Video-Server > Vorlesungen > Car IT and Cybersecurity (CIT-CS) III

Car IT and Cybersecurity (CIT-CS) III

by Prof. Dr.-Ing. Dietmar P. F. Möller

29:43 hrs390 Views10.Apr.2018
Camera and Cut Marvin Zägel

Information about the videoserver and -player

You can find information about the videoserver and the player in the videoserver FAQ (in german only).


Lectures


LO 0: Overview / LO 1: Introduction

01:18 hrs10.Apr.201870 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Part 1- Introduction, Part 2 - Work Topic

LO 2: Cyber-Physical Systems and Internet of Things

01:31 hrs12.Apr.201821 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Introduction to Systems

LO 2: Cyber-Physical Systems and Internet of Things

01:29 hrs24.Apr.201816 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Introduction to Cyberphysical System

LO 2: Cyber-Physical Systems and Internet of Things

01:39 hrs26.Apr.201821 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Vehicular Cyber-Physical Systems and Network

LO2 - Car IT and Cyber Security III

01:06 hrs09.May.201815 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Road Side Units

LO2- Car IT and Cyber Security III

01:55 hrs09.May.201812 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Internet of things

LO3 - Car IT and Cyber Security III

01:21 hrs16.May.20189 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Ubiquitious Computing and Clound Computing

LO3 - Car IT and Cybersecurity III

01:34 hrs16.May.201811 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Ubiquitous Computing and Cloud Computing

LO3 - Car IT and Cyber Security III

01:18 hrs30.May.20183 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Cloud Computing Fundamentals

LO3 - Car IT and Cyber Security III

46:30 min30.May.20183 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

LO0- Car IT and Cyber Security III

26:10 min30.May.201816 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Part II

LO4 - Car IT and Cyber Security III

01:30 hrs06.Jun.20183 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Enemy attack models

LO4 - Car IT and Cyber Security III

01:42 hrs06.Jun.20184 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Enemy Attack Models Part II

LO 4: Enemy Attack Models, Scenarios and Consequences

01:20 hrs20.Jun.20185 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Scenarios and Consequences in Cyber Attacks;
Summary and Exercises;
References and Further Readings;
Outlook

LO 5: Countermeasures for Intrusion Detection and Prevention

01:26 hrs20.Jun.20188 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Overview and Learning Scope;
Introduction;
Intrusion Detection;
Intrusion Prevention;
Intrusion Detection and Prevention;
Countermeasures;
Summary and Exercises

LO5 - Car IT and Cyber Security III

02:33 hrs04.Jul.201831 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Student Research Project Work Topic Options

Car IT and Cybersecurity III - Presentation

07:33 min18.Jul.201811 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack Scenario Modeling

Car IT and Cybersecurity III - Presentation

10:39 min18.Jul.20183 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Risk and Analyses Part I

Car IT and Cybersecurity III - Presentation

08:40 min18.Jul.20182 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Risk and Analyses Part II

Car IT and Cybersecurity III - Presentation

10:52 min18.Jul.20188 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Securing Cloud Computing Part I

Car It and Cybersecurity III - Presentation

08:38 min18.Jul.201810 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Securing Cloud Computing Part II

Car IT and Cybersecurity III - Presentation

16:47 min18.Jul.201820 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Secruing Cloud Computing Part III

Car IT and Cybersecurity III - Presentation

11:26 min18.Jul.201817 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack Models in Automotive Domain

Car IT and Cybersecurity III - Presentation

12:24 min18.Jul.20181 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack Security

Car IT and Cybersecurity III - Presentation

13:50 min18.Jul.20181 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Scenarios and Attack Trees

Car IT and Cybersecurity III - Presentation

14:21 min18.Jul.20187 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Attack Models in Automotive Domain

Car IT and Cybersecurity III - Presentation

16:54 min18.Jul.20184 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Vehicular Ad Hoc Network

Car IT and Cybersecurity III - Presentation

14:40 min18.Jul.201811 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Topics:
Network Application for Network Security

Car IT and Cybersecurity III - Presentation 1 - 6

02:26 hrs10.Sep.201821 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.

Car IT and Cybersecurity III - Presentation 7 - 10

01:48 hrs10.Sep.201820 Views

This recording is available only for participants of the lecture. Please login to Stud.IP.


Impressum · Kontakt · Datenschutz© TU Clausthal 2018