Browse
Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13
Issue Date | Title | Author(s) |
---|---|---|
2011-07-21 | Android Security | Bußmeyer, Daniel |
2011-07-21 | Taming the Robot | Liebergeld, Steffen |
2011-07-21 | Smartphone Honeypots | Mulliner, Collin |
2011-07-21 | Antiforensik auf mobilen Endgeräten | Lambertz, Stefan |
2011-07-21 | Security Aspects of Fuzzy Hashing | Baier, Harald; Breitinger, Frank |
2011-07-21 | Tools and Processes for Forensic Analyses of Smartphones and Mobile Malware | Spreitzenbarth, Michael |
2011-07-21 | Practical P2P-Based Censorship Resistance | Michéle, Benjamin |
2011-07-21 | OS Agnostic Sandboxing Using Virtual CPUs | Lange, Matthias |
2011-07-21 | Evaluating "Ring -3" Rootkits | Stewin, Patrick |
2011-07-21 | SEODisc | Meyer, Matthias |
2011-07-21 | Erkennung von bösartigen Netzwerkverbindungen mittels Verhaltensgraphenanalyse | Hund, Ralf |
2011-07-21 | Verschleiernde Transformationen von Programmen | Rex, Michael |
2011-07-21 | Opening | Uellenbeck, Sebastian |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13
Discover
Date issued
- 13 2011