Quantcast
Channel: News: Informatik 4
Browsing all 1918 articles
Browse latest View live

Anna Pape: "Net Topological Methods in IT-Security"

Everybody is cordially invited to attend.

View Article


Haris Abdullah: "Secure Document Sharing via Crypto"

Everybody is cordially invited to attend.

View Article


Naman Jain: "Investigate the suitability of software metrics for...

Everybody is cordially invited to attend.

View Article

Lukas Wenz, Xhoan Qazimi, Amr Wanli: "Batch Script (De)Obfuscation"

Everybody is cordially invited to attend.

View Article

Jonas Bal: "Industrial Ethernet"

Everybody is cordially invited to attend.

View Article


Franziska Schelleis und Leo Kyster Oerter: "Development of an open source...

Everybody is cordially invited to attend.

View Article

Michael Lomberg: "Decompilation Utilizing Large Language Models"

Everybody is cordially invited to attend.

View Article

Axel Mahr: „Evaluation of the Applicability of Similarity Hashing Algorithms...

Everybody is cordially invited to attend.

View Article


Kevin Neuhöfer: „On the Feasibility of Post-Decompilation Goto Removal and...

Everybody is cordially invited to attend.

View Article


Spartak Ehrlich: „Recognizing algorithms in compiled binary executables with...

Everybody is cordially invited to attend.

View Article

Felix Hartkopf:" Intrusion Detection für homogene IoT-Geräte unter Anwendung...

Everybody is cordially invited to attend.

View Article

Lukas Glöckner, Joshua Huberti, Marc Oliver Krüppel: "Erkennung von...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Nicolas Gassen, Philipp Herzog, Daniel Roos, Kai Sturm: "Automatisierter...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Timo Peperle: "Vetrauensmodelle gegen Adversarial Attacks auf neuronale...

Everybody is cordially invited to attend.

View Article

Felix Viola: "Templating Probe Requests to improve Device Identification...

Everybody is cordially invited to attend.

View Article


Marcel Heinsch: "Automatisierte Regelerstellung für Code-Analyse-Tools durch...

Everybody is cordially invited to attend.

View Article

Suleiman Odeh: "Praktikum beim WDR"

Everybody is cordially invited to attend.

View Article


Luana Pätzold: "Domainklassifizierung nach Vorbild EXPOSURE"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Mohammed Abdel Rahman, Lukas Idasiak, David Passens: "Clustering von Newly...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Louis Hänsch: "System zum Überwachen von Türen und Fenstern mithilfe von...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article
Browsing all 1918 articles
Browse latest View live