Publications of year 2015
Articles in journal or book chapters
-
Know-how: Aufbau und Betrieb von organisationsweitem Security-Monitoring - Wichtiges sehen, Gefährliches bekämpfen.
IT-Administrator, 2015(03):99-102,
3
2015.
Heinemann Verlag GmbH.
BibTeX Entry
@article{hmv15, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye}, title = {{Know-how:} {Aufbau} und {Betrieb} von organisationsweitem {Security-Monitoring} - {Wichtiges} sehen, {Gefährliches} bekämpfen}, journal = {IT-Administrator}, volume = {2015}, number = {03}, pages = {99-102}, year = {2015}, publisher = {Heinemann Verlag GmbH}, address = {München, Deutschland}, key = {hmv15}, month = {3}, } -
I have a DRIHM: A case study in lifting computational science services up to the scientific mainstream.
Proc. Workshop "Bridging the HPC Talent Gap with Computational Science Research Methods (BRIDGE)" at the International Conference on Computational Science (ICCS) , 2015,
6
2015.
Procedia.
BibTeX Entry
@article{schi15, author = {Michael Schiffers and Nils gentschen Felde and Dieter Kranzlmüller}, title = {I have a {DRIHM:} A case study in lifting computational science services up to the scientific mainstream}, journal = {Proc. Workshop "Bridging the HPC Talent Gap with Computational Science Research Methods (BRIDGE)" at the International Conference on Computational Science (ICCS)}, volume = {2015}, year = {2015}, publisher = {Procedia}, address = {Reykjavik, Island}, annote = {DRIHM}, key = {schi15}, month = {6}, }Additional Infos
DRIHM -
Seeing Eye - Set up and operate security monitoring throughout the enterprise.
Admin: Network & Security, 2015(29):66-71,
12
2015.
Linux New Media.
BibTeX Entry
@article{hmv15a, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye}, title = {{Seeing} {Eye} - {Set} up and operate security monitoring throughout the enterprise}, journal = {Admin: Network \& Security}, volume = {2015}, number = {29}, pages = {66-71}, year = {2015}, publisher = {Linux New Media}, address = {Manchester, England}, key = {hmv15a}, month = {12}, }
Articles in conference or workshop proceedings
-
Detektion und Prävention von Denial-of-Service Amplification Attacken - Schutz des Netzes aus Sicht eines Amplifiers.
In Sicherheit in vernetzten Systemen: 22. DFN-Konferenz,
pages H-1-H-13,
2
2015.
Books on Demand.
BibTeX Entry
@inproceedings{rvbb15, author = {Helmut Reiser and Felix von Eye and Timm Böttger and Lothar Braun and Georg Carle and Oliver Gasser}, title = {{Detektion} und {Prävention} von {Denial-of-Service} {Amplification} {Attacken} - {Schutz} des {Netzes} aus {Sicht} eines {Amplifiers}}, booktitle = {Sicherheit in vernetzten Systemen: 22. DFN-Konferenz}, volume = {2015}, pages = {H-1-H-13}, year = {2015}, publisher = {Books on Demand}, address = {Norderstedt, Deutschland}, key = {rvbb15}, month = {2}, } -
DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks.
In Traffic Monitoring and Analysis,
pages 205-218,
5
2015.
Springer International Publishing.
BibTeX Entry
@inproceedings{rvbb15a, author = {Helmut Reiser and Felix von Eye and Timm Böttger and Lothar Braun and Oliver Gasser and Georg Carle}, title = {{DoS} {Amplification} {Attacks} - {Protocol-Agnostic} {Detection} of {Service} {Abuse} in {Amplifier} {Networks}}, booktitle = {Traffic Monitoring and Analysis}, volume = {2015}, pages = {205-218}, year = {2015}, publisher = {Springer International Publishing}, address = {Lugano, Switzerland}, key = {rvbb15a}, month = {5}, organization = {Lecture Notes in Computer Science 9053}, } -
A file-system abstraction for virtualized infrastructure.
In DMTF Datacenter and Cloud Management Workshop,
11
2015.
IFIP Digital Library.
PDF
BibTeX Entry
@inproceedings{danc15, author = {Vitalian Danciu}, title = {A file-system abstraction for virtualized infrastructure}, booktitle = {DMTF Datacenter and Cloud Management Workshop}, year = {2015}, publisher = {IFIP Digital Library}, pdf = {http://dl.ifip.org/db/conf/cnsm/cnsm2015sdn/PID3886183.pdf}, address = {Barcelona, Spain}, key = {danc15}, month = {11}, organization = {DMTF}, } -
Improving higher education network security by automating scan result evaluation with Dr. Portscan.
