Showing 1 - 10 results of 10 for search 'Jörg Keller', query time: 0.04s
Refine Results
-
1
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains by Jörg Keller, Steffen Wendzel
Published 2021-01-01
Article -
2
Requirements for Crafting Virtual Network Packet Captures by Daniel Spiekermann, Jörg Keller
Published 2022-07-01
Article -
3
Challenges of Network Forensic Investigation in Fog and Edge Computing by Daniel Spiekermann, Jörg Keller
Published 2023-10-01
Article -
4
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection by Rafał Kozik, Michał Choraś, Jörg Keller
Published 2019-01-01
Article -
5
-
6
Progress in Features, Data, Patterns and Similarity Analysis by Michał Choraś, Salvatore Antonio, Jörg Keller, Rafał Kozik
Published 2020-06-01
Article -
7
A structural analysis of the A5/1 state transition graph by Andreas Beckmann, Jaroslaw Fedorowicz, Jörg Keller, Ulrich Meyer
Published 2012-10-01
Article -
8
Advances and Practical Applications of Deep and Shallow Machine Learning by Michal Choras, Robert Burduk, Rafal Kozik, Jörg Keller
Published 2022-03-01
Article -
9
Cyberattack Detection and Response by Jörg Keller, Wojciech Mazurczyk, Bela Genge, Lothar Fritsch, Simon Vrhovec
Published 2019-11-01
Article -
10
Giant offshore pumice deposit records a shallow submarine explosive eruption of ancestral Santorini by Tim Druitt, Steffen Kutterolf, Thomas A. Ronge, Christian Hübscher, Paraskevi Nomikou, Jonas Preine, Ralf Gertisser, Jens Karstens, Jörg Keller, Olga Koukousioura, Michael Manga, Abigail Metcalfe, Molly McCanta, Iona McIntosh, Katharina Pank, Adam Woodhouse, Sarah Beethe, Carole Berthod, Shun Chiyonobu, Hehe Chen, Acacia Clark, Susan DeBari, Raymond Johnston, Ally Peccia, Yuzuru Yamamoto, Alexis Bernard, Tatiana Fernandez Perez, Christopher Jones, Kumar Batuk Joshi, Günther Kletetschka, Xiaohui Li, Antony Morris, Paraskevi Polymenakou, Masako Tominaga, Dimitrios Papanikolaou, Kuo-Lung Wang, Hao-Yang Lee
Published 2024-01-01
Article