Publikationen

2024

[1]

Schneider, S., Steuber, F., Schneider J., Dreo G. 2024, January. How well can machine-generated texts be identified and can language models be trained to avoid identification? 57th Hawaii International Conference on System Sciences, HICSS 2024, Waikiki, Hawaii, USA, January 3-6, 2024 Accepted for publication.

[2]

Robin Buchta, Tobias Fritz, Carsten Kleiner, Felix Heine, Gabi Dreo Rodosek. May 2024. One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems, Paper accepted for publication @ Network Operations and Management Symposium, Workshop on Analytics for Network and Service Management (NOMS AnNet) 2024.

 

 

 

2023

[1]

Rodday, N., Dreo, G., 2023, October. BGPEval: Automating Large-Scale Testbed Creation. In 2023 19th International Conference on Network and Service Management (CNSM). IEEE. Accepted for publication.

[2]

Höger, N., Rodday, N., Borchert O., Dreo, G., 2023, October. Path Plausibility Algorithms in GoBGP. In 2023 19th International Conference on Network and Service Management (CNSM). IEEE. Accepted for publication.

[3]

Rodday, N., Cunha, I., Bush, R., Katz-Bassett, E., Rodosek, G.D., Schmidt, T.C. and Wählisch, M., 2023, October. The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects. In IEEE Transactions on Network and Service Management (TNSM). IEEE. Accepted for publication.

 

2022

[1] Klement Hagenhoff and Corinna Schmitt and Gabi Dreo Rodosek. RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs. In: Proc. MILCOM 2022 - 2021 IEEE Military Communications Conference MILCOM, November 2022.
[2] Klement Hagenhoff and Eike Viehmann and Gabi Dreo Rodosek. Time-sensitive Multi-Flow Routing in Highly Utilized MANETs. In: Proc. 18th International Conference on Network and Service Management (CNSM), October 2022.
@INPROCEEDINGS{Hagenhoff:Time,
author="Klement Hagenhoff and Eike Viehmann and Gabi {Dreo Rodosek}",
title="Time-sensitive {Multi-Flow} Routing in Highly Utilized {MANETs}",
booktitle="18th International Conference on Network and Service Management (CNSM)",
address="Thessaloniki, Greece",
days="30",
month=oct,
year=2022,
keywords="MANET; MIP; GP",
}
[3] P. H. Friedemann, N. Rodday, and G. D. Rodosek, Assessing the RPKI Validator Ecosystem. In: Proc. of the 13th International Conference on Ubiquitous and Future Networks (ICUFN). Barcelona, Spain: IEEE, July 2022, pp. 295–300.
[4]

Julius Hermelink, Silvan Streit, Emanuele Strieder, and Katharina Thieme, Adapting Belief Propagation to Counter Shuffling of NTTs. In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2023, 1 (Nov. 2022), 60–88. DOI:https://doi.org/10.46586/tches.v2023.i1.60-88.

[5]

Jan-Pieter D'AnversDaniel HeinzPeter PesslMichiel Van BeirendonckIngrid Verbauwhede:
Masked-Order Masked Ciphertext Comparison for Lattice-Based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 115-139 (2022)

[6] Daniel HeinzMatthias J. KannwischerGeorg LandThomas PöppelmannPeter SchwabeDaan Sprenkels:
First-Order Masked Kyber on ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2022: 58 (2022)
[7]

Christian Dietz, Marcel Antzek, Gabi Dreo, Aanna Sperotto, and Aiko Pras, DMEF: Dynamic Malware Evaluation Framework. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 2022, pp. 1-7, DOI: 10.1109/NOMS54207.2022.9789908.

[8]

N. Mäurer, T. Gräupl, C. Schmitt, G. Dreo Rodosek, and H. Reiser, Advancing the Security of LDACS. In IEEE Transactions on Network and Service Management, pages. 1-15, 2022.

 

2021

[1]
Julius Hermelink, Peter Pessl, and Thomas Pöppelmann. Fault-Enabled Chosen-Ciphertext Attacks on Kyber. In: Avishek Adhikari, Ralf Küsters, and Bart Preneel, editors, Progress in Cryptology - INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings, volume 13143 of Lecture Notes in Computer Science, pages 311–334. Springer, 2021.
[2] Raphael Labaca Castro, Sebastian Franz und Gabi Dreo Rodosek. AIMED-RL: Exploring Adversarial Malware Examples with Reinforcement Learning. In: Proc. Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, September 2021. BibTeX
@inproceedings{labaca2021aimed,
  title={AIMED-RL: Exploring Adversarial Malware Examples with Reinforcement Learning},
  author={Labaca Castro, Raphael and Franz, Sebastian and Dreo Rodosek, Gabi},
  booktitle={Joint European Conference on Machine Learning and Knowledge Discovery in Databases},
  pages={37--52},
  year={2021},
  organization={Springer}
}
[3] Nils Rodday, Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt und Matthias Wählisch. Revisiting RPKI Route Origin Validation on the Data Plane. In: Proc. Network Traffic Measurement and Analysis Conference (TMA), IFIP, September 2021. BibTeX
@inproceedings{rodday2021revisiting,
  title={Revisiting RPKI Route Origin Validation on the Data Plane},
  author={Rodday, Nils and Cunha, Italo and Bush, Randy and Katz-Bassett, Ethan and Dreo Rodosek, Gabi and Schmidt, Thomas C. and W{\"a}hlisch, Matthias},
  booktitle={Proc. of Network Traffic Measurement and Analysis Conference (TMA). IFIP.},
  year={2021}
}
[4] Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder und Christine van Vredendaal. Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), August 2021. BibTeX
@article{bhasin2021attacking,
  title={Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber},
  author={Hamburg, Mike and Hermelink, Julius and Primas, Robert and Samardjiska, Simona and Schamberger, Thomas and Streit, Silvan and Strieder, Emanuele and van Vredendaal, Christine},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  volume={2021},
  number={4},
  pages={88--113},
  year={2021}
}
[5] Nils Rodday, Lukas Kaltenbach, Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt und Matthias Wählisch. On the Deployment of Default Routes in Inter-domain Routing. In: Proc. ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet, ACM, August 2021. BibTeX
@inproceedings{rodday2021deployment,
  title={On the Deployment of Default Routes in Inter-domain Routing},
  author={Rodday, Nils and Kaltenbach, Lukas and Cunha, Italo and Bush, Randy and Katz-Bassett, Ethan and Dreo Rodosek, Gabi and Schmidt, Thomas C and W{\"a}hlisch, Matthias},
  booktitle={Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet},
  pages={14--20},
  year={2021},
  publisher = {Association for Computing Machinery}
}
[6] Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann und Michiel Van Beirendonck. Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(3), Juli 2021. BibTeX
@article{bhasin2021attacking,
  title={Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography},
  author={Bhasin, Shivam and D'Anvers, Jan-Pieter and Heinz, Daniel and P{\"o}ppelmann, Thomas and Van Beirendonck, Michiel},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  volume={2021},
  number={3},
  pages={334--359},
  year={2021}
}
[7] Nils Mäurer, Christoph Gentsch, Thomas Gräupl und Corinna Schmitt. Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS. In Proc. 18th International Conference on Security and Cryptography (SECRYPT 2021), Juli 2021. BibTeX
@inproceedings{maurer2021formal,
  title={Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS},
  author={M{\"a}urer, Nils and Gentsch, Christoph and Gr{\"a}upl, Thomas and Schmitt, Corinna},
  booktitle={18th International Conference on Security and Cryptography (SECRYPT 2021)},
  pages={603--610},
  year={2021}
}
[8] Tim Mittermeier, Matthias Frank, Sabine Ullrich, Gabi Dreo Rodosek und Michaela Geierhos. A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making. In Proc. 21st International Conference on Military Communications and Information Systems (ICMCIS), Mai 2021. BibTeX
@inproceedings{mittermeier2021multimodal,
  title={A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making},
  author={Mittermeier, Tim and Frank, Matthias and Ullrich, Sabine and Dreo Rodosek, Gabi and Geierhos, Michaels},
  booktitle={21st International Conference on Military Communications and Information Systems (ICMCIS)},
  pages={1--8},
  year={2021}
}
[9] Nils Mäurer, Thomas Gräupl, Corinna Schmitt und Gabi Dreo Rodosek. PMAKE: Physical Unclonable Function based Mutual Authentication Key Exchange scheme for Digital Aeronautical Communications. In Proc. 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021), Mai 2021. BibTeX
@inproceedings{maurer2021pmake,
  title={PMAKE: Physical Unclonable Function based Mutual Authentication Key Exchange scheme for Digital Aeronautical Communications},
  author={M{\"a}urer, Nils and Gr{\"a}upl, Thomas and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021},
  pages={},
  year={2021},
  organization={IEEE}
}
[10] Daniel Heinz und Thomas Pöppelmann. Combined Fault and DPA Protection for Lattice-Based Cryptography. Februar 2021. BibTeX
@article{heinz2021combined,
  title={Combined Fault and DPA Protection for Lattice-Based Cryptography},
  author={Heinz, Daniel and P{\"o}ppelmann, Thomas},
  journal={IACR Cryptol. ePrint Arch.},
  year={2021}
}
[11] Raphael Labaca Castro, Luis Muñoz-González, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi und Lorenzo Cavallaro. Universal Adversarial Perturbations for Malware. Februar 2021. BibTeX
@article{labaca2021universal,
  title={Universal Adversarial Perturbations for Malware},
  author={Labaca Castro, Raphael and Mu{\~n}oz-Gonz{\'a}lez, Luis and Pendlebury, Feargus and Dreo Rodosek, Gabi and Pierazzi, Fabio and Cavallaro, Lorenzo},
  journal={arXiv preprint arXiv:2102.06747},
  year={2021}
}

 

