Dr. Buttyán Levente OData support

Department of Networked Systems and Services

Tags

add-in (1) · afl (1) · Android (4) · Android application (1) · anonymity network (1) · API (1) · artificial intelligence (1) · ASN.1 (1) · asn1c (1) · automated vulnerability assessment (1) · automatic malware analysis (2) · automatic malware detection (1) · automatic status reporting (1) · avatao (1) · BEAST (2) · behaviour (1) · block cipher (1) · botnet (1) · browser extension (1) · CAN (1) · CAN communication (1) · car security (1) · Certificate (1) · Cisco (1) · classification (1) · ClearOS (1) · cloud (4) · cloud based systems (1) · Cloud infrastructure (1) · cloud security (1) · cloud services (1) · coa (1) · COM (1) · Controller Area Network (1) · CRIME (1) · Cross Channel Scripting (1) · cryptigraphic file-system (1) · cryptographic permission handling (1) · cryptography (6) · Cuckoo Sandbox (1) · cyber attack detection (1) · cyber attack generation (1) · data acquisition (1) · data integration (1) · data security (1) · detection (2) · digital certificate (2) · digital signature (2) · Distributed systems (1) · DNS hijacking (1) · dynamic analysis (1) · dynamic malware analysis (1) · electronic signature (2) · e-mail (1) · embedded Linux (1) · embedded software (1) · embedded software development (1) · embedded system (1) · embedded systems (1) · encryption (3) · e-Szignó (2) · etag (1) · exercise (1) · exit node (1) · exploits (1) · firewall (2) · firmware (2) · firmware analysis (1) · firmware upgrade (1) · forensic (1) · formal verification (1) · format preserving encryption (1) · framework (1) · fuzzing (1) · Google (1) · Graphical User Interface (1) · hard drive (1) · IBM QRadar (1) · IBM Security Identity Manager (1) · IDS (2) · indicator of compromise (1) · Industrial process control (1) · information security (1) · infrastructure automation (1) · infrastructure management (1) · instant messaging (1) · integration (1) · intergrity (1) · intrusion detection system (1) · IoC (1) · iOS 6 (1) · iPhone (1) · IPS (1) · IPtables (1) · ise (1) · IT security (4) · JAR (1) · key management (1) · lazy re-encryption (1) · Linux (1) · Lucky 13 (1) · malicious (1) · malicious traffic detection (1) · malware (5) · malware detection in a corporate environment (1) · memory forensics (1) · Microsoft Office (1) · Microsoft Word (1) · mobil client (1) · mobile devices (1) · Network Attacks (1) · network defense (1) · network security (2) · OBD-II (1) · OCSP (1) · openssl (1) · Packaging (1) · Padding Oracle (2) · panama (1) · PE (1) · PKI (1) · privacy (1) · protocol (2) · Public Key Infrastructure (1) · public-key cryptography (1) · PyQt (1) · Python (4) · RADIUS (1) · read permission (1) · repository (1) · safety (1) · SD-DSS (1) · security (6) · security analysis (1) · SIEM (1) · signature authentication (1) · Snort (1) · SOHO (1) · sql injection (1) · SSL (1) · SSL/TLS (1) · static analysis (1) · Sulley (1) · Suricata (1) · synchronization (1) · TDI (1) · TGDH (1) · threshold signature (1) · time (1) · TLS (1) · TLS inspection (1) · Tor (2) · training platform (1) · transparent encryption (1) · TSP (1) · unit testing (1) · validation (1) · vehicle security (1) · virtualization (2) · virus protection (1) · write permission (1) · zorp (1)

Theses

41 theses in total.  View all theses »

By degree:

By semester: