A Nationwide Vulnerability Assessment and Reporting Platform |
28. nov. 2024 |
|
Ledelse av informasjonssikkerhet i 澳门皇冠体育,皇冠足球比分 med Gritera Security |
22. nov. 2024 |
|
Cybersecurity in collaboration with mnemonic |
4. nov. 2024 |
|
LLM-Driven Generation of Cybersecurity Ontologies |
2. okt. 2024 |
|
Supporting SMPC: Developing a Framework for Secure Web Integration and Accessibility |
22. sep. 2024 |
|
Optimizing Enumeration: Reducing Noise and Supporting Stealth in Sub-Directory and File Discovery |
22. sep. 2024 |
|
Detecting Account Takeover Detection Using Passive Monitoring Mannerisms |
22. sep. 2024 |
|
Coordinating Agents to Conduct Stealthy DDOS |
22. sep. 2024 |
|
Bypassing SQL Injection Defense with Intelligent Agents |
22. sep. 2024 |
|
Application of Bayesian Inversion for API Auditing |
22. sep. 2024 |
|
Analysis of AI Regulation |
22. sep. 2024 |
|
KI-drevne metoder for trusseldeteksjon |
22. sep. 2024 |
|
Store spr?kmodeller for deteksjon, analyse og respons av digitale trusler |
22. sep. 2024 |
|
Utforsking av ATLAS-rammeverket for trusler mot maskinl?ringsmodeller |
22. sep. 2024 |
|
Potentials and challenges for EU cybersecurity cooperation |
20. sep. 2024 |
|
Impacts of the EU cyber acts |
20. sep. 2024 |
|
Attack analysis of the Open Automated Demand Response protocol |
20. sep. 2024 |
|
Attack analysis of the IEC 61850 Manufacturing Messaging Specification (MMS) |
20. sep. 2024 |
|
Reversering av obfuskert skadevare |
20. sep. 2024 |
|
Maskinl?ring for CTF |
20. sep. 2024 |
|
Maskinl?ring for dekompilering |
20. sep. 2024 |
|
Covert channel analysis in industry protocols |
20. sep. 2024 |
|
Prosess for verdikartlegging og -vurdering i risikostyring |
19. sep. 2024 |
|
Hvordan forhindre at informasjonssikkerhet og personvern blir et hinder for pasientsikkerhet? |
18. sep. 2024 |
|
Valg av risikostyringsrammeverk |
18. sep. 2024 |
|