Abdulmalik Araoye, Ben Balci: "Evaluation von Anwendungen zur Emulation...
Everybody is cordially invited to attend.
View ArticleJonathan Heinz: "Topological One Class Learning"
Everybody is cordially invited to attend.
View ArticleJonas Bal: "Credential Check mit Proxy Erweiterung"
Everybody is cordially invited to attend.
View ArticleSpartak Ehrlich: „Prompt injection attacks on Large Language Models“
Everybody is cordially invited to attend.
View ArticleEvelyn Lippmann, Tim Vellmer: "Performance of LVI mitigations based on Intel...
Everybody is cordially invited to attend.
View ArticleNicholas Malte Kreimeyer: "TipToi Hacking"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleMichael Külper: „Analyzing SSH traffic for authentication attempts“
Everybody is cordially invited to attend.
View ArticleYannik Arndt, Joshua Küpper: "Online-Raumpläne"
Everybody is cordially invited to attend.
View ArticleMichelle Wörsdörfer, Ahmad Arnous: "ARP-Poisoning"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticlePascal Kühnemann: „Applicability of Data Flow Stitching to modern Linux"
Everybody is cordially invited to attend.
View ArticleJan Schmid: "Privatsphäre-erhaltendes Maschinelles Lernen"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleFinn Kalvelage: "Entwicklung einer betriebssystemunabhängigen Abspielsoftware...
Everybody is cordially invited to attend.
View ArticleLars Taufenbach: "Automatisierte Erkennung und Visualisierung von Open-Source...
Everybody is cordially invited to attend.
View ArticleAnna Höpfner: "Die Auswirkungen von Sampling auf...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleTimo Peperle, Felix Hartkopf: "Untersuchung von Sybil-Angriffen im...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleAziz Khorassani: "Automatisierte Anomalieerkennung bei Homogenen IoT-Geräten"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleFinn Koller: "Reinforcement Learning zur Steuerung der Heilung...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleJan Silas Kupfer: "Flipper Zero - Ein Multifunktions-Werkzeug für...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleNazmi Guliyeva, Hajar Sabbah, Anja Goetz: "Sicherheits- und Qualitätsmetriken...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View Article