Anzeige der Treffer 37 bis 56 von 103
< zurück
nächste >
Erscheinungsdatum | Titel | Beteiligte Person(en) |
2024 | Emerging directions for blockchainized 6G | Kalla, Anshuman; de Alwis, Chamitha; Gochhayat, Sarada Prasad; Gür, Gürkan; Liyanage, Madhusanka, et al. |
18-Jun-2021 | Energy prioritized caching for cellular D2D networks | Kafıloğlu, Sebahat Sinem; Gür, Gürkan; Alagöz, Fatih |
2022 | ETSI ZSM driven security management in future networks | Chollon, Geoffrey; Ayed, Dhouha; Garriga, Rodrigo Asensio; Zarca, Alejandro Molina; Skarmeta, Antonio, et al. |
Dez-2020 | Expansive networks : exploiting spectrum sharing for capacity boost and 6G vision | Gür, Gürkan |
2018 | Exploiting the potential of web application vulnerability scanning | Esposito, Damiano; Rennhard, Marc; Ruf, Lukas; Wagner, Arno |
2006 | Fachhochschulen als Innovationspartner für KMU | Rennhard, Marc |
2009 | Fälschbare Zertifikate | Ruf, Lukas; Rennhard, Marc |
2024 | FeedMeter : evaluating the quality of community-driven threat intelligence | Rüedlinger, Andreas; Klauser, Rebecca; Lamprakis, Pavlos; Happe, Markus; Tellenbach, Bernhard, et al. |
14-Mai-2023 | FirmwareDroid : towards automated static analysis of pre-installed android apps | Sutter, Thomas; Tellenbach, Bernhard |
2022 | Graph based liability analysis for the microservice architecture | Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan |
2008 | Histogram matrix : log file visualization for anomaly detection | Frei, Adrian; Rennhard, Marc |
2017 | Honey-copy : a concept and prototype of a generic honeypot system | Favre, Olivier; Tellenbach, Bernhard; Asenz, Jan |
2005 | ICTnet - KTI : innovative Lösungen trotz beschränkten Ressourcen | Hülser, René; Rennhard, Marc; Steffen, Andreas |
Jul-2019 | Improving the effectiveness of web application vulnerability scanning | Rennhard, Marc; Esposito, Damiano; Ruf, Lukas; Wagner, Arno |
2020 | INSPIRE-5Gplus : intelligent security and pervasive trust for 5G and beyond networks | Ortiz, Jordi; Sanchez-Iborra, Ramon; Bernabe, Jorge Bernal; Skarmeta, Antonio; Benzaid, Chafika, et al. |
1-Aug-2022 | Integration of ICN and MEC in 5G and beyond networks : mutual benefits, use cases, challenges, standardization, and future research | Gür, Gürkan; Kalla, Anshuman; de Alwis, Chamitha; Pham, Quoc-Viet; Ngo, Khac-Hoang, et al. |
14-Sep-2010 | Internet Datasafe : Sicherheitstechnische Herausforderungen | Rennhard, Marc |
Jun-2023 | IoMiRCA : root cause analysis in IoT-extended 5G microservice environments | Heeb, Zeno; Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan |
26-Nov-2023 | Is modeling access control worth it? | Basin, David; Guarnizo Hernandez, Juan David; Krstic, Srđan; Nguyen, Hoang; Ochoa Ronderos, Martin |
2011 | IT-Security im Bereich Verkehrstelematik | Rennhard, Marc; Koster, Marco; Marschal, Claude; Schildknecht, Lukas |