Search

Your search keyword '"Neuhaus, Stephan"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Neuhaus, Stephan" Remove constraint Author: "Neuhaus, Stephan"
47 results on '"Neuhaus, Stephan"'

Search Results

1. Security and Privacy Implications of Middlebox Cooperation Protocols

2. BREAKING: Password Entry Is Fine

6. Towards securing hard real-time networked embedded devices and systems : a cBPF implementation for an FPGA

8. After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes

10. Satisfaction of Control Objectives by Control Processes

15. Downright : a framework and toolchain for privilege handling

16. Breaking : password entry is fine

18. Towards an observatory for network transparency research

19. Four different ways to build a chatbot about movies

20. Four different ways to build a chatbot about movies

21. Author profiling with bidirectional RNNs using attention with GRUs : notebook for PAN at CLEF 2017

22. Towards an observatory for network transparency research

25. A path layer for the internet : enabling network operations on encrypted protocols

27. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages

28. Repeating the past experimental and empirical methods in system and software security

29. Isolating Intrusions by Automatic Experiments

41. GoCoMM

43. A Description of the Standardized Measurement Procedures and Recommended Threshold Limit Values for Biological Hazards in Germany.

44. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages

45. Security Trend Analysis with CVE Topic Models

46. Security Trend Analysis with CVE Topic Models

47. The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages

Catalog

Books, media, physical & digital resources