Gabi Dreo Rodosek

Orcid: 0000-0002-8702-8553

Affiliations:
  • Bundeswehr University Munich, Germany


According to our database1, Gabi Dreo Rodosek authored at least 133 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects.
IEEE Trans. Netw. Serv. Manag., April, 2024

WebGL-based Image Processing through JavaScript Injection.
Proceedings of the 29th International ACM Conference on 3D Web Technology, 2024

Exploring the Benefit of Path Plausibility Algorithms in BGP.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Eliminating Bottlenecks in MANETs.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

How good can machine generated texts be identified and can language models be trained to avoid identification?
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

How well can machine-generated texts be identified and can language models be trained to avoid identification?
CoRR, 2023

Fast First-Order Masked NTTRU.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

BGPEval: Automating Large-Scale Testbed Creation.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Path Plausibility Algorithms in GoBGP.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Real-Time Anomaly Detection and Popularity Prediction for Emerging Events on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
Advancing the Security of LDACS.
IEEE Trans. Netw. Serv. Manag., December, 2022

DMEF: Dynamic Malware Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs.
Proceedings of the IEEE Military Communications Conference, 2022

Assessing the RPKI Validator Ecosystem.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Time-sensitive Multi-Flow Routing in Highly Utilized MANETs.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Universal Adversarial Perturbations for Malware.
CoRR, 2021

Revisiting RPKI Route Origin Validation on the Data Plane.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

On the Deployment of Default Routes in Inter-domain Routing.
Proceedings of the TAURIN'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, 2021

AIMED-RL: Exploring Adversarial Malware Examples with Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

PMAKE: Physical Unclonable Function-based Mutual Authentication Key Exchange Scheme for Digital Aeronautical Communications.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

A Multimodal Mixed Reality Data Exploration Framework for Tactical Decision Making.
Proceedings of the International Conference on Military Communication and Information Systems, 2021

A Secure Cell-Attachment Procedure of LDACS.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
On the Path to High Precise IP Geolocation: A Self-Optimizing Model.
CoRR, 2020

Topic Modeling of Short Texts Using Anchor Words.
Proceedings of the WIMS 2020: The 10th International Conference on Web Intelligence, Mining and Semantics, Biarritz, France, June 30, 2020

CeTUP: Controller-equipped Topology Update Process for Tactical Ad-hoc Networks.
Proceedings of the PE-WASUN '20, 2020

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD.
Proceedings of the NOMS 2020, 2020

Improving Routing with Up-to-date and Full Topology Knowledge in MANETs.
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020

Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

OpenMTD: A Framework for Efficient Network-Level MTD Evaluation.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents.
Int. J. Cyber Situational Aware., 2019

Wireless SDN for Highly Utilized MANETs.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

AIMED: Evolving Malware with Genetic Programming to Evade Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Topology Update Algorithm for Wireless Networks.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

Evaluating TCP Connection Healthiness.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

On the Usage of DSCP and ECN Codepoints in Internet Backbone Traffic Traces for IPv4 and IPv6.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

A User Study of the Visualization-Assisted Evaluation and Management of Network Security Detection Events and Policies.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Adaptive and Intelligible Prioritization for Network Security Incidents.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.
J. Netw. Syst. Manag., 2018

Flow-Based Compromise Detection: Lessons Learned.
IEEE Secur. Priv., 2018

DDoS defense using MTD and SDN.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Towards European Network Sovereignty.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve Detection.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

2017
Optimized travel to meetings on a common location of geographical distributed participants.
Proceedings of the 2017 IEEE International Conference on Service Operations and Logistics, 2017

Modeling and learning incident prioritization.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Integrating visual analysis of network security and management of detection system configurations.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren.
Proceedings of the 10. DFN-Forum, 2017

On the Perception of Risk Assessment in Intrusion Detection Systems.
Proceedings of the 10. DFN-Forum, 2017

VulMap: Global information security vulnerabilities IEEE CNS 17 poster.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Content Driven Profile Matching across Online Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Towards Internet Scale Quality-of-Experience Measurement with Twitter.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis.
IEEE Syst. J., 2016

How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation.
Computer, 2016

Simulation and optimization of Content Delivery Networks considering user profiles and preferences of Internet Service Providers.
Proceedings of the Winter Simulation Conference, 2016

Dr. WATTson: Lightweight current-based Intrusion Detection (CBID).
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Privacy-aware intrusion detection in high-speed backbone networks - design and prototypical implementation of a multi-layered NIDS.
Proceedings of the 9. DFN-Forum - Kommunikationstechnologien, 30. Mai, 2016

Modeling the Location Selection of Mirror Servers in Content Delivery Networks.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Analysis and Evaluation of OpenFlow Message Usage for Security Applications.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

How to Achieve Early Botnet Detection at the Provider Level?
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Strategies for Tracking Individual IP Packets Towards DDoS.
Prax. Inf.verarb. Kommun., 2015

Special issue on measure, detect and mitigate-challenges and trends in network security.
Int. J. Netw. Manag., 2015

An efficient solution for K-center problems.
Proceedings of the 2015 Winter Simulation Conference, 2015

Disequilibrium: Tor's Exit Node Selection under the Stereoscope.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A novel approach to solve K-center problems with geographical placement.
Proceedings of 10th IEEE International Conference on Service Operations and Logistics, 2015

Profile Matching Across Online Social Networks Based on Geo-Tags.
Proceedings of the Advances in Nature and Biologically Inspired Computing, 2015

Detection of Zero Day Exploits Using Real-Time Social Media Streams.
Proceedings of the Advances in Nature and Biologically Inspired Computing, 2015

Tracemax: A novel single packet IP traceback strategy for data-flow analysis.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Dragoon: Advanced modelling of IP geolocation by use of latency measurements.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

A Decentralized Framework for Geolocation-Based Pre-Incident Network Forensics.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

An agent-based framework for decentralized reconstruction of attack paths.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

Modelling of IP geolocation by use of latency measurements.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Towards an SDN-enabled IDS environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Towards an Adaptive and Effective IDS Using OpenFlow.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Behavior-based intrusion detection in encrypted environments.
IEEE Commun. Mag., 2014

A Revised Attack Taxonomy for a New Generation of Smart Attacks.
Comput. Inf. Sci., 2014

A novel multi-agent system for complex scheduling problems.
Proceedings of the 2014 Winter Simulation Conference, 2014

Towards evaluating type of service related Quality-of-Experience on mobile networks.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

Smart defence: an architecture for new challenges to cyber security.
Proceedings of the 7. DFN-Forum, 2014

Improving network security through SDN in cloud scenarios.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Assuring trustworthiness of sensor data for cyber-physical systems.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

MuSIC: An IT security architecture for inter-community clouds.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

ICEMAN: An architecture for secure federated inter-cloud identity management.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen.
Proceedings of the 6. DFN-Forum Kommunikationstechnologien, 2013

Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Thwarting attacks on ZigBee - Removal of the KillerBee stinger.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Towards a trust computing architecture for RPL in Cyber Physical Systems.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Attracting sophisticated attacks to secure systems: A new honeypot architecture.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An architecture for supervising COTS products.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit.
Proceedings of the 5. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 2012

The role of COTS products for high security systems.
Proceedings of the 4th International Conference on Cyber Conflict, 2012

2011
Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042).
Dagstuhl Reports, 2011

Towards Permission-Based Attestation for the Android Platform - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Data control in social networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

An auditing system for multi-domain IP carrying Service Level Agreements.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
Is the Management of the Future Internet Ignored? A Report on ManFI 2009.
J. Netw. Syst. Manag., 2010

Security System for Encrypted Environments (S2E2).
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Command Evaluation in Encrypted Remote Sessions.
Proceedings of the Fourth International Conference on Network and System Security, 2010

User identification in encrypted network communications.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Evaluation of an Accounting Model for Dynamic Virtual Organizations.
J. Grid Comput., 2009

Future Internet = content + services + management.
IEEE Commun. Mag., 2009

Self-Healing Systems: Foundations and Challenges.
Proceedings of the Self-Healing and Self-Adaptive Systems, 10.05. - 15.05.2009, 2009

Fast Learning Neural Network Intrusion Detection System.
Proceedings of the Scalability of Networks and Services, 2009

2008
Veranstaltung zum Tagungsmotto: Sicherheit.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Management Challenges for Different Future Internet Approaches.
Proceedings of the Poster and Demonstration Paper Track of the 1st Future Internet Symposium (FIS'08) FIS'08 ; Vienna, 2008

2007
"Current Trends in Network and Service Management".
Prax. Inf.verarb. Kommun., 2007

Towards an Accounting System for Multi-Provider Grid Environments.
Proceedings of the Integrated Network Management, 2007

An Accounting Model for Dynamic Virtual Organizations.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
Dynamic Virtual Organizations as Enablers for Managed Invisible Grids.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

2005
Grid computing: fundamentals and management challenges.
Proceedings of the Integrated Network Management, 2005

2004
IT-Dienstmanagement: Herausforderungen und Lösungsansätze.
Prax. Inf.verarb. Kommun., 2004

2003
Management of IT services.
Comput. Networks, 2003

A Generic Model for IT Services and Service Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2002
Enforcing QoS: Myth or Reality? (Panel).
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002

Quality Aspects in IT Service Management.
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002

2001
A User-Centric Approach to Automated Service Provisioning.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

Dynamic Service Provisioning: A User-Centric Approach.
Proceedings of the Operations & Management, 2001

2000
Service Management Platform: The Next Step in Management Tools.
Proceedings of the Services Management in Intelligent Networks, 2000

1999
Using the Concept of Intelligent Agents in Fault Management of Distributed Services.
J. Netw. Syst. Manag., 1999

A CSP Approach to IT Service Management.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

1997
Determining the Availability of Distributed Applications.
Proceedings of the Integrated Network Management V, 1997

1995
A framework for supporting fault diagnosis in integrated network and systems management: methodologies for the correlation of trouble tickets and acess to problem solving expertise.
PhD thesis, 1995

Management von LEO/MEO-Satellitennetzen: Anforderungen und Netzdarstellung.
Proceedings of the Kommunikation in Verteilten Systemen, Neue Länder - Neue Netze, 1995

Using master tickets as a storage for problem-solving expertise.
Proceedings of the Integrated Network Management IV, 1995

1993
Extending trouble ticket systems to fault diagnostics.
IEEE Netw., 1993

Unterstützung der Fehlerdiagnose durch ein Trouble-Ticket-System: Anforderungen, Design und Einsatzerfahrungen.
Proceedings of the Verteilte Systeme, 1993

1991
Cost analysis of interconnection networks.
Microprocessing and Microprogramming, 1991

Using the OSI Management Information Model for ODP.
Proceedings of the Open Distributed Processing: Proceedings of the IFIP TC6/WG6.4 International Workshop on Open Distributed Processing, 1991


  Loading...