2020

[1] Gabi Dreo Rodosek, Volker Eiseler, Nils gentschen Felde, Wolfgang Gehrke, Udo Helmbrecht, Wolfgang Hommel und Julius Zahn. Europäische Digitale Souveränität: Weg zum Erfolg? - Ein Bericht zur Jahrestagung CODE 2020. In Zeitschrift für Außen- und Sicherheitspolitik, 13, Springer, Dezember 2020. BibTeX
@article{dreo2020europaeische,
  title={Improving Routing with Up-to-date and Full Topology Knowledge in MANETs},
  author={Dreo Rodosek, Gabi and Eiseler, Volker and gentschen Felde, Nils and Gehrke, Wolfgang and Helmbrecht, Udo and Hommel, Wolfgang and Zahn, Julius},
  journal={Zeitschrift f{\"u}r Au{\ss}en-und Sicherheitspolitik},
  volume={13}
  pages={399--404},
  year={2020},
  publisher={Springer}
}
[2] Klement Streit, Eike Viehmann, Florian Steuber und Gabi Dreo Rodosek. Improving Routing with Up-to-date and Full Topology Knowledge in MANETs. In Proc. Military Communications and Information Systems Conference (MilCIS), IEEE, Dezember 2020. BibTeX
@inproceedings{streit2020improving,
  title={Improving Routing with Up-to-date and Full Topology Knowledge in MANETs},
  author={Streit, Klement and Viehmann, Eike and Steuber, Florian and Dreo Rodosek, Gabi},
  booktitle={2020 Military Communications and Information Systems Conference (MilCIS)},
  pages={1–8},
  year={2020},
  organization={IEEE}
}
[3] Julius Hermelink, Thomas Pöppelmann, Marc Stöttinger, Yi Wang und Yong Wan. Quantum safe authenticated key exchange protocol for automotive application. In Proc. 18th escar Europe Conference, November 2020. BibTeX
@incollection{Hermelink2020quantum,
  author={Julius Hermelink and Thomas P{\"o}ppelmann and Marc St{\"o}ttinger and Yi Wang and Yong Wan},
  title={Quantum safe authenticated key exchange protocol for automotive application},
  booktitle={18th escar Europe Conference},
  year={2020}
}
[4] Richard Poschinger, Nils Rodday, Raphael Labaca Castro und Gabi Dreo Rodosek. OpenMTD: A Framework for Efficient Network-Level MTD Evaluation. In Proc. ACM SIGSAC Conference on Computer and Communications Security, ACM, November 2020. BibTeX
@inproceedings{poschinger2020openmtd,
  title={OpenMTD: A Framework for Efficient Network-Level MTD Evaluation},
  author={Poschinger, Richard and Rodday, Nils and Labaca Castro, Raphael and Dreo Rodosek, Gabi},
  booktitle={Proceedings of the 7th ACM Workshop on Moving Target Defense},
  pages={31–41},
  year={2020},
  publisher={Association for Computing Machinery}
}
[5] Peter Hillmann, Marcus Knüpfer, Erik Heiland und Andreas Karcher. Selective Deletion in a Blockchain. In Proc. IEEE 40th International Conference on Distributed Computing Systems (ICDCS), IEEE, November 2020. BibTeX
@inproceedings{hillmann2020selective,
  title={Selective Deletion in a Blockchain},
  author={Hillmann, Peter and Kn{\"u}pfer, Marcus and Heiland, Erik and Karcher, Andreas},
  booktitle={Proceedings of the 40th IEEE International Conference on Distributed Computing Systems (ICDCS)},
  pages={1249–1256},
  year={2020},
  organization={IEEE}
}
[6] Nils Rodday, Ruben van Baaren, Luuk Hendriks, Roland van Rijswijk-Deij, Aiko Pras und Gabi Dreo Rodosek. Poster: Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies. In Proc. 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), ACM, November 2020. BibTeX
@inproceedings{rodday2020poster,
  title={Poster: Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies},
  author={Rodday, Nils and van Baaren, Ruben and Hendriks, Luuk and van Rijswijk-Deij, Roland and Pras, Aiko and Dreo, Gabi},
  booktitle={Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies},
  pages={530--531},
  year={2020},
  publisher={Association for Computing Machinery}
}
[7] Klement Streit und Gabi Dreo Rodosek. CeTUP: Controller-equipped Topology Update Process for Tactical Ad-Hoc Networks. In Proc. 17th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, November 2020. BibTeX
@inproceedings{streit2020cetup,
  title={CeTUP: Controller-Equipped Topology Update Process for Tactical Ad-Hoc Networks},
  author={Streit, Klement and Dreo Rodosek, Gabi},
  booktitle={Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks},
  pages={57–66},
  year={2020},
  publisher={Association for Computing Machinery}
}
[8] Cora Perner, Corinna Schmitt und Georg Carle. Dynamic Network Reconfiguration in Safety-Critical Aeronautical Systems. In Proc. 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. BibTeX
@inproceedings{perner2020dynamic,
  title={Dynamic Network Reconfiguration in Safety-Critical Aeronautical Systems},
  author={C. {Perner} and C. {Schmitt} and G. {Carle}},
  booktitle={2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC)}, 
  pages={1-8},
  year={2020},
  organization={IEEE}
}
[9] Cora Perner und Corinna Schmitt. Security Concept for Unoccupied Aerial Systems. In Proc. 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. BibTeX
@inproceedings{perner2020security,
  title={Security Concept for Unoccupied Aerial Systems},
  author={C. {Perner} and C. {Schmitt}},
  booktitle={2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC)}, 
  pages={1-8},
  year={2020},
  organization={IEEE}
}
[10] Nils Mäurer, Thomas Gräupl und Corinna Schmitt. Comparing different Diffie-Hellman Key Exchange Flavors for LDACS. In Proc. 39th Digital Avionics Systems Conference (DASC), IEEE, Oktober 2020. BibTeX
@inproceedings{maurer2020comparing,
  title={Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS},
  author={N. {Mäurer} and T. {Gräupl} and C. {Gentsch} and C. {Schmitt}},
  booktitle={2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC)},
  pages={1-10},
  year={2020},
  organization={IEEE}
}
[11] Marcus Knüpfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp, Sebastian Seeber, Daniela Pöhn und Peter Hillmann. Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. In Proc. 2nd Model-driven Simulation and Training Environments for Cybersecurity (MSTEC), September 2020. BibTeX
@inproceedings{knupfer2020cyber,
  title={Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems},
  author={Kn{\"u}pfer, Marcus and Bierwirth, Tore and Stiemert, Lars and Schopp, Matthias and Seeber, Sebastian and P{\"o}hn, Daniela and Hillmann, Peter},
  booktitle={2nd Workshop on Model-driven Simulation and Training Environments for Cybersecurity (MSTEC)},
  pages={3-21},
  year={2020},
  publisher={Springer International Publishing}
}
[12] Daniela Pöhn und Wolfgang Hommel. IMC: A Classification of Identity Management Approaches. In Proc. European Symposium on Research in Computer Security (ESORICS), September 2020. BibTeX
@inproceedings{poehn2020imc,
  title={IMC: A Classification of Identity Management Approaches},
  author={P{\"o}hn, Daniela and Hommel, Wolfgang},
  booktitle={European Symposium on Research in Computer Security},
  pages={3-20},
  year={2020},
  publisher={Springer}
}
[13] Klement Streit, Corinna Schmitt und Carlo Giannelli. SDN-based regulated flow routing in MANETs. In Proc. 6th IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, September 2020. BibTeX
@inproceedings{streit2020sdnbased,
  title={SDN-Based Regulated Flow Routing in MANETs},
  author={K. {Streit} and C. {Schmitt} and C. {Giannelli}},
  booktitle={2020 IEEE International Conference on Smart Computing (SMARTCOMP)},   
  pages={73-80},
  year={2020},
  organization={IEEE}
}
[14] Daniela Pöhn und Wolfgang Hommel. An overview of limitations and approaches in identity management. In Proc. 15th International Conference on Availability, Reliability and Security (ARES), ACM, August 2020. BibTeX
@inproceedings{pohn2020overview,
  title={An overview of limitations and approaches in identity management},
  author={P{\"o}hn, Daniela and Hommel, Wolfgang},
  booktitle={Proceedings of the 15th International Conference on Availability, Reliability and Security},
  pages={1--10},
  year={2020},
  publisher = {Association for Computing Machinery}
}
[15] Florian Steuber, Mirco Schoenfeld und Gabi Dreo Rodosek. Topic Modeling of Short Texts Using Anchor Words. In Proc. International Conference on Web Intelligence, Mining and Semantics (WIMS’20), ACM, Juli 2020. BibTeX
@inproceedings{steuber2020topic,
  title={Topic Modeling of Short Texts Using Anchor Words},
  author={Steuber, Florian and Schoenfeld, Mirco and Dreo Rodosek, Gabi},
  booktitle={Proceedings of the 10th International Conference on Web Intelligence, Mining and Semantics (WIMS’20)},
  pages={210--219},
  year={2020},
  publisher={Association for Computing Machinery}
}
[16] Christian Dietz, Gabi Dreo Rodosek, Anna Sperotto und Aiko Pras. Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. In Proc. Network Operations and Management Symposium (NOMS), IEEE, April 2020. BibTeX
@inproceedings{dietz2020towards,
  title={Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD},
  author={Dietz, Christian and Dreo Rodosek, Gabi and Sperotto, Anna and Pras, Aiko},
  booktitle={NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium},
  pages={1--5},
  year={2020},
  organization={IEEE}
}
[17] Mattijs Jonker und Nils Rodday. Tutorial: Reliable measurements with BGP and RPKI. In Network Operations and Management Symposium (NOMS), IEEE, April 2020.

