Search for "Nico" returned 1130 results

52 min
No Body's Business But Mine, a dive into Menstruation Apps
The Not-So Secret Data Sharing Practices Of Menstruation…

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

61 min
QualityLand
Lesung

30 min
Shut Up and Take My Money!
The Red Pill of N26 Security

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

37 min
Listening Back Browser Add-On Tranlates Cookies Into Sound
The Sound of Surveillance

60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…

39 min
Hacking the Czech Parliament via SMS
A parliamentary drama of 223 actors

61 min