Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Lars Stiemert"'
Publikováno v:
Proceedings of the 9th International Conference on Information Systems Security and Privacy.
Publikováno v:
MilCIS
In the area of military simulations, a multitude of different approaches is available. Close Combat Tactical Trainer, Joint Tactical Combat Training System, Battle Force Tactical Training or Warfighter's Simulation 2000 are just some examples within
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90c595e14af224da3f0ac29a5df839ce
http://arxiv.org/abs/2004.09340
http://arxiv.org/abs/2004.09340
IP Geolocation is a key enabler for the Future Internet to provide geographical location information for application services. For example, this data is used by Content Delivery Networks to assign users to mirror servers, which are close by, hence pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::84a7c78ed46752335d6d40e9ffa8c519
Autor:
Sebastian Seeber, Marcus Knüpfer, Daniela Pöhn, Peter Hillmann, Tore Bierwirth, Lars Stiemert, Matthias Schopp
Publikováno v:
Model-driven Simulation and Training Environments for Cybersecurity ISBN: 9783030624323
MSTEC
MSTEC
The lack of guided exercises and practical opportunities to learn about cybersecurity in a practical way makes it difficult for security experts to improve their proficiency. Capture the Flag events and Cyber Ranges are ideal for cybersecurity traini
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f06bde0f8db6a12429f384d245528e61
https://doi.org/10.1007/978-3-030-62433-0_1
https://doi.org/10.1007/978-3-030-62433-0_1
Publikováno v:
CyberC
Cyber incidents can have a wide range of cause from a simple connection loss to an insistent attack. Once a potential cyber security incidents and system failures have been identified, deciding how to proceed is often complex. Especially, if the real
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::28788ab9b79a8aa34824ca9491a88f1b
Autor:
Marinos Charalambides, Robert Koch, Sebastian Seeber, Aiko Pras, Gabi Dreo Rodosek, Volker Eiseler, Daphne Tuncer, Martin Drašar, Lars Stiemert, Rémi Badonnel
Publikováno v:
Journal of network and systems management, 26(4), 1101-1109. Springer
This article is a report of the IFIP AIMS 2016, which was held at Universitat der Bundeswehr Munchen, Germany from June 20 to June 23, 2016. AIMS 2016 focused on the theme “Management and Security in the Age of Hyperconnectivity”. The AIMS confer
Publikováno v:
IEEE Systems Journal. 10:1338-1349
Attack traceability and attribution are two of the main tasks of IT forensics. To support this, IT forensics is not limited to investigate data after the attack has taken place. Already before the attack, an optimal environment for a subsequent inves
Publikováno v:
CNSM
IP Geolocation is a key enabler for many areas of application like Content Delivery Networks, targeted advertisement and law enforcement. Therefore, an increased accuracy is needed to improve service quality. Although IP Geolocation is an ongoing fie
Publikováno v:
CNS
Security related monitoring in high speed backbone networks is still a challenging task, since the amounts of data to process increases continuously. Thus, new approaches need to be investigated to detect and handle attacks in high-speed environments