2019

[1] Peter Hillmann, Marcus Knüpfer, Tobias Guggemos und Klement Streit. CAKE: An Efficient Group Key Management for Dynamic Groups. In INFOCOMP Journal of Computer Science, 18(2), INFOCOMP, Dezember 2019. BibTeX
@article{hillmann2019cake,
  title={CAKE: An Efficient Group Key Management for Dynamic Groups},
  author={Hillmann, Peter and Kn{\"u}pfer, Marcus and Guggemos, Tobias and Streit, Klement}
  journal={Journal of Computer Science},
  volume={18},
  number={2},
  pages={1--13},
  year={2019},
  organization={INFOCOMP}
}
[2] Pawani Porambage, An Braeken und Corinna Schmitt. Public Key Based Protocols - EC Crypto. In IoT Security: Advances in Authentication, Wiley Online Library, Dezember 2019. BibTeX
@article{porambage2019public,
  title={Public Key Based Protocols--EC Crypto},
  author={Porambage, Pawani and Braeken, An and Schmitt, Corinna},
  journal={IoT Security: Advances in Authentication},
  pages={85--99},
  year={2019},
  publisher={Wiley Online Library}
}
[3] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. In International Journal on Cyber Situational Awareness, 4(1), Dezember 2019. BibTeX
@article{renners2019concept,
  title={Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  journal={International Journal Cyber Security Awareness},
  volume={4},
  number={1},
  pages={99--127},
  year={2019}
}
[4] Corinna Schmitt, Dominik Bünzli und Burkhard Stiller. WebMaDa 2.1 - A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel. In IoT Security: Advances in Authentication, Wiley Online Library, Dezember 2019. BibTeX
@article{schmitt2019webmada,
  title={WebMaDa 2.1--A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel},
  author={Schmitt, Corinna and B{\"u}nzli, Dominik and Stiller, Burkhard},
  journal={IoT Security: Advances in Authentication},
  pages={159--184},
  year={2019},
  publisher={Wiley Online Library}
}
[5] Thomas Gräupl, Nils Mäurer und Corinna Schmitt. FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2. In Proc. 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, November 2019. BibTeX
@inproceedings{graupl2019facts2,
  title={FACTS2: Framework for Aeronautical Communications and Traffic Simulations 2},
  author={Gr{\"a}upl, Thomas and M{\"a}urer, Nils and Schmitt, Corinna},
  booktitle={Proceedings of the 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, \& Ubiquitous Networks},
  pages={63--66},
  year={2019},
  publisher={Association for Computing Machinery}
}
[6] Raphael Labaca Castro, Battista Biggio und Gabi Dreo Rodosek. Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. In Proc. ACM SIGSAC Conference on Computer and Communications Security, ACM, November 2019. BibTeX
@inproceedings{labaca2019poster,
  title={Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality},
  author={Labaca Castro, Raphael and Biggio, Battista and Dreo Rodosek, Gabi},
  booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
  pages={2565--2567},
  year={2019},
  publisher={Association for Computing Machinery}
}
[7] Nils Mäurer, Thomas Gräupl, C. Schmitt. Demo: FACTS2 - Framework for Aeronautical Communications and Traffic Simulation 2. In 22nd ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM, November 2019.
[8] Nils Rodday, Raphael Labaca Castro, Klement Streit und Gabi Dreo Rodosek. Evaluating TCP Connection Healthiness. In Proc. International Telecommunication Networks and Applications Conference (ITNAC), IEEE, November 2019. BibTeX
@inproceedings{rodday2019evaluating,
  title={Evaluating TCP Connection Healthiness},
  author={Rodday, Nils and Castro, Raphael Labaca and Streit, Klement and Dreo Rodosek, Gabi},
  booktitle={2019 29th International Telecommunication Networks and Applications Conference (ITNAC)},
  pages={1--4},
  year={2019},
  organization={IEEE}
}
[9] Klement Streit, Raphael Labaca Castro, Nils Rodday und Gabi Dreo Rodosek. Topology Update Algorithm for Wireless Networks. In Proc. 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), IEEE, November 2019. BibTeX
@inproceedings{streit2019topology,
  title={Topology Update Algorithm for Wireless Networks},
  author={Streit, Klement and Castro, Raphael Labaca and Rodday, Nils and Dreo Rodosek, Gabi},
  booktitle={2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)},
  pages={184--185},
  year={2019},
  organization={IEEE}
}
[10] Nils Rodday, Randy Bush, Italo Cunha, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt und Matthias Wählisch. Poster: Extending RPKI ROV Measurement Coverage, In Internet Measurement Conference (IMC), ACM, Oktober 2019. BibTeX
@inproceedings{rodday2019poster,
  title={Poster: Extending RPKI ROV Measurement Coverage},
  author={Rodday, Nils and Bush, Randy and Cunha, Italo and Katz-Bassett, Ethan and Dreo Rodosek, Gabi and Schmidt, Thomas C. and W\"{a}hlisch, Matthias},
  booktitle={Internet Measurement Conference 2019},
  year={2019}
}
[11] Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt und Gabi Dreo Rodosek. Wireless SDN for highly utilized MANETs. In Proc. International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Oktober 2019. BibTeX
@inproceedings{streit2019wireless,
  title={Wireless SDN for highly utilized MANETs},
  author={Streit, Klement and Rodday, Nils and Steuber, Florian and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)},
  pages={226--234},
  year={2019},
  organization={IEEE}
}
[12] Volker Ahlers, Bastian Hellmann und Gabi Dreo Rodosek. A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies. In Proc. 10th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, September 2019. BibTeX
@inproceedings{ahlers2019user,
  title={A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies},
  author={Ahlers, Volker and Hellmann, Bastian and Dreo Rodosek, Gabi},
  booktitle={2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)},
  volume={2},
  pages={668--673},
  year={2019},
  organization={IEEE}
}
[13] Nils Mäurer, Thomas Gräupl und Corinna Schmitt. Evaluation of the LDACS Cybersecurity Implementation. In Proc. IEEE 38th Digital Avionics Systems Conference (DASC), IEEE, September 2019. BibTeX
@inproceedings{maurer2019evaluation,
  title={Evaluation of the LDACS Cybersecurity Implementation},
  author={M{\"a}urer, Nils and Gr{\"a}upl, Thomas and Schmitt, Corinna},
  booktitle={2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)},
  pages={1--10},
  year={2019},
  organization={IEEE}
}
[14] Robert Müller, Corinna Schmitt, Daniel Kaiser und Marcel Waldvogel. HomeCA: Scalable Secure IoT Network Integration. In INFORMATIK 2019, Gesellschaft für Informatik e.V., September 2019. BibTeX
@article{muller2019homeca,
  title={HomeCA: Scalable Secure IoT Network Integration},
  author={M{\"u}ller, Robert and Schmitt, Corinna and Kaiser, Daniel and Waldvogel, Marcel},
  year={2019},
  booktitle={INFORMATIK 2019},
  volume = {P-294},
  pages = {167-180},
  publisher={Gesellschaft f{\"u}r Informatik e.V.}
}
[15] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. AIMED: Evolving Malware with Genetic Programming to Evade Detection. In Proc. 18th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, August 2019. BibTeX
@inproceedings{castro2019aimed,
  title={AIMED: Evolving Malware with Genetic Programming to Evade Detection},
  author={Castro, Raphael Labaca and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
  pages={240--247},
  year={2019},
  organization={IEEE}
}
[16] Gabi Dreo Rodosek, Marcus Knüpfer, Daniela Pöhn und Volker Eiseler. Moving Target Defence - A New Paradigm in Cybersecurity. In Military Scientific Research Annual Report 2018, BMVg, Juni 2019. BibTeX
@article{dreo2019moving,
  title={Moving Target Defence - A New Paradigm in Cybersecurity},
  author={Dreo Rodosek, Gabi and Kn{\"u}pfer, Marcus and P{\"o}hn, Daniela and Eiseler, Volker},
  booktitle={Military Scientific Research Annual Report 2018},
  pages={72--73},
  year={2019},
  publisher={Bundesministerium der Verteidigung}
}
[17] Marcus Knüpfer und Gabi Dreo Rodosek. A Training Ground for Cyberspace - Recent Research Activities on the Subject of Cyber Ranges. In Military Scientific Research Annual Report 2018, BMVg, Juni 2019. BibTeX
@article{knuepfer2019training,
  title={A Training Ground for Cyberspace - Recent Research Activities on the Subject of Cyber Ranges},
  author={Kn{\"u}pfer, Marcus and Dreo Rodosek, Gabi},
  booktitle={Military Scientific Research Annual Report 2018},
  pages={68--69},
  year={2019},
  publisher={Bundesministerium der Verteidigung}
}
[18] Nils Rodday, Klement Streit und Gabi Dreo Rodosek. On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6. In Proc. International Symposium on Networks, Computers and Communications (ISNCC), IEEE, Juni 2019. BibTeX
@inproceedings{roddav2019usage,
  title={On the Usage of DSCP and ECN codepoints in internet backbone traffic traces for IPv4 and IPv6},
  author={Roddav, Nils and Streit, Klement and Dreo Rodosek, Gabi and Pras, Aiko},
  booktitle={2019 International Symposium on Networks, Computers and Communications (ISNCC)},
  pages={1--6},
  year={2019},
  organization={IEEE}
}
[19] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Adaptive and Intelligible Prioritization for Network Security Incidents. In Proc. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), IEEE, Juni 2019. BibTeX
@inproceedings{renners2019adaptive,
  title={Adaptive and Intelligible Prioritization for Network Security Incidents},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  booktitle={2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)},
  pages={1--8},
  year={2019},
  organization={IEEE}
}
[20] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. Design and Evaluation of an Approach for Feedback-based Adaptation of Incident Prioritization. In Proc. 2nd International Conference on Data Intelligence and Security (ICDIS), IEEE, Juni 2019. BibTeX
@inproceedings{renners2019design,
  title={Design and Evaluation of an Approach for Feedback-based Adaptation of Incident Prioritization},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  booktitle={2019 2nd International Conference on Data Intelligence and Security (ICDIS)},
  pages={28--35},
  year={2019},
  organization={IEEE}
}
[21] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. Poster: Training GANs to Generate Adversarial Examples Against Malware Classification. In 40th IEEE Symposium on Security and Privacy, IEEE, Mai 2019. BibTeX
@inproceedings{labacacastroposter,
  title={Poster: Training GANs to Generate Adversarial Examples Against Malware Classification},
  author={Labaca Castro, Raphael and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={40th IEEE Symposium on Security and Privacy},
  year={2019},
  organization={IEEE}
}
[22] Nils Mäurer und Corinna Schmitt. Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis. In Proc. Integrated Communications, Navigation and Surveillance Conference (ICNS), IEEE, April 2019. BibTeX
@inproceedings{maurer2019towards,
  title={Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis},
  author={M{\"a}urer, Nils and Schmitt, Corinna},
  booktitle={2019 Integrated Communications, Navigation and Surveillance Conference (ICNS)},
  pages={1--13},
  year={2019},
  organization={IEEE}
}
[23] Raphael Labaca Castro, Corinna Schmitt und Gabi Dreo Rodosek. ARMED: How Automatic Malware Modifications Can Evade Static Detection? In Proc. 5th International Conference on Information Management (ICIM), IEEE, März 2019. BibTeX
@inproceedings{castro2019armed,
  title={ARMED: How Automatic Malware Modifications Can Evade Static Detection?},
  author={Labaca Castro, Raphael and Schmitt, Corinna and Dreo Rodosek, Gabi},
  booktitle={2019 5th International Conference on Information Management (ICIM)},
  pages={20--27},
  year={2019},
  organization={IEEE}
}

