↧
Philipp Bönninghausen: „A systematic analysis of cybersecurity datasets in...
Everybody is cordially invited to attend.
View ArticleJohannes Kretz: „Codegenerierung in .NET Malware"
Everybody is cordially invited to attend.
View ArticleLennart Kaulen: „Identifikation von USB-Geräten über Artefakte von...
Everybody is cordially invited to attend.
View ArticleMarten Georg Ringwelski: „NeighBSim: Context-Sensitive Binary Code Similarity...
Everybody is cordially invited to attend.
View ArticleFinn Kalvelage: "Erweiterung des IDN-File-Player und...
Everybody is cordially invited to attend.
View ArticleManfred Fandel-Backhausen: "Modelling of Construction Materials for...
Everybody is cordially invited to attend.
View ArticleAnja Götz: "Analyse der Effektivität von Transformern zur Erkennung von...
Everybody is cordially invited to attend.
View ArticleJan Schmid: "Praktikum beim Zentrum für Cybersicherheit der Bundeswehr"
Everybody is cordially invited to attend.
View ArticleFranziska Rau: "Aufklärung öffentlicher Unternehmensressourcen"
Everybody is cordially invited to attend.
View ArticleLina Ebelt: "Privatsphäre-erhaltender Abgleich von Datensätzen im humanitären...
Everybody is cordially invited to attend.
View ArticleBen Balci: "Verschleierung von getunnelten TLS-Handshakes zur Zensurumgehung"
Everybody is cordially invited to attend.
View ArticleMaria Alexander und Joris Lamberty: "Nachbau eines...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleAlexandra Kimmel und Mathias Maureder: "Möglichkeiten des Session Hijacking...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleCarl Gadde und Florian Willms: "Automatisches Sammeln maliziöser...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View ArticleJennifer Kroppen: "Interaction Challenges between Browser-Based Password...
Everybody is cordially invited to attend.
View ArticleKai Oliver Großhanten: "Review of Supply Chain Attacks via IDE extensions"
Everybody is cordially invited to attend.
View ArticleAmelie Artmann und Ümmügülsüm Ates: "Evaluation der Sicherheit von...
(Seminarvortrag PG IT-Sicherheit/Cyber Security)
View Article