Gina Muuss: "Privacy Preserving Collaboration in industrial contexts"
Everybody is cordially invited to attend.
View ArticleTim Goos: "Analysis of the Kaseya Software Supply Chain Attack"
Everybody is cordially invited to attend.
View ArticleMaximilian Düssler: "Analysis of the ZigBee protocol"
Everybody is cordially invited to attend.
View ArticleJonas Bode, Tobias Hürten, Luca Liberto und Florian Spelter: "Exploring...
(Seminarvortrag PG Cyber Security/Kommunikationssysteme)
View ArticleTimo Pohl: "With Great Power Comes Great Responsibility - On the State of...
Everybody is cordially invited to attend.
View ArticleAlexander Börries, Yannik Jiritschka und Malik Mzee: "5G Simulation mit dem...
Everybody is cordially invited to attend.
View ArticleArthi Leela Arumugam, Leon Holz: "Shopsystem-Plugin zur Überprüfung der...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleHonglin Chen: "Opencart-Plugin zur Überprüfung auf geleakte Anmeldedaten...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticlePaul Hege, Leo Schmidt: "Entwicklung eines Plugins zur datenschutzkonformen...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleTim Dmoch: "Eine Zusammenfassung des State of Security in DICOM-Systemen"
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleLeon Luca Lausberg, Leon Vogel: "Praktinizer - Entwicklung einer...
Everybody is cordially invited to attend.
View ArticleJonas Görgen, Christian Schultze: "Evaluation von WiFi-Lokalisierungsdaten"
Everybody is cordially invited to attend.
View ArticleJunior Atemebang Ashu, Malte Grimm, Michail Trubizkij: "Emergency Response...
Everybody is cordially invited to attend.
View ArticleCalvin Huebner: "Statistische Charakterisierung bekannter, trojanisierter...
Everybody is cordially invited to attend.
View ArticleLeon Römer: "Reinforcement learning in ad-hoc networks with authentication...
Everybody is cordially invited to attend.
View ArticleApolonia Gottwald: "Simulations to evaluate the practical usability of...
Everybody is cordially invited to attend.
View ArticleLeo Wilms: "How May Explainable Artificial Intelligence Improve IT Security...
Everybody is cordially invited to attend.
View ArticleJonas Prämaßing: "Portable Data Collection Framework and Analysis of...
Everybody is cordially invited to attend.
View ArticleJan Ossowski: "Reifegradmodell der Informationssicherheit für KMUs"
Everybody is cordially invited to attend.
View ArticleJoris Kutzner: „Evaluation of Yara Rules in the Context of live Memory Scanning“
Everybody is cordially invited to attend.
View Article