2018

[1] Tobias Guggemos, Klement Streit, Marcus Knüpfer, Nils gentschen Felde und Peter Hillmann. No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups. In Proc. International Conference for Internet Technology and Secured Transactions. Dezember 2018. BibTeX
@inproceedings{guggemos2018no,
  title={No Cookies, just CAKE: CRT based Key Hierarchy for Efficient Key Management in Dynamic Groups},
  author={Guggemos, Tobias and Streit, Klement and Kn{\"u}pfer, Marcus and gentschen Felde, Nils and Hillmann, Peter},
  booktitle={13th International Conference for Internet Technology and Secured Transactions},
  pages={25--32},
  year={2018}
}
[2] Nils Rodday, Klement Streit, Gabi Dreo Rodosek, Aiko Pras. Poster: An Empirical Study of DSCP and ECN Usage by Application in Internet Traffic Traces. In 14th International Conference on emerging Networking Experiments and Technologies (CoNEXT), ACM, Dezember 2018. BibTeX
@inproceedings{rodday2018poster,
  title={Poster: An Empirical Study of DSCP and ECN Usage by Application in Internet Traffic Traces},
  author={Rodday, Nils and Streit, Klement and Dreo Rodosek, Gabi and Pras, Aiko},
  booktitle={14th International Conference on emerging Networking Experiments and Technologies (CoNEXT 2018)},
  year={2018}, 
  publisher={Association for Computing Machinery}
}
[3] Corinna Schmitt, Yves Steiner, Reinhard Herzog, Nicola Terrenghi und Burkhard Stiller. A 4-step Tool-Chain for IoT Business Model and Sustainability Recommendations. In IEEE Globecom Workshops 2018, IEEE, December 2018. BibTeX
@inproceedings{schmitt20184,
  title={A 4-Step Tool-Chain for IoT Business Model and Sustainability Recommendations},
  author={Schmitt, Corinna and Steiner, Yves and Herzog, Reinhard and Terrenghi, Nicola and Stiller, Burkhard},
  booktitle={2018 IEEE Globecom Workshops (GC Wkshps)},
  pages={1--6},
  year={2018},
  organization={IEEE}
}
[4] Matthias Schopp, Peter Hillmann und Gabi Dreo Rodosek. Agile Sniper Forensics for Advanced Attacks. In Proc. International Conference for Internet Technology and Secured Transactions. Dezember 2018 BibTeX
@inproceedings{schopp2018agile,
  title={Agile Sniper Forensics for Advanced Attacks},
  author={Schopp, Matthias and Hillmann, Peter and Dreo Rodosek, Gabi},
  booktitle={13th International Conference for Internet Technology and Secured Transactions},
  pages={161--163},
  year={2018}
}
[5] Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary Wilczak, Marcel Antzek, Anna Sperotto und Aiko Pras. IoT-botnet detection and isolation by access routers. In Proc. 9th International Conference on the Network of the Future (NOF), IEEE, November 2018. BibTeX
@inproceedings{dietz2018iot,
  title={IoT-botnet detection and isolation by access routers},
  author={Dietz, Christian and Labaca Castro, Raphael and Steinberger, Jessica and Wilczak, Cezary and Antzek, Marcel and Sperotto, Anna and Pras, Aiko},
  booktitle={2018 9th International Conference on the Network of the Future (NOF)},
  pages={88--95},
  year={2018},
  organization={IEEE}
}
[6] Klement Streit, Nils Rodday, Gabi Dreo Rodosek. AODV-CBR: Capacity-based Path Discovery Algorithm for MANETs with High Utilization. In Proc. Advances in Wireless and Optical Communications (RTUWO), November 2018. BibTeX
@inproceedings{streit2018aodv,
  title={Aodv-cbr: Capacity-based path discovery algorithm for manets with high utilization},
  author={Streit, Klement and Rodday, Nils and Dreo Rodosek, Gabi},
  booktitle={2018 Advances in Wireless and Optical Communications (RTUWO)},
  pages={234--239},
  year={2018},
  organization={IEEE}
}
[7] Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn. A process framework for stakeholder-specific visualization of security metrics. In Proc. 13th International Conference on Availability, Reliability and Security (ARES), ACM, August 2018. BibTeX
@inproceedings{hanauer2018process,
  title={A process framework for stakeholder-specific visualization of security metrics},
  author={Hanauer, Tanja and Hommel, Wolfgang and Metzger, Stefan and P{\"o}hn, Daniela},
  booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security},
  pages={1--10},
  year={2018}, 
  publisher={Association for Computing Machinery}
}
[8] Raphael Labaca Castro and Gabi Dreo Rodosek. Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve Detection. In Proc. 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS), IFIP, Juni 2018. BibTeX
@inproceedings{labacacastro2018black,
  title={Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve Detection},
  author={Labaca Castro, Raphael and Dreo Rodosek, Gabi},
  booktitle={12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018)},
  pages={16--20},
  year={2018},
  publisher={IFIP}
}
[9] Nils Rodday, Aiko Pras and Gabi Dreo Rodosek. Towards European Network Sovereignty. In Proc. 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS), IFIP, Juni 2018. BibTeX
@inproceedings{rodday2018towards,
  title={Towards European Network Sovereignty},
  author={Rodday, Nils and Pras, Aiko and Dreo Rodosek, Gabi},
  booktitle={12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018)},
  year={2018},
  publisher={IFIP}
}

 
[10] Leonard Renners, Felix Heine, Carsten Kleiner und Gabi Dreo Rodosek. A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization. In Proc. 1st International Conference on Data Intelligence and Security (ICDIS), IEEE, April 2018. BibTeX
@inproceedings{renners2018feedback,
  title={A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization},
  author={Renners, Leonard and Heine, Felix and Kleiner, Carsten and Dreo Rodosek, Gabi},
  booktitle={2018 1st International Conference on Data Intelligence and Security (ICDIS)},
  pages={176--183},
  year={2018},
  organization={IEEE}
}
[11] Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras und Gabi Dreo Rodosek. DDoS Defense using MTD and SDN. In Proc. IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), IEEE, April 2018. BibTeX
@inproceedings{steinberger2018ddos,
  title={DDoS Defense using MTD and SDN},
  author={Steinberger, Jessica and Kuhnert, Benjamin and Dietz, Christian and Ball, Lisa and Sperotto, Anna and Baier, Harald and Pras, Aiko and Dreo Rodosek, Gabi},
  booktitle={2018 IEEE/IFIP Network Operations and Management Symposium (NOMS 2018)},
  pages={1--9},
  year={2018},
  organization={IEEE}
}
[12] Rick Hofstede, Aiko Pras, Anna Sperotto und Gabi Dreo Rodosek. Flow-based compromise detection: lessons learned. In IEEE Security & Privacy, 16(1), IEEE, Februar 2018. BibTeX
@article{hofstede2018flow,
  title={Flow-based compromise detection: lessons learned},
  author={Hofstede, Rick and Pras, Aiko and Sperotto, Anna and Dreo Rodosek, Gabi},
  journal={IEEE security \& privacy},
  volume={16},
  number={1},
  pages={82--89},
  year={2018},
  publisher={IEEE}
}

2017

[1] Dennis Kergl, Robert Rödler und Gabi Dreo Rodosek. Poster: VulMap: Global information security vulnerabilities. In Proc. IEEE Conference on Communications and Network Security (CNS), IEEE, Oktober 2017. BibTeX
@inproceedings{kergl2017poster,  
  title={Poster: VulMap: Global information security vulnerabilities},  
  author={Kergl, Dennis and R{\"o}edler, Robert and Dreo Rodosek, Gabi}, 
  booktitle = {IEEE Conference on Communications and Network Security (CNS)},
  pages={362--363},  
  year={2017}, 
  organization={IEEE}
}
[2] Bastian Hellmann, Volker Ahlers und Gabi Dreo Rodosek. Integrating visual analysis of network security and management of detection system configurations. In Proc. 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, September 2017. BibTeX
@inproceedings{hellmann2017integrating,  
  title={Content driven profile matching across online social networks},  
  author={Hellmann, Bastian and Ahlers, Volker and Dreo Rodosek, Gabi}, 
  booktitle = {9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)},
  pages={1020--1025},  
  year={2017}, 
  organization={IEEE}
}
[3] Peter Hillmann, Bastian Kühnel, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. Optimized travel to meetings on a common location of geographical distributed participants. In Proc. IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), IEEE, September 2017. BibTeX
@inproceedings{hillmann2017optimized,  
  title={Optimized travel to meetings on a common location of geographical distributed participants},  
  author={Hillmann, Peter and K{\"u}hnel, Bastian and Uhlig, Tobias and Dreo Rodosek, Gabi and Rose, Oliver}, 
  booktitle = {IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)},
  pages={139--143},  
  year={2017}, 
  organization={IEEE}
}
[4] Ralf Kaschow, Oliver Hanka, Marcus Knüpfer und Volker Eiseler. Cyber Range: Netzverteidigung trainieren mittels Simulation. In Proc. DACH Security Conference, September 2017. BibTeX
@inproceedings{kaschow2017cyber,  
  title={Cyber Range: Netzverteidigung trainieren mittels Simulation},  
  author={Kaschow, Ralf and Hanka, Oliver and Kn{\"u}pfer, Marcus and Eiseler, Volker}, 
  booktitle = {DACH Security Conference},
  pages={126--137},  
  year={2017}, 
  organization={syssec}
}
[5] Leonard Renners, Felix Heine und Gabi Dreo Rodosek. Modeling and learning incident prioritization. In Proc. 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, September 2017. BibTeX
@inproceedings{renners2017modeling,  
  title={Modeling and learning incident prioritization},  
  author={Renners, Leonard and Heine, Felix and Dreo Rodosek, Gabi}, 
  booktitle = {9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)},
  pages={398--403},  
  year={2017}, 
  organization={IEEE}
}
[6] Robert Rödler, Dennis Kergl und Gabi Dreo Rodosek. Content Driven Profile Matching across Online Social Networks. In Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ACM, Juli 2017. BibTeX
@inproceedings{roedler2017content,  
  title={Content driven profile matching across online social networks},  
  author={R{\"o}dler, Robert and Kergl, Dennis and Dreo Rodosek, Gabi}, 
  booktitle = {Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining},
  pages={1049--1055},  
  year={2017}, 
  publisher={Association for Computing Machinery}
}
[7] Dennis Kergl, Robert Rödler und Gabi Dreo Rodosek. Towards Internet Scale Quality-of-Experience Measurement with Twitter. In Proc. IFIP International Conference on Autonomous Infrastructure, Management and Security, Juni 2017. BibTeX
@inproceedings{kergl2017towards,  
  title={Towards Internet Scale Quality-of-Experience Measurement with Twitter},  
  author={Kergl, Dennis and R{\"o}edler, Robert and Dreo Rodosek, Gabi}, 
  booktitle = {IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)},
  pages={108--122},  
  year={2017}, 
  organization={Springer}
}
[8] Mario Golling, Robert Koch und Gabi Dreo Rodosek. On the Perception of Risk Assessment in Intrusion Detection Systems. In 10. DFN-Forum Kommunikationstechnologien, Mai 2017. BibTeX
@inproceedings{golling2017perception,  
  title={On the Perception of Risk Assessment in Intrusion Detection Systems},  
  author={Golling, Mario and Koch, Robert and Dreo Rodosek, Gabi}, 
  booktitle = {10. DFN-Forum Kommunikationstechnologien},
  pages={21--30},  
  year={2017}, 
  publisher={Gesellschaft f{\"u}r Informatik e.V.}
}
[9] Peter Hillmann, Marcus Knüpfer und Gabi Dreo Rodosek. CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren. In 10. DFN-Forum Kommunikationstechnologien, Mai 2017. BibTeX
@inproceedings{hillmann2017cake,  
  title={CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren},  
  author={Hillmann, Peter and Kn{\"u}pfer, Marcus and Dreo Rodosek, Gabi}, 
  booktitle = {10. DFN-Forum Kommunikationstechnologien},
  pages={31--40},  
  year={2017}, 
  publisher={Gesellschaft f{\"u}r Informatik e.V.}
}
[10] Volker Eiseler, Robert Koch und Gabi Dreo Rodosek. System complexity meets decision makers: A framework for level-appropriate information processing. In Proc. 12th International Conference on Cyber Warfare and Security, März 2017. BibTeX
@inproceedings{eiseler2017system,  
  title={System complexity meets decision makers: A framework for level-appropriate information processing},  
  author={Eiseler, Volker and Koch, Robert and Dreo Rodosek, Gabi}, 
  booktitle = {Proceedings of the 12th International Conference on Cyber Warfare and Security},
  pages={427--431},  
  year={2017}, 
  organization={ACPI}
}

