Quantcast
Channel: News: Informatik 4
Browsing all 1918 articles
Browse latest View live

Florian Hartmann: „Paket-Manager-Forensik“

Everybody is cordially invited to attend.

View Article


Philipp Bönninghausen: „A systematic analysis of cybersecurity datasets in...

Everybody is cordially invited to attend.

View Article


Johannes Kretz: „Codegenerierung in .NET Malware"

Everybody is cordially invited to attend.

View Article

Lennart Kaulen: „Identifikation von USB-Geräten über Artefakte von...

Everybody is cordially invited to attend.

View Article

Marten Georg Ringwelski: „NeighBSim: Context-Sensitive Binary Code Similarity...

Everybody is cordially invited to attend.

View Article


Finn Kalvelage: "Erweiterung des IDN-File-Player und...

Everybody is cordially invited to attend.

View Article

Manfred Fandel-Backhausen: "Modelling of Construction Materials for...

Everybody is cordially invited to attend.

View Article

Anja Götz: "Analyse der Effektivität von Transformern zur Erkennung von...

Everybody is cordially invited to attend.

View Article


Jan Schmid: "Praktikum beim Zentrum für Cybersicherheit der Bundeswehr"

Everybody is cordially invited to attend.

View Article


Lena Berster: "Honeypot Attraction Level"

Everybody is cordially invited to attend.

View Article

Franziska Rau: "Aufklärung öffentlicher Unternehmensressourcen"

Everybody is cordially invited to attend.

View Article

Lina Ebelt: "Privatsphäre-erhaltender Abgleich von Datensätzen im humanitären...

Everybody is cordially invited to attend.

View Article

Ben Balci: "Verschleierung von getunnelten TLS-Handshakes zur Zensurumgehung"

Everybody is cordially invited to attend.

View Article


Maria Alexander und Joris Lamberty: "Nachbau eines...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Benedikt Glas: "Web-Fingerprinting"

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article


Alexandra Kimmel und Mathias Maureder: "Möglichkeiten des Session Hijacking...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article

Carl Gadde und Florian Willms: "Automatisches Sammeln maliziöser...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article


Jennifer Kroppen: "Interaction Challenges between Browser-Based Password...

Everybody is cordially invited to attend.

View Article

Kai Oliver Großhanten: "Review of Supply Chain Attacks via IDE extensions"

Everybody is cordially invited to attend.

View Article

Amelie Artmann und Ümmügülsüm Ates: "Evaluation der Sicherheit von...

(Seminarvortrag PG IT-Sicherheit/Cyber Security)

View Article
Browsing all 1918 articles
Browse latest View live