MNM-Team

Publication list

LMU
Home Contact

Publications of year 2015

Articles in journal or book chapters

  1. Wolfgang Hommel, Stefan Metzger, and Felix von Eye. Know-how: Aufbau und Betrieb von organisationsweitem Security-Monitoring - Wichtiges sehen, Gefährliches bekämpfen. IT-Administrator, 2015(03):99-102, 3 2015. Heinemann Verlag GmbH. Link to this entry
    BibTeX Entry
    @article{hmv15, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye}, title = {{Know-how:} {Aufbau} und {Betrieb} von organisationsweitem {Security-Monitoring} - {Wichtiges} sehen, {Gefährliches} bekämpfen}, journal = {IT-Administrator}, volume = {2015}, number = {03}, pages = {99-102}, year = {2015}, publisher = {Heinemann Verlag GmbH}, address = {München, Deutschland}, key = {hmv15}, month = {3}, }
  2. Michael Schiffers, Nils gentschen Felde, and Dieter Kranzlmüller. I have a DRIHM: A case study in lifting computational science services up to the scientific mainstream. Proc. Workshop "Bridging the HPC Talent Gap with Computational Science Research Methods (BRIDGE)" at the International Conference on Computational Science (ICCS) , 2015, 6 2015. Procedia. Link to this entry
    BibTeX Entry
    @article{schi15, author = {Michael Schiffers and Nils gentschen Felde and Dieter Kranzlmüller}, title = {I have a {DRIHM:} A case study in lifting computational science services up to the scientific mainstream}, journal = {Proc. Workshop "Bridging the HPC Talent Gap with Computational Science Research Methods (BRIDGE)" at the International Conference on Computational Science (ICCS)}, volume = {2015}, year = {2015}, publisher = {Procedia}, address = {Reykjavik, Island}, annote = {DRIHM}, key = {schi15}, month = {6}, }
    Additional Infos
    DRIHM
  3. Wolfgang Hommel, Stefan Metzger, and Felix von Eye. Seeing Eye - Set up and operate security monitoring throughout the enterprise. Admin: Network & Security, 2015(29):66-71, 12 2015. Linux New Media. Link to this entry
    BibTeX Entry
    @article{hmv15a, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye}, title = {{Seeing} {Eye} - {Set} up and operate security monitoring throughout the enterprise}, journal = {Admin: Network \& Security}, volume = {2015}, number = {29}, pages = {66-71}, year = {2015}, publisher = {Linux New Media}, address = {Manchester, England}, key = {hmv15a}, month = {12}, }

Articles in conference or workshop proceedings

  1. Helmut Reiser, Felix von Eye, Timm Böttger, Lothar Braun, Georg Carle, and Oliver Gasser. Detektion und Prävention von Denial-of-Service Amplification Attacken - Schutz des Netzes aus Sicht eines Amplifiers. In Sicherheit in vernetzten Systemen: 22. DFN-Konferenz, pages H-1-H-13, 2 2015. Books on Demand. Link to this entry
    BibTeX Entry
    @inproceedings{rvbb15, author = {Helmut Reiser and Felix von Eye and Timm Böttger and Lothar Braun and Georg Carle and Oliver Gasser}, title = {{Detektion} und {Prävention} von {Denial-of-Service} {Amplification} {Attacken} - {Schutz} des {Netzes} aus {Sicht} eines {Amplifiers}}, booktitle = {Sicherheit in vernetzten Systemen: 22. DFN-Konferenz}, volume = {2015}, pages = {H-1-H-13}, year = {2015}, publisher = {Books on Demand}, address = {Norderstedt, Deutschland}, key = {rvbb15}, month = {2}, }
  2. Helmut Reiser, Felix von Eye, Timm Böttger, Lothar Braun, Oliver Gasser, and Georg Carle. DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks. In Traffic Monitoring and Analysis, pages 205-218, 5 2015. Springer International Publishing. Link to this entry
    BibTeX Entry
    @inproceedings{rvbb15a, author = {Helmut Reiser and Felix von Eye and Timm Böttger and Lothar Braun and Oliver Gasser and Georg Carle}, title = {{DoS} {Amplification} {Attacks} - {Protocol-Agnostic} {Detection} of {Service} {Abuse} in {Amplifier} {Networks}}, booktitle = {Traffic Monitoring and Analysis}, volume = {2015}, pages = {205-218}, year = {2015}, publisher = {Springer International Publishing}, address = {Lugano, Switzerland}, key = {rvbb15a}, month = {5}, organization = {Lecture Notes in Computer Science 9053}, }
  3. Vitalian Danciu. A file-system abstraction for virtualized infrastructure. In DMTF Datacenter and Cloud Management Workshop, 11 2015. IFIP Digital Library. Link to this entry PDF
    BibTeX Entry
    @inproceedings{danc15, author = {Vitalian Danciu}, title = {A file-system abstraction for virtualized infrastructure}, booktitle = {DMTF Datacenter and Cloud Management Workshop}, year = {2015}, publisher = {IFIP Digital Library}, pdf = {http://dl.ifip.org/db/conf/cnsm/cnsm2015sdn/PID3886183.pdf}, address = {Barcelona, Spain}, key = {danc15}, month = {11}, organization = {DMTF}, }
  4. Wolfgang Hommel, Stefan Metzger, Felix von Eye, and Daniela Pöhn. Improving higher education network security by automating scan result evaluation with Dr. Portscan. In EUNIS Journal of Higher Education IT - EJHEIT, pages 11-20, 5 2015. Link to this entry PDF
    BibTeX Entry
    @inproceedings{hmvp14, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye and Daniela Pöhn}, title = {{Improving} higher education network security by automating scan result evaluation with {Dr.} {Portscan}}, booktitle = {EUNIS Journal of Higher Education IT - EJHEIT}, volume = {2015}, number = {2}, pages = {11-20}, year = {2015}, pdf = {http://www.eunis.org/download/2014/papers/eunis2014\_submission\_65.pdf}, address = {Umea, Sweden}, key = {hmvp14}, month = {5}, }
  5. Vitalian Danciu. Presenting the cloud as files and directories. In 11th IEEE International Conference on eScience, 8 2015. IEEE Xplore. Link to this entry PDF
    BibTeX Entry
    @inproceedings{danc15a, author = {Vitalian Danciu}, title = {{Presenting} the cloud as files and directories}, booktitle = {11th IEEE International Conference on eScience}, year = {2015}, publisher = {IEEE Xplore}, pdf = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7303998}, address = {München, Germany}, key = {danc15a}, month = {8}, }
  6. Wolfgang Hommel, David Schmitz, and Felix von Eye. Integrated Tool Support in the Context of Security and Network Management Convergence. In INFOCOMP 2015, The Fifth International Conference on Advanced Communications and Computation, pages 36-42, 6 2015. Link to this entry PDF
    BibTeX Entry
    @inproceedings{hsv15, author = {Wolfgang Hommel and David Schmitz and Felix von Eye}, title = {{Integrated} {Tool} {Support} in the {Context} of {Security} and {Network} {Management} {Convergence}}, booktitle = {INFOCOMP 2015, The Fifth International Conference on Advanced Communications and Computation}, pages = {36-42}, year = {2015}, pdf = {http://www.thinkmind.org/download.php?articleid=infocomp\_2015\_2\_30\_60058}, key = {hsv15}, month = {6}, organization = {IARIA}, }
  7. Wolfgang Hommel, Felix von Eye, and Michael Grabatin. Netzbasierte Erkennung von mittels Port Knocking versteckten Diensten und Backdoors. In 8. DFN-Forum Kommunikationstechnologien - Beiträge der Fachtagung, GI-Edition - Lecture Notes in Informatics (LNI) 243, pages 57-67, 6 2015. Gesellschaft für Informatik. Link to this entry
    BibTeX Entry
    @inproceedings{hvg15, author = {Wolfgang Hommel and Felix von Eye and Michael Grabatin}, title = {{Netzbasierte} {Erkennung} von mittels {Port} {Knocking} versteckten {Diensten} und {Backdoors}}, booktitle = {8. DFN-Forum Kommunikationstechnologien - Beiträge der Fachtagung}, volume = {2015}, pages = {57-67}, year = {2015}, series = {GI-Edition - Lecture Notes in Informatics (LNI) 243}, publisher = {Gesellschaft für Informatik}, address = {Bonn, Deutschland}, key = {hvg15}, month = {6}, }