2016

[1] Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. Simulation and optimization of content delivery networks considering user profiles and preferences of internet service providers. In Proc. Winter simulation conference (WSC), Dezember 2016. BibTeX
@inproceedings{hillmann2016simulation,
  title={Simulation and optimization of content delivery networks considering user profiles and preferences of internet service providers},
  author={Hillmann, Peter and Uhlig, Tobias and Rodosek, Gabi Dreo and Rose, Oliver},
  booktitle={2016 Winter simulation conference (WSC)},
  pages={3143--3154},
  year={2016},
  organization={IEEE}
}
[2] Robert Koch, Teo Kühn, Marcel Odenwald und Gabi Dreo Rodosek. Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). In Proc. 14th Annual Conference on Privacy, Security and Trust (PST), Dezember 2016. BibTeX
@inproceedings{koch2016wattson,
  title={Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)},
  author={Koch, Robert and K{\"u}hn, Teo and Odenwald, Marcel and Dreo Rodosek, Gabi},
  booktitle={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
  pages={170--177},
  year={2016},
  organization={IEEE}
}
[3] Robert Koch, Mario Golling, Lars Stiemert und Gabi Dreo Rodosek. Using geolocation for the strategic preincident preparation of an it forensics analysis. In IEEE Systems Journal, 10(4), IEEE, Dezember 2016. BibTeX
@article{koch2016using,
  title={Using geolocation for the strategic preincident preparation of an it forensics analysis},
  author={Koch, Robert and Golling, Mario and Stiemert, Lars and Rodosek, Gabi Dreo},
  journal={IEEE Systems Journal},
  volume={10},
  number={4},
  pages={1338--1349},
  year={2016},
  publisher={IEEE}
}
[4] Tobias Uhlig, Peter Hillmann und Oliver Rose. Evaluation of the General Applicability of Dragoon for the k-Center Problem. In Proc. Winter simulation conference (WSC), Dezember 2016. BibTeX
@inproceedings{uhlig2016evaluation,
  title={Evaluation of the General Applicability of Dragoon for the k-Center Problem},
  author={Uhlig, Tobias and Hillmann, Peter and Rose, Oliver},
  booktitle={2016 Winter simulation conference (WSC)},
  pages={2284--2291},
  year={2016},
  organization={IEEE}
}
[5] Christian Dietz, Rocco Mandrysch, Urs Anliker und Gabi Dreo Rodosek. Language Agnostic Botnet Detection Based on ESOM and DNS. In Journal on Cybercrime & Digital Investigations – CybIN; Botconf 2016, November 2016. BibTeX
@article{dietz2016language,
  title={Language Agnostic Botnet Detection Based on ESOM and DNS},
  author={Dietz, Christian and Mandrysch, Rocco and Anliker, Urs and Dreo Rodosek, Gabi},
  journal={Journal on Cybercrime & Digital Investigations – CybIN; Botconf 2016},
  volume={2},
  year={2016},
}
[6] Christian Dietz, Anna Sperotto, Gabi Dreo Rodosek und Aiko Pras. How to Achieve Early Botnet Detection at the Provider Level?. In Proc. IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Juni 2016. BibTeX
@inproceedings{dietz2016achieve,
  title={How to Achieve Early Botnet Detection at the Provider Level?},
  author={Dietz, Christian and Sperotto, Anna and Dreo Rodosek, Gabi and Pras, Aiko},
  booktitle={IFIP International Conference on Autonomous Infrastructure, Management and Security},
  pages={142--146},
  year={2016},
  organization={Springer}
}
[7] Christian Dietz, Anna Sperotto, Gabi Dreo Rodosek und Aiko Pras. Monitoring the DNS infrastructure for proactive botnet detection. In Proc. 11th SPRING graduate workshop of the special interest group Security-Intrusion Detection and Response (SIDAR), Juni 2016. BibTeX
@inproceedings{dietz2016monitoring,
  title={Monitoring the DNS infrastructure for proactive botnet detection},
  author={Dietz, Christian and Sperotto, Anna and Dreo Rodosek, Gabi and Pras, Aiko},
  booktitle={Proceedings of the 11th SPRING graduate workshop of the special interest group Security-Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI)(SPRING 2016)},
  pages={3--4},
  year={2016},
  publisher={Gesellschaft f{\"u}r Informatik e.V.}
}
[8] Cem Gündogan, Sandro Passarelli, Peter Hillmann, Christian Dietz und Lars Stiemert. A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic. In Proc. 11th SPRING graduate workshop of the special interest group Security-Intrusion Detection and Response (SIDAR), Juni 2016. BibTeX
@inproceedings{guendogan2016traffic,
  title={A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic},
  author={G{\"u}ndogan, Cem and Passarelli, Sandro and Hillmann, Peter and Dietz, Christian and Stiemert, Lars},
  booktitle={Proceedings of the 11th SPRING graduate workshop of the special interest group Security-Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI)(SPRING 2016)},
  pages={9--10},
  year={2016},
  publisher={Gesellschaft f{\"u}r Informatik e.V.}
}
[9] Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. Modeling the location selection of mirror servers in content delivery networks. In Proc. IEEE International Congress on Big Data (BigData Congress), IEEE, Juni 2016. BibTeX
@inproceedings{hillmann2016modeling,
  title={Modeling the location selection of mirror servers in content delivery networks},
  author={Hillmann, Peter and Uhlig, Tobias and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={2016 IEEE International Congress on Big Data (BigData Congress)},
  pages={438--445},
  year={2016},
  organization={IEEE}
}
[10] Sebastian Seeber, Gabi Dreo Rodosek, Gaetan Hurel und Remi Badonnel. Analysis and evaluation of OpenFlow message usage for security applications. In Proc. IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Juni 2016. BibTeX
@inproceedings{seeber2016analysis,
  title={Analysis and evaluation of OpenFlow message usage for security applications},
  author={Seeber, Sebastian and Dreo Rodosek, Gabi and Hurel, Ga{\"e}tan and Badonnel, R{\'e}mi},
  booktitle={IFIP International Conference on Autonomous Infrastructure, Management and Security},
  pages={84--97},
  year={2016},
  organization={Springer}
}
[11] Mario Golling, Robert Koch und Gabi Dreo Rodosek. Privacy-aware intrusion detection in high-speed backbone networks-design and prototypical implementation of a multi-layered NIDS. In 9. DFN-Forum Kommunikationstechnologien, Mai 2016. BibTeX
@inproceedings{golling2016privacy,
  title={Privacy-aware intrusion detection in high-speed backbone networks-design and prototypical implementation of a multi-layered NIDS},
  author={Golling, Mario and Koch, Robert and Dreo Rodosek, Gabi},
  booktitle={9. DFN-Forum Kommunikationstechnologien},
  pages={77--86},
  year={2016},
  organization={Gesellschaft f{\"u}r Informatik e.V.}
}
[12] Christian Dietz, Anna Sperotto, Aiko Pras und Gabi Dreo Rodosek. Poster: Proactive Botnet Detection and Defense at Internet scale. In Proc. TERENA Networking Conference (TNC16), April 2016. BibTeX
@inproceedings{dietz2016poster,
  title={Poster: Proactive Botnet Detection and Defense at Internet scale},
  author={Dietz, Christian and Sperotto, Anna and Pras, Aiko and Dreo Rodosek, Gabi},
  booktitle={TERENA Networking Conference (TNC16)},
  year={2016}
}
[13] Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek und Oliver Rose. On the Path to High Precise IP Geolocation: A Self-Optimizing Model. In International Journal of Intelligent Computing Research (IJICR), 7(1), März 2016. BibTeX
@article{hillman2016path,
  title = {On the Path to High Precise IP Geolocation: A Self-Optimizing Model},
  author = {Hillmann, Peter and Stiemert, Lars and Rodosek, Gabi Dreo and Rose, Oliver},
  journal={International Journal of Intelligent Computing Research (IJICR)},
  volume={7},
  number={1},
  pages = {682--693},
  year={2016},
  publisher={Infonomics Society}
}
[14] Robert Koch, Mario Golling und Gabi Dreo Rodosek. How anonymous is the tor network? A long-term black-box investigation. In IEEE Computer, 49(3), IEEE, März 2016. BibTeX
@article{koch2016anonymous,
  title = {How anonymous is the tor network? A long-term black-box investigation},
  author = {Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  journal={Computer},
  volume={49},
  number={3},
  pages = {42--49},
  year={2016},
  publisher={IEEE}
}

2015

[1] Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek und Oliver Rose. Dragoon: Advanced modelling of IP geolocation by use of latency measurements. In Proc. 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, Dezember 2015. BibTeX
@inproceedings{hillmann2015dragoon,
  title={Dragoon: Advanced modelling of IP geolocation by use of latency measurements},
  author={Hillmann, Peter and Stiemert, Lars and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)},
  pages={438--445},
  year={2015},
  organization={IEEE}
}
[2] Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. An efficient solution for k-center problems. In Proc. Winter Simulation Conference (WSC), IEEE, Dezember 2015. BibTeX
@inproceedings{hillmann2015efficient,
  title={An efficient solution for k-center problems},
  author={Hillmann, Peter and Uhlig, Tobias and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={2015 Winter Simulation Conference (WSC)},
  pages={3186--3187},
  year={2015},
  organization={IEEE}
}
[3] Dennis Kergl, Robert Rödler und Gabi Dreo Rodosek. Detection of zero day exploits using real-time social media streams. In Advances in Nature and Biologically Inspired Computing, Dezember 2015. BibTeX
@incollection{kergl2015detection,
  title={Detection of zero day exploits using real-time social media streams},
  author={Kergl, Dennis and Roedler, Robert and Dreo Rodosek, Gabi},
  booktitle={Advances in Nature and Biologically Inspired Computing},
  pages={405--416},
  year={2015},
  publisher={Springer}
}
[4] Robert Rödler, Dennis Kergl und Gabi Dreo Rodosek. Profile matching across online social networks based on geo-tags. In Advances in Nature and Biologically Inspired Computing, Dezember 2015. BibTeX
@incollection{roedler2015profile,
  title={Profile matching across online social networks based on geo-tags},
  author={Roedler, Robert and Kergl, Dennis and Rodosek, Gabi Dreo},
  booktitle={Advances in Nature and Biologically Inspired Computing},
  pages={417--428},
  year={2015},
  publisher={Springer}
}
[5] Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert und Andreas Rekker. On the evaluation of military simulations: towards a taxonomy of assessment criteria. In Proc. Military Communications and Information Systems Conference (MilCIS), IEEE, November 2015. BibTeX
@inproceedings{golling2015evaluation,
  title={On the evaluation of military simulations: towards a taxonomy of assessment criteria},
  author={Golling, Mario and Koch, Robert and Hillmann, Peter and Eiseler, Volker and Stiemert, Lars and Rekker, Andres},
  booktitle={2015 Military Communications and Information Systems Conference (MilCIS)},
  pages={1--7},
  year={2015},
  organization={IEEE}
}
[6] Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek und Oliver Rose. Modelling of IP Geolocation by use of Latency Measurements. In Proc. 11th International Conference on Network and Service Management (CNSM), IEEE, November 2015. BibTeX
@inproceedings{hillmann2015modelling,
  title={Modelling of IP Geolocation by use of Latency Measurements},
  author={Hillmann, Peter and Stiemert, Lars and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={2015 11th International Conference on Network and Service Management (CNSM)},
  pages={173--177},
  year={2015},
  organization={IEEE}
}
[7] Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. A novel approach to solve k-center problems with geographical placement. In Proc. International Conference on Service Operations And Logistics, And Informatics (SOLI), IEEE, November 2015. BibTeX
@inproceedings{hillmann2015novel,
  title={A novel approach to solve k-center problems with geographical placement},
  author={Hillmann, Peter and Uhlig, Tobias and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={2015 IEEE International Conference on Service Operations And Logistics, And Informatics (SOLI)},
  pages={31--36},
  year={2015},
  organization={IEEE}
}
[8] Peter Hillmann, Frank Tietze und Gabi Dreo Rodosek. Tracemax: A novel single packet IP traceback strategy for data-flow analysis. In Proc. 40th Conference on Local Computer Networks (LCN), IEEE, Oktober 2015. BibTeX
@inproceedings{hillmann2015tracemax,
  title={Tracemax: A novel single packet IP traceback strategy for data-flow analysis},
  author={Hillmann, Peter and Tietze, Frank and Rodosek, Gabi Dreo},
  booktitle={2015 IEEE 40th Conference on Local Computer Networks (LCN)},
  pages={177--180},
  year={2015},
  organization={IEEE}
}
[9] Sebastian Seeber, Lars Stiemert und Gabi Dreo Rodosek. Towards an SDN-enabled IDS environment. In Proc. Conference on Communications and Network Security (CNS), IEEE, Oktober 2015. BibTeX
@inproceedings{seeber2015towards,
  title={Towards an SDN-enabled IDS environment},
  author={Seeber, Sebastian and Stiemert, Lars and Dreo Rodosek, Gabi},
  booktitle={2015 IEEE Conference on Communications and Network Security (CNS)},
  pages={751--752},
  year={2015},
  organization={IEEE}
}
[10] Peter Hillmann, Frank Tietze und Gabi Dreo Rodosek. Strategies for tracking individual IP packets towards DDoS. In PIK-Praxis der Informationsverarbeitung und Kommunikation, September 2015. BibTeX
@article{hillmann2015strategies,
  title={Strategies for tracking individual IP packets towards DDoS},
  author={Hillmann, Peter and Tietze, Frank and Dreo Rodosek, Gabi},
  journal={PIK-Praxis der Informationsverarbeitung und Kommunikation},
  volume={38},
  number={1-2},
  pages={15--21},
  year={2015},
  publisher={De Gruyter}
}
[11] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Disequilibrium: Tor's Exit Node Selection under the Stereoscope. In Proc. Trustcom/BigDataSE/ISPA, IEEE, August 2015. BibTeX
@inproceedings{koch2015disequilibrium,
  title={Disequilibrium: Tor's Exit Node Selection under the Stereoscope},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={2015 IEEE Trustcom/BigDataSE/ISPA},
  volume={1},
  pages={942--949},
  year={2015},
  organization={IEEE}
}
[12] Robert Koch, Mario Golling, Lars Stiemert, Volker Eiseler, Frank Tietze und Gabi Dreo Rodosek. A decentralized framework for geolocation-based pre-incident network forensics. In Proc. 7th International Symposium on Cyberspace Safety and Security (CSS), IEEE, August 2015. BibTeX
@inproceedings{koch2015decentralized,
  title={A decentralized framework for geolocation-based pre-incident network forensics},
  author={Koch, Robert and Golling, Mario and Stiemert, Lars and Eiseler, Volker and Tietze, Frank and Dreo Rodosek, Gabi},
  booktitle={2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems},
  pages={1210--1218},
  year={2015},
  organization={IEEE}
}
[13] Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorothea Hein, Michael Kretzschmar und Gabi Dreo Rodosek. An agent-based framework for decentralized reconstruction of attack paths. In 8. DFN-Forum Kommunikationstechnologien, Juni 2015. BibTeX
@inproceedings{golling2015agent,
  title={An agent-based framework for decentralized reconstruction of attack paths},
  author={Golling, Mario and Koch, Robert and Tietze, Frank and Hein, Sandy-Dorotea and Ketzschmar, Michael and Dreo Rodosek, Gabi},
  booktitle={8. DFN-Forum Kommunikationstechnologien},
  year={2015},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[14] Sebastian Seeber und Gabi Dreo Rodosek. Towards an adaptive and effective IDS using OpenFlow. In Proc. International Conference on Autonomous Infrastructure, Management and Security (AIMS), IFIP, Juni 2015. BibTeX
@inproceedings{seeber2015towards,
  title={Towards an adaptive and effective IDS using OpenFlow},
  author={Seeber, Sebastian and Dreo Rodosek, Gabi},
  booktitle={IFIP International Conference on Autonomous Infrastructure, Management and Security},
  pages={134--139},
  year={2015},
  organization={Springer}
}
[15] Frank Tietze, Peter Hillmann und Gabi Dreo Rodosek. Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse. In 8. DFN-Forum Kommunikationstechnologien, Juni 2015. BibTeX
@inproceedings{tietze2015strategie,
  title={Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse},
  author={Tietze, Frank and Hillmann, Peter and Dreo Rodosek, Gabi},
  booktitle={8. DFN-Forum Kommunikationstechnologien},
  year={2015},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[16] Robert Koch und Mario Golling. Blackout and now? network centric warfare in an Anti-Access Area-denial theatre. In Proc. 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), IEEE, Mai 2015. BibTeX
@inproceedings{koch2015blackout,
  title={Blackout and now? network centric warfare in an Anti-Access Area-denial theatre},
  author={Koch, Robert and Golling, Mario},
  booktitle={2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace},
  pages={169--184},
  year={2015},
  organization={IEEE}
}
[17] Jessica Steinberger, Anna Sperotto, Mario Golling und Harald Baier. How to exchange security events? overview and evaluation of formats and protocols. In Proc. International Symposium on Integrated Network Management (IM), IEEE, Mai 2015. BibTeX
@inproceedings{steinberger2015exchange,
  title={How to exchange security events? overview and evaluation of formats and protocols},
  author={Steinberger, Jessica and Sperotto, Anna and Golling, Mario and Baier, Harald},
  booktitle={2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)},
  pages={261--269},
  year={2015},
  organization={IEEE}
}
[18] Mario Golling und Michael Kretzschmar. Entwicklung einer Architektur für das Accounting in dynamischen Virtuellen Organisationen. Books on Demand, Februar 2015. BibTeX
@book{golling2015entwicklung,
  title={Entwicklung einer Architektur f{\"u}r das Accounting in dynamischen Virtuellen Organisationen},
  author={Golling, Mario and Kretzschmar, Michael},
  year={2015},
  publisher={BoD--Books on Demand}
}

