Dr. Buttyán Levente OData support

Department of Networked Systems and Services

Tags

add-in (1) · Android (3) · anonymity network (1) · API (1) · artificial intelligence (1) · automated vulnerability assessment (1) · automatic malware analysis (2) · automatic malware detection (1) · automatic status reporting (1) · BEAST (1) · behaviour (1) · botnet (1) · browser extension (1) · CAN communication (1) · Certificate (1) · Cisco (1) · classification (1) · ClearOS (1) · cloud (3) · cloud based systems (1) · cloud security (1) · cloud services (1) · coa (1) · COM (1) · CRIME (1) · Cross Channel Scripting (1) · cryptigraphic file-system (1) · cryptographic permission handling (1) · cryptography (6) · Cuckoo Sandbox (1) · data acquisition (1) · data security (1) · detection (2) · digital certificate (2) · digital signature (2) · Distributed systems (1) · dynamic analysis (1) · dynamic malware analysis (1) · electronic signature (1) · e-mail (1) · embedded Linux (1) · embedded software (1) · embedded software development (1) · embedded system (1) · embedded systems (1) · encryption (2) · e-Szignó (1) · etag (1) · exit node (1) · exploits (1) · firewall (2) · firmware (2) · firmware analysis (1) · firmware upgrade (1) · forensic (1) · formal verification (1) · framework (1) · Google (1) · Graphical User Interface (1) · hard drive (1) · IDS (1) · indicator of compromise (1) · Industrial process control (1) · information security (1) · instant messaging (1) · integration (1) · intergrity (1) · IoC (1) · iOS 6 (1) · iPhone (1) · IPS (1) · IPtables (1) · ise (1) · IT security (3) · JAR (1) · key management (1) · lazy re-encryption (1) · Linux (1) · Lucky 13 (1) · malicious (1) · malicious traffic detection (1) · malware (5) · malware detection in a corporate environment (1) · memory forensics (1) · Microsoft Office (1) · Microsoft Word (1) · mobil client (1) · mobile devices (1) · Network Attacks (1) · network defense (1) · network security (1) · OBD-II (1) · Packaging (1) · Padding Oracle (1) · panama (1) · PE (1) · privacy (1) · protocol (2) · Public Key Infrastructure (1) · public-key cryptography (1) · PyQt (1) · Python (4) · RADIUS (1) · read permission (1) · repository (1) · safety (1) · security (5) · security analysis (1) · signature authentication (1) · Snort (1) · SOHO (1) · SSL (1) · static analysis (1) · Suricata (1) · synchronization (1) · TGDH (1) · threshold signature (1) · time (1) · TLS (1) · Tor (2) · unit testing (1) · validation (1) · virtualization (2) · virus protection (1) · write permission (1) · zorp (1)

Theses

33 theses in total.  View all theses »

By degree:

By semester: