X-TIER: Kernel module injection S Vogl, F Kilic, C Schneider, C Eckert Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 23 | 2013 |
Blind format string attacks F Kilic, T Kittel, C Eckert International Conference on Security and Privacy in Communication Networks …, 2015 | 15 | 2015 |
iDeFEND: Intrusion detection framework for encrypted network data F Kilic, C Eckert Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015 | 9 | 2015 |
Security Testing over Encrypted Channels on the ARM Platform F Kilic, B Geßele, HI Akram 12th International Conference on Internet Monitoring and Protection, 2017 | 4 | 2017 |
Interactive function identification decreasing the effort of reverse engineering F Kilic, H Laner, C Eckert Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016 | 4 | 2016 |
Development Model of a Public Safety Broadband Communications Network in Indonesia G Damanik, DK Hendraningrat, O Favre, B Tellenbach, J Alsenz, F Kilic, ... ICIMP, 2017 | 2 | 2017 |
Retrospective Protection utilizing Binary Rewriting S Proskurin, F Kilic, C Eckert 14. Deutscher IT-Sicherheitskongress, 2015 | 1 | 2015 |
Security Investigation in Encrypted Environment F Kilic Technische Universität München, 2017 | | 2017 |