|
Nummer
|
Name
|
Dozent
|
1
|
310509
|
Concurrent Programming
|
Arinir, Doga
|
2
|
150322
|
Datenstrukturen und Algorithmen
|
Buchin, Maike
|
3
|
143251
|
Master seminar Privacy and Security in Mobile Operating Systems
|
Degeling, Martin
|
4
|
141105
|
Nichttechnische Veranstaltungen
|
Dozenten der RUB
|
5
|
141106
|
Free Choice of Courses
|
Dozenten der RUB
|
6
|
144013
|
Lehrveranstaltungen der RUB
|
Dozenten der RUB
|
7
|
140001
|
Anpassungsfächer
|
Dozenten der RUB
|
8
|
141036
|
Introduction to Usable Security and Privacy
|
Dürmuth, Markus
|
9
|
143290
|
Bachelor-Seminar Usable Security and Privacy Research
|
Dürmuth, Markus
|
10
|
142061
|
Master-Practical Course on Usable Security and Privacy
|
Dürmuth, Markus
|
11
|
143291
|
Master-Seminar Usable Security and Privacy Research
|
Dürmuth, Markus
|
12
|
141033
|
Usable Security and Privacy
|
Dürmuth, Markus
|
13
|
141347
|
Digital Forensics
|
Fein, Christofer
|
14
|
150332
|
Deep Learning
|
Fischer , Asja
|
15
|
310508
|
Machine Learning: Supervised Methods
|
Glasmachers, Tobias
|
16
|
141321
|
Computer Science 2 - Algorithms and Datastructures
|
Güneysu, Tim
|
17
|
141247
|
Introduction to System Safety Engineering and Management
|
Güneysu, Tim
|
18
|
140002
|
Master Startup ITS
|
Güneysu, Tim
|
19
|
144002
|
Bachelor Thesis ITS
|
Hochschullehrer der Fakultät ET/IT
|
20
|
144004
|
Colloquium ITS
|
Hochschullehrer der Fakultät ET/IT
|
21
|
144102
|
Master Thesis ITS
|
Hochschullehrer der Fakultät ET/IT
|
22
|
141030
|
Software Implementation of Cryptographic Schemes
|
Hoffmann, Max
|
23
|
143243
|
Bachelor Seminar Current topics in IT Security
|
Holz, Thorsten
|
24
|
141340
|
System Security
|
Holz, Thorsten
|
25
|
142249
|
Master Practical Course Vulnerability Assessment
|
Holz, Thorsten
|
26
|
142221
|
Master Practical Course Machine Learning and Security
|
Holz, Thorsten
|
27
|
143242
|
Master Seminar Current topics in IT Security
|
Holz, Thorsten
|
28
|
141241
|
Program Analysis
|
Holz, Thorsten
|
29
|
141246
|
Operating Systems
|
Hönig, Timo
|
30
|
150320
|
Efficient Algorithms
|
Kacso, Daniela
|
31
|
150343
|
Cryptographic Protocols
|
Kiltz, Eike
|
32
|
142040
|
Master Project DSP
|
Kolossa, Dorothea
|
33
|
143163
|
Master Seminar Speech and Pattern Recognition
|
Kolossa, Dorothea
|
34
|
141044
|
Fundamentals of Automatic Speech Recognition
|
Kolossa, Dorothea
|
35
|
128968
|
Web-Engineering
|
König, Markus
|
36
|
150357
|
Boolesche Funktionen mit Anwendungen in der Kryptographie
|
Leander, Gregor
|
37
|
150537
|
Seminar zur Kryptographie
|
Leander, Gregor
|
38
|
150539
|
Seminar Symetric Cryptography
|
Leander, Gregor
|
39
|
150112
|
Mathematics 2
|
Lipinski, Mario
|
40
|
141250
|
Computer Networks
|
Mainka, Christian
|
41
|
141170
|
Systemtheorie 1 - Signale und Systeme
|
Martin, Rainer
|
42
|
150326
|
Introduction to Asymmetric Cryptanalysis
|
May, Alexander
|
43
|
150310
|
Introduction to Theoretical Computer Science
|
May, Alexander
|
44
|
150560
|
Seminar zur Real World Cryptoanalysis
|
May, Alexander
|
45
|
150318
|
Quantum Algorithms
|
May, Alexander
|
46
|
144011
|
Internship ITS
|
Mitarbeiter von Firmen
|
47
|
141035
|
Bachelor-Seminar Security Engineering
|
Moradi, Amir
|
48
|
141034
|
Master-Seminar Security Engineering
|
Moradi, Amir
|
49
|
141028
|
Physical Attacks and Countermeasures
|
Moradi, Amir
|
50
|
141146
|
Quantum Circuits
|
Niemann, Philipp
|