Showing results 46 to 65 of 103
< previous
next >
Issue Date | Title | Involved Person(s) |
2022 | Graph based liability analysis for the microservice architecture | Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan |
2008 | Histogram matrix : log file visualization for anomaly detection | Frei, Adrian; Rennhard, Marc |
2017 | Honey-copy : a concept and prototype of a generic honeypot system | Favre, Olivier; Tellenbach, Bernhard; Asenz, Jan |
2005 | ICTnet - KTI : innovative Lösungen trotz beschränkten Ressourcen | Hülser, René; Rennhard, Marc; Steffen, Andreas |
Jul-2019 | Improving the effectiveness of web application vulnerability scanning | Rennhard, Marc; Esposito, Damiano; Ruf, Lukas; Wagner, Arno |
2020 | INSPIRE-5Gplus : intelligent security and pervasive trust for 5G and beyond networks | Ortiz, Jordi; Sanchez-Iborra, Ramon; Bernabe, Jorge Bernal; Skarmeta, Antonio; Benzaid, Chafika, et al |
1-Aug-2022 | Integration of ICN and MEC in 5G and beyond networks : mutual benefits, use cases, challenges, standardization, and future research | Gür, Gürkan; Kalla, Anshuman; de Alwis, Chamitha; Pham, Quoc-Viet; Ngo, Khac-Hoang, et al |
14-Sep-2010 | Internet Datasafe : Sicherheitstechnische Herausforderungen | Rennhard, Marc |
Jun-2023 | IoMiRCA : root cause analysis in IoT-extended 5G microservice environments | Heeb, Zeno; Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan |
26-Nov-2023 | Is modeling access control worth it? | Basin, David; Guarnizo Hernandez, Juan David; Krstic, Srđan; Nguyen, Hoang; Ochoa Ronderos, Martin |
2011 | IT-Security im Bereich Verkehrstelematik | Rennhard, Marc; Koster, Marco; Marschal, Claude; Schildknecht, Lukas |
2011 | IT-Security in der Verkehrstelematik | Rennhard, Marc; Marschal, Claude |
2018 | JESS : joint entropy-based DDoS defense scheme in SDN | Kalkan, Kubra; Altay, Levent; Gür, Gürkan; Alagöz, Fatih |
Sep-2020 | Liability-aware security management for 5G | Gaber, Chrystel; Vilchez, Jose Sanchez; Gür, Gürkan; Chopin, Morgan; Perrot, Nancy, et al |
2023 | MERLINS : moving target defense enhanced with deep-RL for NFV in-depth security | Soussi, Wissem; Christopoulou, Maria; Gür, Gürkan; Stiller, Burkhard |
Sep-2021 | Moving target defense as a proactive defense element for beyond 5G | Soussi, Wissem; Christopoulou, Maria; Xilouris, George; Gür, Gürkan |
2019 | Multidimensional content modeling and caching in D2D edge networks | Kafıloğlu, S. Sinem; Gür, Gürkan; Alagöz, Fatih |
2023 | Network fingerprinting via timing attacks and defense in software defined networks | Yiğit, Beytüllah; Gür, Gürkan; Alagöz, Fatih; Tellenbach, Bernhard |
2023 | PIM detection in wireless networks as an anomaly detection problem | Cantali, Gokcan; Deniz, Eren; Ozay, Ozcan; Yildirim, Onur; Gür, Gürkan, et al |
13-Jul-2005 | PKI und Digitale Signatur : Theorie, Politik, Wunschdenken und Realität | Rennhard, Marc; Mumprecht, Eduard |