  8. Felix von Eye. Effective Security Monitoring Through System Recognition. In ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection, pages 8-11, 6 2015. Link to this entry PDF
    BibTeX Entry
    @inproceedings{vone15, author = {Felix von Eye}, title = {{Effective} {Security} {Monitoring} {Through} {System} {Recognition}}, booktitle = {ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection}, pages = {8-11}, year = {2015}, pdf = {https://www.thinkmind.org/download.php?articleid=icimp\_2015\_1\_20\_30008}, key = {vone15}, month = {6}, organization = {IARIA}, }
  9. Bastian Kemmler and Dieter Kranzlmüller. Redefining the Cloud Based on Beneficial Service Characteristics - A New Cloud Taxonomy Leads to Economically Reasonable Semi-cloudification. In Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER), pages 135-144, 5 2015. Science and Technology Publications (SCITEPRESS). Link to this entry ISBN 978-989-758-104-5, DOI: 10.5220/0005446401350144
    BibTeX Entry
    @inproceedings{kekr15, author = {Bastian Kemmler and Dieter Kranzlmüller}, title = {{Redefining} the {Cloud} {Based} on {Beneficial} {Service} {Characteristics} - A {New} {Cloud} {Taxonomy} {Leads} to {Economically} {Reasonable} {Semi-cloudification}}, booktitle = {Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER)}, volume = {2015}, pages = {135-144}, year = {2015}, publisher = {Science and Technology Publications (SCITEPRESS)}, address = {Lisbon, Portugal}, key = {kekr15}, month = {5}, note = {ISBN 978-989-758-104-5, DOI: 10.5220/0005446401350144}, organization = {Institute for Systems and Technologies of Information, Control and Communication (INSTICC)}, }
  10. Tapasya Patki, David K. Lowenthal, Anjana Sasidharan, Matthias Maiterth, Barry Rountree, Martin Schulz, and Bronis R. Supinski. Practical Resource Management in Power-Constrained, High Performance Computing. In Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2015, Portland, OR, USA, June 15-19, 2015, pages 121 - 132, 6 2015. ACM. Link to this entry
    BibTeX Entry
    @inproceedings{plsm15, author = {Tapasya Patki and David K. Lowenthal and Anjana Sasidharan and Matthias Maiterth and Barry Rountree and Martin Schulz and Bronis R. Supinski}, title = {{Practical} {Resource} {Management} in {Power-Constrained,} {High} {Performance} {Computing}}, booktitle = {Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2015, Portland, OR, USA, June 15-19, 2015}, pages = {121 - 132}, year = {2015}, publisher = {ACM}, key = {plsm15}, month = {6}, }
  11. Daniel Migault, Daniel Palomares, and Tobias Guggemos. Efficient Security for Homenet IoT and M2M Communications. In Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 15, pages 9-17, 11 2015. ACM New York. Link to this entry embedded-sec-lab PDF
    BibTeX Entry
    @inproceedings{mpg15a, author = {Daniel Migault and Daniel Palomares and Tobias Guggemos}, title = {{Efficient} {Security} for {Homenet} {IoT} and {M2M} {Communications}}, booktitle = {Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks}, volume = {2015}, number = {15}, pages = {9-17}, year = {2015}, series = {Q2SWinet 15}, publisher = {ACM New York}, pdf = {http://dl.acm.org/citation.cfm?id=2815317.2815323}, address = {Cancun Mexico}, crossref = {ACM Digital Library}, key = {mpg15a}, month = {11}, note = {embedded-sec-lab}, organization = {ACM}, }
  12. Simone Hantke, Tobias Appel, Florian Eyben, and Björn Schuller. iHEARU-PLAY: Introducing a game for crowdsourced data collection for affective computing. In 1st International Workshop on Automatic Sentiment Analysis in the Wild (WASA 2015), satellite of the 6th biannual Conference on Affective Computing and Intelligent Interaction (ACII 2015), pages 891-897, 9 2015. Link to this entry PDF
    BibTeX Entry
    @inproceedings{haes15, author = {Simone Hantke and Tobias Appel and Florian Eyben and Björn Schuller}, title = {{iHEARU-PLAY:} {Introducing} a game for crowdsourced data collection for affective computing}, booktitle = {1st International Workshop on Automatic Sentiment Analysis in the Wild (WASA 2015), satellite of the 6th biannual Conference on Affective Computing and Intelligent Interaction (ACII 2015)}, pages = {891-897}, year = {2015}, pdf = {http://www.fim.uni-passau.de/fileadmin/files/lehrstuhl/schuller/Publications/Hantke15-IIA.pdf}, address = {Xian, P.R. China}, key = {haes15}, month = {9}, organization = {AAAC, IEEE}, }
  13. Do-Mai Anh-Tu, Dang Diep, and Thoai Nam. Message Leak Detection in Debugging Large-Scale Parallel Applications. In 2015 International Conference on Advanced Computing and Applications (ACOMP), pages pp. 82-89, 11 2015. IEEE. Link to this entry PDF
    BibTeX Entry
    @inproceedings{adn15, author = {Do-Mai Anh-Tu and Dang Diep and Thoai Nam}, title = {{Message} {Leak} {Detection} in {Debugging} {Large-Scale} {Parallel} {Applications}}, booktitle = {2015 International Conference on Advanced Computing and Applications (ACOMP)}, pages = {pp. 82-89}, year = {2015}, publisher = {IEEE}, pdf = {https://ieeexplore.ieee.org/document/7422378}, address = {Ho Chi Minh City, Vietnam}, key = {adn15}, month = {11}, }

