Bib.Kaishakunin.com
open-menu closeme
Home
Books
Links icon
Kaishakunin.com - My main website Cryptomancer.de - Cryptography stuff Mastodon CodeBerg
About
codeberg mastodon rss
  • Malware Analysis Machine Learning Approaches

    calendar Nov 17, 2018 · 2 min read · - editor malware machine-learning malware-analysis deep-learning  ·
    Share on: twitter facebook linkedin copy

    Malware Analysis Machine Learning Approaches Chiheb Chebbi published in Magdeburger Journal zur Sicherheitsforschung (2018, #16, p. 893-899) Info Machine learning is obviously the hottest trend in the tech industry at the moment, thanks to the huge amount of data collected in many organizations. It is so powerful to …


    Read More

Stefan Schumacher photo

Stefan Schumacher

Hacker, Psychologe, Sicherheitsarchitekt, ehem. Sicherheitsforscher, ehem. Herausgeber eines Open-Access-Journals zur Sicherheitsforschung, ehem. NetBSD-Entwickler, ehem. Scientific Advisor, ehem. Dozent in der polBil, mehrere GnuPG-Schlüssel in Strongset, ab und zu noch mal Konferenz-Speaker
Read More

Recent Posts

  • Informationssicherheit in Versorgungsunternehmen umsetzen Einige praktische Erfahrungen

