Quantcast
Channel: News: Informatik 4
Browsing all 1943 articles
Browse latest View live

Lennart Henke: „Finding Use After Free Vulnerabilities Using Symbolic...

Everybody is cordially invited to attend.

View Article


Daniel Nagy: „Filtering Internet background noise from network captures"

Everybody is cordially invited to attend.

View Article


Marvin Löhr: „Fidelity of Intermediate Representations of Assembly Code"

Everybody is cordially invited to attend.

View Article

Melina Hoffmann: "Linking Online and Offline Identity Profiles for Future...

Everybody is cordially invited to attend.

View Article

Dongyuan Zhang: "A Comparison of Graph Models to model Tactical Networks"

Everybody is cordially invited to attend.

View Article


Fabian Ermisch, Ali Reda: "Rekonstruktion von leerzeichen-losem Morsecode"

Everybody is cordially invited to attend.

View Article

Björn Carlberg: "Automating Digital Forensics"

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Janko Höner: "Analytischer Vergleich von allgemeinen Backup-Lösungen"

Everybody is cordially invited to attend.

View Article


Jannis Borg-Olivier, Leonard Gerschel, Lars Morkovsky: "Adding Decryption...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article


Ümmügülsüm Ates, Konrad Blessing: "Forensische Extraktion von Artefakten...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Jonas Bal, Jakob Kreutz: "Credential Check mit Proxy Erweiterung"

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Dana Lauer, Kristi Balla, Pierre Serangeli, Kevin Neuhöfer: "Automatische...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Manfred Fandel-Backhausen: "3D Radiowave signal propagation using Blender"

Everybody is cordially invited to attend.

View Article


Lina Ebelt, Ege Cabuk, Noah Dünnwald, Lysander Lenzen:...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Julius Lange: "Emulationsmethoden für Firmware"

Everybody is cordially invited to attend.

View Article


Eric Nathrath: "Android Forensic Artifact Extractor"

Everybody is cordially invited to attend.

View Article

Maja Overath: "IT-Risikomanagement bei der Charité Universitätsmedizin Berlin"

Everybody is cordially invited to attend.

View Article


Image may be NSFW.
Clik here to view.

Dr. Matthias Frank erhält Lehrpreis der Universität Bonn

Beim 13. Universitätsfest am 1.7.2017 wurde Dr. Matthias Frank (Institut für Informatik 4) mit einem der Lehrpreise der mathematisch-naturwissenschaftlichen Fakultät der Universität Bonn ausgezeichnet...

View Article

Image may be NSFW.
Clik here to view.

Abschlussarbeit erhält AFCEA Studienpreis

Im Rahmen der Koblenzer IT-Tagung in der Stadthalle Koblenz am 7. September belegte Herr Sergio Valmorisco Sierra mit seiner Masterarbeit mit dem Titel „Privacy-Aware Next Location Prediction Using...

View Article

Jonas Bode: "Comparing Defenses for Robust Reinforcement Learning against...

Everybody is cordially invited to attend.

View Article
Browsing all 1943 articles
Browse latest View live