Search for "Leah" returned 1493 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Demoscene now and then
41 min

Demoscene now and then

The demoscene is an underground computer art culture.

Handsfree assistive technology
40 min

Handsfree assistive technology

My technology portfolio to enable work, life, smart home…

Why Railway Is Safe But Not Secure
41 min

Why Railway Is Safe But Not Secure

Security Of Railway Communication Protocols

About Gamma-Ray Bursts And Boats
61 min

About Gamma-Ray Bursts And Boats

What We (Don't) Know About the Most Energetic Events in the…

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

How to Hack Your Way to Space
61 min

How to Hack Your Way to Space

Bringing the Hacker Mindset to the Space Ecosphere - The…

The Maker movement meets patent law
67 min

The Maker movement meets patent law

How many windows are open in the patent fortress

The Enemy
61 min

The Enemy

War, Journalism, VR

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…