2014

[1] Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek und Oliver Rose. A novel multi-agent system for complex scheduling problems. In Proc. Winter Simulation Conference (WSC), IEEE, Dezember 2014. BibTeX
@inproceedings{hillmann2014novel,
  title={A novel multi-agent system for complex scheduling problems},
  author={Hillmann, Peter and Uhlig, Tobias and Dreo Rodosek, Gabi and Rose, Oliver},
  booktitle={Proceedings of the Winter Simulation Conference 2014},
  pages={231--241},
  year={2014},
  organization={IEEE}
}
[2] Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede und Frank Tietze. YANG2UML: Bijective transformation and simplification of YANG to UML. In Proc. 10th International Conference on Network and Service Management (CNSM), IEEE, November 2014. BibTeX
@inproceedings{golling2014yang2uml,
  title={YANG2UML: Bijective transformation and simplification of YANG to UML},
  author={Golling, Mario and Koch, Robert and Hillmann, Peter and Hofstede, Rick and Tietze, Frank},
  booktitle={10th International Conference on Network and Service Management (CNSM) and Workshop},
  pages={300--303},
  year={2014},
  organization={IEEE}
}
[3] Sebastian Seeber und Gabi Dreo Rodosek. Improving network security through SDN in cloud scenarios. In Proc. 10th International Conference on Network and Service Management (CNSM), IEEE, November 2014. BibTeX
@inproceedings{seeber2014improving,
  title={Improving network security through SDN in cloud scenarios},
  author={Seeber, Sebastian and Dreo Rodosek, Gabi},
  booktitle={10th International Conference on Network and Service Management (CNSM) and Workshop},
  pages={376--381},
  year={2014},
  organization={IEEE}
}
[4] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Behavior-based intrusion detection in encrypted environments. In IEEE Communications Magazine, 52(7), IEEE, Juli 2014. BibTeX
@article{koch2014behavior,
  title={Behavior-based intrusion detection in encrypted environments},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  journal={IEEE Communications Magazine},
  volume={52},
  number={7},
  pages={124--131},
  year={2014},
  publisher={IEEE}
}
[5] Mario Golling, Rick Hofstede und Robert Koch. Towards multi-layered intrusion detection in high-speed networks. In Proc. 6th International Conference on Cyber Conflict (CyCon), IEEE, Juni 2014. BibTeX
@inproceedings{golling2014towards,
  title={Towards multi-layered intrusion detection in high-speed networks},
  author={Golling, Mario and Hofstede, Rick and Koch, Robert},
  booktitle={2014 6th International Conference on Cyber Conflict (CyCon)},
  pages={191--206},
  year={2014},
  organization={IEEE}
}
[6] Mario Golling, Robert Koch, Peter Hillmann und Gabi Dreo Rodosek. Smart defence: an architecture for new challenges to cyber security. In 7. DFN-Forum-Kommunikationstechnologien, Juni 2014. BibTeX
@inproceedings{golling2014smart,
  title={Smart defence: an architecture for new challenges to cyber security},
  author={Golling, Mario and Koch, Robert and Hillmann, Peter and Rodosek, Gabi Dreo},
  booktitle={7. DFN-Forum-Kommunikationstechnologien},
  year={2014},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[7] Robert Koch, Mario Golling und Lars Stiemert. Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen. In 7. DFN-Forum-Kommunikationstechnologien, Juni 2014. BibTeX
@inproceedings{golling2014architektur,
  title={Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen},
  author={Golling, Mario and Koch, Robert and Stiemert, Lars},
  booktitle={7. DFN-Forum-Kommunikationstechnologien},
  year={2014},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[8] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Towards comparability of intrusion detection systems: New data sets. In Proc. TERENA Networking Conference (TNC), Mai 2014. BibTeX
@inproceedings{koch2014towardscomparability,
  title={Towards comparability of intrusion detection systems: New data sets},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={TERENA Networking Conference (TNC)},
  year={2014}
}
[9] Christos Tsiaras, Anuj Sehgal, Sebastian Seeber, Daniel Dönni, Burkhard Stiller, Jürgen Schönwälder und Gabi Dreo Rodosek. Towards Evaluating Type of Service Related Quality-of-Experience on Mobile Networks. In Proc. 7th IFIP Wireless and Mobile Networking Conference (WMNC), Mai 2014. BibTeX
@inproceedings{tsiaras2014towards,
  title={Towards evaluating type of service related Quality-of-Experience on mobile networks},
  author={Tsiaras, Christos and Sehgal, Anuj and Seeber, Sebastian and D{\"o}nni, Daniel and Stiller, Burkhard and Sch{\"o}nw{\"a}lder, J{\"u}rgen and Dreo Rodosek, Gabi},
  booktitle={2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)},
  pages={1--8},
  year={2014},
  organization={IEEE}
}
[10] Mario Golling, Robert Koch und Gabi Dreo Rodosek. Poster: From just-in-time intrusion detection to pro-active response by means of collaborated cross-domain multilayered intrusion detection. In Proc. 9th International Conference on Cyber Warfare and Security (ICCWS), März 2014. BibTeX
@inproceedings{golling2014just,
  title={Poster: From just-in-time intrusion detection to pro-active response by means of collaborated cross-domain multilayered intrusion detection},
  author={Golling, Mario and Koch, Robert and Dreo Rodosek, Gabi},
  booktitle={9th International Conference on Cyber Warfare and Security (ICCWS)},
  year={2014},
  organization={Academic Conferences Limited}
}
[11] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Using Layer 1 Signal Analysis for the Supervision of COTS Products. In Proc. 9th International Conference on Cyber Warfare and Security (ICCWS), März 2014. BibTeX
@inproceedings{koch2014using,
  title={Using Layer 1 Signal Analysis for the Supervision of COTS Products},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={9th International Conference on Cyber Warfare and Security (ICCWS)},
  pages={263--270},
  year={2014},
  organization={Academic Conferences Limited}
}
[12] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Poster: Towards Smart Network Defense. In Proc. 9th International Conference on Cyber Warfare and Security (ICCWS), März 2014. BibTeX
@inproceedings{koch2014towardssmart,
  title={Poster: Towards Smart Network Defense},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={9th International Conference on Cyber Warfare and Security (ICCWS)},
  year={2014},
  organization={Academic Conferences Limited}
}
[13] Robert Koch, Mario Golling, Volker Eiseler und Gabi Dreo Rodosek. Poster: Applying Case-Based Reasoning to Intrusion Detection. In Proc. 9th International Conference on Cyber Warfare and Security (ICCWS), März 2014. BibTeX
@inproceedings{koch2014applying,
  title={Poster: Applying Case-Based Reasoning to Intrusion Detection},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={9th International Conference on Cyber Warfare and Security (ICCWS)},
  year={2014},
  organization={Academic Conferences Limited}
}

2013

[1] Peter Hillmann und Björn Stelte. A flexible cryptographic infrastructure for high-security SDR-based systems. In Proc. Military Communications and Information Systems Conference (MilCIS), IEEE, November 2013. BibTeX
@inproceedings{hillmann2013flexible,
  title={A flexible cryptographic infrastructure for high-security SDR-based systems},
  author={Hillmann, Peter and Stelte, Bj{\"o}rn},
  booktitle={Military Communications and Information Systems Conference (MilCIS)},
  pages={1--6},
  year={2013},
  organization={IEEE}
}
[2] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Geolocation and verification of IP-addresses with specific focus on IPv6. In Proc. International Symposium on Cyberspace Safety and Security, November 2013. BibTeX
@inproceedings{koch2013geolocation,
  title={Geolocation and verification of IP-addresses with specific focus on IPv6},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={International Symposium on Cyberspace Safety and Security},
  pages={151--170},
  year={2013},
  organization={Springer}
}
[3] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Poster: An Architecture for Supervising COTS Products. In Proc. Conference on Communications and Network Security (CNS), IEEE, Oktober 2013. BibTeX
@inproceedings{koch2013architecture,
  title={Poster: An Architecture for Supervising COTS Products},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
  pages={404--404},
  year={2013},
  organization={IEEE}
}
[4] Robert Koch, Mario Golling und Gabi Dreo Rodosek. Poster: Attracting sophisticated attacks to secure systems: A new honeypot architecture. In Proc. Conference on Communications and Network Security (CNS), IEEE, Oktober 2013. BibTeX
@inproceedings{koch2013attracting,
  title={Poster: Attracting sophisticated attacks to secure systems: A new honeypot architecture},
  author={Koch, Robert and Golling, Mario and Dreo Rodosek, Gabi},
  booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
  pages={409--410},
  year={2013},
  organization={IEEE}
}
[5] Björn Stelte. Poster: ISP Traceback - Attack Path Detection. In Proc. Conference on Communications and Network Security (CNS), IEEE, Oktober 2013. BibTeX
@inproceedings{stelte2013traceback,
  title={Poster: ISP Traceback - Attack Path Detection},
  author={Stelte, Bj{\"o}rn},
  booktitle={2013 IEEE Conference on Communications and Network Security (CNS)},
  pages={363--364},
  year={2013},
  organization={IEEE}
}
[6] Sebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek und Jürgen Schönwälder. Towards a trust computing architecture for RPL in cyber physical systems. In Proc. 9th International Conference on Network and Service Management (CNSM), IEEE, September 2013. BibTeX
@inproceedings{seeber2013towards,
  title={Towards a trust computing architecture for RPL in cyber physical systems},
  author={Seeber, Sebastian and Sehgal, Anuj and Stelte, Bj{\"o}rn and Dreo Rodosek, Gabi and Sch{\"o}nw{\"a}lder, J{\"u}rgen},
  booktitle={9th International Conference on Network and Service Management (CNSM)},
  pages={134--137},
  year={2013},
  organization={IEEE}
}
[7] Björn Stelte. Vertrauenswürdigkeit von Sensordaten in sicherheitskritischen drahtlosen Sensornetzen. Verlag Dr. Hut, September 2013. BibTeX
@book{stelte2013vertrauenswurdigkeit,
  title={Vertrauensw{\"u}rdigkeit von Sensordaten in sicherheitskritischen drahtlosen Sensornetzen},
  author={Stelte, Bj{\"o}rn},
  year={2013},
  publisher={Verlag Dr. Hut}
}
[8] Björn Stelte und Gabi Dreo Rodosek. Thwarting attacks on ZigBee - Removal of the KillerBee stinger. In Proc. 9th International Conference on Network and Service Management (CNSM), IEEE, September 2013. BibTeX
@inproceedings{stelte2013thwarting,
  title={Thwarting attacks on ZigBee - Removal of the KillerBee stinger},
  author={Stelte, Bj{\"o}rn and Rodosek, Gabi Dreo},
  booktitle={9th International Conference on Network and Service Management (CNSM)},
  pages={219--226},
  year={2013},
  organization={IEEE}
}
[9] Mario Golling, Robert Koch, Peter Hillmann und Gabi Dreo Rodosek. Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendung. In 6. DFN-Forum Kommunikationstechnologien, Juni 2013. BibTeX
@inproceedings{golling2013ganzheitliche,
  title={Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendung},
  author={Golling, Mario and Koch, Robert and Hillmann, Peter and Dreo Rodosek, Gabi},
  booktitle={6. DFN-Forum Kommunikationstechnologien},
  year={2013},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[10] Gabi Dreo Rodosek, Mario Golling und Wolfgang Hommel. MuSIC: An IT security architecture for inter-community clouds. In Proc. International Symposium on Integrated Network Management (IM), IEEE, Mai 2013. BibTeX
@inproceedings{dreo2013music,
  title={MuSIC: An IT security architecture for inter-community clouds},
  author={Dreo Rodosek, Gabi and Golling, Mario and Hommel, Wolfgang},
  booktitle={2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)},
  pages={812--815},
  year={2013},
  organization={IEEE}
}
[11] Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel und Frank Tietze. ICEMAN: An architecture for secure federated inter-cloud identity management. In Proc. International Symposium on Integrated Network Management (IM), IEEE, Mai 2013. BibTeX
@inproceedings{dreo2013iceman,
  title={ICEMAN: An architecture for secure federated inter-cloud identity management},
  author={Dreo Rodosek, Gabi and Golling, Mario and Hommel, Wolfgang and Tietze, Frank},
  booktitle={2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)},
  pages={1207--1210},
  year={2013},
  organization={IEEE}
}
[12] Björn Stelte und Gabi Dreo Rodosek. Assuring trustworthiness of sensor data for cyber-physical systems. In Proc. International Symposium on Integrated Network Management (IM), IEEE, Mai 2013. BibTeX
@inproceedings{stelte2013assuring,
  title={Assuring trustworthiness of sensor data for cyber-physical systems},
  author={Stelte, Bj{\"o}rn and Rodosek, Gabi Dreo},
  booktitle={2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)},
  pages={395--402},
  year={2013},
  organization={IEEE}
}

