From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

APT RPG: Design of a Gamified Attacker/Defender Meta Model., , , и . ICISSP, стр. 526-537. SciTePress, (2018)Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space., , , , и . USENIX Security Symposium, USENIX Association, (2011)Security and privacy of smartphone messaging applications., , , , и . Int. J. Pervasive Comput. Commun., 11 (2): 132-150 (2015)PenQuest: a gamified attacker/defender meta model for cyber security assessment and education., , , , и . J. Comput. Virol. Hacking Tech., 16 (1): 19-61 (2020)Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process., , , , и . ICISSP, стр. 211-218. SCITEPRESS, (2024)Compiling and Analyzing Open Source Malware for Research Purposes., , , и . ICSSA, стр. 32-37. IEEE, (2020)Spoiled Onions: Exposing Malicious Tor Exit Relays., , , , , , и . Privacy Enhancing Technologies, том 8555 из Lecture Notes in Computer Science, стр. 304-331. Springer, (2014)InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles., , , , и . Sicherheit, том P-228 из LNI, стр. 363-374. GI, (2014)What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications., , , , и . iiWAS, стр. 142-151. ACM, (2014)Using the structure of B+-trees for enhancing logging mechanisms of databases., , , , , и . iiWAS, стр. 301-304. ACM, (2011)