208 results on '"Dietrich, Sven"'
Search Results
2. Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure
3. QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
4. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)
5. MIAMI-AD (Methylation in Aging and Methylation in AD): an integrative knowledgebase that facilitates explorations of DNA methylation across sex, aging, and Alzheimer’s disease
6. A Secure Submission System for Online Whistleblowing Platforms
7. Bodyweight-adjusted rivaroxaban for children with venous thromboembolism (EINSTEIN-Jr): results from three multicentre, single-arm, phase 2 studies
8. QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
9. Attacks on tomorrow’s virtual world
10. Serum vascular endothelial growth factor is a potential biomarker for acute mountain sickness
11. Detecting zero-day attacks using context-aware anomaly detection at the application-layer
12. Erratum to: Financial Cryptography and Data Security
13. Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes
14. Art Style, Art & Culture International Magazine, no. 7
15. WECSR Preface
16. Erratum to: Financial Cryptography and Data Security
17. A Secure Submission System for Online Whistleblowing Platforms
18. WECSR Preface
19. Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces
20. Network Attack Detection and Defense (Dagstuhl Seminar 16361)
21. Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure
22. Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends
23. Network Attack Detection and Defense (Dagstuhl Seminar 16361)
24. Changes of growth factors under the influence of hypobaric hypoxia and physical activity
25. Cybersecurity and the Future
26. Security Challenges and Opportunities of Software-Defined Networking
27. Ethics in Data Sharing (Dagstuhl Seminar 14052)
28. Detecting zero-day attacks using context-aware anomaly detection at the application-layer
29. Ethics in Data Sharing (Dagstuhl Seminar 14052)
30. Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY 2004)
31. Ethics in Data Sharing: Developing a Model for Best Practice
32. SEI Independent Research and Development Projects (FY 2003)
33. Experiments with P2P Botnet Detection
34. Building an Active Computer Security Ethics Community
35. SEI Independent Research and Development Projects
36. Friends of an enemy
37. Session details: Anonymization techniques
38. Session details: Attacks 2
39. P2P as botnet command and control: A deeper insight
40. New Directions in Peer-to-Peer Malware
41. Session details: Protocols and spam filters
42. Secure Software Architecture, Design, Implementation and Assurance
43. Friends of an enemy.
44. What Instills Trust? A Qualitative Study of Phishing.
45. A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
46. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
47. Mental Models of Security Risks.
48. Usability Analysis of Secure Pairing Methods.
49. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.
50. Improving Usability by Adding Security to Video Conferencing Systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.