2012

[1] Gabi Dreo Rodosek und Mario Golling. Cyber security: challenges and application areas. In Supply Chain Safety Management, Oktober 2012. BibTeX
@incollection{rodosek2012cyber,
  title={Cyber security: challenges and application areas},
  author={Rodosek, Gabi Dreo and Golling, Mario},
  booktitle={Supply Chain Safety Management},
  pages={179--197},
  year={2012},
  publisher={Springer}
}
[2] Ingo Bente, Bastian Hellmann, Jörg Vieweg, Josef van Helden und Gabi Dreo Rodosek. TCADS: Trustworthy, context-related anomaly detection for smartphones. In Proc. 15th International Conference on Network-Based Information Systems, IEEE, September 2012. BibTeX
@inproceedings{bente2012tcads,
  title={TCADS: Trustworthy, context-related anomaly detection for smartphones},
  author={Bente, Ingo and Hellmann, Bastian and Vieweg, Joerg and von Helden, Josef and Dreo Rodosek, Gabi},
  booktitle={15th International Conference on Network-Based Information Systems},
  pages={247--254},
  year={2012},
  organization={IEEE}
}
[3] Robert Koch und Gabi Dreo Rodosek. The role of COTS products for high security systems. In Proc. 4th International Conference on Cyber Conflict (CYCON), IEEE, Juni 2012. BibTeX
@inproceedings{koch2012role,
  title={The role of COTS products for high security systems},
  author={Koch, Robert and Dreo Rodosek, Gabi},
  booktitle={4th International Conference on Cyber Conflict (CYCON)},
  pages={1--14},
  year={2012},
  organization={IEEE}
}
[4] Robert Koch, Björn Stelte und Mario Golling. Attack trends in present computer networks. In Proc. 4th International Conference on Cyber Conflict (CYCON), IEEE, Juni 2012. BibTeX
@inproceedings{koch2012attack,
  title={Attack trends in present computer networks},
  author={Koch, Robert and Stelte, Bj{\"o}rn and Golling, Mario},
  booktitle={4th International Conference on Cyber Conflict (CYCON)},
  pages={1--12},
  year={2012},
  organization={IEEE}
}
[5] Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel und Alexander Reinhold. Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit. In 5. DFN-Forum Kommunikationstechnologien, Mai 2012. BibTeX
@inproceedings{rodosek2012inter,
  title={Inter-Clouds: Einsatzm{\"o}glichkeiten und Anforderungen an die IT-Sicherheit},
  author={Dreo Rodosek, Gabi and Golling, Mario and Hommel, Wolfgang and Reinhold, Alexander},
  booktitle={5. DFN-Forum Kommunikationstechnologien--Verteilte Systeme im Wissenschaftsbereich},
  year={2012},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[6] Mario Golling und Gabi Dreo Rodosek. Maßnahmen und Herausforderungen beim Schutz von IT-Systemen. In Technik in Bayern (TiB), 2012(01), VDI, Januar 2012. BibTeX
@article{,
  author = {Golling, Mario and Dreo Rodosek, Gabi},
  title = {Ma\ss{}nahmen und Herausforderungen beim Schutz von IT-Systemen},
  journal = {Technik in Bayern (TiB)},
  publisher = {VDI Verein Deutscher Ingenieure},
  volume = {2012},
  number =  {1},
  year = {2012}
}

2011

[1] Robert Koch. Systemarchitektur zur Ein-und Ausbruchserkennung in verschlüsselten Umgebungen. Books on Demand, Dezember 2011. BibTeX
@book{koch2011systemarchitektur,
  title={Systemarchitektur zur Ein-und Ausbruchserkennung in verschl{\"u}sselten Umgebungen},
  author={Koch, Robert},
  year={2011},
  publisher={BoD--Books on Demand}
}
[2] Michael Kretzschmar und Marcus Knüpfer. Reference security management architecture - guiding governmental and military inter-cloud initiatives. In Proc. Military Communications and Information Systems Conference (MilCIS), IEEE, November 2011. BibTeX
@inproceedings{kretzschmar2011reference,
  title={Reference security management architecture - guiding governmental and military inter-cloud initiatives},
  author={Kretzschmar, Michael and Kn{\"u}pfer, Marcus},
  booktitle={2011 Military Communications and Information Systems Conference},
  pages={1--7},
  year={2011},
  organization={IEEE}
}
[3] Michael Kretzschmar und Mario Golling. Functional components for a security manager within future inter-cloud environments. In Proc. 7th International Conference on Network and Service Management (CNSM), IEEE, Oktober 2011. BibTeX
@inproceedings{kretzschmar2011functional,
  title={Functional components for a security manager within future inter-cloud environments},
  author={Kretzschmar, Michael and Golling, Mario},
  booktitle={7th International Conference on Network and Service Management (CNSM)},
  pages={1--5},
  year={2011},
  organization={IEEE}
}
[4] Michael Kretzschmar und Mario Golling. Security management spectrum in future multi-provider Inter-Cloud environments — Method to highlight necessary further development. In Proc. 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM), IEEE, Oktober 2011. BibTeX
@inproceedings{kretzschmar2011securityspectrum,
  title={Security management spectrum in future multi-provider Inter-Cloud environments—Method to highlight necessary further development},
  author={Kretzschmar, Michael and Golling, Mario},
  booktitle={5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM)},
  pages={1--8},
  year={2011},
  organization={IEEE}
}
[5] Björn Stelte und Andreas Matheus. Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation. In Proc. 10th SENSORS Conference, IEEE, Oktober 2011. BibTeX
@inproceedings{stelte2011secure,
  title={Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation},
  author={Stelte, Bj{\"o}rn and Matheus, Andreas},
  booktitle={SENSORS, 2011 IEEE},
  pages={920--923},
  year={2011},
  organization={IEEE}
}
[6] Robert Koch, Dominik Holzapfel und Gabi Dreo Rodosek. Data control in social networks. In Proc. 5th International Conference on Network and System Security (NSS), IEEE, September 2011. BibTeX
@inproceedings{koch2011data,
  title={Data control in social networks},
  author={Koch, Robert and Holzapfel, Dominik and Dreo Rodosek, Gabi},
  booktitle={5th International Conference on Network and System Security (NSS)},
  pages={274--279},
  year={2011},
  organization={IEEE}
}
[7] Michael Kretzschmar, Mario Golling und Sebastian Hanigk. Security management areas in the inter-cloud. In Proc. 4th International Conference on Cloud Computing, IEEE, Juli 2011. BibTeX
@inproceedings{kretzschmar2011securityareas,
  title={Security management areas in the inter-cloud},
  author={Kretzschmar, Michael and Golling, Mario and Hanigk, Sebastian},
  booktitle={IEEE 4th International Conference on Cloud Computing},
  pages={762--763},
  year={2011},
  organization={IEEE}
}
[8] Björn Stelte. Byzantine decisions for inferring trust in Sensor Networks. In Proc. International Conference on Security and Cryptography (SECRYPT), IEEE, Juli 2011. BibTeX
@inproceedings{stelte2011byzantine,
  title={Byzantine decisions for inferring trust in Sensor Networks},
  author={Stelte, Bj{\"o}rn},
  booktitle={Proceedings of the International Conference on Security and Cryptography (SECRYPT)},
  pages={396--399},
  year={2011},
  organization={IEEE}
}
[9] Björn Stelte. Protection against byzantine attacks on wireless sensor networks. In Proc. International Conference on Wireless Information Networks and Systems (WINSYS), IEEE, Juli 2011. BibTeX
@inproceedings{stelte2011protection,
  title={Protection against byzantine attacks on wireless sensor networks},
  author={Stelte, Bj{\"o}rn},
  booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems (WINSYS)},
  pages={53--58},
  year={2011},
  organization={IEEE}
}
[10] Ingo Bente, Gabi Dreo Rodosek, Bastian Hellmann, Stephan Heuser, Jörg Vieweg, Josef van Helden und Johannes Westhuis. Towards permission-based attestation for the android platform. In Proc. 4th International Conference on Trust and Trustworthy Computing, Juni 2011. BibTeX
@inproceedings{bente2011towards,
  title={Towards permission-based attestation for the android platform},
  author={Bente, Ingo and Dreo, Gabi and Hellmann, Bastian and Heuser, Stephan and Vieweg, Joerg and von Helden, Josef and Westhuis, Johannes},
  booktitle={4th International Conference on Trust and Trustworthy Computing},
  pages={108--115},
  year={2011},
  organization={Springer}
}
[11] Mario Golling und Björn Stelte. Requirements for a future EWS - Cyber Defence in the internet of the future. In Proc. 3rd International Conference on Cyber Conflict (ICCC), IEEE, Juni 2011. BibTeX
@inproceedings{golling2011requirements,
  title={Requirements for a future EWS - Cyber Defence in the internet of the future},
  author={Golling, Mario and Stelte, Bj{\"o}rn},
  booktitle={3rd International Conference on Cyber Conflict (ICCC)},
  pages={1--16},
  year={2011},
  organization={IEEE}
}
[12] Robert Koch. Towards next-generation intrusion detection. In Proc. 3rd International Conference on Cyber Conflict (ICCC), IEEE, Juni 2011. BibTeX
@inproceedings{koch2011towards,
  title={Towards next-generation intrusion detection},
  author={Koch, Robert},
  booktitle={2011 3rd International Conference on Cyber Conflict},
  pages={1--18},
  year={2011},
  organization={IEEE}
}
[13] Michael Kretzschmar und Mario Golling. Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler. In 4. DFN-Forum Kommunikationstechnologien, Juni 2011. BibTeX
@inproceedings{kretzschmar2011taxonomie,
  title={Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler},
  author={Kretzschmar, Michael and Golling, Mario},
  booktitle={4. DFN-Forum Kommunikationstechnologien},
  year={2011},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[14] Björn Stelte. Drahtlose Sensornetze in der Lehre - Sicherheitsbetrachtung von ZigBee-Netzen. In 4. DFN-Forum Kommunikationstechnologien, Juni 2011. BibTeX
@inproceedings{stelte2011drahtlose,
  title={Drahtlose Sensornetze in der Lehre - Sicherheitsbetrachtung von ZigBee-Netzen},
  author={Stelte, Bj{\"o}rn},
  booktitle={4. DFN-Forum Kommunikationstechnologien},
  year={2011},
  organization={Gesellschaft f{\"u}r Informatik eV}
}
[15] Frank Eyermann und Gabi Dreo Rodosek. An auditing system for multi-domain IP carrying Service Level Agreements. In Proc. 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), IEEE, Mai 2011. BibTeX
@inproceedings{eyermann2011auditing,
  title={An auditing system for multi-domain IP carrying Service Level Agreements},
  author={Eyermann, Frank and Dreo Rodosek, Gabi},
  booktitle={12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops},
  pages={25--32},
  year={2011},
  organization={IEEE}
}
[16] Björn Stelte. Poster: An event management communication system for wireless sensor networks. In Proc. 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), IEEE, Mai 2011. BibTeX
@inproceedings{stelte2011event,
  title={Poster: An event management communication system for wireless sensor networks},
  author={Stelte, Bj{\"o}rn},
  booktitle={12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops},
  pages={630--633},
  year={2011},
  organization={IEEE}
}
[17] Gabi Dreo Rodosek, Aiko Pras, Henning Schulzrinne und Bernhard Stiller. Dagstuhl Seminar 11042 - Learning from the Past: Implications for the Future Internet and its Management?. Dagstuhl Reports, 1(1), Januar 2011. BibTeX
@inproceedings{dreo2011learning,
  title={Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042)},
  author={Dreo Rodosek, Gabi and Pras, Aiko and Schulzrinne, Henning and Stiller, Burkhard},
  booktitle={Dagstuhl reports},
  volume={1},
  number={1},
  year={2011},
  organization={Schloss Dagstuhl - Leibniz-Zentrum f{\"u}r Informatik}
}