The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Sicherheit"( http://dblp.L3S.de/Venues/Sicherheit )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sicherheit

Publication years (Num. hits)
2005 (44) 2006 (47) 2008 (52) 2010 (31) 2012 (26) 2013-2014 (38) 2016 (27) 2018 (27) 2020 (18) 2022 (21)
Publication types (Num. hits)
inproceedings(321) proceedings(10)
Venues (Conferences, Journals, ...)
Sicherheit(331)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 331 publication records. Showing 331 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jonas Möller Differential Testing: How to find differences between programs that mostly behave identically? Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fabian Lochmann, Sebastian Schmerl Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein Praxisbericht. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Moritz Gruber, Christian Höfig, Matteo Große-Kampmann, Tobias Urban, Norbert Pohlmann Short Paper: Business Chat ist verwirrt. Es hat sich vor Verwirrung selbst verletzt! Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Torge Hinrichs Ongoing Automated Data Set Generation for Vulnerability Prediction from Github Data. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Viktor Garske, Andreas Noack Recovering information from pixelized credentials. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christoph Saatjohann, Fabian Ising, Matthias Gierlings, Dominik Noss, Sascha Schimmler, Alexander Klemm, Leif Grundmann, Tilman Frosch, Sebastian Schinzel Sicherheit medizintechnischer Protokolle im Krankenhaus. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Robin Müller, Julius Ruppert, Katharina Will, Lukas Wüsteney, Tobias Heer Analyzing the Software Patch Discipline Across Different Industries and Countries. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Matthias Güdemann SMT-Based Verification of Concurrent Critical System. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jan Gruber, Felix C. Freiling Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hauke Heseding Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anne Hennig Your website has been hijacked: Raising awareness for an invisible problem. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carsten Strotmann, Patrick Ben Koetter, Roland van Rijswijk-Deij, Markus de Brün, Anders Kölligan Studie über das Gefahrenpotential und Gegenmaßnahmen zu Angriffen auf das DNS Protokoll durch IP-Fragmentierung. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Florian Jacob, Saskia Bayreuther, Hannes Hartenstein On CRDTs in Byzantine Environments. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer Recent Developments in the Context of Online Elections and Digital Polls in Germany. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltán Ádám Mann (eds.) Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  BibTeX  RDF
1Nico Mayer, Steffen Wendzel, Jörg Keller 0001 Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jan Breig, Dirk Westhoff Short Paper: Debating Ethics with Cybersecurity Students. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Dominik Doerner, Jeremias Mechler, Jörn Müller-Quade Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Bastian Fraune Automated Monitoring of Operational Technology Security and Compliance for Power Grids. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christian Burkert, Jonathan Balack, Hannes Federrath PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nurullah Demir, Daniel Theis, Tobias Urban, Norbert Pohlmann Towards Understanding First-Party Cookie Tracking in the Field. Search on Bibsonomy Sicherheit The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Matthias Marx Abusers don't get Privacy. Sensitively Logging and Blocking Tor Abuse. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 Sicherheit 2020 - Komplettband. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  BibTeX  RDF
1Nico Müller, Tilo Müller, Felix C. Freiling Urheberrecht ./. Sicherheitsanalyse. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Frauke Greven Informationssicherheit für KRITIS-Betreiber: Kritische Dienstleistungen systematisch schützen. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Lukaseder, Maya Halter, Frank Kargl Context-based Access Control and Trust Scores in Zero Trust Campus Networks. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Delphine Reinhardt, Hanno Langweg, Bernhard C. Witt, Mathias Fischer 0001 (eds.) Sicherheit 2020, Sicherheit, Schutz und Zuverlässigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 17.-20. März 2020, Göttingen. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  BibTeX  RDF
1Tom Petersen Datenschutzgerechte und mehrseitig sichere IT-Plattformen für die medizinische Forschung. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nurul Momen, Lothar Fritsch App-generated digital identities extracted through Android permission-based data access - a survey of app privacy. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Manfred Hofmeier, Ulrike Lechner Schwachstellen und Angriffsketten in der Wertschöpfungskette der Fleischproduktion. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stephan Wiefling Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Paul Walther, Robert Knauer, Thorsten Strufe Passive Angriffe auf kanalbasierten Schlüsselaustausch. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andreas Schaad Project OVVL - Threat Modeling Support for the entire secure development lifecycle. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marcel Kneib A Survey on Sender Identification Methodologies for the Controller Area Network. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marius Stübs Hierarchical Distributed Consensus for Smart Grids. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jan Zibuschka, Christian Zimmermann 0002 Lean Privacy by Design. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Asya Mitseva, Thomas Engel 0001, Andriy Panchenko 0001 Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Till Zimmermann, Jan Bauer, Nils Aschenbruck CryptoCAN - Ensuring Confidentiality in Controller Area Networks for Agriculture. Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alexander Richter Do Privacy Concerns Prevent Employees' Acceptance of Smart Wearables and Collaborative Robots? Search on Bibsonomy Sicherheit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sebastian Kurowski, Nicolas Fähnrich, Heiko Roßnagel On the possible impact of security technology design on policy adherent user behavior - Results from a controlled empirical experiment. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erik Buchmann, Andreas Hartmann, Stephanie Bauer Informationssicherheitskonzept nach IT-Grundschutz für Containervirtualisierung in der Cloud. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vanessa Chille, Sybille Mund, Andreas Möller Harmonizing physical and IT security levels for critical infrastructures. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Harborth, Maren Braun, Akos Grosz, Sebastian Pape 0001, Kai Rannenberg Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Julian Seuffert, Marc Stamminger, Christian Riess Towards Forensic Exploitation of 3-D Lighting Environments in Practice. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matthias Marx, Ephraim Zimmer, Tobias Mueller, Maximilian Blochberger, Hannes Federrath Hashing of personally identifiable information is not sufficient. