Quantcast
Channel: News: Informatik 4
Browsing all 1918 articles
Browse latest View live

Kevin Neuhöfer: „On the Feasibility of Post-Decompilation Goto Removal and...

Everybody is cordially invited to attend.

View Article


Michael Külper: „Proxy Patrol: Systematizing and Investigating Network...

Everybody is cordially invited to attend.

View Article


Michael Külper: „Port-rait of a Hacker: Unmasking Malicious Server...

Everybody is cordially invited to attend.

View Article

Axel Mahr: „Dissecting and Systematizing C2 Protocols of Prevalent RATs"

Everybody is cordially invited to attend.

View Article

Axel Mahr: „RATatouille: Developing Recipes for RAT Controller Detection and...

Everybody is cordially invited to attend.

View Article


Joshua Huberti: „Verbesserung der Dateisystem-Exploration von SIM-Karten...

Everybody is cordially invited to attend.

View Article

Helga Behrendt: „Identification of SSL wrapper functions in Android-based...

Everybody is cordially invited to attend.

View Article

Elias Gläßer: "Identity Leakage User Experience"

Everybody is cordially invited to attend.

View Article


Evelyn Lippmann: "Implemented Security Check of Cybersecurity-Systems for...

Everybody is cordially invited to attend.

View Article


Daniel Lingnau: "Erweiterung des OpenIDN-Laser-DAC-Framework" - VERSCHOBEN!...

Everybody is cordially invited to attend.

View Article

Alexandra Kimmel und Mathias Maureder: "Möglichkeiten des Session Hijacking...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Amelie Artmann: "Bewertung der Sicherheit von KI-gestützter Codegenerierung"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Carl Gadde und Florian Willms: "Automatisches Sammeln maliziöser...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Daniel Lingnau: "Erweiterung des OpenIDN-Laser-DAC-Framework"

Everybody is cordially invited to attend.

View Article

Roman Lichnok: "Erweiterung des IDN Dissectors in Wireshark"

Everybody is cordially invited to attend.

View Article


Maria Alexander und Joris Lamberty: "Nachbau eines...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Benedikt Glas: "Web-Fingerprinting"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article


Gregor Hagemann und Georg Heindl: "Pipeline für ressourcenschonende...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Aura Pop: "Erstellung einer IT-Sicherheitsschulung"

Everybody is cordially invited to attend.

View Article

Gregor Bauer: "Analyse der Reproduzierbarkeit von Builds bei...

Everybody is cordially invited to attend.

View Article
Browsing all 1918 articles
Browse latest View live