In EUNIS Journal of Higher Education IT - EJHEIT,
pages 11-20,
5
2015.
PDF
BibTeX Entry
@inproceedings{hmvp14, author = {Wolfgang Hommel and Stefan Metzger and Felix von Eye and Daniela Pöhn}, title = {{Improving} higher education network security by automating scan result evaluation with {Dr.} {Portscan}}, booktitle = {EUNIS Journal of Higher Education IT - EJHEIT}, volume = {2015}, number = {2}, pages = {11-20}, year = {2015}, pdf = {http://www.eunis.org/download/2014/papers/eunis2014\_submission\_65.pdf}, address = {Umea, Sweden}, key = {hmvp14}, month = {5}, } -
Presenting the cloud as files and directories.
In 11th IEEE International Conference on eScience,
8
2015.
IEEE Xplore.
PDF
BibTeX Entry
@inproceedings{danc15a, author = {Vitalian Danciu}, title = {{Presenting} the cloud as files and directories}, booktitle = {11th IEEE International Conference on eScience}, year = {2015}, publisher = {IEEE Xplore}, pdf = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7303998}, address = {München, Germany}, key = {danc15a}, month = {8}, } -
Integrated Tool Support in the Context of Security and Network Management Convergence.
In INFOCOMP 2015, The Fifth International Conference on Advanced Communications and Computation,
pages 36-42,
6
2015.
PDF
BibTeX Entry
@inproceedings{hsv15, author = {Wolfgang Hommel and David Schmitz and Felix von Eye}, title = {{Integrated} {Tool} {Support} in the {Context} of {Security} and {Network} {Management} {Convergence}}, booktitle = {INFOCOMP 2015, The Fifth International Conference on Advanced Communications and Computation}, pages = {36-42}, year = {2015}, pdf = {http://www.thinkmind.org/download.php?articleid=infocomp\_2015\_2\_30\_60058}, key = {hsv15}, month = {6}, organization = {IARIA}, } -
Netzbasierte Erkennung von mittels Port Knocking versteckten Diensten und Backdoors.
In 8. DFN-Forum Kommunikationstechnologien - Beiträge der Fachtagung,
GI-Edition - Lecture Notes in Informatics (LNI) 243,
pages 57-67,
6
2015.
Gesellschaft für Informatik.
BibTeX Entry
@inproceedings{hvg15, author = {Wolfgang Hommel and Felix von Eye and Michael Grabatin}, title = {{Netzbasierte} {Erkennung} von mittels {Port} {Knocking} versteckten {Diensten} und {Backdoors}}, booktitle = {8. DFN-Forum Kommunikationstechnologien - Beiträge der Fachtagung}, volume = {2015}, pages = {57-67}, year = {2015}, series = {GI-Edition - Lecture Notes in Informatics (LNI) 243}, publisher = {Gesellschaft für Informatik}, address = {Bonn, Deutschland}, key = {hvg15}, month = {6}, } -
Effective Security Monitoring Through System Recognition.
In ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection,
pages 8-11,
6
2015.
PDF
BibTeX Entry
@inproceedings{vone15, author = {Felix von Eye}, title = {{Effective} {Security} {Monitoring} {Through} {System} {Recognition}}, booktitle = {ICIMP 2015, The Tenth International Conference on Internet Monitoring and Protection}, pages = {8-11}, year = {2015}, pdf = {https://www.thinkmind.org/download.php?articleid=icimp\_2015\_1\_20\_30008}, key = {vone15}, month = {6}, organization = {IARIA}, } -
Redefining the Cloud Based on Beneficial Service Characteristics - A New Cloud Taxonomy Leads to Economically Reasonable Semi-cloudification.
In Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER),
pages 135-144,
5
2015.
Science and Technology Publications (SCITEPRESS).
ISBN 978-989-758-104-5, DOI: 10.5220/0005446401350144
BibTeX Entry
@inproceedings{kekr15, author = {Bastian Kemmler and Dieter Kranzlmüller}, title = {{Redefining} the {Cloud} {Based} on {Beneficial} {Service} {Characteristics} - A {New} {Cloud} {Taxonomy} {Leads} to {Economically} {Reasonable} {Semi-cloudification}}, booktitle = {Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER)}, volume = {2015}, pages = {135-144}, year = {2015}, publisher = {Science and Technology Publications (SCITEPRESS)}, address = {Lisbon, Portugal}, key = {kekr15}, month = {5}, note = {ISBN 978-989-758-104-5, DOI: 10.5220/0005446401350144}, organization = {Institute for Systems and Technologies of Information, Control and Communication (INSTICC)}, } -
Practical Resource Management in Power-Constrained, High Performance Computing.
In Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2015, Portland, OR, USA, June 15-19, 2015,
pages 121 - 132,
6
2015.
ACM.
BibTeX Entry
@inproceedings{plsm15, author = {Tapasya Patki and David K. Lowenthal and Anjana Sasidharan and Matthias Maiterth and Barry Rountree and Martin Schulz and Bronis R. Supinski}, title = {{Practical} {Resource} {Management} in {Power-Constrained,} {High} {Performance} {Computing}}, booktitle = {Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2015, Portland, OR, USA, June 15-19, 2015}, pages = {121 - 132}, year = {2015}, publisher = {ACM}, key = {plsm15}, month = {6}, } -
Efficient Security for Homenet IoT and M2M Communications.
In Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks,
Q2SWinet 15,
pages 9-17,
11
2015.
ACM New York.
embedded-sec-lab
PDF
BibTeX Entry
@inproceedings{mpg15a, author = {Daniel Migault and Daniel Palomares and Tobias Guggemos}, title = {{Efficient} {Security} for {Homenet} {IoT} and {M2M} {Communications}}, booktitle = {Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks}, volume = {2015}, number = {15}, pages = {9-17}, year = {2015}, series = {Q2SWinet 15}, publisher = {ACM New York}, pdf = {http://dl.acm.org/citation.cfm?id=2815317.2815323}, address = {Cancun Mexico}, crossref = {ACM Digital Library}, key = {mpg15a}, month = {11}, note = {embedded-sec-lab}, organization = {ACM}, } -
iHEARU-PLAY: Introducing a game for crowdsourced data collection for affective computing.
In 1st International Workshop on Automatic Sentiment Analysis in the Wild (WASA 2015), satellite of the 6th biannual Conference on Affective Computing and Intelligent Interaction (ACII 2015),
pages 891-897,
9
2015.
PDF
BibTeX Entry
@inproceedings{haes15, author = {Simone Hantke and Tobias Appel and Florian Eyben and Björn Schuller}, title = {{iHEARU-PLAY:} {Introducing} a game for crowdsourced data collection for affective computing}, booktitle = {1st International Workshop on Automatic Sentiment Analysis in the Wild (WASA 2015), satellite of the 6th biannual Conference on Affective Computing and Intelligent Interaction (ACII 2015)}, pages = {891-897}, year = {2015}, pdf = {http://www.fim.uni-passau.de/fileadmin/files/lehrstuhl/schuller/Publications/Hantke15-IIA.pdf}, address = {Xian, P.R. China}, key = {haes15}, month = {9}, organization = {AAAC, IEEE}, } -
Message Leak Detection in Debugging Large-Scale Parallel Applications.
In 2015 International Conference on Advanced Computing and Applications (ACOMP),
pages pp. 82-89,
11
2015.
IEEE.
PDF
BibTeX Entry
@inproceedings{adn15, author = {Do-Mai Anh-Tu and Dang Diep and Thoai Nam}, title = {{Message} {Leak} {Detection} in {Debugging} {Large-Scale} {Parallel} {Applications}}, booktitle = {2015 International Conference on Advanced Computing and Applications (ACOMP)}, pages = {pp. 82-89}, year = {2015}, publisher = {IEEE}, pdf = {https://ieeexplore.ieee.org/document/7422378}, address = {Ho Chi Minh City, Vietnam}, key = {adn15}, month = {11}, }
Internal reports
-
Schlussbericht BNBest-BMBF 98 - Projekt SASER.
SASER-Projekt,
10
2015.
BibTeX Entry
@techreport{hovo15, author = {Wolfgang Hommel and Felix von Eye}, title = {{Schlussbericht} {BNBest-BMBF} 98 -- {Projekt} {SASER}}, year = {2015}, institution = {SASER-Projekt}, key = {hovo15}, month = {10}, type = {Schlussbericht}, } -
Deliverable M2.14: Evaluation of Procedures for Network Control and Operation.
SASER-Projekt,
7
2015.
BibTeX Entry
@techreport{vaaa15, author = {Felix von Eye and Iris Adam and Djamel Amar and Jean-Luc Augé and Nicolas Brochier and Steffen Gebert and Philippe Gravey and Andreas Köpsel and Stanislav Lange and Esther Le Rouzic and Julien Meuric and Michel Morvan and Ernst-Dieter Schmidt and Jan-Erik Stange and Haï Dao Thanh and Thomas Zinner}, title = {{Deliverable} {M2.14:} {Evaluation} of {Procedures} for {Network} {Control} and {Operation}}, year = {2015}, institution = {SASER-Projekt}, key = {vaaa15}, month = {7}, type = {Meilensteinbericht}, }
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

