47 results on '"Neuhaus, Stephan"'
Search Results
2. BREAKING: Password Entry Is Fine
3. Towards Securing Hard Real-Time Networked Embedded Devices and Systems: a cBPF Implementation for an FPGA
4. Urgency in preliminary injunctions in patent law (with a discussion of Solarzelle II and Bortezomib II)
5. BREAKING: Password Entry Is Fine
6. Towards securing hard real-time networked embedded devices and systems : a cBPF implementation for an FPGA
7. Software Security Economics: Theory, in Practice
8. After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes
9. xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
10. Satisfaction of Control Objectives by Control Processes
11. Ein System zur benutzerdefinierten Visualisierung von parallelen Programmen
12. Satisfaction of Control Objectives by Control Processes
13. Downright: A Framework and Toolchain for Privilege Handling
14. Ein System zur benutzerdefinierten Visualisierung von parallelen Programmen
15. Downright : a framework and toolchain for privilege handling
16. Breaking : password entry is fine
17. A Novel Lubricant Based on Covalent Functionalized Graphene Oxide Quantum Dots
18. Towards an observatory for network transparency research
19. Four different ways to build a chatbot about movies
20. Four different ways to build a chatbot about movies
21. Author profiling with bidirectional RNNs using attention with GRUs : notebook for PAN at CLEF 2017
22. Towards an observatory for network transparency research
23. Bok: Skjønnlitterære selvmord
24. A path layer for the Internet: Enabling network operations on encrypted protocols
25. A path layer for the internet : enabling network operations on encrypted protocols
26. Towards an Observatory for Network Transparency Research
27. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages
28. Repeating the past experimental and empirical methods in system and software security
29. Isolating Intrusions by Automatic Experiments
30. Social power for privacy protected opportunistic networks
31. POSTER: Preserving Privacy and Accountability for Personal Devices
32. POSTER: Critique of the CISSP Common Body of Knowledge of Cryptography
33. GoCoMM: a governance and compliance maturity model
34. Self-Awareness in Computer Networks
35. Analysis of a hardware security module's high-availability setting
36. POSTER: Preserving privacy and accountability for personal devices
37. POSTER: Critique of the CISSP common body of knowledge of cryptography
38. Hardware support for dynamic protocol stacks
39. Session details: Keynote Address
40. Security Trend Analysis with CVE Topic Models
41. GoCoMM
42. Predicting vulnerable software components
43. A Description of the Standardized Measurement Procedures and Recommended Threshold Limit Values for Biological Hazards in Germany.
44. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages
45. Security Trend Analysis with CVE Topic Models
46. Security Trend Analysis with CVE Topic Models
47. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.