| Blockchain Lab: Visualizing poisoning attacks on federated learning |
28. aug. 2025 |
|
| Blockchain Lab: Simulating attacks on blockchain |
28. aug. 2025 |
|
| Drone LIDAR streaming for Public Safety |
28. aug. 2025 |
|
| Proactive Defense Against Stealthy Poisoning via Embedding Anomaly Detection |
27. aug. 2025 |
|
| Beyond Template-Based Poisoning: Semantic and Adaptive Attacks on RAG |
27. aug. 2025 |
|
| Towards a Holistic Threat Model for General Purpose AI Systems |
27. aug. 2025 |
|
| AI Red Teaming for Security in General Purpose AI Systems |
27. aug. 2025 |
|
| Implementing a Passkey Revocation Service |
20. aug. 2025 |
|
| QR Code Vulnerabilities |
20. aug. 2025 |
|
| Evaluating Authentication Inconsistencies for Specific Authentication Methods |
20. aug. 2025 |
|
| Informasjonssikkerhet i omorganiseringsprosesser |
20. juni 2025 |
|
| Sikkerhetskompetanse hos ledere |
20. juni 2025 |
|
| A Nationwide Vulnerability Assessment and Reporting Platform |
28. nov. 2024 |
|
| Ledelse av informasjonssikkerhet i 澳门葡京手机版app下载 med Gritera Security |
22. nov. 2024 |
|
| Cybersecurity in collaboration with mnemonic |
4. nov. 2024 |
|
| Application of Bayesian Inversion for API Auditing |
22. sep. 2024 |
|
| Store spr?kmodeller for deteksjon, analyse og respons av digitale trusler |
22. sep. 2024 |
|
| Reversering av obfuskert skadevare |
20. sep. 2024 |
|
| Maskinl?ring for CTF |
20. sep. 2024 |
|
| Maskinl?ring for dekompilering |
20. sep. 2024 |
|
| Prosess for verdikartlegging og -vurdering i risikostyring |
19. sep. 2024 |
|
| Hvordan forhindre at informasjonssikkerhet og personvern blir et hinder for pasientsikkerhet? |
18. sep. 2024 |
|
| Valg av risikostyringsrammeverk |
18. sep. 2024 |
|
| Intelligent Detection of Malicious Activity on Tor |
15. sep. 2024 |
|
| Assessing the Reliability of PenTestGPT: A Comparative Case Study Between LLMs in AI-Driven Infrastructure Testing |
9. sep. 2024 |
|