Department of Networked Systems and Services
6LoWPAN (1) · AArch64 (1) · abstract syntax tree (1) · add-in (1) · Advanced Metering Infrastructure (1) · adversarial example (4) · AES encryption (2) · afl (1) · algorithm analysis (1) · Allienvault (1) · Amazon cloud (1) · Ambari (1) · analysis (1) · Android (8) · Android application (3) · Angular (1) · anomaly detection (3) · anonymity network (1) · Ansible (1) · anti-sandbox (1) · Apache Hadoop (1) · API (1) · application-specific monitoring (1) · APRE (1) · ARM (2) · arm64 (1) · artificial intelligence (1) · ASN.1 (1) · asn1c (1) · ATM (1) · authentication (3) · authorization (1) · automated software test (1) · automated vulnerability assessment (1) · automatic code generation (1) · automatic malware analysis (7) · automatic malware detection (2) · Automatic Protocol Reverse Engineering (1) · automatic status reporting (1) · automation (1) · automatization (1) · automotive cybersecurity (1) · avatao (4) · banking system (1) · BEAST (2) · behaviour (1) · BigData (1) · binary function similarity (1) · black box (1) · BLE (1) · block cipher (1) · botnet (1) · BouncyCastle (1) · browser extension (1) · Bruteforce (1) · c2c communication (1) · CAN (1) · CAN Bus (1) · CAN communication (1) · car security (1) · cash machine (1) · Certificate (3) · certificate revocation (1) · Certificate Transparency (1) · certification (2) · chat application (1) · Cisco (1) · classification (1) · ClearOS (1) · cloud (4) · cloud based systems (1) · cloud computing (1) · cloud environments (1) · Cloud infrastructure (1) · cloud security (1) · cloud services (1) · cloud storage (1) · cloud-based application (1) · clustering (2) · coa (1) · COM (1) · connected car (1) · container management (1) · container orchestration (1) · containerization (1) · containers (1) · context triggered piecewise hashing (1) · Controller Area Network (1) · convolutional neural networks (1) · cooperative transportation (1) · correlation analysis (1) · CRIME (1) · critical systems (1) · CRL (1) · Cross Channel Scripting (1) · cryptigraphic file-system (1) · cryptographic permission handling (1) · cryptography (10) · Cuckoo Sandbox (2) · cve (1) · cyber attack detection (1) · cyber attack generation (1) · cyber security (3) · cybersecurity (3) · data acquisition (1) · data anonymization (1) · data integration (1) · data manipulation (1) · data security (1) · data storage (1) · datacenter (1) · dataset (1) · DCS systems (1) · delta compression (1) · Denial of Service (1) · detection (2) · DevOps (1) · differential storage (1) · digital certificate (3) · digital signature (4) · distributed data storage (1) · Distributed systems (1) · distributed tracing (1) · DNS hijacking (1) · Docker (3) · docker compose (1) · docker network (2) · docker swarm (2) · dynamic analysis (2) · dynamic graph (1) · dynamic malware analysis (3) · eBPF (1) · e-Dossier (1) · educational framework (1) · educational tool (1) · eID (1) · e-learning (1) · electronic signature (4) · electronic voting (1) · e-mail (1) · embedded Linux (3) · embedded software (1) · embedded software development (1) · embedded system (4) · embedded systems (5) · employee monitoring (1) · encryption (3) · entropy (1) · entropy source (1) · Envoy (1) · erlang (1) · Erlang/OTP (1) · e-Szigno (1) · e-Szignó (2) · etag (1) · ethical hacking (3) · executable packing (1) · exercise (1) · exit node (1) · exploits (2) · file encryption (1) · firewall (2) · firmware (2) · firmware analysis (1) · firmware update (2) · firmware upgrade (1) · flash encryption (1) · Flask (1) · forensic (1) · formal verification (1) · format preserving encryption (1) · framework (1) · fuzzing (3) · GCC Plugin (1) · generating random numbers (1) · generic (1) · ghidra (1) · ghidra plugin (1) · Google (1) · GPS (1) · Grammatical Inference (1) · graph clustering (1) · graph database (1) · Graphical User Interface (1) · graphical user interface testing (1) · grey box testing (1) · gRPC (1) · Hadoop (2) · hard drive (1) · hardening (1) · hardware entropy source (1) · Hardware-in-the-Loop (1) · HarmonyOS (1) · HDFS (2) · Honeypot (1) · hyperparameter optimization (1) · hypervisor (3) · IBM QRadar (1) · IBM Security Identity Manager (1) · ICS (2) · ICS/SCADA (1) · Identity Provider (1) · IDS (3) · incremental clustering (1) · indicator of compromise (1) · industrial control system (1) · Industrial process control (1) · information security (1) · infrastructure automation (1) · Infrastructure automatization (1) · infrastructure management (1) · instant messaging (1) · integration (1) · integrity monitoring (3) · intelligent transport system (1) · interactive website (1) · intergrity (1) · Internet of Things (7) · intrusion detection system (1) · IoC (1) · iOS 6 (1) · IoT (6) · IoT devices (4) · IoT protocols (1) · IoT security (16) · iPhone (1) · IPS (2) · IPtables (1) · ise (1) · Istio (1) · IT security (12) · JAR (1) · Java (1) · Java 8 (2) · Java Spring Boot (1) · kernel mitigations (1) · key management (2) · Keycloak (1) · key-exchange (1) · kiosk (1) · Kubernetes (1) · large-scale graph (1) · lazy re-encryption (1) · Linux (3) · Linux kernel (2) · locality sensitive hashing (2) · locality-sensitive hashing (2) · log analysis (1) · logging subsystem (1) · LoRa (1) · LoRa test environment (1) · LoRaWAN (1) · Lucky 13 (1) · machine learnig (1) · machine learning (3) · machine learning model (1) · malicious (1) · malicious software (1) · malicious traffic detection (1) · malware (15) · malware analysis (5) · malware classification (2) · malware detection (11) · malware detection in a corporate environment (1) · malware development (1) · malware-classification (1) · malware-detection (1) · man in the middle (1) · MapReduce (1) · Mealy automaton (1) · memory forensics (1) · Memory Protection Unit (MPU) (1) · metadata (1) · methodology (1) · microservice (1) · Microservice architecture (1) · microservices (2) · Microsoft Office (1) · Microsoft Word (1) · MITRE ATT&CK framework (2) · mobil client (1) · mobile application (1) · mobile autentication (1) · mobile devices (1) · Modbus (1) · model based software developement (1) · modell driven configuration management (1) · MQTT protocol (1) · Network Analyzer (1) · Network Attacks (1) · network defense (2) · network protocol (1) · network security (6) · network traffic analysis (2) · neural network (1) · noise source (1) · OBD-II (1) · OCSP (1) · opcode (1) · OpenAPI (1) · OpenID connect (1) · openssl (2) · operation (1) · OP-TEE (8) · Packaging (1) · Padding Oracle (2) · panama (1) · PassBy[ME] (3) · PE (1) · penetration testing (5) · pentest (1) · PKCS#11 (2) · PKI (3) · PLC (2) · position (1) · PostgreSQL (1) · post-quantum (1) · post-quantum algorithms (2) · post-quantum cryptography (2) · post-quantum messaging (1) · PQC (1) · privacy (2) · program analysis (1) · program similarity (1) · protection (1) · protocol (2) · protocol analysis (1) · protocol analyzer (1) · protocol decoder (1) · public certificate log (1) · Public Key Infrastructure (5) · public-key cryptography (2) · PyQt (2) · Python (10) · RADIUS (1) · random forest (1) · random number generator (1) · random numbers (1) · Raspberry PI (3) · read permission (1) · real-time vehicle communication (1) · Redis (1) · remote attestation (2) · remote update (2) · repository (1) · reverse engineering (3) · robustness analysis (1) · rootkit detection (3) · RSA encryption (1) · safety (1) · Sandbox (1) · SBCFI (1) · SCADA (1) · SCADA systems (1) · SCIT (1) · SD-DSS (1) · sdhash (1) · secure boot (2) · secure by design (1) · secure messaging (1) · secure update (3) · security (10) · security analysis (6) · security protocol (1) · security testing (2) · service integration (1) · service mesh (1) · SIEM (1) · signature authentication (1) · Sikuli (1) · similarity graph (2) · similarty (1) · simulation (1) · Single Sign On (2) · skimmer (1) · smart meter (1) · snapshot (1) · Snort (1) · SoC (1) · software development (1) · SOHO (1) · sql injection (1) · ssdeep (1) · SSL (1) · SSL/TLS (2) · SSO (1) · static analysis (4) · static analysis tool (1) · static malware analysis (1) · Sulley (1) · SUMO (1) · Suricata (2) · synchronization (1) · Syslog (1) · syslog-ng (1) · TDI (1) · TEE (4) · Testbed (1) · TGDH (1) · threat intelligence (1) · threat modeling (1) · threshold signature (1) · time (1) · TLS (1) · TLS inspection (1) · TLSH (5) · Tor (2) · training platform (1) · transparent encryption (1) · Trusted Application (3) · Trusted Computing (1) · Trusted Execution Environment (6) · Trusted Storage (1) · TrustZone (3) · TSP (1) · two factor autentication (1) · U-Boot (2) · UDS protocol (1) · unit testing (1) · User Configuration Block (UCBs) (1) · user emulation (1) · V2V (1) · v2v communication (1) · V2X (1) · v2x communic (1) · v2x communication (1) · validation (1) · vehicle security (1) · virtualization (2) · virus protection (1) · vulnerability research (2) · web (1) · web application (1) · web crawling (1) · web security (2) · webserver (1) · webservice (1) · WiFi security (1) · wireless communication (1) · Wireshark (1) · write permission (1) · Xdelta3 (1) · ZigBee (1) · zorp (1)
127 theses in total. View all theses »