Seminar on Internet Technologies (Winter 2011/2012): Difference between revisions

Jump to navigation Jump to search
Line 42: Line 42:
| Voice Over IP - A Success Story?
| Voice Over IP - A Success Story?
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
|-
|-
| Business Models of the Underground Economy.
| Business Models of the Underground Economy.
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
|  
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
|-
|-
| Malware Detection in Networks - Anomaly Detection (multiple topics available)
| Malware Detection in Networks - Anomaly Detection (multiple topics available)