Dr. Buttyán Levente OData support

Department of Networked Systems and Services

Tags

add-in (1) · afl (1) · Amazon cloud (1) · Android (5) · Android application (2) · anonymity network (1) · API (1) · application-specific monitoring (1) · ARM (1) · artificial intelligence (1) · ASN.1 (1) · asn1c (1) · authentication (1) · automated vulnerability assessment (1) · automatic malware analysis (2) · automatic malware detection (1) · automatic status reporting (1) · automation (1) · avatao (1) · BEAST (2) · behaviour (1) · block cipher (1) · botnet (1) · browser extension (1) · c2c communication (1) · CAN (1) · CAN communication (1) · car security (1) · Certificate (2) · Certificate Transparency (1) · certification (1) · Cisco (1) · classification (1) · ClearOS (1) · cloud (4) · cloud based systems (1) · cloud computing (1) · cloud environments (1) · Cloud infrastructure (1) · cloud security (1) · cloud services (1) · cloud storage (1) · cloud-based application (1) · coa (1) · COM (1) · connected car (1) · containers (1) · Controller Area Network (1) · cooperative transportation (1) · CRIME (1) · Cross Channel Scripting (1) · cryptigraphic file-system (1) · cryptographic permission handling (1) · cryptography (8) · Cuckoo Sandbox (1) · cyber attack detection (1) · cyber attack generation (1) · cyber security (1) · data acquisition (1) · data anonymization (1) · data integration (1) · data security (1) · datacenter (1) · detection (2) · DevOps (1) · digital certificate (2) · digital signature (2) · Distributed systems (1) · distributed tracing (1) · DNS hijacking (1) · Docker (1) · dynamic analysis (1) · dynamic malware analysis (1) · e-Dossier (1) · educational framework (1) · e-learning (1) · electronic signature (3) · e-mail (1) · embedded Linux (1) · embedded software (1) · embedded software development (1) · embedded system (1) · embedded systems (2) · employee monitoring (1) · encryption (3) · entropy (1) · entropy source (1) · e-Szigno (1) · e-Szignó (2) · etag (1) · ethical hacking (1) · exercise (1) · exit node (1) · exploits (1) · firewall (2) · firmware (2) · firmware analysis (1) · firmware upgrade (1) · forensic (1) · formal verification (1) · format preserving encryption (1) · framework (1) · fuzzing (1) · generating random numbers (1) · Google (1) · Graphical User Interface (1) · graphical user interface testing (1) · hard drive (1) · hardening (1) · hardware entropy source (1) · Honeypot (1) · IBM QRadar (1) · IBM Security Identity Manager (1) · ICS (1) · IDS (3) · indicator of compromise (1) · Industrial process control (1) · information security (1) · infrastructure automation (1) · infrastructure management (1) · instant messaging (1) · integration (1) · integrity monitoring (1) · intelligent transport system (1) · interactive website (1) · intergrity (1) · Internet of Things (3) · intrusion detection system (1) · IoC (1) · iOS 6 (1) · IoT (2) · IoT security (4) · iPhone (1) · IPS (2) · IPtables (1) · ise (1) · IT security (9) · JAR (1) · Java (1) · Java 8 (2) · key management (1) · lazy re-encryption (1) · Linux (2) · Linux kernel (1) · log analysis (1) · logging subsystem (1) · Lucky 13 (1) · malicious (1) · malicious traffic detection (1) · malware (5) · malware detection in a corporate environment (1) · memory forensics (1) · microservices (1) · Microsoft Office (1) · Microsoft Word (1) · mobil client (1) · mobile application (1) · mobile devices (1) · Network Attacks (1) · network defense (1) · network security (3) · noise source (1) · OBD-II (1) · OCSP (1) · openssl (1) · operation (1) · OP-TEE (3) · Packaging (1) · Padding Oracle (2) · panama (1) · PassBy[ME] (1) · PE (1) · penetration testing (1) · PKCS#11 (1) · PKI (2) · PLC (1) · privacy (2) · program analysis (1) · protocol (2) · public certificate log (1) · Public Key Infrastructure (4) · public-key cryptography (1) · PyQt (1) · Python (4) · RADIUS (1) · random number generator (1) · random numbers (1) · Raspberry PI (2) · read permission (1) · remote attestation (1) · repository (1) · safety (1) · SCADA (1) · SCIT (1) · SD-DSS (1) · secure boot (1) · secure update (1) · security (6) · security analysis (1) · security protocol (1) · service integration (1) · SIEM (1) · signature authentication (1) · Sikuli (1) · Snort (1) · SOHO (1) · sql injection (1) · SSL (1) · SSL/TLS (1) · static analysis (1) · Sulley (1) · Suricata (1) · synchronization (1) · Syslog (1) · syslog-ng (1) · TDI (1) · TEE (3) · TGDH (1) · threshold signature (1) · time (1) · TLS (1) · TLS inspection (1) · Tor (2) · training platform (1) · transparent encryption (1) · Trusted Application (1) · Trusted Execution Environment (1) · TrustZone (2) · TSP (1) · U-Boot (1) · unit testing (1) · user emulation (1) · v2v communication (1) · v2x communic (1) · validation (1) · vehicle security (1) · virtualization (2) · virus protection (1) · web security (1) · write permission (1) · zorp (1)

Theses

59 theses in total.  View all theses »

By degree:

By semester: