Gregor Bauer, Karen Hedstück, Jorgo Triantafilidis: "Vergleich von...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleBora Barin, Maximilian Goertz, Tobias Kupezki, Fengyi Zhao: "Hands-on...
Everybody is cordially invited to attend.
View ArticleKonrad Blessing, Kjell Graf: "Papernizr - Online-Platform zur kollaborativen...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleJonas Boppard, Lukas Kettendorf: "Bewertung der Cyber-Resilienz von...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleMarcel Heinsch: "Automatisierte Regelerstellung für Code-Analyse-Tools durch...
Everybody is cordially invited to attend.
View ArticleFelix Lehmann: "Attention Mechanisms in Neural Networks for Side Channel...
Everybody is cordially invited to attend.
View ArticleAura Pop, Nick Lukas Preis: "Optimizing Load Distribution2
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleMaliheh Fakhraei, Seyed Hamid Vahabian: "Entwicklung einer...
Everybody is cordially invited to attend.
View ArticleBora Barin, Maximilian Goertz, Tobias Kupezki, Fengyi Zhao: "Hands-on...
Everybody is cordially invited to attend.
View ArticleAlice Rahn: „Large Language Models zur Logdaten-Analyse und Angriffserkennung"
Everybody is cordially invited to attend.
View ArticleLeander Schickhaus: „Analyzing the Scudo Memory Allocator"
Everybody is cordially invited to attend.
View ArticleLeander Kohler: „Exploring malicious stalling code regions in emulation“
Everybody is cordially invited to attend.
View ArticleLukas Idasiak: „TLS-Schlüsselmaterial Extraktion von cross-platform...
Everybody is cordially invited to attend.
View ArticleGregor Bauer: "Reproducible Builds - Analyse der Reproduzierbarkeit von...
Everybody is cordially invited to attend.
View ArticleSuleiman Odeh: "Erkennung von potenziell schadhaften Erweiterungen für Visual...
Everybody is cordially invited to attend.
View ArticleFabian Ermisch: "Entwicklung und Evaluation einer Software zur Vereinigung...
Everybody is cordially invited to attend.
View ArticleAziz Khorassani: "Populationsbasierte Parameteroptimierung für die...
Everybody is cordially invited to attend.
View ArticleAbdulmalik Araoye: "Analyzing the Efficiency of Internet Censorship Measures"
Everybody is cordially invited to attend.
View Article