Phil-Tabeas Noack: "Efficient Techniques for Privacy-Preserving Sharing of...
Everybody is cordially invited to attend.
View ArticleFelix Bilstein: "Address Space Layout Randomization in Linux 4.19.37"
Everybody is cordially invited to attend.
View ArticleThorbjörn Schulz: "Modern approaches in side-channel analysis"
Everybody is cordially invited to attend.
View ArticleArne Hennies: "Coalescing Repetitive Values in Large Measurement Databases"
Everybody is cordially invited to attend.
View ArticleKonstantin Torreck: "An Evaluation of Name Systems on the Internet"
Everybody is cordially invited to attend.
View ArticleLeo Wilms: "Metrik für Syntaxbäume von Python und C Source Code"
Everybody is cordially invited to attend.
View ArticleSebastian Knopp: "Erkennung von Botnetz-Verbreitung mittels Paketanalyse"
Everybody is cordially invited to attend.
View ArticleKai Schenk: "Plug & Exploit - Lokale Angriffe über USB"
Everybody is cordially invited to attend.
View ArticleFelix Rossmann: "Visual Detection of Arbitrary Artifacts in IT-Security...
Everybody is cordially invited to attend.
View ArticleErster Platz des AFCEA-Studienpreises für Bonner Informatikstudent
Für seine Masterarbeit »File system fuzzing applied to the BSD operating system family« wurde Christopher Krah, Absolvent des Fachbereichs »Informatik« an der Rheinischen Friedrich-Wilhelms-Universität...
View ArticleSteffen Enders: "Authorship Attribution on Executable x86/x64 Binary Code"
Everybody is cordially invited to attend.
View ArticleMerlin von Rechenberg: "Network Intrusion Detection in maritimen Systemen"
Everybody is cordially invited to attend.
View ArticleNavid Azadi: "Einführung in Malware Persistence Techniken für Windows"
Everybody is cordially invited to attend.
View ArticleChristian Matthies : "State of the Art Code Injection techniques"
Everybody is cordially invited to attend.
View ArticleChih-Teng Tseng: "Evolution of Malware Spreading Techniques and Future Outlook"
Everybody is cordially invited to attend.
View ArticleChih-Teng Tseng: "Finding and Extracting Indicator of Compromise for Code...
Everybody is cordially invited to attend.
View ArticlePaul Schiffer: "State-of-the-Art Techniques to Hide Malware in a System"
Everybody is cordially invited to attend.
View Article