Eldorado Collection:
http://hdl.handle.net/2003/26601
2024-03-28T23:29:02ZCan Data Leakage Prevention Prevent Data Leakage?
http://hdl.handle.net/2003/26619
Title: Can Data Leakage Prevention Prevent Data Leakage?
Authors: Luft, Matthias2010-01-15T08:57:28ZDesign and Application of a Security Analysis Method for Healthcare Telematics in Germany (HatSec)
http://hdl.handle.net/2003/26618
Title: Design and Application of a Security Analysis Method for Healthcare Telematics in Germany (HatSec)
Authors: Sunyaev, Ali2010-01-15T08:57:26ZAutomatic Generation of Separation of Duty Fraud Scenarios
http://hdl.handle.net/2003/26617
Title: Automatic Generation of Separation of Duty Fraud Scenarios
Authors: Flegel, Ulrich; Stelle, Stanislaus2010-01-15T08:57:24ZModeling Fraud Scenarios in a Rete-based Stateful Rule Engine with First-order Capabilities
http://hdl.handle.net/2003/26616
Title: Modeling Fraud Scenarios in a Rete-based Stateful Rule Engine with First-order Capabilities
Authors: Flegel, Ulrich; Fortu, Cristina2010-01-15T08:57:22ZGenerierung von Signaturen mittelsstatischer Kontrollflussanalyse
http://hdl.handle.net/2003/26615
Title: Generierung von Signaturen mittelsstatischer Kontrollflussanalyse
Authors: Rietz, René2010-01-15T08:57:19ZEvaluation von Lernverfahren zur Bewertung der Gefahrenlage im Internet
http://hdl.handle.net/2003/26614
Title: Evaluation von Lernverfahren zur Bewertung der Gefahrenlage im Internet
Authors: Hunke, Simon2010-01-15T08:57:17ZDetecting Bots with Automatically Generated Network Signatures
http://hdl.handle.net/2003/26613
Title: Detecting Bots with Automatically Generated Network Signatures
Authors: Bilge, Leyla; Goebel, Jan; Holz, Thorsten; Kirda, Engin; Kruegel, Christopher; Wurzinger, Peter2010-01-15T08:57:15ZAnwendbarkeit der Entropie-Analyse für die Erkennung von Shellcode
http://hdl.handle.net/2003/26612
Title: Anwendbarkeit der Entropie-Analyse für die Erkennung von Shellcode
Authors: Gröning, Michael2010-01-15T08:57:12ZContinuous User Verification through Behavior Biometrics
http://hdl.handle.net/2003/26611
Title: Continuous User Verification through Behavior Biometrics
Authors: Messerman, Arik2010-01-15T08:57:10ZContext-Aware Security for Mobiles
http://hdl.handle.net/2003/26610
Title: Context-Aware Security for Mobiles
Authors: Batyuk, Leonid2010-01-15T08:57:08ZAndroid Application Sandbox
http://hdl.handle.net/2003/26609
Title: Android Application Sandbox
Authors: Bläsing, Thomas2010-01-15T08:57:06ZSmartphone Malware Evolution Revisited
http://hdl.handle.net/2003/26608
Title: Smartphone Malware Evolution Revisited
Authors: Schmidt, Aubrey-Derrick2010-01-15T08:57:03ZEDL als Ereigniskorrelationssprache in Multi-Sensor Intrusion Detection Systemen
http://hdl.handle.net/2003/26607
Title: EDL als Ereigniskorrelationssprache in Multi-Sensor Intrusion Detection Systemen
Authors: Leuzinger, Christoph2010-01-15T08:57:01ZVisualisierung von Malware-Verhalten
http://hdl.handle.net/2003/26606
Title: Visualisierung von Malware-Verhalten
Authors: Trinius, Philipp2010-01-15T08:56:58ZConflood a non-distributed DoS-Attack
http://hdl.handle.net/2003/26605
Title: Conflood a non-distributed DoS-Attack
Authors: Wasserfall, Florens; Witte, Kjell2010-01-15T08:56:55ZBotnetzmonitoring Waledac
http://hdl.handle.net/2003/26604
Title: Botnetzmonitoring Waledac
Authors: Stock, Ben2010-01-15T08:56:53ZReturn-Oriented Rootkits
http://hdl.handle.net/2003/26603
Title: Return-Oriented Rootkits
Authors: Hund, Ralf2010-01-15T08:56:50ZOpening
http://hdl.handle.net/2003/26602
Title: Opening
Authors: Flegel, Ulrich2010-01-15T08:56:46Z