Quantcast
Channel: News: Informatik 4
Browsing all 1918 articles
Browse latest View live

Abdulmalik Araoye, Ben Balci: "Evaluation von Anwendungen zur Emulation...

Everybody is cordially invited to attend.

View Article


Jonathan Heinz: "Topological One Class Learning"

Everybody is cordially invited to attend.

View Article


Jonas Bal: "Credential Check mit Proxy Erweiterung"

Everybody is cordially invited to attend.

View Article

Spartak Ehrlich: „Prompt injection attacks on Large Language Models“

Everybody is cordially invited to attend.

View Article

Evelyn Lippmann, Tim Vellmer: "Performance of LVI mitigations based on Intel...

Everybody is cordially invited to attend.

View Article


Nicholas Malte Kreimeyer: "TipToi Hacking"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Michael Külper: „Analyzing SSH traffic for authentication attempts“

Everybody is cordially invited to attend.

View Article

Yannik Arndt, Joshua Küpper: "Online-Raumpläne"

Everybody is cordially invited to attend.

View Article


Michelle Wörsdörfer, Ahmad Arnous: "ARP-Poisoning"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Pascal Kühnemann: „Applicability of Data Flow Stitching to modern Linux"

Everybody is cordially invited to attend.

View Article

Jan Schmid: "Privatsphäre-erhaltendes Maschinelles Lernen"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Finn Kalvelage: "Entwicklung einer betriebssystemunabhängigen Abspielsoftware...

Everybody is cordially invited to attend.

View Article

Lars Taufenbach: "Automatisierte Erkennung und Visualisierung von Open-Source...

Everybody is cordially invited to attend.

View Article


Anna Höpfner: "Die Auswirkungen von Sampling auf...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Timo Peperle, Felix Hartkopf: "Untersuchung von Sybil-Angriffen im...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Aziz Khorassani: "Automatisierte Anomalieerkennung bei Homogenen IoT-Geräten"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Finn Koller: "Reinforcement Learning zur Steuerung der Heilung...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Jan Silas Kupfer: "Flipper Zero - Ein Multifunktions-Werkzeug für...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Nazmi Guliyeva, Hajar Sabbah, Anja Goetz: "Sicherheits- und Qualitätsmetriken...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Image may be NSFW.
Clik here to view.

5.11.2023 - 10 Years IDN

Article on LinkedIn in german: https://www.linkedin.com/

View Article
Browsing all 1918 articles
Browse latest View live