1![SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so](https://www.pdfsearch.io/img/7ebe45f359cbe579dc7d66bad698f2b9.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:58
|
---|
2![Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract](https://www.pdfsearch.io/img/a3f2976b7e27b4d07e0f1fdeb8eac648.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2017-08-13 20:57:42
|
---|
3![Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G](https://www.pdfsearch.io/img/c9d77f294bd6212f6c9ba8708921cc6f.jpg) | Add to Reading ListSource URL: nds.rub.deLanguage: English - Date: 2015-10-30 05:21:14
|
---|
4![Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract](https://www.pdfsearch.io/img/f2ffa9cc59f753ebadd70467e60875a6.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2017-07-13 05:46:45
|
---|
5![Struktur des IT-Dienstleistungszentrum Berlin Pressesprecherin Fr. Schwenk Vorständin Fr. Ines Fiedler Struktur des IT-Dienstleistungszentrum Berlin Pressesprecherin Fr. Schwenk Vorständin Fr. Ines Fiedler](https://www.pdfsearch.io/img/df5bb1db4e847d6271ec50dd135006e8.jpg) | Add to Reading ListSource URL: www.itdz-berlin.deLanguage: German |
---|
6![Out of the Dark: UI Redressing and Trustworthy Events Marcus Niemietz, J¨org Schwenk Horst G¨ ortz Institute for IT Security Chair for Network and Data Security Out of the Dark: UI Redressing and Trustworthy Events Marcus Niemietz, J¨org Schwenk Horst G¨ ortz Institute for IT Security Chair for Network and Data Security](https://www.pdfsearch.io/img/67e4f566df566d12621c5170671fdca2.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2017-11-03 08:02:27
|
---|
7![Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany](https://www.pdfsearch.io/img/e4d99a09922c42aac5b1e352f28c103a.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2012-08-16 02:39:46
|
---|
8![Struktur des IT-Dienstleistungszentrum Berlin Pressesprecherin Fr. Schwenk Vorständin Fr. Ines Fiedler Struktur des IT-Dienstleistungszentrum Berlin Pressesprecherin Fr. Schwenk Vorständin Fr. Ines Fiedler](https://www.pdfsearch.io/img/c272c26ee3c224906093160087b03d14.jpg) | Add to Reading ListSource URL: www.itdz-berlin.deLanguage: German |
---|
9![A Close Look on n-Grams in Intrusion Detection: Anomaly Detection vs. Classification Christian Wressnegger Guido Schwenk A Close Look on n-Grams in Intrusion Detection: Anomaly Detection vs. Classification Christian Wressnegger Guido Schwenk](https://www.pdfsearch.io/img/329f585754873675e59785dc131a4274.jpg) | Add to Reading ListSource URL: filepool.informatik.uni-goettingen.de- Date: 2015-05-08 05:06:14
|
---|
10![VC-G50 Hochauflösende Videokamera Die schwenk-/neig-/zoombare HD-Kamera VC-G50 von Lumens ™ ist mit einem professionellen 1/2,8-ZollBildsensor mit Full HD-1080p-Ausgangsauflösung bei einer hochdynamischen Bildanzeige VC-G50 Hochauflösende Videokamera Die schwenk-/neig-/zoombare HD-Kamera VC-G50 von Lumens ™ ist mit einem professionellen 1/2,8-ZollBildsensor mit Full HD-1080p-Ausgangsauflösung bei einer hochdynamischen Bildanzeige](https://www.pdfsearch.io/img/69841ba6975169997d308bda8d88d1aa.jpg) | Add to Reading ListSource URL: www.kolok.ch- Date: 2016-07-29 07:32:51
|
---|