Categories

MAGDEBURGER JOURNAL ZUR SICHERHEITSFORSCHUNG 70 EDITOR 59 AUTHOR 44 IN PROCEEDINGS 11 BOOKCHAPTER 3

Series

OHNE REIHE 46 INFORMATIONSTECHNOLOGIE UND SICHERHEITSPOLITIK 19 DEEPSEC 2015 14 DEEPSEC 2017 13 DEEPSEC 2019 11

Tags

STEFAN-SCHUMACHER 42 ITSIPOL 19 UPTIMES 14 SICHERHEIT 13 PSYCHOLOGIE 11 SOCIAL-ENGINEERING 10 EDITOR 9 SOZIALPSYCHOLOGIE 8 - 7 KRITIS 7 HUMAN-FACTORS 6 NETBSD 6 BACKUP 5 MALWARE 5 WASSER 5 CYBERWAR 4 OPEN-SOURCE 4 PENETRATION-TESTING 4 2FA 3 CHEMNITZ 3 CRYPTOGRAPHY 3 FFG 3 SECURITY 3
All Tags
-7 2FA3 4G1 5G-MOBILE-NETWORK1 ACTIVE-DOMAIN1 AD1 ADMINISTRATION1 AES2 AIR-GAP1 ANALYSIS1 ANDROID1 ANONYMITÄT1 ANTIVIR1 ANTIVIRUS1 API1 APT2 ATHENS1 AUSBILDUNG1 AUßENPOLITIK1 AUTHENTIFIKATION1 BACKUP5 BACULA2 BEHAVIOURAL-PATTERN1 BETRIEBSSCHUTZ1 BITCOIN1 BITLOCKER1 BLACKENERGY2 BLUETOOTH1 BOTNET1 BYPASS-TECHNIQUES2 CARNA1 CCC1 CHARGING1 CHEMNITZ3 CIPHER1 CIVIL-SOCIETY-ORGANISATION1 CLAUSEWITZ1 CLOUD2 COMPLIANCE1 CONTENT-SECURITY-POLICY1 COSTS1 COUNTERMEASURES1 CRASHOVERRIDE1 CRIMINAL-LAW1 CRITICAL-INFRASTRUCTURE1 CRYPTOGRAPHICATTACK1 CRYPTOGRAPHY3 CSP1 CUDA1 CYBER-SPACE1 CYBERCRIME2 CYBERFRIEDEN1 CYBERKRIEG2 CYBERMOBBING1 CYBERSPACE1 CYBERTERROR1 CYBERWAR4 DATEISYSTEME1 DATENDIEBSTAHL1 DATENSCHUTZ2 DATENSICHERHEIT1 DATENSICHERUNG1 DEEP-LEARNING1 DEEPSEC1 DEFENSIVE-SECURITY1 DIAMETER1 DIN1 DRONES1 DUMP1 EDITOR9 ENCRYPTION2 ESRP1 ETHICAL-HACKING2 EU2 EUROPA2 EUROPEAN-SECURITY-RESEARCH-PROGRAMME1 EVAKUIERUNGSASSISTENT1 EVASION1 EXFILTRATION1 FACHINFORMATIKER2 FAIL1 FAILOVER1 FFG3 FP71 FRIEDENSPOLITIK1 FUNKDIENSTE1 GNUPG1 GOVERNANCE1 GPO1 GPU1 GROUP-POLICY-OBJECTS1 GSM1 HACKER1 HACKING1 HASH1 HEILIGER-STUHL1 HTML1 HUMAN-FACTORS6 HUMAN-VULNERABILITIES1 HVAC1 HYPERVISOR1 ICS1 IDS2 INDUSTRIAL-CONTROL-SYSTEMS1 INDUSTRIE-4.01 INFORMATIONSSICHERHEIT1 INFORMATIONSSICHERHEITSMANAGEMENT1 INSECURITIES1 INTERCONNECTION1 INTERNET1 INTRUSION-DETECTION2 IPV62 IPX1 ISMS1 IT-SICHERHEIT1 IT-SYSTEMELEKTRONIKER1 IT-WEITERBILDUNGSSYSTEM1 ITSIPOL19 JAVA1 JUS-AD-BELLUM1 KERNEL1 KOMPETENZENTWICKLUNG1 KRITIS7 KRYPTOGRAPHIE2 KULTUR1 LAW2 LAWFUL-INTERCEPTION1 LEAKAGE1 LÖSCHEN1 MACHINE-LEARNING1 MAIL1 MALWARE5 MALWARE-ANALYSIS2 MANAGEMENT1 MCAFEE1 MD51 MEDICAL-DEVICES1 METASPLOIT1 MFA1 MICROSOFT1 MJSEDITORIAL1 MOBBING1 NETBSD6 NORM1 OFFENSIVE-SECURITY1 OPEN-SOURCE4 OPERATIONALISIERUNG1 PASSWORDCRACKING1 PENETRATION-TESTING4 PENTEST1 PGP1 PHYSICAL-SEPARATION1 PKGSRC1 POSTGRESQL1 PRIVACY2 PSYCHOLOGIE11 PSYCHOLOGY1 QUALITATIVE-INTERVIEWS1 RADIKALISIERUNG1 RANSOMWARE1 RED-TEAM2 REGULATION1 RESEARCH1 RESTORE1 REZENSION2 RISIKOMANAGEMENT1 RISK-MANAGEMENT1 RISKS1 ROUTER1 SALAFISMUS1 SCADA2 SCHADSOFTWARE2 SECURITY3 SECURITY-ARCHITECTURE1 SECURITY-AWARENESS1 SEGREGATION-OF-DUTY1 SERVER1 SHA-2561 SICHERHEIT13 SICHERHEITSARCHITEKTUR1 SICHERHEITSPOLITIK3 SICHERHEITSSTRATEGIE1 SIGNAL-HACKING-AND-DISRUPTION1 SINGLE-SIGN-ON1 SMIME1 SNORT1 SOCIAL-ENGINEERING10 SOZIALE-KOMPETENZEN1 SOZIALPSYCHOLOGIE8 SS71 SSL2 SSLSOCKET1 SSO1 STALKING1 STEFAN-SCHUMACHER42 STRATEGIE1 SYSTEM-CALL2 SYSTEM-CALLS1 SYSTRACE3 TECHNIKGENESE1 TECHNIKPHILOSOPHIE1 TECHNOLOGIEGENESE1 TERROR1 TIEFENPSYCHOLOGIE1 TOR1 TRINKWASSER1 TRISIS1 TROJANER1 TRUST1 TVET1 TWO-FACTOR-AUTHENTICATION1 ÜBERWACHUNG1 UNSICHERHEIT1 UNSOLVED-CASES1 UPTIMES14 VERDECKTE-KANÄLE1 VERSORGUNGSUNTERNEHMEN1 VIRTUAL-MACHINE1 VIRTUALISATION2 VIRUS1 VODAFONE1 VULNERABILITIES3 WAF1 WAHRNEHMUNG1 WASSER5 WASSERVERSORGUNG1 WEB-APPLICATION1 WEB-APPLICATION-FIREWALL1 WEB-APPLICATION-FIREWALLS2 WHITELISTS1 WIPE1 WURM1 YUBIKEY1 ZIGBEE1 ZWEI-FAKTOR1
[A~Z][0~9]
Copyright © 2008–2025, Stefan Schumacher

Copyright 2008-  COPYRIGHT © 2008–2025, STEFAN SCHUMACHER. All Rights Reserved

to-top