Personensuche
X
?
Communications in Computer and Information Science; Ubiquitous Security ,
2
A SLAHP in the Face of DLL Search Order Hijacking:
, In:
?
Lecture Notes in Networks and Systems; Good Practices and New Perspectives in Information Systems and Technologies ,
3
A Model for Assessing the Adherence of E-Identity Solutions..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
5
Enhancing the ACME Protocol to Automate the Management of A..:
, In:
?
2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom) ,
6
The Interplay Between Policy and Technology in Metaverses: ..:
, In:
?
2023 7th Cyber Security in Networking Conference (CSNet) ,
7
Implementing the Principle of Least Privilege Using Linux C..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
8
Towards Reliable Collaborative Data Processing Ecosystems: ..:
, In:
?
Communications in Computer and Information Science; Emerging Information Security and Applications ,
10
AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malici..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
14