path discovery algorithm for manets with high utilization},
author={Streit, Klement and Rodday, Nils and Dreo Rodosek, Gabi},
booktitle={2018 Advances in Wireless and Optical Communications (RTUWO)},
pages={234--239},
year={2018},
organization={IEEE}
}
[7] Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn. A process framework for stakeholder-specific visualization of security metrics. In Proc. 13th International Conference on Availability, Reliability and Security (ARES), ACM, August 2018. BibTeX
@inproceedings{hanauer2018process,
title={A process framework for stakeholder-specific visualization of security metrics},
author={Hanauer, Tanja and Hommel, Wolfgang and Metzger, Stefan and P{\"o}hn, Daniela},
booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security},
pages={1--10},
year={2018}
}
[8] Raphael Labaca Castro and Gabi Dreo Rodosek. Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve Detection. In Proc. 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS), IFIP, Juni 2018. BibTeX
@inproceedings{labacacastro2018black,
title={Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve Detection},
author={Labaca Castro, Raphael and Dreo Rodosek, Gabi},
booktitle={12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018)},
pages={16--20},
year={2018},
publisher={IFIP}
}
[9] Nils Rodday, Aiko Pras and Gabi Dreo Rodosek. Towards European Network Sovereignty. In Proc. 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS), IFIP, Juni 2018. BibTeX
@inproceedings{rodday2018towards,
title={Towards European Network Sovereignty},
author={Rodday, Nils and Pras, Aiko and Dreo Rodosek, Gabi},
booktitle={12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018)},
year={2018},
publisher={IFIP}
}

 
[10] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization. In Proc. 1st International Conference on Data Intelligence and Security (ICDIS), IEEE, April 2018. BibTeX
@inproceedings{renners2018feedback,
title={A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization},
author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
booktitle={2018 1st International Conference on Data Intelligence and Security (ICDIS)},
pages={176--183},
year={2018},
organization={IEEE}
}
[11] Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras und Gabi Dreo Rodosek. DDoS Defense using MTD and SDN. In Proc. IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), IEEE, April 2018. BibTeX
@inproceedings{steinberger2018ddos,
title={DDoS Defense using MTD and SDN},
author={Steinberger, Jessica and Kuhnert, Benjamin and Dietz, Christian and Ball, Lisa and Sperotto, Anna and Baier, Harald and Pras, Aiko and Dreo Rodosek, Gabi},
booktitle={2018 IEEE/IFIP Network Operations and Management Symposium (NOMS 2018)},
pages={1--9},
year={2018},
organization={IEEE}
}
[12] Rick Hofstede, Aiko Pras, Anna Sperotto und Gabi Dreo Rodosek. Flow-based compromise detection: lessons learned. In IEEE Security & Privacy, 16(1), IEEE, Februar 2018. BibTeX
@article{hofstede2018flow,
title={Flow-based compromise detection: lessons learned},
author={Hofstede, Rick and Pras, Aiko and Sperotto, Anna and Dreo Rodosek, Gabi},
journal={IEEE security \& privacy},
volume={16},
number={1},
pages={82--89},
year={2018},
publisher={IEEE}
}