Browsing by Keywords for Webfeeds Information Security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  

Showing results 59 to 78 of 103 < previous   next >
Issue DateTitleInvolved Person(s)
Sep-2020Liability-aware security management for 5GGaber, Chrystel; Vilchez, Jose Sanchez; Gür, Gürkan; Chopin, Morgan; Perrot, Nancy, et al
2023MERLINS : moving target defense enhanced with deep-RL for NFV in-depth securitySoussi, Wissem; Christopoulou, Maria; Gür, Gürkan; Stiller, Burkhard
Sep-2021Moving target defense as a proactive defense element for beyond 5GSoussi, Wissem; Christopoulou, Maria; Xilouris, George; Gür, Gürkan
2019Multidimensional content modeling and caching in D2D edge networksKafıloğlu, S. Sinem; Gür, Gürkan; Alagöz, Fatih
2023Network fingerprinting via timing attacks and defense in software defined networksYiğit, Beytüllah; Gür, Gürkan; Alagöz, Fatih; Tellenbach, Bernhard
2023PIM detection in wireless networks as an anomaly detection problemCantali, Gokcan; Deniz, Eren; Ozay, Ozcan; Yildirim, Onur; Gür, Gürkan, et al
13-Jul-2005PKI und Digitale Signatur : Theorie, Politik, Wunschdenken und RealitätRennhard, Marc; Mumprecht, Eduard
Aug-2019PoMeS : profit-maximizing sensor selection for crowd-sensed spectrum discoveryBayhan, Suzan; Gür, Gürkan; Zubow, Anatolij
2023Prioritization based task offloading in UAV-assisted edge networksKalinagac, Onur; Gür, Gürkan; Alagöz, Fatih
2022Priority-driven task processing in UAV-assisted software-defined edge networksKalinagac, Onur; Gür, Gürkan; Alagöz, Fatih
2020Proactive controller assignment schemes in SDN for fast recoveryGuner, Selcan; Gür, Gürkan; Alagöz, Fatih
25-Oct-2018PROFINET Real-time protection layer : performance analysis of cryptographic and protocol processing overheadMüller, Thomas; Doran, Hans
2018Protecting PROFINET cyclic real-time traffic : a performance evaluation and verification platformMüller, Thomas; Doran, Hans
2019Reactive controller assignment for failure resilience in software defined networksAcan, Faruk; Gür, Gürkan; Alagöz, Fatih
2023Root cause and liability analysis in the microservices architecture for edge IoT servicesKalinagac, Onur; Soussi, Wissem; Anser, Yacine; Gaber, Chrystel; Gür, Gürkan
2018Safety & cyber-security analysis based on systems-theoryFrischknecht-Gruber, Carmen; Senn, Christoph W.; Krauss, Sven Stefan; Reif, Monika Ulrike
26-Oct-2004Schutz der Privatsphäre aus BenutzersichtRennhard, Marc
4-Feb-2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc
2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc
28-May-2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc