Vortragsunterlagen
- Allmer_Red Teamer Tagebuch Kapitel 2
- Bär_ITSEC-X_Überwachung,+Angriffserkennung+und+Analysemöglichkeiten+auf+Container-Umgebungen+zur+Laufzeit_englisch.pdf
- Dorner_Who Watches the Watchmen - Kernel-Level Anti-Cheat vs Rootkits.pdf
- Ekelhart_LLM_Cybersecurity_051024.pdf
- Ettlinger_Skynet wants your Passwords_IT-SecX.pdf
- Fürthauer_Pentesting_AI_v2024.pdf
- Gattermeyer_anapur IT-SECX 2024 CC r1 Handout.pdf
- Grottenthaler_VidraSec-ITSECX-Who-Let-The-Hounds-Out.pdf
- Habenegg_OT-Security_im_Kontext_Manufacturing_AI_PwC_20241009.pdf
- Holzgethan_The Big LLMbowski - Ensuring AI Abides.pdf
- Kosic_Breaching_Bad_IT_SECX24.pdf
- Kruchem_JKU_ITSECX_Presentation_v1.0.pdf
- Kugler_SBA ITSECX Observing Clouds - container defenses for embedded systems using eBPF.pdf
- Kukovic_Schwabel_Praesentation_ITSECX.pdf
- Loew_Novotny_ITSECX2024_EVN_NIS_Gießkanne_final.pdf
- Longin_ITSECX_SMTP_Smuggling_v1.0.pdf
- Medicke_DTTL_LLM-Sicherheitslücken_in_AI-Chatbots_IT-SECX.pdf
- Mrskos_itsecx_2024_smp.pdf
- Pfeiffer_CyberDefense_DES_ITSECX.pdf
- Poisel_Embedded Security Testing
- Schier_ITSECX-UnlockingAgileSecurity.pdf
- Schlaghuber_AI and Cybersecurity in IT and OT Convergence V3 handout.pdf
- Steinbrenner_ITSecX 2024.pdf
- Strommer_OT_v2.pdf