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Pape 0001, Daniel Tasche, Iulia Bastys, Akos Grosz, Jörg Lässig, Kai Rannenberg Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Menges, Fabian Böhm, Manfred Vielberth, Alexander Puchta, Benjamin Taubmann, Noëlle Rakotondravony, Tobias Latzo Introducing DINGfest: An architecture for next generation SIEM systems. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher Späth Is MathML dangerous? Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karola Marky, Oksana Kulyk, Melanie Volkamer Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jenni Reuben Towards a Differential Privacy Theory for Edge-Labeled Directed Graphs. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Haupert, Gaston Pugliese Ich sehe was, das du nicht siehst - Die Realität von Mobilebanking zwischen allgemeinen und rechtlichen Anforderungen. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Timo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier 0001 Ein Werkzeug zur automatisierten Analyse von Identitätsdaten-Leaks. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hanno Langweg, Michael Meier 0001, Bernhard C. Witt, Delphine Reinhardt (eds.) Sicherheit 2018, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27.4.2018, Konstanz. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  BibTeX  RDF
1Christian Röpke 0001 SDN Ro2tkits: A Case Study of Subverting A Closed Source SDN Controller. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Hartmann Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality of Service. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Träder, Alexander Zeier, Andreas Heinemann Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lena Wiese, Daniel Homann, Tim Waage, Michael Brenner 0003 Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sven Bock My Data is Mine - Users' Handling of Personal Data in Everyday Life. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Leo Gorski Usability von Security-APIs für massiv-skalierbare vernetzte Service-orientierte Systeme. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steffen Ullrich Fallstricke bei der Inhaltsanalyse von Mails: Beispiele, Ursachen und Lösungsmöglichkeiten. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Geiger, Sabrina Krausz, Holger Mettler Ein integriertes Vorgehensmodell zur Planung und Umsetzung eines ISMS am Beispiel der Pharmaproduktion. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nurul Momen Turning the Table Around: Monitoring App Behavior. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Thaeter, Rüdiger Reischuk Improving Anonymization Clustering. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Übler, Johannes Götzfried, Tilo Müller Secure Remote Computation using Intel SGX. Search on Bibsonomy Sicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dominik Schürmann, Lars C. Wolf Surreptitious sharing on Android. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Christian Müller 0015, Frederik Armknecht, Zinaida Benenson, Philipp Morgner On the security of the ZigBee Light Link touchlink commissioning procedure. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann A semantic framework for a better understanding, investigation and prevention of organized financial crime. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Christopher Corbett, Elmar Schoch, Frank Kargl, Felix Preussner Automotive Ethernet: security opportunity or challenge? Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Tim Waage Order preserving encryption for wide column stores. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Leonard Renners Towards adaptive event prioritization for network security - ideas and challenges. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Saffija Kasem-Madani A framework for encrypted computation on shared data. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Jernej Tonejc, Jaspreet Kaur, Alexandra Kobekova Detecting anomalies in BACnet network data. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Severin Rast, Timo Brecher, Sabine Kammerhofer IT-Grundschutz in großen Institutionen - Herausforderungen und Lösungsstrategien. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Sebastian Hahn, Mykola Protsenko, Tilo Müller Comparative evaluation of machine learning-based malware detection on Android. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Harald Glanzer, Lukas Krammer, Wolfgang Kastner Increasing security and availability in KNX networks. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Felix Schuckert Generating security vulnerabilities in source code. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Mariia Astrakhantceva, Günter Karjoth, Bettina Hübscher Die Bordkarte als Authentifikationsmittel bei Flugreisen. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Vincent Haupert, Tilo Müller Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Jens Braband Why 2 times 2 ain't neccessarily 4 - at least not in IT security risk assessment. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Christian Röpke 0001 SDN malware: problems of current protection systems and potential countermeasures. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Jakob Rieck Attacks on fitness trackers revisited: a case-study of unfit firmware security. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Fabian Beterke Distributed evolutionary fuzzing with Evofuzz. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Dominik Herrmann, Jens Lindemann 0001 Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights? Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Stefanie Jasser Sicherheit im Softwareentwurf - Integrierte Modellierung von Security und Softwarearchitektur. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Juergen Graf, Martin Hecker 0001, Martin Mohr, Gregor Snelting Sicherheitsanalyse mit JOANA. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Florian Hertle Lessons learned bei KMUs aus dem Befall durch Ransomware. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Friedrich Praus, Wolfgang Kastner, Peter Palensky Software security requirements in building automation. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Moazzam Butt, Johannes Merkle, Ulrike Korte, Christoph Busch 0001 Correlation-resistant fuzzy vault for fingerprints. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Michael Meier 0001, Delphine Reinhardt, Steffen Wendzel (eds.) Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. April 2016, Bonn Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Siavash Valipour Designing resilient and secure smart micro grids. Search on Bibsonomy Sicherheit The full citation details ... 2016 DBLP  BibTeX  RDF
1Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Patrick Grofig, Martin Härterich, Isabelle Hang, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Frederik Armknecht, Matthias Hamann, Matthias Krause 0001 Hardware Efficient Authentication based on Random Selection. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Erik Tews, Christian Schlehuber Quantitative Ansätze zur IT-Risikoanalyse. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Andreas Westfeld Angriffe auf eine Spreizspektrummethode für Audio-Steganographie. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, Konrad Rieck Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
1Christoph Sibinger, Tilo Müller Verwendung von Festplattenvollverschlüsselung im geschäftlichen und privaten Umfeld. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 331 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license