Internal reports

  1. Wolfgang Hommel and Felix von Eye. Schlussbericht BNBest-BMBF 98 - Projekt SASER. SASER-Projekt, 10 2015. Link to this entry
    BibTeX Entry
    @techreport{hovo15, author = {Wolfgang Hommel and Felix von Eye}, title = {{Schlussbericht} {BNBest-BMBF} 98 -- {Projekt} {SASER}}, year = {2015}, institution = {SASER-Projekt}, key = {hovo15}, month = {10}, type = {Schlussbericht}, }
  2. Felix von Eye, Iris Adam, Djamel Amar, Jean-Luc Augé, Nicolas Brochier, Steffen Gebert, Philippe Gravey, Andreas Köpsel, Stanislav Lange, Esther Le Rouzic, Julien Meuric, Michel Morvan, Ernst-Dieter Schmidt, Jan-Erik Stange, Haï Dao Thanh, and Thomas Zinner. Deliverable M2.14: Evaluation of Procedures for Network Control and Operation. SASER-Projekt, 7 2015. Link to this entry
    BibTeX Entry
    @techreport{vaaa15, author = {Felix von Eye and Iris Adam and Djamel Amar and Jean-Luc Augé and Nicolas Brochier and Steffen Gebert and Philippe Gravey and Andreas Köpsel and Stanislav Lange and Esther Le Rouzic and Julien Meuric and Michel Morvan and Ernst-Dieter Schmidt and Jan-Erik Stange and Haï Dao Thanh and Thomas Zinner}, title = {{Deliverable} {M2.14:} {Evaluation} of {Procedures} for {Network} {Control} and {Operation}}, year = {2015}, institution = {SASER-Projekt}, key = {vaaa15}, month = {7}, type = {Meilensteinbericht}, }

Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Thu Oct 16 13:51:51 2025 CEST