Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Jens Tölle
2010 – today
- 2012
[j2]Solange Ghernaouti-Helie, Jens Tölle, Jean-Jacques Quisquater: Cybercrime and Privacy Issues - Introduction to the Special Theme. ERCIM News 2012(90) (2012)
[e1]Nils Aschenbruck, Peter Martini, Michael Meier, Jens Tölle (Eds.): Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings. Communications in Computer and Information Science 318, Springer 2012, ISBN 978-3-642-33160-2
2000 – 2009
- 2009
[c17]Marko Jahnke, Jens Tölle, Christian Thul, Peter Martini: Validating GrADAR - an Approach for graph-based automated DoS attack response. LCN 2009: 225-228
[c16]Nils Aschenbruck, Jeff Boleng, Jens Tölle: The 5th LCN Workshop on Security in Communications Networks (SICK 2009). LCN 2009: 889- 2008
[c15]Joachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel: 08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008- 2007
[c14]Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tölle: Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. LCN 2007: 1043-1052
[c13]Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini: Methodologies and frameworks for testing ids in adhoc networks. Q2SWinet 2007: 113-122- 2006
[c12]Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige: A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs. DIMVA 2006: 164-180
[c11]Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle, Roland Legat, Heinz-Dieter Richmann: Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. IWIA 2006: 103-108
[c10]Jens Tölle, Harald Schmidt: Simultaneous Support of Multiple Security Protocols in a Group Communication Gateway. LCN 2006: 993-999- 2005
[j1]Marko Jahnke, Jens Tölle: Zuverlässige Intrusion Detection für dynamische Koalitionsumgebungen. Praxis der Informationsverarbeitung und Kommunikation 28(2): 107-112 (2005)
[c9]Jens Tölle, Marko Jahnke, Michael Bussmann, Sven Henkel: Meta IDS Environments: An Event Message Anomaly Detection Approach. IWIA 2005: 85-94- 2004
[c8]Marko Jahnke, Martin Lies, Sven Henkel, Michael Bussmann, Jens Tölle: Komponenten für kooperative Intrusion-Detection in dynamischen Koalitionsumgebungen. DIMVA 2004: 39-53
[c7]
[c6]Nils Aschenbruck, Matthias Frank, Wolfgang Hansmann, Peter Martini, Christoph Scholz, Jens Tölle: Integration of 3G Protocols into the Linux Kernel to Enable the Use of Generic Bearers. HSNMC 2004: 533-544
[c5]Nils Aschenbruck, Matthias Frank, Peter Martini, Jens Tölle: Human Mobility in MANET Disaster Area Simulation - A Realistic Approach. LCN 2004: 668-675- 2001
[c4]- 2000
[c3]Simon Baatz, Wolfgang Hansmann, Jens Tölle: Security of Routing Cache Updates in Cellular IP. LCN 2000: 163-164
1990 – 1999
- 1999
[c2]Markus Albrecht, Juan Altmeyer Pizzorno, Jens Tölle: Praktische Erfahrungen mit der Implementierung eines DNS-Protokoll-Intrusion-Detection-Systems. Kommunikation in Verteilten Systemen 1999: 158-169- 1997
[c1]Peter Martini, Markus Rümekasten, Jens Tölle: Tolerant Synchronization for Distributed Simulations of Interconnected Computer Networks. Workshop on Parallel and Distributed Simulation 1997: 138-141
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:56 CEST by the dblp team



