Personensuche
X
?
Communications in Computer and Information Science; Information Systems Security and Privacy ,
1
Credential Intelligence Agency: A Threat Intelligence Appro..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
2
Generalizing the phishing principle : analyzing user beh..:
, In:
?
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018); Advances in Intelligent Systems and Computing ,
4
Warning of Affected Users About an Identity Leak:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
5
Use-After-FreeMail : Generalizing the Use-After-Free Pro..:
, In:
?
Proceedings of the 15th ACM International Conference on Computing Frontiers ,
6
Gathering and analyzing identity leaks for a proactive warn..:
, In:
?
2017 IEEE 42nd Conference on Local Computer Networks (LCN) ,
7
Reclaim Your Prefix: Mitigation of Prefix Hijacking Using I..:
, In:
?
12
Hacking and security
the comprehensive guide to penetration testing and cybersec...
Rheinwerk Computing
Exemplar:
TB BHV: com 764/159(Engl.)