Quantcast
Channel: News: Informatik 4
Browsing all 1918 articles
Browse latest View live

Tobias Hürten: "A Comparison of Adversarial Attacks against Reinforcement...

Everybody is cordially invited to attend.

View Article


Florian Spelter: "Comparing the Robustness of Reinforcement Learning Based...

Everybody is cordially invited to attend.

View Article


Luca Liberto: "Comparing Detection Mechanisms for Adversarial Attacks within...

Everybody is cordially invited to attend.

View Article

Leon Vogel: "Funktionsweise und Verbreitung von sicherheitsrelevanten...

Everybody is cordially invited to attend.

View Article

Jonas Görgen: "Erkennung von JavaScript-Bibliotheken in minifizierter oder...

Everybody is cordially invited to attend.

View Article


Ellen Bundschuh: "Evaluation der Qualität von synthetischen Daten"

Everybody is cordially invited to attend.

View Article

Annika Friedrichs: "Automatisierte Sicherheitsprüfung für Softwareprotokolle...

Everybody is cordially invited to attend.

View Article

Leon Holz: „Auto-Skalierung von Cloud-Infrastruktur mithilfe von Ansible“

Everybody is cordially invited to attend.

View Article


Pascal Hertleif: „A Method for Reproducible Quality Measurements of Leak...

Everybody is cordially invited to attend.

View Article


Honglin Chen: „Automatische Sammlung von geleakten Nutzerdaten aus...

Everybody is cordially invited to attend.

View Article

Charlene Stuke: "Detection of Malicious Packages With Automatically Generated...

Everybody is cordially invited to attend.

View Article

Leander Schickhaus: "Migration und Evaluation eines IDN Netzwerkempfängers"

Everybody is cordially invited to attend.

View Article

Sebastian Tasch: "IDN-Android-Viz: Development and Evaluation of an IDN...

Everybody is cordially invited to attend.

View Article


Leon Holz: „Auto-Skalierung von Cloud-Infrastruktur mithilfe von Ansible“

Everybody is cordially invited to attend.

View Article

Leonie Köchling: „Wie effizient sind clusterbasierte Verfahren zur...

Everybody is cordially invited to attend.

View Article


Evelyn Lippmann und Tim Vellmer: „How expensive are LVI mitigations?"

Everybody is cordially invited to attend.

View Article

Charlene Stucke: "Statistical Classification of Maliciously Manipulated...

Everybody is cordially invited to attend.

View Article


Felix Lehmann: "Side Channel Attacks on Google Titan Key"

Everybody is cordially invited to attend.

View Article

Rezwan Md Ashik: "Predicting traffic behavior in smart cities"

Everybody is cordially invited to attend.

View Article

Tobias Wilkat: „Analysis of CVE patch data to extract vulnerable code patterns“

Everybody is cordially invited to attend.

View Article
Browsing all 1918 articles
Browse latest View live