Parent directory/ | - | - |
A couple of results about JavaScript.mp4 | 36.4 MiB | 2021 May 16 23:22 |
Detecting Bots in Online Games using Human Observational Proofs.mp4 | 49.0 MiB | 2021 May 16 23:22 |
Enterprise-Wide Intrusions Involving Advanced Threats.mp4 | 59.0 MiB | 2021 May 16 23:22 |
Exploiting Banners for Fun and Profits.mp4 | 51.1 MiB | 2021 May 16 23:22 |
FuzzyFusion(tm), an application architecture for multisource informati..mp4 | 42.3 MiB | 2021 May 16 23:22 |
Jam me if you can - Mitigating the Impact of Inside Jammers.mp4 | 56.1 MiB | 2021 May 16 23:22 |
Methods and Techniques for Protecting Data in Real Time on the Wire.mp4 | 51.6 MiB | 2021 May 16 23:22 |
Mobile Phones and Evidence Preservation.mp4 | 50.1 MiB | 2021 May 16 23:22 |
Modeling DNS Security - Misconfiguration, Availability, and Visualizatio..mp4 | 49.1 MiB | 2021 May 16 23:22 |
Non-homogeneous anonymizations.mp4 | 52.7 MiB | 2021 May 16 23:22 |
Ontological Semantic Technology Goes Phishing.mp4 | 52.2 MiB | 2021 May 16 23:22 |
Process Implanting - A New Active Introspection Framework for Virtualization.mp4 | 25.2 MiB | 2021 May 16 23:22 |
Provisioning Protocol Challenges in an Era of gTLD Expansion.mp4 | 58.6 MiB | 2021 May 16 23:22 |
Retrofitting Legacy Code for Security.mp4 | 44.8 MiB | 2021 May 16 23:22 |
Risk Perception and Trust in Cloud.mp4 | 33.8 MiB | 2021 May 16 23:22 |
Securing Application-Level Topology Estimation Networks - Facing the Frog-Boil..mp4 | 26.1 MiB | 2021 May 16 23:22 |
Semantic Security - or How I Learned to Stop Worrying and Looooooove the..mp4 | 58.4 MiB | 2021 May 16 23:22 |
Society, Law Enforcement and the Internet - Models for Give and Take.mp4 | 74.1 MiB | 2021 May 16 23:22 |
Soundcomber - A Stealthy and Context-Aware Sound Trojan for Smartphones.mp4 | 57.4 MiB | 2021 May 16 23:22 |
SureView AMP, Active Malware Protection, detecting malware anti virus solutio..mp4 | 42.6 MiB | 2021 May 16 23:22 |
Trusted Computing and Security for Embedded Systems.mp4 | 49.7 MiB | 2021 May 16 23:22 |
Understanding insiders - An analysis of risk-taking behavior.mp4 | 43.1 MiB | 2021 May 16 23:22 |
User and Machine Authentication and Authorization Infrastructure for Distrib..mp4 | 54.9 MiB | 2021 May 16 23:22 |
Weighted Multiple Secret Sharing.mp4 | 50.5 MiB | 2021 May 16 23:22 |
What does Knowledge Discovery, Predictability, and Human Behavior have to do ..mp4 | 46.4 MiB | 2021 May 16 23:22 |
Wireless Technologies and how it relates to cyber security research.mp4 | 56.7 MiB | 2021 May 16 23:22 |