Search

Your search keyword '"Dietrich, Sven"' showing total 208 results

Search Constraints

Start Over You searched for: Author "Dietrich, Sven" Remove constraint Author: "Dietrich, Sven"
208 results on '"Dietrich, Sven"'

Search Results

1. PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering

2. Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

3. QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection

4. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

5. MIAMI-AD (Methylation in Aging and Methylation in AD): an integrative knowledgebase that facilitates explorations of DNA methylation across sex, aging, and Alzheimer’s disease

6. A Secure Submission System for Online Whistleblowing Platforms

7. Bodyweight-adjusted rivaroxaban for children with venous thromboembolism (EINSTEIN-Jr): results from three multicentre, single-arm, phase 2 studies

9. Attacks on tomorrow’s virtual world

14. Art Style, Art & Culture International Magazine, no. 7

15. WECSR Preface

16. Erratum to: Financial Cryptography and Data Security

20. Network Attack Detection and Defense (Dagstuhl Seminar 16361)

23. Network Attack Detection and Defense (Dagstuhl Seminar 16361)

27. Ethics in Data Sharing (Dagstuhl Seminar 14052)

29. Ethics in Data Sharing (Dagstuhl Seminar 14052)

30. Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY 2004)

32. SEI Independent Research and Development Projects (FY 2003)

35. SEI Independent Research and Development Projects

44. What Instills Trust? A Qualitative Study of Phishing.

45. A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?

46. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.

47. Mental Models of Security Risks.

48. Usability Analysis of Secure Pairing Methods.

49. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.

50. Improving Usability by Adding Security to Video Conferencing Systems.

Catalog

Books, media, physical & digital resources