Search

Your search keyword '"Dietrich, Sven"' showing total 213 results

Search Constraints

Start Over You searched for: Author "Dietrich, Sven" Remove constraint Author: "Dietrich, Sven"
213 results on '"Dietrich, Sven"'

Search Results

1. Emerging Security Challenges of Large Language Models

2. PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering

3. Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

4. QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection

5. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

6. A Secure Submission System for Online Whistleblowing Platforms

7. Bodyweight-adjusted rivaroxaban for children with venous thromboembolism (EINSTEIN-Jr): results from three multicentre, single-arm, phase 2 studies

9. MIAMI-AD (Methylation in Aging and Methylation in AD): an integrative knowledgebase that facilitates explorations of DNA methylation across sex, aging, and Alzheimer’s disease

10. Attacks on tomorrow’s virtual world

13. Multi‐ancestry whole genome sequencing analysis of 36,361 individuals from the Alzheimer's Disease Sequencing Project (ADSP).

15. MIAMI‐AD (Methylation in Aging and Methylation in AD): an integrative knowledgebase that facilitates explorations of DNA methylation across sex, aging, and Alzheimer's disease.

17. WECSR Preface

18. Art Style, Art & Culture International Magazine, no. 7

19. Erratum to: Financial Cryptography and Data Security

25. Network Attack Detection and Defense (Dagstuhl Seminar 16361)

29. Network Attack Detection and Defense (Dagstuhl Seminar 16361)

31. Ethics in Data Sharing (Dagstuhl Seminar 14052)

32. Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY 2004)

33. Ethics in Data Sharing (Dagstuhl Seminar 14052)

35. SEI Independent Research and Development Projects (FY 2003)

38. SEI Independent Research and Development Projects

47. Cryptographic Securities Exchanges.

48. Space-Efficient Private Search with Applications to Rateless Codes.

49. Hidden Identity-Based Signatures.

50. Vulnerabilities in First-Generation RFID-enabled Credit Cards.

Catalog

Books, media, physical & digital resources