Anna Pape: "Net Topological Methods in IT-Security"
Everybody is cordially invited to attend.
View ArticleHaris Abdullah: "Secure Document Sharing via Crypto"
Everybody is cordially invited to attend.
View ArticleNaman Jain: "Investigate the suitability of software metrics for...
Everybody is cordially invited to attend.
View ArticleLukas Wenz, Xhoan Qazimi, Amr Wanli: "Batch Script (De)Obfuscation"
Everybody is cordially invited to attend.
View ArticleFranziska Schelleis und Leo Kyster Oerter: "Development of an open source...
Everybody is cordially invited to attend.
View ArticleMichael Lomberg: "Decompilation Utilizing Large Language Models"
Everybody is cordially invited to attend.
View ArticleAxel Mahr: „Evaluation of the Applicability of Similarity Hashing Algorithms...
Everybody is cordially invited to attend.
View ArticleKevin Neuhöfer: „On the Feasibility of Post-Decompilation Goto Removal and...
Everybody is cordially invited to attend.
View ArticleSpartak Ehrlich: „Recognizing algorithms in compiled binary executables with...
Everybody is cordially invited to attend.
View ArticleFelix Hartkopf:" Intrusion Detection für homogene IoT-Geräte unter Anwendung...
Everybody is cordially invited to attend.
View ArticleLukas Glöckner, Joshua Huberti, Marc Oliver Krüppel: "Erkennung von...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleNicolas Gassen, Philipp Herzog, Daniel Roos, Kai Sturm: "Automatisierter...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleTimo Peperle: "Vetrauensmodelle gegen Adversarial Attacks auf neuronale...
Everybody is cordially invited to attend.
View ArticleFelix Viola: "Templating Probe Requests to improve Device Identification...
Everybody is cordially invited to attend.
View ArticleMarcel Heinsch: "Automatisierte Regelerstellung für Code-Analyse-Tools durch...
Everybody is cordially invited to attend.
View ArticleLuana Pätzold: "Domainklassifizierung nach Vorbild EXPOSURE"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleMohammed Abdel Rahman, Lukas Idasiak, David Passens: "Clustering von Newly...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleLouis Hänsch: "System zum Überwachen von Türen und Fenstern mithilfe von...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View Article