Search for "Isa" returned 9575 results
51 min
How to contribute to make open hardware happen
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
26 min
Data Mining for Good
Using random sampling, entity resolution, communications…
32 min
The Case for Scale in Cyber Security
Security Track Keynote
60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite
29 min
Hacking collective as a laboratory
Hackers' knowledge studied by sociologist of science
113 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 33C3
60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers
31 min
BGP and the Rule of Custom
How the internet self-governs without international law
29 min
Building and Breaking Wireless Security
Wireless Physical Layer Security & More...
45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways
60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders
26 min
Der 33 Jahrerückblick
Technology and Politics in Congress Talks, from 1984 to now
55 min