Dr. Holczer Tamás OData support

Department of Networked Systems and Services

Tags

.NET (1) · 802.1X (1) · ACL (1) · active scan (1) · anomaly detection (3) · Ansible (2) · application development (1) · application performance monitoring (1) · ASAv (1) · asset discovery (1) · authentication (1) · Automated Protocol Reverse Engineering (1) · automated test (1) · automated test system (1) · automatic deployment (2) · automatic malware detection (1) · automation (1) · automatisation (1) · Azure Cloud (1) · bait (2) · Beckhoff (1) · benchmark (1) · Big Data (2) · biometrics (1) · black box (1) · C/C++ (1) · CAN Bus (3) · CAN communication (1) · Cisco (1) · code coverage (1) · CrowdSec (1) · cryptography (1) · CVSS 3.1 (1) · cyber attack (1) · cyber attack detection (1) · cyber attack generation (1) · cyber security (2) · cyber-physical systems (1) · cybersecurity (5) · data diode (1) · data forwarding (1) · data security (1) · decoy (2) · deployment optimalization (1) · detection (1) · device management (2) · digital substation (1) · Docker (2) · Dynamic Binary Analysis (1) · elastic (1) · Elastic Stack (2) · embedded system (1) · Endian Firewall (1) · exposure assessment (1) · firewall (2) · Fluid simulation (1) · fuzz test (2) · fuzzing (2) · GENIVI (1) · goose (1) · GPGPU (1) · Graphical User Interface (1) · Hadoop (1) · Hardware In the Loop (1) · heterogeneous platforms (1) · Honeypot (5) · honeytoken (1) · HSR (1) · ICS (3) · ICS networks (1) · ICS/SCADA (3) · IDS (1) · IEC61850 (2) · industrial application (1) · industrial control system (5) · industrial environment (1) · Industrial Ethernet (1) · industrial facility (1) · Industrial Networks (1) · information security (1) · infotainment systems (1) · infrastructure automation (1) · Internet (1) · intrusion detection (2) · intrusion detection system (4) · intrusion prevention system (1) · IPS (1) · IPtables (1) · IT security (7) · key-exchange (1) · leak-out (1) · log analysis (2) · Log files (1) · Log management (1) · MACSec (1) · Man-in-the-Middle attack (1) · MapFile (1) · MISP (1) · MISP installation (1) · Modbus (1) · monitoring framework (1) · monitoring system (1) · movement (1) · network (1) · Network Attacks (1) · network fuzzing (1) · Network management (1) · network monitoring (2) · network planning (1) · network processor (1) · network protection (1) · network protocol (1) · network security (2) · network traffic analysis (2) · network traffic modeling (1) · networking (1) · open source (1) · operating system security hardening (1) · orchestration (1) · OSINT (1) · Out-of-band (1) · parallel processing (1) · penetration testing (1) · pfSense (1) · PLC (5) · PLC : Programmable Logic Controller (1) · PoC (1) · programmable logic controller (2) · protocol analysis (1) · Public Key Infrastructure (1) · Python (4) · python programming (1) · radiation detection (1) · Raspberry PI (1) · reputation store (1) · resource allocation (1) · risk assessment (2) · routing (2) · s7 (1) · SCADA (1) · SCADA systems (2) · Schneider M241 (1) · searching for vulnerabilities (1) · security (4) · security operation center (1) · Security operations center (1) · security system (1) · Sequence File (1) · SIEM (1) · SIEM system (2) · Simulation test environment (1) · Smartgrid (1) · SNMP (1) · SoC (1) · Software Defined Networking (1) · Splunk (1) · spyware (1) · Suricata (2) · SV (1) · threat sharing platform (1) · TinyOS (1) · Tofino Xenon (1) · UFW (1) · unidirectional communication (1) · user authentication (1) · vehicle (2) · vehicle communication (1) · virtual machines (1) · virtual network function (1) · virtual platform (1) · web application (1) · Zeek (1) · Zorp firewall (1) · ZPF (1)

Theses

47 theses in total.  View all theses »

By degree:

By semester: