Search for "51" returned 3738 results
55 min
Lobby-Schlacht um die ePrivacy-Verordnung
Die EU hat die Wahl: Schutz von Menschen oder von…
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
61 min
Warum die Digitale Revolution des Lernens gescheitert ist.
Fünf Desillusionen
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
58 min
Virtual Machine Introspection
From the Outside Looking In
60 min
Lifting the Fog on Red Star OS
A deep dive into the surveillance features of North Korea's…
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits
64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…
58 min
PLC-Blaster
Ein Computerwurm für PLCs
91 min
What the World can learn from Hongkong
From Unanimity to Anonymity
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
56 min
Electronic Bank Robberies
Stealing Money from ATMs with Malware
60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…
59 min